NSA spies targeted World of Warcraft and Xbox Live
Wizard plan saw spooks became elves and trolls to hunt for terrorists.


GCHQ and the NSA both infiltrated games such as World of Warcraft and the Xbox Live platform as part of their Prism operations, it has emerged.
The Guardian reported the campaign of spying was leaked in a document from Edward Snowden.
The document, entitled Exploiting Terrorist Use of Games & Virtual Environments, was written in 2008 and claimed games were a "target rich communications network" and that agencies slurped up vast amounts of data.
The NSA said the games could allow surveillance targets to hide in plain sight.
"We know that terrorists use many feature-rich internet communications media for operational purposes such as email, VoIP, chat, proxies, and web forums and it is highly likely they will be making wide use of the many communications features offered by Games and Virtual Environments (GVE) by 2010," the document said.
"The SIGINT Enterprise needs to begin taking action now to plan for collection, processing, presentation, and analysis of these communications."
The document also show how spy agencies tried to recruit informants to help find terrorists using games as a cover.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
However, so many spies infiltrated the games leading to spy agencies setting up a "de-confliction" group to make sure agents didn't erroneously spy on each other.
It is unclear if the action taken by spies to infiltrate games ever resulted in the foiling of a terrorist plot. The document said the "amount of GVEs in the world is growing but the specific ones that CT [counter-terrorism] needs to be methodically discovered and validated. Only then can we find evidence that GVEs are being used for operational uses."
In a statement, Blizzard Entertainment, the company behind World of Warcraft, said: "We are unaware of any surveillance taking place. If it was, it would have been done without our knowledge or permission."
Microsoft also made similar statements.
The news comes as a group of major tech companies have asked the US government to reform surveillance laws.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
AWS makes its Panorama Appliance generally available
News The device helps increase quality control, optimize supply chains, and enhance consumer experiences
By Praharsha Anand Published
-
Eagle Eye Networks announces new editions of Cloud VMS
News The editions are suitable for small, medium, and large businesses
By Praharsha Anand Published
-
How to build a Raspberry Pi security camera
Tutorials Build your own cut-price surveillance equipment
By Mark Mayne Last updated
-
EnGenius EL-EWS1025CAM review
Reviews A clever hybrid IP camera that combines video surveillance with a wireless AP and support for EnGenius’ Neutron WLAN meshing
By Dave Mitchell Published
-
Axis M1065-LW review
Reviews It’s pricey, but this little 1080p camera simply won’t be beaten for video quality and surveillance features
By Dave Mitchell Published
-
D-Link Vigilance DCS-4602EV review
Reviews A very affordable outdoor IP camera that’s built like a tank, though image quality is merely adequate
By Dave Mitchell Published
-
Big Data surveillance 'risks public's privacy'
News Commissioner looks to limit use of CCTV
By Dale Walker Published
-
WikiLeaks files expose alleged CIA hacking tools
News CIA's tools can break into any kind of operating system, smart device or digital machine
By Clare Hopping Published