Fringe is an American science fiction television series that originally aired on the Fox network from September 9, 2008, to January 18, 2013. The series follows the Fringe Team as it investigates bizarre scientific occurrences related to "The Pattern", a string of freak, fringe science –related incidents worldwide. The team consists of FBI special agent Olivia Dunham ( Anna Torv ), eccentric scientist Walter Bishop ( John Noble ) and his genius son Peter Bishop ( Joshua Jackson ), as well as others at the FBI and the Department of Homeland Security . The series' narrative evolves and it later centers on a parallel universe and then on the mysterious Observers – a group of expressionless, pale, bald men in suits who have appeared throughout documented human history at significant historical events.
89-474: " The Transformation " is the thirteenth episode of the first season of the American science fiction drama television series Fringe . Its storyline centers on the circumstances surrounding a deceased scientist ( Neal Huff ), who was doped with a "designer virus" and transformed into a dangerous monster, causing his plane to crash. Fringe agent Olivia Dunham ( Anna Torv ) and FBI consultants Peter ( Joshua Jackson ) and Walter Bishop ( John Noble ) connect
178-636: A "privacy mechanism"; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was canceled when Michael Hayden chose Trailblazer , which did not include ThinThread's privacy system. Trailblazer Project ramped up in 2002 and was worked on by Science Applications International Corporation (SAIC), Boeing , Computer Sciences Corporation , IBM , and Litton Industries . Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and
267-714: A 2010 article in The Washington Post , "every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases." Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple , Venona project , and JN-25 ). In 2004, NSA Central Security Service and
356-473: A 5/6.5 ratings share among viewers aged 18–49, meaning that it was seen by 5.0 percent of all 18- to 49-year-olds, and 6.5 percent of all 18- to 49-year-olds watching television at the time of broadcast. This rating meant it ranked eighth for the week among all the major networks. Sarah Stegall of SFScope attributed this ratings success to its lead-in show, the highly rated American Idol , and observed that "with episodes like this one, mixing action, horror, and
445-674: A CIA plot (ordered by the administration of President John F. Kennedy ) to assassinate Fidel Castro . The investigation also uncovered NSA's wiretaps on targeted U.S. citizens. After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed. This was designed to limit the practice of mass surveillance in the United States . In 1986, the NSA intercepted
534-466: A few tender moments, it looks like Fringe is hitting its stride with viewers." "The Transformation" received generally positive reviews. Andrew Hanson from the Los Angeles Times gave the episode a positive review, opining that it "hit the perfect tone for Fringe [and had] the right mixture of science fiction, dark comedy, crime story and melodrama". Hanson was, however, disappointed with
623-603: A file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR , who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor ; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal . Linus Torvalds ,
712-402: A little emotional." SFScope columnist Sarah Stegall had difficulty "suspend[ing her] disbelief" with the science behind Bowman's rapid transformation. Though she thought it was "sweet" that Scott's proposal "echo[ed] the real-life recent marriage between Anna Torv and Mark Valley," Stegall was pleased that the series could now move onto another storyline. List of Fringe episodes Fringe
801-399: A major cryptography conference was J. Solinas' presentation on efficient Elliptic Curve Cryptography algorithms at Crypto 1997. The IAD's cooperative approach to academia and industry culminated in its support for a transparent process for replacing the outdated Data Encryption Standard (DES) by an Advanced Encryption Standard (AES). Cybersecurity policy expert Susan Landau attributes
890-668: A physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a highly classified intelligence team) inserts eavesdropping devices in high-value targets (such as presidential palaces or embassies). SCS collection tactics allegedly encompass "close surveillance, burglary, wiretapping, [and] breaking and entering". Unlike the CIA and the Defense Intelligence Agency (DIA), both of which specialize primarily in foreign human espionage ,
979-513: A plane disaster; accordingly, IGN expressed, it made sense thematically to have his last appearance be in an episode about a similar type of disaster. The Los Angeles Times viewed the flight number of 718 and its subsequent crash as a nod to co-creator J. J. Abrams ' other series, Lost . The episode also had an influence on the series' fourth season, which featured parallel stories to those that occurred in earlier episodes. The season's sixteenth episode, " Nothing As It Seems ", centers around
SECTION 10
#17327650213631068-477: A result of the boomerang routing of Canadian Internet service providers . A document included in NSA files released with Glenn Greenwald 's book No Place to Hide details how the agency's Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers , servers , and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This
1157-588: A variety of measures to accomplish its mission, the majority of which are clandestine . The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II , it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of personnel and budget, but information available as of 2013 indicates that
1246-423: Is an "unethical researcher" who fell "under the overmastering spell of research," in a vein similar to Walter. Like the pilot episode , "The Transformation" begins on the passenger section of an airplane in flight. Actor Mark Valley was asked how the episode differed from the pilot, leading him to joke that "it's a completely different airline this time." His character, John Scott, was first seen in an episode about
1335-937: Is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013. A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East. The NSA has also spied extensively on the European Union, the United Nations, and numerous governments including allies and trading partners in Europe, South America, and Asia. In June 2015, WikiLeaks published documents showing that NSA spied on French companies. WikiLeaks also published documents showing that NSA spied on federal German ministries since
1424-408: Is involved in a sale, leading to Olivia returning to the sensory deprivation tank in order to find out more from Scott's memories. In a motel room they used to share, Scott talks to Olivia, scaring her into shooting him. Olivia next appears in an alleyway, where she follows Scott into a memory of him almost killing Conrad. He reveals that he, Hicks, and Marshall are all undercover government agents for
1513-496: The Central Intelligence Agency (CIA) pulled ahead in this regard, with a budget of $ 14.7 billion. The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end. The NSA is also alleged to have been behind such attack software as Stuxnet , which severely damaged Iran's nuclear program . The NSA, alongside the CIA, maintains
1602-715: The Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage , received criticism from countries outside the UKUSA alliance. The NSA was also involved in planning to blackmail people with " SEXINT ", intelligence gained about a potential target's sexual activity and preferences. Those targeted had not committed any apparent crime nor were they charged with one. To support its facial recognition program,
1691-565: The NSA , and tells Olivia to ask Hicks where the meeting is going to happen. They awake Hicks, who tells them more about the weapons sale. Being given details from a secret radio by Hicks, Olivia pretends to be the weapons buyer, and is accompanied by Peter. They successfully make contact, but the sellers become suspicious after Hicks' transformation restarts, depriving Olivia of the necessary information. Conrad makes his appearance and realizes Olivia and Peter are lying; just before he orders them killed,
1780-811: The National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand the NSA Centers of Academic Excellence in Information Assurance Education Program. As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008, by President Bush, the NSA became the lead agency to monitor and protect all of
1869-582: The Television Critics Awards , Fringe earned a 2009 award that designated it "Outstanding New Program of the Year". Fringe won seven Saturn Awards among fifteen nominations; from 2009–11, Torv won for Best Actress on Television , while Noble won for Best Supporting Actor on Television in 2010. Noble won a similar award at the 2011 Critics' Choice Television Awards , where the series and Torv also received nominations. Additionally,
SECTION 20
#17327650213631958-639: The US Court of Appeals . The court also added that the US intelligence leaders, who publicly defended it, were not telling the truth. NSA's eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential, or secret government communications. According to
2047-596: The United States Department of Defense , under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems . The NSA relies on
2136-685: The Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident . A secret operation, code-named " MINARET ", was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker , as well as key leaders of the civil rights movement , including Martin Luther King Jr. , and prominent U.S. journalists and athletes who criticized
2225-602: The Vietnam War , with about 30,000 NESTOR sets produced. However, a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit and intercept U.S. communications. In the aftermath of the Watergate scandal , a congressional hearing in 1975 led by Senator Frank Church revealed that the NSA, in collaboration with Britain's SIGINT intelligence agency, Government Communications Headquarters (GCHQ), had routinely intercepted
2314-403: The Vietnam War . However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was "disreputable if not outright illegal". The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during
2403-464: The fifth featured thirteen installments. Fringe ' s ratings started strongly with a weekly episode average of 8.8 million, achieving first place in the 18–49 adult demographic among the 2008–09 television season's new shows . In addition to these solid ratings, the first season garnered a generally favorable critical reception. Later seasons gradually suffered a decrease in ratings—the series finale being watched by just 3.2 million viewers—though
2492-488: The "designer virus" that had caused Marshall Bowman to transform, but this time he does so in the airport after his plane has safely landed. Peter recognizes the case from his own timeline, as seen in the events of "The Transformation", and helps the Fringe team locate Daniel Hicks. "The Transformation" first aired on February 3, 2009 in the United States, and was watched by an estimated 12.78 million viewers. The episode earned
2581-486: The 1990s. Even Germany's Chancellor Angela Merkel 's cellphones and phones of her predecessors had been intercepted. Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant . Initially, it
2670-574: The AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests, such as the Department of State , the Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI). In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as
2759-724: The Chamber's initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson , who defended his decision by stating, "Gentlemen do not read each other's mail." During World War II , the Signal Intelligence Service (SIS) was created to intercept and decipher the communications of the Axis powers . When the war ended, the SIS was reorganized as the Army Security Agency (ASA), and it
The Transformation - Misplaced Pages Continue
2848-474: The FBI moves in and arrests the sellers. The episode ends with Walter telling Olivia her brain waves are going back to normal, and that Scott's memories are fading from her mind. Olivia requests to enter the tank regardless, and she makes a last encounter with Scott, where he tells her he loved her and was going to marry her. She bids farewell to his consciousness, which has finally left her own. "The Transformation"
2937-411: The NSA and DoD Inspectors General . The project was canceled in early 2004. Turbulence started in 2005. It was developed in small, inexpensive "test" pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer. It
3026-714: The NSA and other U.S. defense cryptanalysis components. To further ensure streamlined communication between the signals intelligence community divisions, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service. The NSA's actions have been a matter of political controversy on several occasions, including its spying on anti–Vietnam War leaders and
3115-497: The NSA does not publicly conduct human intelligence gathering . The NSA is entrusted with assisting with and coordinating, SIGINT elements for other government organizations—which are prevented by Executive Order from engaging in such activities on their own. As part of these responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which facilitates cooperation between
3204-590: The NSA is intercepting "millions of images per day". The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by the NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques. This "collect it all" strategy introduced by NSA director, Keith B. Alexander ,
3293-447: The NSA that allowed the export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a "workload reduction factor" for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage , but not against spying by the US government. While it is assumed that foreign transmissions terminating in
3382-567: The NSA's Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish a network bridge "that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants." NSA's mission, as outlined in Executive Order 12333 in 1981, is to collect information that constitutes "foreign intelligence or counterintelligence" while not "acquiring information concerning
3471-583: The NSA's ability to surveil the domestic Internet traffic of foreign countries through " boomerang routing ". The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I . A code and cipher decryption unit was established as the Cable and Telegraph Section, which was also known as the Cipher Bureau. It
3560-653: The NSA's harmonious collaboration with industry and academia in the selection of the AES in 2000—and the Agency's support for the choice of a strong encryption algorithm designed by Europeans rather than by Americans—to Brian Snow , who was the Technical Director of IAD and represented the NSA as cochairman of the Technical Working Group for the AES competition, and Michael Jacobs , who headed IAD at
3649-673: The NSA's role in economic espionage in a report entitled 'Development of Surveillance Technology and Risk of Abuse of Economic Information'. That year, the NSA founded the NSA Hall of Honor , a memorial at the National Cryptologic Museum in Fort Meade, Maryland. The memorial is a, "tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology". NSA employees must be retired for more than fifteen years to qualify for
The Transformation - Misplaced Pages Continue
3738-460: The National Security Agency. The National Security Council issued a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9 . On the same day, Truman issued a second memorandum that called for the establishment of the NSA. The actual establishment of the NSA was done by a November 4 memo by Robert A. Lovett , the Secretary of Defense , changing
3827-597: The U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA's ability to surveil the domestic Internet traffic of foreign countries. Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as
3916-598: The United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO). This memo appears to give credence to previous speculation by cryptographers at Microsoft Research . Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted. XKeyscore rules (as specified in
4005-511: The ability to monitor a large proportion of the world's transmitted civilian telephone, fax, and data traffic. During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill. Investigative journalist Duncan Campbell reported in 1988 on the " ECHELON " surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT , and detailed how
4094-500: The agency's participation in economic espionage . In 2013, the NSA had many of its secret surveillance programs revealed to the public by Edward Snowden , a former NSA contractor. According to the leaked documents, the NSA intercepts and stores the communications of over a billion people worldwide, including United States citizens. The documents also revealed that the NSA tracks hundreds of millions of people's movements using cell phones metadata . Internationally, research has pointed to
4183-810: The airplane [from "The Transformation"] was more shocking. It was so unexpected." At the time "The Transformation" aired, Joshua Jackson considered it the series' best episode. John Noble called it "grotesque" and "possibly one of the more gruesome ones we've done." In her 2011 book Into the Looking Glass: Exploring the Worlds of Fringe , author Sarah Clarke Stuart observed that two unrelated Fringe characters, Conrad Moreau of "The Transformation" and Moreau ( Brad Dourif ) of " The Day We Died ", are allusions to H. G. Wells ' 1896 novel The Island of Doctor Moreau . Both are "scientifically inspired men with questionable integrity," while Wells' Doctor Moreau
4272-498: The army cryptographic section of Military Intelligence (MI-8) moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley. After the disbandment of the U.S. Army cryptographic section of military intelligence known as MI-8, the U.S. government created the Cipher Bureau, also known as Black Chamber , in 1919. The Black Chamber
4361-422: The back foam mold with "backbarbs". Eight different dentures were made of Huff's mouth to depict the character gradually losing his teeth, "anything from simple teeth that match his own..., to wiggling teeth that he can start to loosen up, to ones where he's already started to lose a tooth," explained Special Effects Makeup crewman Stephen Kelley. Each denture appliance took about a day to create. The final version of
4450-439: The cast and crew referred to the monster as a "were-upine" or "porcuman". Lance Reddick commented on set, "When I first got here tonight, I was expecting zombies to come up out of the ground. And the actual creature looks so bizarre, I mean it really looks like something I wouldn't want to be caught in the woods with." The crew spent over a week collecting and placing the plane wreckage together. According to Set Dresser Russ Griffin,
4539-521: The closure of the Olivia–John Scott storyline, as he hoped that "she doesn't carry this torch too long" because he preferred the "flirty" Olivia. Ramsey Isler of IGN gave the episode 9.0/10, an indication of an "amazing" installment. He was pleased with the absence of Sanford Harris and enjoyed the "brilliantly written and directed" undercover sting operation, particularly because Peter was properly utilized as Olivia's "wingman." Isler also criticized
SECTION 50
#17327650213634628-599: The communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing . The White House asserted that the NSA interception had provided "irrefutable" evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya . In 1999, a multi-year investigation by the European Parliament highlighted
4717-405: The creature, Kelley noted, was "very exaggerated... He's got the big giant quills coming off it like a porcupine. And it's also got six nipples on it, which is part of us trying to investigate what this creature actually it is." Andrew Orloff, the creative director and visual effects supervisor of Zoic Studios , considered the creature one of the most challenging effects his company helped make for
4806-535: The decrypted traffic of many of the conference delegations, including the Japanese . The Black Chamber successfully persuaded Western Union , the largest U.S. telegram company at the time, as well as several other communications companies, to illegally give the Black Chamber access to cable traffic of foreign embassies and consulates. Soon, these companies publicly discontinued their collaboration. Despite
4895-538: The eavesdropping operations worked. On November 3, 1999, the BBC reported that they had confirmation from the Australian Government of the existence of a powerful "global spying network" code-named Echelon, that could "eavesdrop on every single phone call, fax or e-mail, anywhere on the planet" with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was "linked directly to
4984-527: The equivalent agencies in the United Kingdom ( Government Communications Headquarters ), Canada ( Communications Security Establishment ), Australia ( Australian Signals Directorate ), and New Zealand ( Government Communications Security Bureau ), otherwise known as the UKUSA group, was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include
5073-508: The event to an impending arms deal. Olivia must explore her mind for remaining memories of her former partner and lover, John Scott ( Mark Valley ), in order to prevent the sale of the virus. The episode was co-written by Zack Whedon and supervising producer J. R. Orci , while producer Brad Anderson served as the director. The creation of the monster took the crew approximately eleven days—they took molds of guest actor Huff's head and back and created eight sets of dentures in order to create
5162-524: The federal government's computer networks from cyber-terrorism . A part of the NSA's mission is to serve as a combat support agency for the Department of Defense. Operations by the National Security Agency can be divided into three types: "Echelon" was created in the incubator of the Cold War . Today it is a legacy system , and several NSA stations are closing. NSA/CSS, in combination with
5251-410: The founder of Linux kernel , joked during a LinuxCon keynote on September 18, 2013, that the NSA, who is the founder of SELinux , wanted a backdoor in the kernel. However, later, Linus' father, a Member of the European Parliament (MEP), revealed that the NSA actually did this. When my oldest son was asked the same question: "Has he been approached by the NSA about backdoors?" he said "No", but at
5340-635: The headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland". NSA's United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about "... U.S. persons , entities, corporations or organizations...." without explicit written legal permission from the United States Attorney General when the subject is located abroad, or
5429-475: The international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock . The NSA tracked these individuals in a secret filing system that was destroyed in 1974. Following the resignation of President Richard Nixon , there were several investigations into suspected misuse of FBI, CIA and NSA facilities. Senator Frank Church uncovered previously unknown activity, such as
SECTION 60
#17327650213635518-537: The last appearance of actor Mark Valley. Media outlets speculated that because Valley and Torv married over the holiday break, his departure "would eliminate any chances of the marriage conflicting with the show." Co-creator Roberto Orci called Scott's final scene a "truly satisfactory conclusion to his story." The creation of the monster took the series special effects crew approximately eleven days to implement. They created molds of guest actor Neal Huff's head and back, giving him "creature eye" contact lenses and covering
5607-471: The lavatory before he transforms into a beast and bursts out, causing havoc in the plane and leading to a crash in Scarsdale, New York . The Fringe team arrives on the scene and discover the beast's body. Dr. Walter Bishop ( John Noble ) concludes that it started out as a human. Agent Olivia Dunham ( Anna Torv ) recognizes Bowman's picture from John Scott 's ( Mark Valley ) memories, realizing that Bowman
5696-412: The memorial. NSA's infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs for $ 3 million to get
5785-414: The monster's special effects and believed there were still unanswered questions concerning Scott's storyline. Writing for The A.V. Club , Noel Murray thought it was the best "freak-meet" of the series thus far, as well as one of its best episodes, which he would "eagerly show to Fringe -doubters as evidence that the series has found its legs." He consequently graded the episode an A−, further attributing
5874-409: The name of the AFSA to the NSA, and making the new agency responsible for all communications intelligence. Since President Truman's memo was a classified document, the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy, the U.S. intelligence community referred to the NSA as "No Such Agency". In the 1960s, the NSA played a key role in expanding U.S. commitment to
5963-481: The post-September 11 era, Snow was replaced as Technical Director, Jacobs retired, and IAD could no longer effectively oppose proposed actions by the offensive arm of the NSA. In the aftermath of the September 11 attacks , the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cell phones. ThinThread contained advanced data mining capabilities. It also had
6052-421: The potential benefits and risks of emerging technologies, the nature of time, and the differences that separate faith and reason. The series was broadcast across five seasons and 100 episodes. Its first season included 20 episodes, while its second contained 23 installments, though one of these, " Unearthed ", was filmed during the first season. The third and fourth seasons contained 22 episodes, while
6141-523: The process by administering a sedative and placing him in an induced coma. Walter develops an antidote, while Olivia finds another small disc in Hicks' hand. Her demand to see Scott's body leads her and Phillip Broyles ( Lance Reddick ) to Massive Dynamic, where Nina Sharp ( Blair Brown ) tells her that the information gleaned from Scott's body implicates him in a bioterrorist cell with the other two. French intelligence states that weapons manufacturer Conrad
6230-556: The same time he nodded. Then he was sort of in the legal free. He had given the right answer, everybody understood that the NSA had approached him. IBM Notes was the first widely adopted software product to use public key cryptography for client-server and server–server authentication and encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with
6319-419: The season. He explained that this and other designed monsters are "really super fantastical, they're really out there, the anatomy and the biology of them is so wild and crazy, that it really takes a lot to make it look real in the scene and make it a part of the actors are reacting to these things—to get the audience to believe in it is kind of the biggest challenge we've faced on the show so far." During filming,
6408-478: The series did develop a cult following . Entertainment Weekly conjectures that despite its ratings decline, Fringe survived for five seasons in part because of Fox executive Kevin Reilly 's love of the series, and also due to the network's desire to make amends for the science fiction shows it had previously canceled. Across its run the series earned many accolades, though it failed to win major awards. At
6497-415: The series received nominations for two Primetime Creative Arts Emmy Awards , eight Golden Reel Awards , two Satellite Awards , and two Writers Guild of America Awards . For the fifth season, see "Fringe: Season Five Ratings" . TV Series Finale . January 23, 2013 . Retrieved July 26, 2017 . Works cited NSA The National Security Agency ( NSA ) is an intelligence agency of
6586-553: The set included approximately 15,000 pounds' worth of plane parts. Though the episode first aired in February 2009, "The Transformation" had an early screening at the November 2008 PaleyFest , where Fringe ' s producers answered questions from the audience. When asked in an interview if the "giant germ" from " Bound " was the grossest thing of the season, executive producer Jeff Pinkner replied that "the huge porcupine man on
6675-433: The special effect of transformation. To create the plane crash set, the crew spent over a week strategically placing around 15,000 pounds' worth of plane parts. It was first screened at PaleyFest in November 2008. On February 3, 2009, the episode was broadcast in the United States on Fox to an estimated 12.78 million viewers. The episode earned a 5/6.5 ratings share among adults aged 18 to 49, finishing in eighth place for
6764-419: The success of the episode to "top-tier" writers Orci and Whedon and "skilled" director Brad Anderson. Murray wrote, "I wouldn't say that 'The Transformation' broke any new ground. If anything, it recapitulated pretty much every previous Fringe element—bio-weapons sales, telepathic communication, Massive Dynamics, [ sic ] airplane crashes, etc.—but did so in a way that was energetic, tense, and even
6853-488: The system running again. (Some incoming traffic was also directed instead to Britain's GCHQ for the time being.) Director Michael Hayden called the outage a "wake-up call" for the need to invest in the agency's infrastructure. In the 1990s the defensive arm of the NSA—the Information Assurance Directorate (IAD)—started working more openly; the first public technical talk by an NSA scientist at
6942-405: The time. After the terrorist attacks of September 11, 2001 , the NSA believed that it had public support for a dramatic expansion of its surveillance activities. According to Neal Koblitz and Alfred Menezes , the period when the NSA was a trusted partner with academia and industry in the development of cryptographic standards started to come to an end when, as part of the change in the NSA in
7031-417: The week. It received generally positive reviews. Commentators have noted allusions to the pilot and a fourth-season episode , in addition to the television series Lost and H. G. Wells ' novel The Island of Doctor Moreau . On an airplane in flight, scientist Marshall Bowman ( Neal Huff ) gets a nosebleed, and he tries to warn the crew to give him sedatives or use force against him. He locks himself in
7120-472: Was co-written by Zack Whedon and supervising producer J.R. Orci . Whedon had last co-written the season's ninth episode, " The Dreamscape ", while Orci helped write " The Equation ", the season's eighth episode. Producer Brad Anderson served as director, his latest Fringe work since directing " In Which We Meet Mr. Jones " six episodes earlier. The episode resolved the John Scott storyline and featured
7209-488: Was created by J. J. Abrams , Alex Kurtzman , and Roberto Orci . They took inspiration from multiple sources including the works of Michael Crichton and David Cronenberg , the film Altered States , and the television series The X-Files and The Twilight Zone . The three also sought to combine elements of procedural shows like Law & Order with an "extremely serialized and very culty" series like Lost , which Abrams co-created. Fringe' s pilot episode
7298-521: Was described by an NSA manager as "some of the most productive operations in TAO because they preposition access points into hard target networks around the world." Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth. Cottonmouth is a device that can be inserted in the USB port of a computer to establish remote access to the targeted machine. According to
7387-470: Was flying to meet another man in the memories named Daniel Hicks ( Felix Solis ). Back at the lab at Harvard , Walter finds a small crystalline disc implanted in the beast's hand similar to one seen inside the woman killed in " The Ghost Network ", and thinks Marshall was dosed with a "designer virus". Hicks is brought in for questioning. After beginning to transform into a beast, he admits that "Conrad" dosed them before Peter Bishop ( Joshua Jackson ) pauses
7476-634: Was headquartered in Washington, D.C., and was part of the war effort under the executive branch without direct congressional authorization. During the war, it was relocated in the army's organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the Navy's cryptanalysis functions in July 1918. World War I ended on November 11, 1918 , and
7565-505: Was picked up by Fox in May 2008, and premiered on September 9. Critics hailed the series as a successor to Lost , as the two shared many similarities including Abrams' involvement, characters exploring a series of unexplained events, the use of many of the same actors and writers, and the difficulty in categorizing each show within just one genre. Explored themes in Fringe include free will,
7654-729: Was placed under the leadership of the Director of Military Intelligence. On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA). This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff . The AFSA was tasked with directing the Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units. However,
7743-526: Was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain, and France, but later on, it became clear that those data were collected by European agencies during military missions abroad and were subsequently shared with NSA. In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual EC DRBG encryption standard that contained built-in vulnerabilities in 2006 to
7832-639: Was the United States' first peacetime cryptanalytic organization. Jointly funded by the Army and the State Department, the Cipher Bureau was disguised as a New York City commercial code company; it produced and sold such codes for business use. Its true mission, however, was to break the communications (chiefly diplomatic) of other nations. At the Washington Naval Conference , it aided American negotiators by providing them with
7921-417: Was to be a realization of information processing at higher speeds in cyberspace. The massive extent of the NSA's spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor Edward Snowden . On 4 September 2020, the NSA's surveillance program was ruled unlawful by
#362637