Title: SCARLETFEVER

Description: This undated page from NSA’s WikiInfo describes SCARLETFEVER, “a message driven cryptologic exploitation service for DNSC traffic”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.

Document: SCARLETFEVER - Wikiinfo

The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT
KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY *

TOP SECRET//SI//REL TO USA, FVEY

(U) SCARLETFEVER

From Wikiinfo

This Project page has moved to the: CES 2P
PIQ Wiki

Contents

■ 1 (U) Overview

■ 2 (U) Development Process and
Standards

■ 2.1 (U) Related Wiki Pages

■ 3 (U) History

■ 4 (U) Design

■ 5 (U) Contact Info

£ Java This application makes use of the Java programming language.

C++ This application makes use of the C++ programming language.

(U) Overview

(TS//SI//REL) SCARLETFEVER is the second LONGHAUL capability. It is a
message driven cryptologic exploitation service for DNSC traffic. Currently, the
list of SCARLETFEVER clients includes TURMOIL, WEALTHYCLUSTER and the
TEe. Each client can connect to SCARLETFEVER using ISLANDTRANSPORT.
Once connected, clients send and receive XML messages encrypted using
ISLANDHIDEAWAY.

An in depth look at SCARLETFEVER can be found here.

(U) Development Process and Standards

(U//FOUO) SCARLETFEVER follows the LONGHAUL Development Process

1 of 3

SCARLETFEVER - Wikiinfo

KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY *

(U) Related Wiki Pages

■ (U//FOUO) LONGHAUL - the Parent Project

■ (U//FOUO) POISONNUT - a Sibling LONGHAUL Project

(U) History

■ (TS//SI//REL) The SCARLETFEVER development started in July 2009.

■ (TS//SI//REL) The basic high level functional design was completed in
early September 2009.

(U) Design

(TS//SI//REL) The SCARLETFEVER team then met several times over the
July-September time frame to refine the design of the system. The output of
those meetings was a series of BPMN diagrams and technology areas for
further investigation. The BPMN diagrams exposed:

■ The flow of information through the system (messages).

■ The high level components and critical elements.

(TS//SI//REL) The messages, component and critical elements, and technology
areas were used to generate an initial list of Engineering Change Requests
(ECRs) for further refinement and development.

(TS//SI//REL) SCARLETFEVER also has a geographically distributed
architecture concept which is currently being fleshed out. Why is this being
pursued?

■ Resume session pairing generates the bulk of the load. If this processing
can be shifted to the edge, then:

■ Less total aggregated network traffic due to collaboration with the
core

■ Less aggregate memory requirements at any one location

■ Redundant capabilities for better total mission survivability

(U) Contact Info

■ (U//FOUO) SCARLETFEVER Development Team email alias: TBD

■ (U//FOUO) Jabber Chat Room: TBD _____________________________

■ (U//FOUO) LONGHAUL JSignout group

from

Categories: URN | Applications using Java | Applications using C + + | TLS |
SCARLETFEVER | LONGHAUL

2 of 3

SCARLETFEVER - Wikiinfo

Derived From: SI Classification Guide, 02-01, Dated: 20060711
and NSA/CSSM 1-52, Dated: 20070108
Declassify On: 20320108

TOP SECRET//SI//REL TO USA, FVEY

3 of 3

Release Date: 2014-12-28

Document Path: https://edwardsnowden.com/wp-content/uploads/2015/01/media-35536.pdf

Article Link: http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html

Links

#1 http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html Show in Doc Search Show in New Window

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh