Filtered By
BULLRUNX
Codewords [filter]
Results
7 Total
1.0

Project BULLRUN classification guide

Document

Document Date: 2010-06-16Release Date: 2013-09-05
A classification guide on the NSA’s Project BULLRUN goals and capabilities in decryption: see the Guardian article Revealed: how US and UK spy agencies defeat internet privacy and security, 5 September 2013.
TOP SECRET//SI//REL TO USA, FVEY CLASSIFICATION GUIDE TITLE/NUMBER: (U//FOUO) PROJECT BULLRUN/2-16 PUBLICATION DATE: 16 June 2010 OFFICE OF ORIGIN: (U) Cryptanalysis and Exploitation Ser...
1.0

Crypt Ops Data Store User Guide

Document

Release Date: 2014-12-28
This undated GCHQ document provides guidance for analysts on how to handle encrypted data: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
SECRET Crypt Ops Data StoreUserGuide Crypt Ops Datastore DataStore Rota: -Data Store to be reviewed weekly at the DataStore management meeting The Tasking Process Submitting a Ta...
1.0

TURMOIL GALLANTWAVE

Document

Release Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes tools for attacking VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TURMOIL GALLANTWAVE - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEiHOLEZ/OHCON/PHOPIN/RELIDO/RELTOUSiV FVE¥ * TOPSECRETOSIf/RELTO USA, FVEY (U//F...
1.0

SIGINT Strategy Threads 4 and 7

Document

Document Date: 2011-09-14Release Date: 2014-12-28
This 14 September 2011 post from the NSA internal newsletter SIDToday from the agency’s Cryptanalysis and Exploitation Services division explains why ubiquitous encryption presents a “major threat” to the agency: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
SIDToday - SIGINT Strategy Threads 4 and 7 DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL • Web search • Agency-all Emails • SID...
1.0

BULLRUN CoI – Briefing Sheet

Document

Release Date: 2013-09-05
This undated GCHQ document provides a classification guide for BULLRUN – NSA and GCHQ’s attempts to weaken or defeat cryptographic protocols – and specifies some of its achievements: see the ProPublica article Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security, 5 September 2013.
TOP SECRET STRAP1 COMINT BULLRUN Col - Briefing Sheet Introduction 1. The ability to exploit targets’ encrypted communications is extremely fragile and is often enabled through sensiti...
1.0

BULLRUN

Document

Release Date: 2014-12-28
This undated presentation from GCHQ’s PTD (Penetrating Target Defences) unit gives an overview of BULLRUN efforts to defeat encryption: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET STRAP1 BULLRUN PTD Lead for Special Operations and Policy PTD "We penetrate targets' defences." This information is exempt from disclosure under the Freedom of Information A...
1.0

TLS Trends at GCHQ

Document

Release Date: 2014-12-28
This undated GCHQ presentation explains the agency’s FLYING PIG database and its role in undermining SSL/TLS encryption: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TS//SI//REL TLS trends at GCHQ TS//S1//REL TS//SI//REL Source of data Our TLS events come from our TLS app - Runs on special source (approx. 200 x 10G) and Comsat data -Produ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh