Filtered By
CLOUDSHIELDX
Codewords [filter]
Results
2 Total
1.0

Case Studies of Integrated Cyber Operation Techniques

Document

Release Date: 2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY Case Studies of Integrated Cyber Operation Techniques NSA/CSS Threat Operations Center VS TOP SECRET//COMINT//REL USA, FVEY (U//FOUO) TUiT0t.EÄ,©i...
1.0

Net Defense from Encrypted Communications

Document

Release Date: 2014-12-28
This February 2012 presentation from NSA’s Technology Directorate describes a system codenamed BLUESNORT and its relationship to associated systems: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
(U//FOUO) Net Defense from Encrypted Communications irt i ir\ / 1 HI 1 SECRET//SI//REL TO USA, FVEY Increment 3 Requirement SYSREQ10322.2 (S//REL) TURMOIL shall reinject decrypted ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh