Filtered By
CONVEYANCEX
Codewords [filter]
Results
3 Total
1.0

VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN

Document

Release Date: 2014-03-12
Slides from an NSA Turbulence presentation describe two of the agency’s specialised implants, aimed at compromising virtual private networks (VPNs) and online telephony (VOIP): see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 APEX VPN Phases ► VPN Phase 1: IKE Metadata Only (Spin 15) - IKE packets are exfiled to TURMOIL APEX. ■ APEX reconstructs/r...
1.0

Analytic Challenges from Active-Passive Integration

Document

Release Date: 2014-12-28
This undated NSA presentation from the agency’s Information Technology Directorate, aimed at analysts, describes techniques for decrypting IPSec VPN traffic: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
This Briefing is Classified TOP SECRET//COMINT//REL USA, FVEY Analytic Challenges from Active-Passive Integration S324 This Briefing is Classified TOP SECRET//COMINT//REL USA,FVEY DER...
1.0

PRISM/US-984XN Overview

Document

Document Date: 2013-04-01Release Date: 2013-06-06
Nineteen slides from a 41-slide April 2013 NSA presentation describing the PRISM collection of data via internet service providers, “the SIGAD most used in NSA reporting.” Slides have been published gradually by several media organisations: see the Washington Post article NSA slides explain the PRISM data-collection program, 6 June 2013.
01.jpg: PRISM/U S-984XN Overview OR The SIGAD Used Most in NS A Reporting Overview April 2013 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20360901 OP SECRET/...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh