Filtered By
FOXACID (FA?)X
Codewords [filter]
Results
9 Total
1.0

FOXACID

Document

Document Date: 2007-01-08Release Date: 2013-12-30
The first slide of an NSA presentation on the FOXACID system. The image plays on the original delivery method used to compromise targets: spam emails: see the Der Spiegel article, NSA’s Secret Toolbox: Unit Offers Spy Gadgets for Every Need, 30 December 2013.

1.0

Case Studies of Integrated Cyber Operation Techniques

Document

Release Date: 2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY Case Studies of Integrated Cyber Operation Techniques NSA/CSS Threat Operations Center VS TOP SECRET//COMINT//REL USA, FVEY (U//FOUO) TUiT0t.EÄ,©i...
1.0

CNE Presence in CT10 Status Report

Document

Release Date: 2015-01-17
This undated NSA paper describes a project to recognise and process data that comes from third party attacks on computers: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//NOFORN//20291123 CNE Presence in CT10 Status Report Authors: SNIP Intern 1LT (U//FOUO) Executive Summary (S//SI//REL USA, FVEY) This paper discusses the work ...
1.0

VALIDATOR and OLYMPUSFIRE

Document

Document Date: 2004-01-01Release Date: 2014-01-01
These two pages from a 2004 NSA briefing document describes two trojan implants used with the FOXACID system: see the Der Spiegel article NSA-Totalausspähung: FDP-Politiker Baum setzt auf Generalbundesanwalt, 1 January 2014.
image-583936-galleryV9-hpue.jpg: TOP SECRET//COMINT//MR VALIDATOR VALIDATOR is a part of a backdoor access system under the FOXACID project. The VALIDATOR is a client/server-based system t...
1.0

Tailored Access Operations – Texas Cryptologic Center

Document

Release Date: 2013-12-29
This NSA presentation describes the staffing and activities of the Tailored Access Operations sectio based in San Antonia Texas. These included operations against Mexico’s Secretariat of Public Security (codenamed WHITETAMALE), Cuba, Columbia, Venezuela and unspecified targets in the Middle East: see the Der Spiegel article Inside TAO: Documents Reveal Top NSA Hacking Unit, 29 December […]
image-584021-galleryV9-yenq.jpg: image-584022-galleryV9-qplk.jpg: TOP SECRET//COMINT//REL TO USA, FVEY Overview • Current People, Space, & Operations (FY2009) • Medina era Growth (FY20...
1.0

WILLOWVIXEN and SECONDDATE

Document

Document Date: 2012-01-01Release Date: 2014-03-12
This extract from a 2012 NSA presentation demonstrates how conventional phishing attacks (like WILLOWVIXEN) have become deprecated in the agency’s offensive arsenal in favour of more sophisticated techniques like Quantum: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.s
TOP SECRET//COMINT//NOFORN FOXACID these days... • XSS is becoming less and less viable with each passing day. It’s just too hard to develop and too easy to circumvent. Because of this (and...
1.0

QUANTUMHAND

Document

Document Date: 2011-04-01Release Date: 2014-03-15
This short extract from an April 2011 NSA document describes the operation of the agency’s QUANTUMHAND tool: see the Intercept article Compare the NSA’s Facebook Malware Denial to its Own Secret Documents, 15 March 2014.
(TS//SI//NF) QUANTUMTHEORY (QT) is a set of CNO Man-on-the-Side capabilities that involve real-time responses to passive collection. After the recent TURMOIL upgrade at SSO’s SARATOGA access, TA...
1.0

Targets visiting specific websites

Document

Release Date: 2015-07-01
Ths undated set of annotated screenshots from XKeyScore provides a worked example of a search: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-targets-visiting-specific-websites-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, AUS, CAN. GBR. NZU/20320108 Center.! =*oc Book Aleo Hammer See next page for Derived From: NSA'CSSM ...
1.0

NSA QUANTUM Tasking Techniques for the R&T Analyst

Document

Release Date: 2013-12-29
This Booz Allen Hamilton presentation on the NSA’s Quantum tools describes the different kinds of malware attacks available to workgroups within the agency, the procedure an analyst must follow in order to make use of them and the way the systems themselves work, using a “man-on-the-side” attack from TAO’s FOXACID server. It also describes the […]
image-583967-galleryV9-quqn.jpg: TOP SECRET//SI//REL USA, AUS, CAN, GBR, NZL (TS) NSA QUANTUM Tasking Techniques for the R&T Analyst POC: TAO RTD | Team - Booz Allen Hamilton SDS2 ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh