DocumentDocument Date: 2007-01-08Release Date: 2013-12-30
The first slide of an NSA presentation on the FOXACID system. The image plays on the original delivery method used to compromise targets: spam emails: see the Der Spiegel article, NSA’s Secret Toolbox: Unit Offers Spy Gadgets for Every Need, 30 December 2013.
DocumentRelease Date: 2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY Case Studies of Integrated Cyber Operation Techniques NSA/CSS Threat Operations Center VS TOP SECRET//COMINT//REL USA, FVEY (U//FOUO) TUiT0t.EÄ,©i...
BOXINGRUMBLE, CLOUDSHIELD, DEFIANTWARRIOR, FOXACID (FA?), QUANTUM, QUANTUMBISCUIT, QUANTUMBOT, QUANTUMCOPPER, QUANTUMDNS, QUANTUMHAND, QUANTUMINSERT (QI), QUANTUMPHANTOM, QUANTUMSKY, TUTELAGE
DocumentRelease Date: 2015-01-17
This undated NSA paper describes a project to recognise and process data that comes from third party attacks on computers: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//NOFORN//20291123 CNE Presence in CT10 Status Report Authors: SNIP Intern 1LT (U//FOUO) Executive Summary (S//SI//REL USA, FVEY) This paper discusses the work ...
DocumentDocument Date: 2004-01-01Release Date: 2014-01-01
These two pages from a 2004 NSA briefing document describes two trojan implants used with the FOXACID system: see the Der Spiegel article NSA-Totalausspähung: FDP-Politiker Baum setzt auf Generalbundesanwalt, 1 January 2014.
image-583936-galleryV9-hpue.jpg: TOP SECRET//COMINT//MR VALIDATOR VALIDATOR is a part of a backdoor access system under the FOXACID project. The VALIDATOR is a client/server-based system t...
DocumentRelease Date: 2013-12-29
This NSA presentation describes the staffing and activities of the Tailored Access Operations sectio based in San Antonia Texas. These included operations against Mexico’s Secretariat of Public Security (codenamed WHITETAMALE), Cuba, Columbia, Venezuela and unspecified targets in the Middle East: see the Der Spiegel article Inside TAO: Documents Reveal Top NSA Hacking Unit, 29 December […]
image-584021-galleryV9-yenq.jpg: image-584022-galleryV9-qplk.jpg: TOP SECRET//COMINT//REL TO USA, FVEY Overview • Current People, Space, & Operations (FY2009) • Medina era Growth (FY20...
DocumentDocument Date: 2012-01-01Release Date: 2014-03-12
This extract from a 2012 NSA presentation demonstrates how conventional phishing attacks (like WILLOWVIXEN) have become deprecated in the agency’s offensive arsenal in favour of more sophisticated techniques like Quantum: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.s
TOP SECRET//COMINT//NOFORN FOXACID these days... • XSS is becoming less and less viable with each passing day. It’s just too hard to develop and too easy to circumvent. Because of this (and...
DocumentDocument Date: 2011-04-01Release Date: 2014-03-15
This short extract from an April 2011 NSA document describes the operation of the agency’s QUANTUMHAND tool: see the Intercept article Compare the NSA’s Facebook Malware Denial to its Own Secret Documents, 15 March 2014.
(TS//SI//NF) QUANTUMTHEORY (QT) is a set of CNO Man-on-the-Side capabilities that involve real-time responses to passive collection. After the recent TURMOIL upgrade at SSO’s SARATOGA access, TA...
DocumentRelease Date: 2015-07-01
Ths undated set of annotated screenshots from XKeyScore provides a worked example of a search: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-targets-visiting-specific-websites-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, AUS, CAN. GBR. NZU/20320108 Center.! =*oc Book Aleo Hammer See next page for Derived From: NSA'CSSM ...
DocumentRelease Date: 2013-12-29
This Booz Allen Hamilton presentation on the NSA’s Quantum tools describes the different kinds of malware attacks available to workgroups within the agency, the procedure an analyst must follow in order to make use of them and the way the systems themselves work, using a “man-on-the-side” attack from TAO’s FOXACID server. It also describes the […]
image-583967-galleryV9-quqn.jpg: TOP SECRET//SI//REL USA, AUS, CAN, GBR, NZL (TS) NSA QUANTUM Tasking Techniques for the R&T Analyst POC: TAO RTD | Team - Booz Allen Hamilton SDS2 ...