DocumentDocument Date: 2010-09-10Release Date: 2013-10-21
This NSA document from 10 September 2010 details operations against foreign embassies, concluding with a glossary of tools and tactics. Earlier versions of this docoument that only contained some of the operations conducted were published in l’Espresso on 5 December 2013 and in Le Monde on 21 October 2013: see the book No Place to […]
Page 145 10 Sep 2010 CLOSE ACCESS SIGADS CLOSE ACCESS SIGADS All Close Access domestic collection uses the US-3136 SIGAD with a unique two-letter suffix for each target location and m...
AIRGAP, ALAMITO, BANISTER, BLACKFOOT, BRUNEAU, DEWSWEEPER, DOBIE, DROPMIRE, FLEMING, GENIE, HEMLOCK, HIGHLANDS, KATEEL, KLONDIKE, LIFESAVER, MAGNETIC, MAGOTHY, MERCED, MULBERRY, NASHUA, NAVAJO, NAVARRO, OCEAN, OSAGE, OSWAYO, PANTHER, PERDIDO, POCOMOKE, POWELL, RADON, REQUETTE, SULPHUR, VAGRANT, WABASH, WESTPORT
Brazil (BRA/BR), Bulgaria (BGR/BG), Colombia (COL/CO), France (FRA/FR), Georgia (GEO/GE), Greece (GRC/GR), India (IND/IN), Italy (ITA/IT), Japan (JPN/JP), Korea (KOR/KR), Mexico (MEX/MX), Slovakia (SVK/SK), South Africa (ZAF/ZA), Taiwan (TWN/TW), Venezuela (VEN/VE), Vietnam (VNM/VN)
DocumentRelease Date: 2014-03-12
This extract from an undated NSA document describes the planned capability of the automated malware injection system Turbine as extending to “potentially millions of implants”: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
(TS//SI//REL) A new intelligent command and control capability designed to manage a very large number of covert implants for active SIGINT and active Attack that reside on the GENIE covert infras...
DocumentRelease Date: 2013-12-30
These pages from an NSA internal catalogue describe the tools available to the agency in 2008: see the Der Spiegel article NSA’s Secret Toolbox: Unit Offers Spy Gadgets for Every Need, 30 December 2013
S3222_DEITYBOUNCE.jpg: SECRET//COMINT//REL TO USA, FVEY DEITYBOUNCE ANT Product Data (TS//SI//REL) DEITYBOUNCE provides software application persistence on Dell PowerEdge servers by exp...
ANGRYNEIGHBOR, ARKSTREAM, BANANAGLEE, BLINDDATE, BULLDOZER, CANDYGRAM, CHIMNEYPOOL, CONJECTURE, COTTONMOUTH (CM), CROSSBEAM, CYCLONE Hx9, DANDERSPRITZ, DEITYBOUNCE, DROPOUTJEEP, ENTOURAGE, GENESIS, GENIE, GOPHERSET, GOTHAM, GOURMETTROUGH, HALLUXWATER, HEADWATER, HOLLOWPOINT, HOWLERMONKEY (HM), IRATEMONK, JETPLOW, JUNIORMINT, KONGUR, LOUDAUTO, MOCCASIN, MONKEYCALENDAR, NIGHTSTAND, NIGHTWATCH, OLYMPUS, PHOTOANGLO, PICASSO, QUANTUM, RAGEMASTER, ROCKYKNOB, SOUFFLETROUGH, SPECULATION, SWAP, TAWDRYYARD, TOTECHASER, TOTEGHOSTLY, TRINITY, TURBOPANDA, TURBULENCE (TU), TWISTEDKILT, TYPHON, TYPHON HX, UNITEDRAKE, VAGRANT, VIEWPLATE, WATERWITCH, WISTFULTOLL, ZESTYLEAK
DocumentDocument Date: 2012-02-18Release Date: 2015-01-17
This extract from the US Intelligence Community’s Congressional Budget Justification for the Fiscal Year 2013 (the “Black Budget”) provides the budget for GENIE the project “which underpins NSA/CSS’ Computer Network Operations (CNO) Endpoint capabilities conducted by the Tailored Access Operations (TAO) Group: see the Der Spiegel article The Digital Arms Race: NSA Preps America for […]
TOP SECRET//SI/TK//NOFORN (U) COMPUTER NETWORK OPERATIONS (U) GENIE This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 2013 Base...