Filtered By
ISLANDTRANSPORT (IT)X
Codewords [filter]
Results
11 Total
1.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Document Date: 2010-05-24Release Date: 2015-01-17
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
1.0

SCARLETFEVER

Document

Release Date: 2014-12-28
This undated page from NSA’s WikiInfo describes SCARLETFEVER, “a message driven cryptologic exploitation service for DNSC traffic”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
SCARLETFEVER - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY * TOP SECRET//SI//REL TO USA, FVEY (U) ...
1.0

SSL/TLS Experiment Profile

Document

Document Date: 2010-01-01Release Date: 2014-12-28
This GCHQ Experiment Profile from 2010 proposes a joint NSA/GCHQ trial of SSL decryption on a massive scale: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET STRAP1 Experiment Profile Experiment Name Cryptanalytic Services Experiment Reference Version Date Experiment Owner (GCHQ) Department NSA/S3/CES GCHQ/PTD Experiment Start...
1.0

Quantum Shooter SBZ Notes

Document

Release Date: 2015-01-17
This undated page from the NSA’s internal WikiInfo site describes QUANTUMSHOOTER, an implant that allows computers to be controlled remotely: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
QUANTUM Shooter SBZ Notes - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY * TOP SECRET//SI//REL TO USA,...
1.0

LONGHAUL

Document

Release Date: 2014-12-28
This undated NSA wiki page describes LONGHAUL, an “end-to-end attack orchestration and key recovery service for Data Network Cipher and Data Network Session Cipher traffic”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
LONG HAUL - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN /RELIDO/REL TO USA, FVEY * TOP SECRET//SI//REL TO USA, FVEY (U) ...
1.0

TURMOIL/APEX/APEX High Level Description Document

Document

Release Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes some of the agency’s techniques for capturing IPSec Virtual Private Network (VPN) traffic: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TURMOIL/APEX/APEX High Level Description Document - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY * TOP...
1.0

TURMOIL GALLANTWAVE

Document

Release Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes tools for attacking VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TURMOIL GALLANTWAVE - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEiHOLEZ/OHCON/PHOPIN/RELIDO/RELTOUSiV FVE¥ * TOPSECRETOSIf/RELTO USA, FVEY (U//F...
1.0

VALIANTSURF WikiInfo page

Document

Release Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes VALIANTSURF “the coverterm for the development of Data Network Cipher (DNC) exploitation capabilities in TURMOIL”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
VALIANTSURF - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY * TOP SECRET1/SI/10RCON1REL TO USA, FVEY ...
1.0

QUANTUMTHEORY

Document

Document Date: 2010-01-01Release Date: 2014-03-12
This presentation from the 2010 SIGDEV Conference describes the contribution made by GCHQ to the development of Quantum techniques: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, FVEY//20320108 TOP SECRET//COMINT//REL TO USA, FVEY//20320108 SIGDEV: Discovery in the Cyber Ag> TOP SECRET//COMINT//REL TO USA, FVEY//20320108 (U) Clas...
1.0

POISONNUT

Document

Release Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes POISONNUT, “the Virtual Private Network Attack Orchestrator (VAO)”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
POISONNUT - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLP//nRmv/PRnPiN/BFi inn/RPi rn tt*;4 fvfv * TOP SECRETJ/SI//REL TO USA, FVEY (u) POISON...
1.0

APEX Active/Passive Exfiltration

Document

Document Date: 2009-08-01Release Date: 2015-01-17
This NSA TURBULENCE presentation dated August 2009 explains the APEX method of combining passive with active methods to exfiltrate data from networks attacked: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Active/Passive Exfiltration "go apex" STDP: S32354 & T112, NCSC/C91 August 2009 OP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMHMT//REL TO USA. AUS. CAN....

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh