Filtered By
NSA X
Agency [filter]
China (CHN/CN) X
Countries Mentioned [filter]
Computer Network Operations X
Document Topic [filter]
Results
18 Total
0.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Release Date: 2015-01-17 Document Date: 2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
0.0

Chinese Exfiltrate Sensitive Military Technology

Document

Release Date: 2015-01-17
These three undated NSA slides describe alleged Chinese cyberattacks against US military targets, codenamed BYZANTINE HADES: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
(U) Acquired radar design - (U) Numbers and types of modules (U) Detailed engine schematics (U) Methods for cooling gases (U) Leading and trailing edge treatments (U) Aft deck he...
0.0

BYZANTINE HADES: An Evolution of Collection

Document

Release Date: 2015-01-17 Document Date: 2010-06-01
This June 2010 NSA presentation for the SIGDEV conference describes efforts to trace a suspected Chinese cyber attack: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (S//REL)BYZANTINE HADES: An Evolution of Collection NTOC, V225 SIGINT Development Conference June 2010 TOP SECRET//COMINT//REL TO...
0.0

GCSB has identified an MFA data link

Document

Release Date: 2015-04-19 Document Date: 2013-04-01
This short extract from an April 2013 NSA document describes a “verbal agreement” between GCSB and NSA to proceed with the FROSTBITE / BASILHAYDEN project to infiltrate a Chinese diplomatic data link: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
(TS//SI//NF) New Zealand: GCSB has identified an MFA data link between the Chinese Consulate and Chinese Visa Office in Auckland. NSA and GCSB have verbally agreed to move forward with a coopera...
0.0

Case Studies of Integrated Cyber Operation Techniques

Document

Release Date: 2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY Case Studies of Integrated Cyber Operation Techniques NSA/CSS Threat Operations Center VS TOP SECRET//COMINT//REL USA, FVEY (U//FOUO) TUiT0t.EÄ,©i...
0.0

Using XKEYSCORE to Enable TAO

Document

Release Date: 2015-07-01 Document Date: 2009-07-16
This NSA presentation from 16 July 2009 explains how the XKeyScore system supports the agency’s Tailored Access Operations: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
using-xks-to-enable-tao-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR. NZL//20291123 Ait* tuv. Using XKEYSCORE to Enable TAO Booz I AJIen l Hamilton SDS Analyst 16 July ...
0.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Release Date: 2015-09-29 Document Date: 2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
0.0

Computer Network Exploitation (CNE) Classification Guide / 2-59

Document

Release Date: 2014-10-10 Document Date: 2010-03-01
This 2010 NSA classication guide outlines the sensitivity of aspects of the agency’s hacking activities: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2010.
TOP SECRET//SI//REL TO USA, FVEY (U) CLASSIFICATION GUIDE TITLE/NUMBER: Computer Network Exploitation (CNE) Classification Guide / 2-59 (U) PUBLICATION DATE: 1 March 2010 (U) OFFICE OF O...
0.0

Sentry Eagle National Initiative – Security Framework

Document

Release Date: 2014-10-10
This group of three undated NSA slides provides a graphical representation of the sensitivity of aspects of the agency’s SENTRY EAGLE programme: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN SENTRY EAGLE National Initiative - Security Framework DERIVED FROM: NSA/CSS Manual 1-52. Dated: 20041123. Declassify On: 20291123 TOP SECRET//COMINT//NOFORN ...
0.0

Bad guys are everywhere, good guys are somewhere!

Document

Release Date: 2014-09-14
This undated NSA presentation sets out the network-mapping tool Treasure Map, and supplies information on some of the agency’s collection access points: see the Intercept article New Zealand Launched Mass Surveillance Project While Publicly Denying It, 15 September 2014.
Bad guys are everywhere, good guys are somewhere! NSA/CSS Threat Operations Center (NTOC) NTOC Technology Development TS//SI//REL TO USA, FVEY (U) NTOC • (U//FOUO) Operates under bot...
0.0

NSA’s Offensive and Defensive Missions: The Twain Have Met

Document

Release Date: 2015-01-17 Document Date: 2011-04-26
This 26 April 2011 SIDToday post from the NSA/CSS Threat Operations Center (NTOC) Hawaii describes how the NSA has developed its capabilities in collecting “other people’s sigint”, for instance in exploiting Chinese operations against the United Nations: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015. […]
SIDToday - NSA's Offensive and Defensive Missions: The Twain Have Met DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) NSA's O...
0.0

Shotgiant

Document

Release Date: 2014-03-22 Document Date: 2010-01-01
Selected slides, some with speaking notes, drawn from a 2010 NSA presention, describe the aims of the agency’s operations against Chinese company Huawei: see the New York Times article N.S.A. Breached Chinese Servers Seen as Security Threat, 22 March 2014.
(U) Why We Care (TS//SI//REL TO USA, FVEY) S2 - many of our targets communicate over Huawei produced products (TS//SI//REL TO USA, FVEY) S3 - design, deployment & market expansion imp...
0.0

XKEYSCORE for Counter-CNE

Document

Release Date: 2015-07-01 Document Date: 2011-03-01
This NSA presentation from March 2011 discusses the use of the XKeyScore tool for countering foreign CNE attacks: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-for-counter-cne-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, FVEY Using the XKS CNE dataset and a DISGRUNTLEDDUCK fingerprint, we now see at least 21 TAO boxes with evidence of this in...
0.0

INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers

Document

Release Date: 2015-02-04 Document Date: 2010-05-06
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET a/ SI / TK // REL TO USA AUS CAN GBR NZL SID Today archi“s reedback iBi ■ ■ ■ Welcome! Saturday, 10 Nov 2012 1 1 B ...
0.0

National Initiative Protection Program – Sentry Eagle

Document

Release Date: 2014-10-10 Document Date: 2004-11-23
This document, produced by the NSA and the US military’s Joint Functional Component Command – Network Wardare, provides a briefing on, and classification guide to, the highly sensitive group of “core computer network operations secrets” codenamed SENTRY EAGLE: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN//20310524 DRAFT (S) National Security Agency/Central Security' Service (NSA/CSS) and U.S. Strategic Command Joint Functional Component Command - Net...
0.0

FOXACID SOP for Operational Management of FOXACID Infrastructure

Document

Release Date: 2016-08-19
This draft NSA report on using the agency’s FOXACID system confirms that malware code released by the ShadowBrokers did, in fact, originate from the NS see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL D R A F T NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND FOXACID SOP FOR OPERATIONAL MANAGEMENT...
0.0

Classification guide for ECI Pawleys (PAW)

Document

Release Date: 2014-10-10 Document Date: 2006-11-14
This 2006 NSA classification guide outlines the sensitivity of the agency’s clandestine human and electronic access to systems in order to “obtain cryptographic information and material”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE 0^ftUJDt54 SD7 AôEWf b<Kf' DTBb3LP HDEYI D0<XS«X 0*YR Jfi! (55^ BUH 5654 ...
0.0

Classification guide for the NSA/CSS Target Exploitation (TAREX) program

Document

Release Date: 2014-10-10 Document Date: 2012-02-06
This 2012 classification guide details the NSA’s human intelligence (TAREX) operations: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
SECRET//SI//NOFORN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR THE NSA/CSS TARGET EXPLOITATION (TAREX) PROGRAM 2-52 Effective Date: 6 February 2012...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh