Filtered By
NSA X
Agency [filter]
China (CHN/CN) X
Countries Mentioned [filter]
Computer Network Operations X
Document Topic [filter]
Top Secret X
Classification [filter]
Results
9 Total
0.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Release Date: 2015-01-17 Document Date: 2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
0.0

BYZANTINE HADES: An Evolution of Collection

Document

Release Date: 2015-01-17 Document Date: 2010-06-01
This June 2010 NSA presentation for the SIGDEV conference describes efforts to trace a suspected Chinese cyber attack: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (S//REL)BYZANTINE HADES: An Evolution of Collection NTOC, V225 SIGINT Development Conference June 2010 TOP SECRET//COMINT//REL TO...
0.0

GCSB has identified an MFA data link

Document

Release Date: 2015-04-19 Document Date: 2013-04-01
This short extract from an April 2013 NSA document describes a “verbal agreement” between GCSB and NSA to proceed with the FROSTBITE / BASILHAYDEN project to infiltrate a Chinese diplomatic data link: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
(TS//SI//NF) New Zealand: GCSB has identified an MFA data link between the Chinese Consulate and Chinese Visa Office in Auckland. NSA and GCSB have verbally agreed to move forward with a coopera...
0.0

Case Studies of Integrated Cyber Operation Techniques

Document

Release Date: 2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY Case Studies of Integrated Cyber Operation Techniques NSA/CSS Threat Operations Center VS TOP SECRET//COMINT//REL USA, FVEY (U//FOUO) TUiT0t.EÄ,©i...
0.0

Computer Network Exploitation (CNE) Classification Guide / 2-59

Document

Release Date: 2014-10-10 Document Date: 2010-03-01
This 2010 NSA classication guide outlines the sensitivity of aspects of the agency’s hacking activities: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2010.
TOP SECRET//SI//REL TO USA, FVEY (U) CLASSIFICATION GUIDE TITLE/NUMBER: Computer Network Exploitation (CNE) Classification Guide / 2-59 (U) PUBLICATION DATE: 1 March 2010 (U) OFFICE OF O...
0.0

Sentry Eagle National Initiative – Security Framework

Document

Release Date: 2014-10-10
This group of three undated NSA slides provides a graphical representation of the sensitivity of aspects of the agency’s SENTRY EAGLE programme: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN SENTRY EAGLE National Initiative - Security Framework DERIVED FROM: NSA/CSS Manual 1-52. Dated: 20041123. Declassify On: 20291123 TOP SECRET//COMINT//NOFORN ...
0.0

National Initiative Protection Program – Sentry Eagle

Document

Release Date: 2014-10-10 Document Date: 2004-11-23
This document, produced by the NSA and the US military’s Joint Functional Component Command – Network Wardare, provides a briefing on, and classification guide to, the highly sensitive group of “core computer network operations secrets” codenamed SENTRY EAGLE: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN//20310524 DRAFT (S) National Security Agency/Central Security' Service (NSA/CSS) and U.S. Strategic Command Joint Functional Component Command - Net...
0.0

FOXACID SOP for Operational Management of FOXACID Infrastructure

Document

Release Date: 2016-08-19
This draft NSA report on using the agency’s FOXACID system confirms that malware code released by the ShadowBrokers did, in fact, originate from the NS see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL D R A F T NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND FOXACID SOP FOR OPERATIONAL MANAGEMENT...
0.0

Classification guide for ECI Pawleys (PAW)

Document

Release Date: 2014-10-10 Document Date: 2006-11-14
This 2006 NSA classification guide outlines the sensitivity of the agency’s clandestine human and electronic access to systems in order to “obtain cryptographic information and material”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE 0^ftUJDt54 SD7 AôEWf b<Kf' DTBb3LP HDEYI D0<XS«X 0*YR Jfi! (55^ BUH 5654 ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh