Filtered By
PINWALE X
Codewords [filter]
UNITEDRAKE X
Codewords [filter]
Computer Network Operations X
Document Topic [filter]
Results
3 Total
0.0

FASHIONCLEFT Interface Control Document

Document

Release Date: 2015-01-17 Document Date: 2009-06-15
This internal NSA document dated 15 June 2009 describes a protocol the agency uses to exfiltrate data from its computer network exploitation operations: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Classification: TOP SECRET//COMINT//X1 // COMINT // XI FASHIONCLEFT Interface Control Document Updated: 15 June 2009 Document Number: TAO.DNT_SE07_005_V1.1 28 March 2005 FASHIONCLE...
0.0

APEX Active/Passive Exfiltration

Document

Release Date: 2015-01-17 Document Date: 2009-08-01
This NSA TURBULENCE presentation dated August 2009 explains the APEX method of combining passive with active methods to exfiltrate data from networks attacked: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Active/Passive Exfiltration "go apex" STDP: S32354 & T112, NCSC/C91 August 2009 OP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMHMT//REL TO USA. AUS. CAN....
0.0

CNE Analysis in XKeyScore

Document

Release Date: 2015-07-01 Document Date: 2009-10-15
This NSA presentation from 15 October 2009 explains how analysts can exploit the products of the agency’s CNE hacking operations within XKeyScore and provides examples with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CNE Analysis in XKEYSCORE 15 October 2009 xkeyscore@nsa.ic.gov l@nsa.ic.gov) y >M 1-5 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL DERIVED F ROM: Ñ WCSSM 1-52 DATED: 2...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh