Results
6 Total
0.0
Expeditionary Access Operations: NSA’s Close Access Network Exploitation Program
Document
Release Date:
2016-08-19
This undated presentation from the NSA’s Expeditionary Access Operations discusses how malware techniques are used in the field: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
EXPEDITIONARY ACCESS OPERATIONS
NSA’s Close Access Network Exploitation Program
Expeditionary Access Operations
(S//SI//REL) S3283 is the expeditionary arm of TAO which
conducts worldwide...
0.0
Introduction to WLAN / 802.11 Active CNE Operations
Document
Release Date:
2016-08-19
Document Date:
2010-12-15
This NSA presentation from December 2010 forms the second part of a course in using the agency’s CNE tools: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//NOFORN
CLOSE «
ACCESS
Introduction to WLAN / 802.11
Active CNE Operations
December 15-16, 2010
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
Classifi...
0.0
Wireless LAN/CNE Tool Training Course and Evaluation
Document
Release Date:
2016-08-19
Document Date:
2010-12-15
This NSA presentation from December 2010 forms the first part of a course in using the agency’s CNE tools: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//NOFORN
CLOSE «
ACCESS
Wireless LAN / CNE Tool Training
Course and Evaluation
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
Classification
#4
CLOSE...
0.0
ANT Product Data
Document
Release Date:
2013-12-30
These pages from an NSA internal catalogue describe the tools available to the agency in 2008: see the Der Spiegel article NSA’s Secret Toolbox: Unit Offers Spy Gadgets for Every Need, 30 December 2013
S3222_DEITYBOUNCE.jpg:
SECRET//COMINT//REL TO USA, FVEY
DEITYBOUNCE
ANT Product Data
(TS//SI//REL) DEITYBOUNCE provides software application persistence on Dell
PowerEdge servers by exp...
ANGRYNEIGHBOR, ARKSTREAM, BANANAGLEE, BLINDDATE, BULLDOZER, CANDYGRAM, CHIMNEYPOOL, CONJECTURE, COTTONMOUTH (CM), CROSSBEAM, CYCLONE Hx9, DANDERSPRITZ, DEITYBOUNCE, DROPOUTJEEP, ENTOURAGE, GENESIS, GENIE, GOPHERSET, GOTHAM, GOURMETTROUGH, HALLUXWATER, HEADWATER, HOLLOWPOINT, HOWLERMONKEY (HM), IRATEMONK, JETPLOW, JUNIORMINT, KONGUR, LOUDAUTO, MOCCASIN, MONKEYCALENDAR, NIGHTSTAND, NIGHTWATCH, OLYMPUS, PHOTOANGLO, PICASSO, QUANTUM, RAGEMASTER, ROCKYKNOB, SOUFFLETROUGH, SPECULATION, SWAP, TAWDRYYARD, TOTECHASER, TOTEGHOSTLY, TRINITY, TURBOPANDA, TURBULENCE (TU), TWISTEDKILT, TYPHON, TYPHON HX, UNITEDRAKE, VAGRANT, VIEWPLATE, WATERWITCH, WISTFULTOLL, ZESTYLEAK
0.0
NIOC Maryland Advanced Computer Network Operations Course
Document
Release Date:
2015-01-17
Document Date:
2012-04-18
This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
NIOC MARYLAND ADVANCED COMPUTER
NETWORK OPERATIONS COURSE
Coordinated by
-- NAVIOCOM Maryland
Center of Excellence for Non-Kinetic Options —
1
SECRET//REL TO USA, /
Title
• C...
0.0
Introduction to BADDECISION
Document
Release Date:
2016-08-19
Document Date:
2010-12-15
This December 2010 instructional presentation explains how to use the see the BADDECISION tool to redirect web traffic to a FOXACID server: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//NOFORN
CLOSE «
ACCESS
Introduction to BADDECISION
December 15-16, 2010
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
Classification
CLOSE
ACCESS...