Results
12 Total
0.0
CNE Presence in CT10 Status Report
Document
Release Date:
2015-01-17
This undated NSA paper describes a project to recognise and process data that comes from third party attacks on computers: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//NOFORN//20291123
CNE Presence in CT10 Status Report
Authors:
SNIP Intern
1LT
(U//FOUO) Executive Summary
(S//SI//REL USA, FVEY) This paper discusses the work ...
0.0
VALIDATOR and OLYMPUSFIRE
Document
Release Date:
2014-01-01
Document Date:
2004-01-01
These two pages from a 2004 NSA briefing document describes two trojan implants used with the FOXACID system: see the Der Spiegel article NSA-Totalausspähung: FDP-Politiker Baum setzt auf Generalbundesanwalt, 1 January 2014.
image-583936-galleryV9-hpue.jpg:
TOP SECRET//COMINT//MR
VALIDATOR
VALIDATOR is a part of a backdoor access system under the FOXACID project. The
VALIDATOR is a client/server-based system t...
0.0
Case Studies of Integrated Cyber Operation Techniques
Document
Release Date:
2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY
Case Studies of Integrated Cyber
Operation Techniques
NSA/CSS Threat Operations Center
VS
TOP SECRET//COMINT//REL USA, FVEY
(U//FOUO) TUiT0t.EÄ,©i...
0.0
Tailored Access Operations – Texas Cryptologic Center
Document
Release Date:
2013-12-29
This NSA presentation describes the staffing and activities of the Tailored Access Operations sectio based in San Antonia Texas. These included operations against Mexico’s Secretariat of Public Security (codenamed WHITETAMALE), Cuba, Columbia, Venezuela and unspecified targets in the Middle East: see the Der Spiegel article Inside TAO: Documents Reveal Top NSA Hacking Unit, 29 December […]
image-584021-galleryV9-yenq.jpg:
image-584022-galleryV9-qplk.jpg:
TOP SECRET//COMINT//REL TO USA, FVEY
Overview
• Current People, Space, & Operations (FY2009)
• Medina era Growth (FY20...
0.0
Introduction to WLAN / 802.11 Active CNE Operations
Document
Release Date:
2016-08-19
Document Date:
2010-12-15
This NSA presentation from December 2010 forms the second part of a course in using the agency’s CNE tools: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//NOFORN
CLOSE «
ACCESS
Introduction to WLAN / 802.11
Active CNE Operations
December 15-16, 2010
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
Classifi...
0.0
NSA QUANTUM Tasking Techniques for the R&T Analyst
Document
Release Date:
2013-12-29
This Booz Allen Hamilton presentation on the NSA’s Quantum tools describes the different kinds of malware attacks available to workgroups within the agency, the procedure an analyst must follow in order to make use of them and the way the systems themselves work, using a “man-on-the-side” attack from TAO’s FOXACID server. It also describes the […]
image-583967-galleryV9-quqn.jpg:
TOP SECRET//SI//REL USA, AUS, CAN, GBR, NZL
(TS) NSA QUANTUM Tasking Techniques
for the R&T Analyst
POC:
TAO RTD | Team
- Booz Allen Hamilton SDS2
...
0.0
QUANTUMHAND
Document
Release Date:
2014-03-15
Document Date:
2011-04-01
This short extract from an April 2011 NSA document describes the operation of the agency’s QUANTUMHAND tool: see the Intercept article Compare the NSA’s Facebook Malware Denial to its Own Secret Documents, 15 March 2014.
(TS//SI//NF) QUANTUMTHEORY (QT) is a set of CNO Man-on-the-Side capabilities that involve
real-time responses to passive collection. After the recent TURMOIL upgrade at SSO’s SARATOGA
access, TA...
0.0
Targets visiting specific websites
Document
Release Date:
2015-07-01
Ths undated set of annotated screenshots from XKeyScore provides a worked example of a search: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-targets-visiting-specific-websites-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA, AUS, CAN. GBR. NZU/20320108
Center.! =*oc
Book Aleo Hammer
See next page for Derived From: NSA'CSSM ...
0.0
Introduction to BADDECISION
Document
Release Date:
2016-08-19
Document Date:
2010-12-15
This December 2010 instructional presentation explains how to use the see the BADDECISION tool to redirect web traffic to a FOXACID server: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//NOFORN
CLOSE «
ACCESS
Introduction to BADDECISION
December 15-16, 2010
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
Classification
CLOSE
ACCESS...
0.0
FOXACID
Document
Release Date:
2013-12-30
Document Date:
2007-01-08
An NSA presentation on the FOXACID system used to redirect web traffic in order to deliver malware to a target machine. The image on the first slide plays on the original delivery method used to compromise targets: spam emails. Those conventional phishing attacks (such as WILLOWVIXEN) have become deprecated in the agency’s offensive arsenal in […]
TOP
FC
TOP SECF
Derived From: NSA/CSSM 1-52
Dated: 20070108
Declassify On: 20291123
TOP SECRET//COMINT//NOFORN
Mission Statement: Provide Points of Presence for follow
on collecti...
0.0
DGO Enables Endpoint Implants via QUANTUMTHEORY
Document
Release Date:
2016-08-19
Document Date:
2011-09-26
This 26 September 2011 article from the NSA’s internal newsletter Special Source Operations News discusses the delivery of QUANTUMINSERT malware to a target in Pakistan: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
(TS//SI//NF) DGO Enables Endpoint Implants via QUANTUMTHEORY
By [[REDACTED]] on 2011-09-26 1548
(TS//SI//NF) In another example of the emerging collaboration between the Endpoint
and Midpoint ...
0.0
FOXACID SOP for Operational Management of FOXACID Infrastructure
Document
Release Date:
2016-08-19
This draft NSA report on using the agency’s FOXACID system confirms that malware code released by the ShadowBrokers did, in fact, originate from the NS see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
D R A F T
NATIONAL SECURITY AGENCY
CENTRAL SECURITY SERVICE
FORT GEORGE G. MEADE, MARYLAND
FOXACID SOP
FOR
OPERATIONAL MANAGEMENT...