Results
3 Total
0.0
SIGINT Development Support II Program Management Review
Document
Release Date:
2016-08-19
Document Date:
2013-04-24
Four slides taken from a 24 April 2013 NSA presentation detail how SECONDDATE man-in-the-middle attacks were used against targets in Pakistan and Lebanon: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//SI//NOFORN
The overall classification of this brief is
(U) SIGINT Development Support II
Program Management Review
► 24 April 2013
TOP SECRET//COMINT//NOFORN
Derived Fro...
0.0
VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN
Document
Release Date:
2014-03-12
Slides from an NSA Turbulence presentation describe two of the agency’s specialised implants, aimed at compromising virtual private networks (VPNs) and online telephony (VOIP): see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
APEX VPN Phases
► VPN Phase 1: IKE Metadata Only (Spin 15)
- IKE packets are exfiled to TURMOIL APEX.
■ APEX reconstructs/r...
0.0
TURMOIL/APEX/APEX High Level Description Document
Document
Release Date:
2014-12-28
This undated page from NSA’s internal WikiInfo describes some of the agency’s techniques for capturing IPSec Virtual Private Network (VPN) traffic: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TURMOIL/APEX/APEX High Level Description Document - Wikiinfo
The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT
KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY *
TOP...