Filtered By
TOYGRIPPE X
Codewords [filter]
Results
13 Total
0.0

APEX Active/Passive Exfiltration

Document

Release Date: 2015-01-17 Document Date: 2009-08-01
This NSA TURBULENCE presentation dated August 2009 explains the APEX method of combining passive with active methods to exfiltrate data from networks attacked: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Active/Passive Exfiltration "go apex" STDP: S32354 & T112, NCSC/C91 August 2009 OP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMHMT//REL TO USA. AUS. CAN....
0.0

VPN SigDev Basics

Document

Release Date: 2014-12-28
This undated NSA presentation describes how to perform attacks against VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (TS//SI//REL)VPN SigDev Basics S31244 - OTTERCREEK Derived From: NSA/CSSM 1-52 Dated: 20070108 ______Declassify On: 20341101 TOP S...
0.0

Analytic Challenges from Active-Passive Integration

Document

Release Date: 2014-12-28
This undated NSA presentation from the agency’s Information Technology Directorate, aimed at analysts, describes techniques for decrypting IPSec VPN traffic: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
This Briefing is Classified TOP SECRET//COMINT//REL USA, FVEY Analytic Challenges from Active-Passive Integration S324 This Briefing is Classified TOP SECRET//COMINT//REL USA,FVEY DER...
0.0

Bad guys are everywhere, good guys are somewhere!

Document

Release Date: 2014-09-14
This undated NSA presentation sets out the network-mapping tool Treasure Map, and supplies information on some of the agency’s collection access points: see the Intercept article New Zealand Launched Mass Surveillance Project While Publicly Denying It, 15 September 2014.
Bad guys are everywhere, good guys are somewhere! NSA/CSS Threat Operations Center (NTOC) NTOC Technology Development TS//SI//REL TO USA, FVEY (U) NTOC • (U//FOUO) Operates under bot...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

Turmoil VPN Processing

Document

Release Date: 2014-12-28 Document Date: 2009-10-27
This NSA presentation dated 27 October 2009 outlines the use of intercepted IPSec VPN data within the agency: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TURMOIL VPN PROCESSING 27 October 2009 The overall classification for this brief is: [TOPSECRET//COMINT//REL TO USA, FVEY] TOP SECRET//COMINT//REL TO USA FVEY Agenda • VPN Technolo...
0.0

VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN

Document

Release Date: 2014-03-12
Slides from an NSA Turbulence presentation describe two of the agency’s specialised implants, aimed at compromising virtual private networks (VPNs) and online telephony (VOIP): see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 APEX VPN Phases ► VPN Phase 1: IKE Metadata Only (Spin 15) - IKE packets are exfiled to TURMOIL APEX. ■ APEX reconstructs/r...
0.0

SSO Corporate Portfolio Overview

Document

Release Date: 2015-08-15
This undated NSA presentation, presented together with speaking notes, provides an introduction to the main cable access programmes facilitated by the agency’s corporate partners and specifies the relevant SIGADs: see the book No Place to Hide, 13 May 2014.
 SSO Corporate Portfolio Overview Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361201 Agenda 2 What is SSO Corporate access collection? (TS//SI//NF) Access an...
0.0

Fielded Capability: End-to-End VPN SPIN 9 Design Review

Document

Release Date: 2014-12-28
This undated NSA presentation describes the Spin 9 system for decrypting VPN data: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
The overall classification for this brief is: TOPSECRET//COMINT//REL USA, AUS, CAN, GBR, NZL//20320108 SPIN 9 Design Review TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL//20320108 VPN ...
0.0

VALIANTSURF WikiInfo page

Document

Release Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes VALIANTSURF “the coverterm for the development of Data Network Cipher (DNC) exploitation capabilities in TURMOIL”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
VALIANTSURF - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY * TOP SECRET1/SI/10RCON1REL TO USA, FVEY ...
0.0

TURMOIL/APEX/APEX High Level Description Document

Document

Release Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes some of the agency’s techniques for capturing IPSec Virtual Private Network (VPN) traffic: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TURMOIL/APEX/APEX High Level Description Document - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY * TOP...
0.0

What Your Mother Never Told You About SIGDEV Analysis

Document

Release Date: 2014-12-28
This undated presentation from NSA’s Network Analysis Center describes agency techniques for overcoming Virtual Private Networks (VPNs): see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
(s//si//rel) What Your Mother Never Told You About SIGDEV Analysis^^^^^^^ SSG21 Net Pursuit Network Analysis Center Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 2037040...
0.0

Network Tradecraft Advancement Team

Document

Release Date: 2014-12-04 Document Date: 2010-06-10
This GCHQ document from June 2010 describes cooperation between members of the Five Eyes alliance, particularly Canada’s CSEC, on the technical analysis of international mobile phone networks: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
Network Tradecraft Advancement Team (NTAT) 3G > 2nd SCAMP at CSEC process ■ Worked with CSEC H3 developers to implement IRASCIABLE RABBIT into OLYMPIA ■ Developed 41 use cases ■ Devel...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh