Results
6 Total
0.0
‘4th Party Collection’: Taking Advantage of Non-Partner Computer Network Exploitation Activity
Document
Release Date:
2015-01-17
Document Date:
2008-01-07
This 7 January 2008 post from NSA Menwith Hill Station’s internal Horizon newsletter describes the practice of piggybacking on other states’ computer network exploitation operations: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
SIDToday - '4th Party Collection': Taking Advantage of Non-Partner Computer Network Exploitation Activity
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA ...
0.0
Case Studies of Integrated Cyber Operation Techniques
Document
Release Date:
2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY
Case Studies of Integrated Cyber
Operation Techniques
NSA/CSS Threat Operations Center
VS
TOP SECRET//COMINT//REL USA, FVEY
(U//FOUO) TUiT0t.EÄ,©i...
0.0
Expeditionary Access Operations: NSA’s Close Access Network Exploitation Program
Document
Release Date:
2016-08-19
This undated presentation from the NSA’s Expeditionary Access Operations discusses how malware techniques are used in the field: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
EXPEDITIONARY ACCESS OPERATIONS
NSA’s Close Access Network Exploitation Program
Expeditionary Access Operations
(S//SI//REL) S3283 is the expeditionary arm of TAO which
conducts worldwide...
0.0
Exploiting Foreign Lawful Intercept (LI) Roundtable
Document
Release Date:
2015-09-29
Document Date:
2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif:
TOP SECRET//SI//REL TO USA, FVEY
(S//SI//REL) Exploiting Foreign
Lawful Intercept (LI)
Roundtable
S31122
TOP SECRET//SI//REL TO USA, FVEY...
0.0
Tailored Access Operations – Texas Cryptologic Center
Document
Release Date:
2013-12-29
This NSA presentation describes the staffing and activities of the Tailored Access Operations sectio based in San Antonia Texas. These included operations against Mexico’s Secretariat of Public Security (codenamed WHITETAMALE), Cuba, Columbia, Venezuela and unspecified targets in the Middle East: see the Der Spiegel article Inside TAO: Documents Reveal Top NSA Hacking Unit, 29 December […]
image-584021-galleryV9-yenq.jpg:
image-584022-galleryV9-qplk.jpg:
TOP SECRET//COMINT//REL TO USA, FVEY
Overview
• Current People, Space, & Operations (FY2009)
• Medina era Growth (FY20...
0.0
NIOC Maryland Advanced Computer Network Operations Course
Document
Release Date:
2015-01-17
Document Date:
2012-04-18
This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
NIOC MARYLAND ADVANCED COMPUTER
NETWORK OPERATIONS COURSE
Coordinated by
-- NAVIOCOM Maryland
Center of Excellence for Non-Kinetic Options —
1
SECRET//REL TO USA, /
Title
• C...