This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 26 lines
!!! Overview
[{$pagename}] is a [SIGINT] program [Architecture] that capitalises on [vulnerabilities|Vulnerability] within [applications] and [networks] using a number of hacking techniques and was developed by [NSA] [Office of Tailored Access Operations]
[{$pagename}] relies on a compromised [router] that duplicates [internet] traffic, typically [HTTP] requests, so that they go both to the intended target and to an [NSA] site (indirectly). The [NSA] site runs [FOXACID] software which sends back exploits that load in the background in the target web [browser] before the intended destination has had a chance to respond (it's unclear if the compromised router facilitates this race on the return trip).
Prior to the development of [{$pagename}] technology, [FOXACID] software made spear-[phishing] attacks the [NSA] referred to as [spam]. If the browser is exploitable, further permanent "implants" (rootkits etc.) are deployed in the target computer, e.g. [OLYMPUSFIRE] for [Microsoft Windows], which give complete remote access to the infected machine. This type of attack is part of the [Man-In-The-Middle] [attack] family, though more specifically it is called man-on-the-side attack. It is difficult to pull off without controlling some of the [Internet] backbone.The [NSA] creates "[fingerprints]" that detect [HTTP] requests from the Tor network to particular servers. These [fingerprints] are loaded into NSA [Government Data Store] systems like [XKEYSCORE], a bespoke collection and analysis tool that NSA boasts allows its analysts to see "almost everything" a target does on the Internet.
!! Components of [{$pagename}]
* [TURMOIL]
* [TURBINE]
* [ISLANDTRANSPORT]
* [SURPLUSHANGER]
* [STRAITBIZARRE] or [DAREDEVIL]
* [QUANTUMINSERT]
* [QUANTUMSKY]
* [QUANTUMBOT]!! Category
%%category [Government Surveillance]%%
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [QUANTUM THEORY|http://www.dcssproject.net/quantum-theory/|target='_blank'] - based on information obtained 2018-10-03-
* [#2] - [Tailored_Access_Operations|Wikipedia:Tailored_Access_Operations|target='_blank'] - based on information obtained 2018-10-03-
* [#3] - [How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID|https://www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html|target='_blank'] - based on information obtained 2018-10-03-
* [#2] - [EFF|https://www.eff.org/document/20150117-spiegel-quantumtheory-man-side-interference-attacks-tcp-ip-straightbizarre-and-0|target='_blank'] - based on information obtained 2018-10-08-