Documents
Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail
Mar. 12, 2014
l'vlHS Leverages XKS for QUANTUM Against Yahoo and Hotmail
TOP TD USA, FVEY -
MH 5 Leverages Paclret Analysis to Identify Feasibility of QUANTUM Against "I"aho-or and Hotmail
Automated deep pacl-cet analysis of "r"ahoo and Hotmail providers gives keen insight into the potential success of QUAHTUMTHEDRY exploitation against these services-
is a set of CHD man--on--the--side capabilities that involves real--time packet inject in response to passive collection of target communications-
inspects each packet, one at a time. for a set of keywords that determine if the packet originated from a CHE target and if a modified response to that packet might result in exploitation ofthe client
computer- Because each is inspected individually. if occur across packet boundaries the technicgue will not tipthe EIGIHT systemto attempt exploitation of a
client. As headers and the size ofcool-ties grows. the likelihood of all lteywords occurring within a single packet reduces- in collaboration with and the FECHI.
productized an IHIHETECGRE l'u'lapIFi.educe analytic that leverages the packets collected and made accessible to analytics by HKEYEEDRE systems-
identifies the QUAHTUMTHEDFW keywords in a packet capture and generates statistics for each service [currently Hotmail and "r"ahoo} to determine how often all of the
lteywords occur within a single packet- This would not have been possible without providing a platform for analysis to mass-deploy packet-level processing- Approximately of
Hotmail and of"r"ahoo sessions contain the lteywords necessary within a single packet to be targeted
Ec-llaberatic-n: name radar-ted Access Operations Division. HEIFTWE Fl'.'l
Po-c: rum=ouo} Iuoax Division. Iv1Hs reclaaz-'teel
TOP SECRETHSIHREL T0 USA, FVEY
l'vlHS Leverages XKS for QUANTUM Against Yahoo and Hotmail
TOP TD USA, FVEY -
MH 5 Leverages Paclret Analysis to Identify Feasibility of QUANTUM Against "I"aho-or and Hotmail
Automated deep pacl-cet analysis of "r"ahoo and Hotmail providers gives keen insight into the potential success of QUAHTUMTHEDRY exploitation against these services-
is a set of CHD man--on--the--side capabilities that involves real--time packet inject in response to passive collection of target communications-
inspects each packet, one at a time. for a set of keywords that determine if the packet originated from a CHE target and if a modified response to that packet might result in exploitation ofthe client
computer- Because each is inspected individually. if occur across packet boundaries the technicgue will not tipthe EIGIHT systemto attempt exploitation of a
client. As headers and the size ofcool-ties grows. the likelihood of all lteywords occurring within a single packet reduces- in collaboration with and the FECHI.
productized an IHIHETECGRE l'u'lapIFi.educe analytic that leverages the packets collected and made accessible to analytics by HKEYEEDRE systems-
identifies the QUAHTUMTHEDFW keywords in a packet capture and generates statistics for each service [currently Hotmail and "r"ahoo} to determine how often all of the
lteywords occur within a single packet- This would not have been possible without providing a platform for analysis to mass-deploy packet-level processing- Approximately of
Hotmail and of"r"ahoo sessions contain the lteywords necessary within a single packet to be targeted
Ec-llaberatic-n: name radar-ted Access Operations Division. HEIFTWE Fl'.'l
Po-c: rum=ouo} Iuoax Division. Iv1Hs reclaaz-'teel
TOP SECRETHSIHREL T0 USA, FVEY