Filtered By
CSE X
Agency [filter]
Results
13 Total
0.0

LEVIATHAN and the FFU Hypothesis

Document

Release Date: 2015-01-28 Document Date: 2012-01-01
This CSE (then CSEC) presentation from 2012 describes the Canadian agency’s file download monitoring operation: see the Intercept article Canada Casts Global Surveillance Dragnet Over File Downloads, 28 January 2015. cse-presentation-on-the-levitation-project
TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA LEVITATION and the FFU Hypothesis cse-cst.gc.ca TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA What is LEVITATION? A behaviour-based target...
0.0

SNOWGLOBE: From Discovery to Attribution

Document

Release Date: 2015-01-17 Document Date: 2011-01-01
This 2011 CSEC presentation describes how the agency analysed SNOWGLOBE, which it considered “to be a state-sponsored CNO effort, put forth by a French intelligence agency”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Overall Classification: TOP SECRET II COMINT II REL TO CAN, AUS, GBR, NZL, USA ■ ■ Communications Security Establishment Canada SNOWGLOBE: From Discovery to Attribution CSEC CNT/Cyb...
0.0

Mobile apps doubleheader: BADASS Angry Birds

Document

Release Date: 2015-01-17
This undated joint GCHQ/CSEC presentation provides an overview of “exploring and exploiting leaky mobile apps”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Mobile apps doubleheader: BADASS Angry Birds From 6 weeks to 6 minutes: protocols exploitation in a rapidly changing world Exploring and Exploiting Leaky Mobile Apps with BADASS GTE/GCHQ GA...
0.0

TLS Trends: A roundtable discussion on current usage and future directions

Document

Release Date: 2014-12-28
This CSEC presentation from 2012 outlines the agency’s capabilities against SSL encryption at that point: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO CAN, AUS, GBR, NZL, USA rs TLS Trends: A roundtable discussion on current usage and future directions Communications Security Establishment Canada (CSEC) ...
0.0

IP Profiling Analytics & Mission Impacts

Document

Release Date: 2014-01-30 Document Date: 2012-05-10
This CSEC presentation dated 10 May 2012 describes the agency’s techniques for tracking a single IP address and details an experiment carried out at a Canadian airport with the help of an unspecified special source provider: see the CBC article, CSEC used airport Wi-Fi to track Canadian travellers: Edward Snowden documents, 30 January 2014. Download […]
TOP SECRET ■ ■ Communications Security Establishment Canada IP Profiling Analytics & Mission Impacts Tradecraft Developer CSEC - Network Analysis Centre May 10, 2012 SIGINT ...
0.0

CSEC – Advanced Network Tradecraft

Document

Release Date: 2013-10-06 Document Date: 2012-06-01
This CSEC presentation from June 2012, slides from which were first published by Fantástico in October 2013, describes the Canadian agency’s use of the Olympia suite of analytic tools in the context of spying on Brazil’s Ministry of Mines and Energy: see the Globe and Mail article How CSEC became an electronic spying giant, 30 […]
1-b5263447e8.jpg: AND THEY SAID TO THE TITANS: « WATCH OUT OLYMPIANS IN THE HOUSE! » CSEC - Advanced Network Tradecraft SD Conference June 2012 Overall Classification: TOP SECRET//SI2-6...
0.0

Synergising Network Analysis Tradecraft

Document

Release Date: 2015-05-21 Document Date: 2012-01-01
This 2012 presentation from the Network Tradecraft Advancement Team (NTAT), a joint Five Eyes surveillance unit, discusses options for installing malware on smartphones in light of the challenge posed by the Arab Spring: see the CBC News article Spy agencies target mobile phones, app stores to implant spyware, 21 May 2015.
Synergising Network Analysis Tradecraft Network Tradecraft Advancement Team (NTAT) Overview TOP SECRET//SI Tradecraft? Tradecraft • “The development of methods, techni...
0.0

CSEC Cyber Threat Capabilities

Document

Release Date: 2015-03-23 Document Date: 2011-01-01
This CSE presentation from 2011 describes some of the cyber warfare tools at the agency’s disposal: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
■ ^ ■ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY Establishment Canada des télécommunications Canada CSEC Cyber Threat Capabilities SIGINT and ITS: an en...
0.0

LANDMARK

Document

Release Date: 2014-08-15
Undated CSEC slides describe LANDMARK, a tool which is used to expand the Five Eyes’ network of Operational Relay Boxes (ORBs) and other compromised machines located outside of Five Eyes territory. Another tool, OLYMPIA, automates the process of pursuing leads identified using the HACIENDA post scanning tool: see the Heise article The HACIENDA Program for […]
Abbildung17-4271ef23aec87e86.png: TOP SECRET//COMINT ■ ju ■ Communications Security Centre de la sécurité ■ “ ■ Establishment des télécommunications Presentation Outline * LANDMARK - au...
0.0

CASCADE – Joint Cyber Sensor Architecture

Document

Release Date: 2015-03-23 Document Date: 2011-01-01
This CSEC presentation from 2011 communicates Canada’s current and future cyberwar plans to their Five Eyes partners: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
CLASSIFICATION: CLASSIFICATION: TOP SECRET // COMINT // REL FVEY Project Overview Current Status Proposed Architecture Towards 2015 CLASSIFICATION: TOP SECRET // COMINT // REL FYEY ...
0.0

CSEC ITS/2NE Cyber Threat Discovery

Document

Release Date: 2015-02-25 Document Date: 2010-01-01
This 2010 CSEC document complete with speakers’ notes shows that visits to Canadian government websites were monitored, and hundreds of thousands of emails to government email addresses retained every day, for cybersecurity purposes: see the CBC News article CSE monitors millions of Canadian emails to government, 25 February 2015.
TOP SECRET 1^1 Communications Security Centre de la sécurité Establishment Canada des télécommunications Canada CSEC ITS/N2E Cyber Threat Discovery I DISCOCON 2010 m/4 ...
0.0

Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure

Document

Release Date: 2015-01-17 Document Date: 2010-06-01
This June 2010 CSEC presentation for the CSEC conference outlines counter-computer network exploitation (CCNE) techniques: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure CSEC Counter-CNE Target Analytics thread SIGDEV Conference NSA-June 201...
0.0

CSEC SIGINT Cyber Discovery: Summary of the current effort

Document

Release Date: 2015-01-17 Document Date: 2010-11-18
This CSEC presentation for a November 2010 conference outlines CSEC capabilities in the recognition of trojans and other “network based anomolies”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT ■ Communications Security Establishment Canada Centre de la sécurité des télécommunications Canada CSEC SIGINT Cyber Discovery: Summary of the current effort ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh