Filtered By
MUGSHOTX
Codewords [filter]
Results
2 Total
1.0

MUGSHOT

Document

Release Date: 2014-08-15
These slides, taken from an undated GCHQ presentation, show the operation of the agency’s automated tool for compromising Operational Relay Boxes (ORBs): see the Heise article The HACIENDA Program for Internet Colonization, 15 August 2014.
Abbildung23-1298aca890a5439a.png: ^CCHQ^ © Crown Copyright. All rights reserved. ing OrbsAbbildung24-900db32885f0cc0f.png: Benefits ■ Automated Vulnerability Assessment - Using Vuln...
1.0

CNE End Point Requirements

Document

Release Date: 2015-01-17
This undated GCHQ reference document enumerates the processes and tools analysts use for computer network exploitation: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET STRAP1 COMINT CNE End Point Requirements CATEGORY O Experimt O Refinemer O Bug Fix O ALL REQTYPE O Capability O Convergenc O Query O Taskir O Viewe Oall PRIOR...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh