Filtered By
WARRIORPRIDE (WP)X
Codewords [filter]
Results
8 Total
1.0

CSEC SIGINT Cyber Discovery: Summary of the current effort

Document

Document Date: 2010-11-18Release Date: 2015-01-17
This CSEC presentation for a November 2010 conference outlines CSEC capabilities in the recognition of trojans and other “network based anomolies”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT ■ Communications Security Establishment Canada Centre de la sécurité des télécommunications Canada CSEC SIGINT Cyber Discovery: Summary of the current effort ...
1.0

Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure

Document

Document Date: 2010-06-01Release Date: 2015-01-17
This June 2010 CSEC presentation for the CSEC conference outlines counter-computer network exploitation (CCNE) techniques: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure CSEC Counter-CNE Target Analytics thread SIGDEV Conference NSA-June 201...
1.0

Malware from the Five Eyes

Document

Release Date: 2015-01-17
This extract of source code, presented here with a short introduction, appears to be part of the WARRIORPRIDE suite and was subsequently linked to the nation-state level malware Regin: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Malware from the Five Eyes Introduction The Five Eyes commonly share tools and techniques, and in some occasions also collectively develop new ones, such as the WARRIORPRIDE malware framewo...
1.0

Mobile Theme Briefing

Document

Document Date: 2010-05-28Release Date: 2014-01-27
Six slides from a 28 May 2010 GCHQ presentation on intercepting mobile phone data, describing the agency’s many tools for compromising individual handsets and weaknesses within national networks and international roaming exchanges (GRXs). Note that these are the first versions of these documents to be released online: see the Guardian article NSA and GCHQ target […]
SECRET STRAP 1 MOBILE THEME BRIEFING MAY 28 2010 MORE - mobile technologies, networks, signals & locations FASTER - developments against new mobile internet applications BETTER - ...
1.0

SNOWGLOBE: From Discovery to Attribution

Document

Document Date: 2011-01-01Release Date: 2015-01-17
This 2011 CSEC presentation describes how the agency analysed SNOWGLOBE, which it considered “to be a state-sponsored CNO effort, put forth by a French intelligence agency”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Overall Classification: TOP SECRET II COMINT II REL TO CAN, AUS, GBR, NZL, USA ■ ■ Communications Security Establishment Canada SNOWGLOBE: From Discovery to Attribution CSEC CNT/Cyb...
1.0

Moving Data Through Disconnected Networks

Document

Document Date: 2012-06-18Release Date: 2015-01-17
This June 2012 NSA presentation describes methods to exfiltrate data, even from networks that are apparently offline: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Moving Data Through Disconnected Networks Delay-Tolerant Networking and the IC (U//FOUO) June ; The overall classification of this briefing is: TOP SECRET//COMINT//REL TO USA, FVEY ...
1.0

iPhone target analysis and exploitation with unique device identifiers

Document

Document Date: 2010-11-12Release Date: 2015-01-17
This GCHQ research paper dated 12 November 2010 discuss some of the agency’s attacks against iPhone handsets: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET STRAP1 12th November 2010 ICTR-MCT Team (ICTR-MCT-GCHQ-dl) MHE Team (MHETeam-GCHQ-dl) OPDSDHQ^^^H TEA Benhall Records Centre iPhone target analysis and exploitation wit...
1.0

SUSLOW monthly report for March 2013

Document

Document Date: 2013-03-01Release Date: 2015-03-10
This NSA document from March 2013 gives an update on GCSB activities, including the use of WARRIOR PRIDE malware against an ASEAN country and the Kim Dotcom case: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: - (U) Intelligence update: o (TS//SI//REL TO USA, FVEY) GCSB has a WARRIORPRIDE ca...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh