Results
13 Total
0.0
SNOWGLOBE: From Discovery to Attribution
Document
Release Date:
2015-01-17
Document Date:
2011-01-01
This 2011 CSEC presentation describes how the agency analysed SNOWGLOBE, which it considered “to be a state-sponsored CNO effort, put forth by a French intelligence agency”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Overall Classification: TOP SECRET II COMINT II REL TO CAN, AUS, GBR, NZL, USA
■ ■ Communications Security
Establishment Canada
SNOWGLOBE:
From Discovery to Attribution
CSEC CNT/Cyb...
0.0
Mobile apps doubleheader: BADASS Angry Birds
Document
Release Date:
2015-01-17
This undated joint GCHQ/CSEC presentation provides an overview of “exploring and exploiting leaky mobile apps”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Mobile apps doubleheader: BADASS Angry Birds
From 6 weeks to 6 minutes: protocols exploitation in a rapidly changing world
Exploring and Exploiting Leaky Mobile Apps with BADASS
GTE/GCHQ GA...
0.0
TLS Trends: A roundtable discussion on current usage and future directions
Document
Release Date:
2014-12-28
This CSEC presentation from 2012 outlines the agency’s capabilities against SSL encryption at that point: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO CAN, AUS, GBR, NZL, USA
rs
TLS Trends:
A roundtable discussion on current
usage and future directions
Communications Security Establishment Canada (CSEC)
...
0.0
LEVIATHAN and the FFU Hypothesis
Document
Release Date:
2015-01-28
Document Date:
2012-01-01
This CSE (then CSEC) presentation from 2012 describes the Canadian agency’s file download monitoring operation: see the Intercept article Canada Casts Global Surveillance Dragnet Over File Downloads, 28 January 2015. cse-presentation-on-the-levitation-project
TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA
LEVITATION and
the FFU Hypothesis
cse-cst.gc.ca
TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA
What is LEVITATION?
A behaviour-based target...
Bahrain (BHR/BH), Brazil (BRA/BR), Canada (CAN/CA), Germany (DEU/DE), Iraq (IRQ/IQ), Jordan (JOR/JO), Kenya (KEN/KE), Kuwait (KWT/KW), Morocco (MAR/MA), Qatar (QAT/QA), Saudi Arabia (SAU/SA), Senegal (SEN/SN), Spain (ESP/ES), United Arab Emirates (ARE/AE), United Kingdom (GBR/GB), United States (USA/US), Yemen (YEM/YE)
0.0
IP Profiling Analytics & Mission Impacts
Document
Release Date:
2014-01-30
Document Date:
2012-05-10
This CSEC presentation dated 10 May 2012 describes the agency’s techniques for tracking a single IP address and details an experiment carried out at a Canadian airport with the help of an unspecified special source provider: see the CBC article, CSEC used airport Wi-Fi to track Canadian travellers: Edward Snowden documents, 30 January 2014. Download […]
TOP SECRET
■ ■ Communications Security
Establishment Canada
IP Profiling Analytics
& Mission Impacts
Tradecraft Developer
CSEC - Network Analysis Centre
May 10, 2012
SIGINT
...
0.0
Synergising Network Analysis Tradecraft
Document
Release Date:
2015-05-21
Document Date:
2012-01-01
This 2012 presentation from the Network Tradecraft Advancement Team (NTAT), a joint Five Eyes surveillance unit, discusses options for installing malware on smartphones in light of the challenge posed by the Arab Spring: see the CBC News article Spy agencies target mobile phones, app stores to implant spyware, 21 May 2015.
Synergising Network Analysis
Tradecraft
Network Tradecraft Advancement Team
(NTAT)
Overview
TOP SECRET//SI
Tradecraft?
Tradecraft
• “The development of methods,
techni...
0.0
CSEC Cyber Threat Capabilities
Document
Release Date:
2015-03-23
Document Date:
2011-01-01
This CSE presentation from 2011 describes some of the cyber warfare tools at the agency’s disposal: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
■ ^ ■ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY
Establishment Canada des télécommunications Canada
CSEC Cyber Threat Capabilities
SIGINT and ITS: an en...
0.0
LANDMARK
Document
Release Date:
2014-08-15
Undated CSEC slides describe LANDMARK, a tool which is used to expand the Five Eyes’ network of Operational Relay Boxes (ORBs) and other compromised machines located outside of Five Eyes territory. Another tool, OLYMPIA, automates the process of pursuing leads identified using the HACIENDA post scanning tool: see the Heise article The HACIENDA Program for […]
Abbildung17-4271ef23aec87e86.png:
TOP SECRET//COMINT
■ ju ■ Communications Security Centre de la sécurité ■ “ ■ Establishment des télécommunications
Presentation Outline
* LANDMARK - au...
0.0
Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure
Document
Release Date:
2015-01-17
Document Date:
2010-06-01
This June 2010 CSEC presentation for the CSEC conference outlines counter-computer network exploitation (CCNE) techniques: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT
Pay attention to that man behind the
curtain:
Discovering aliens on CNE infrastructure
CSEC Counter-CNE
Target Analytics thread
SIGDEV Conference
NSA-June 201...
0.0
CASCADE – Joint Cyber Sensor Architecture
Document
Release Date:
2015-03-23
Document Date:
2011-01-01
This CSEC presentation from 2011 communicates Canada’s current and future cyberwar plans to their Five Eyes partners: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
CLASSIFICATION:
CLASSIFICATION: TOP SECRET // COMINT // REL FVEY
Project Overview
Current Status
Proposed Architecture
Towards 2015
CLASSIFICATION: TOP SECRET // COMINT // REL FYEY
...
0.0
CSEC ITS/2NE Cyber Threat Discovery
Document
Release Date:
2015-02-25
Document Date:
2010-01-01
This 2010 CSEC document complete with speakers’ notes shows that visits to Canadian government websites were monitored, and hundreds of thousands of emails to government email addresses retained every day, for cybersecurity purposes: see the CBC News article CSE monitors millions of Canadian emails to government, 25 February 2015.
TOP SECRET
1^1 Communications Security Centre de la sécurité
Establishment Canada des télécommunications Canada
CSEC ITS/N2E
Cyber Threat Discovery
I
DISCOCON 2010
m/4
...
0.0
CSEC SIGINT Cyber Discovery: Summary of the current effort
Document
Release Date:
2015-01-17
Document Date:
2010-11-18
This CSEC presentation for a November 2010 conference outlines CSEC capabilities in the recognition of trojans and other “network based anomolies”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT
■ Communications Security
Establishment Canada
Centre de la sécurité
des télécommunications Canada
CSEC SIGINT Cyber Discovery:
Summary of the current effort
...
0.0
Hackers are Humans too: Cyber leads to CI leads
Document
Release Date:
2017-08-02
Document Date:
2011-01-01
This CSEC presentation from 2011 describes how poor operational security led to the successful attribution of a group of Russian-state associated hackers codenamed MAKERSMARK: see the Intercept article White House Says Russia’s Hackers Are Too Good To Be Caught But Nsa Partner Called Them “Morons”, 2 August 2017.
■ ■ Communications Security
Establishment Canada
TS//SI//REL TO CAN, AUS, GBR, NZL, and USA
Centre de la securite
des telecommunications Canada
Hackers are Humans too
Cyber leads ...