Results
3 Total
0.0
QUANTUMTHEORY
Document
Release Date:
2014-03-12
Document Date:
2010-01-01
This presentation from the 2010 SIGDEV Conference describes the contribution made by GCHQ to the development of Quantum techniques: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, FVEY//20320108
TOP SECRET//COMINT//REL TO USA, FVEY//20320108
SIGDEV: Discovery in the Cyber Ag>
TOP SECRET//COMINT//REL TO USA, FVEY//20320108
(U) Clas...
0.0
Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure
Document
Release Date:
2015-01-17
Document Date:
2010-06-01
This June 2010 CSEC presentation for the CSEC conference outlines counter-computer network exploitation (CCNE) techniques: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT
Pay attention to that man behind the
curtain:
Discovering aliens on CNE infrastructure
CSEC Counter-CNE
Target Analytics thread
SIGDEV Conference
NSA-June 201...
0.0
CSEC SIGINT Cyber Discovery: Summary of the current effort
Document
Release Date:
2015-01-17
Document Date:
2010-11-18
This CSEC presentation for a November 2010 conference outlines CSEC capabilities in the recognition of trojans and other “network based anomolies”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT
■ Communications Security
Establishment Canada
Centre de la sécurité
des télécommunications Canada
CSEC SIGINT Cyber Discovery:
Summary of the current effort
...