DocumentRelease Date: 2014-10-10 Document Date: 2004-11-23
This document, produced by the NSA and the US military’s Joint Functional Component Command – Network Wardare, provides a briefing on, and classification guide to, the highly sensitive group of “core computer network operations secrets” codenamed SENTRY EAGLE: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN//20310524 DRAFT (S) National Security Agency/Central Security' Service (NSA/CSS) and U.S. Strategic Command Joint Functional Component Command - Net...
DocumentRelease Date: 2014-07-14 Document Date: 2012-07-01
This page from GCHQ’s internal GCWiki describes tools developed by the Joint Threat Research Intelligence Group and their status. The page was last edited in July 2012 and was accessed nearly 20,000 times: see the Intercept article Hacking Online Polls and Other Ways British Spies Seek to Control the Internet, 14 July 2014. jtrigall
navigation ■ Main Page ■ Help Pages ■ Wikipedia Mirror ■ Ask Me About... ■ Random page ■ Recent changes ■ Report a Problem ■ Contacts ■ GCWeb search toolbox ■ W...
AIRWOLF, EAGLE, GAMBIT, MIDDLEMAN, RADIANT, SHADOWCAT, SKYSCRAPER, SWAMP, ANGRY PIRATE, BIRDSTRIKE, BOMB BAY, BUMPERCAR, BUMPERCAR+, BURLESQUE, CLEAN SWEEP, CONCRETE DONKEY, GATEWAY, GESTATOR, GLASSBACK, GLOBAL SURGE, HACIENDA, HUSK, INTERACTION, JEDI, MINIATURE HERO, MOUTH, PHOTON TORPEDO, ROLLING THUNDER (RT), SCRAPHEAP CHALLENGE, SPRING BISHOP, SUNBLOCK, SWAMP DONKEY, UNDERPASS, WARPATH, SLIPSTREAM