Filtered By
GHOSTMACHINE X
Codewords [filter]
United States (USA/US) X
Countries Mentioned [filter]
Computer Network Operations X
Document Topic [filter]
Results
3 Total
0.0

TUTELAGE

Document

Release Date: 2015-01-17
This undated NSA presentation describes techniques for repurposing third party attack tools: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, FVEY TOP SECRET//COMINT//REL TO USA, TOP SECRET//COMINT//REL TO USA, FVEY Before TUTELAGE... AFTERk INTRUSION Manual Analysis of Reporting Lo...
0.0

SPINALTAP: Making Passive Sexy for Generation Cyber

Document

Release Date: 2015-01-17
This undated NSA Menwith Hill presentation describes SPINALTAP, a project to combine data from active operations and passive signals intelligence: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, FVEY / '■%.^ (U//FOUO) SPINALTAP: Making Passive Sexy for Generation Cyber TOP SECRET//COMINT//REL TO USA, FVEY TOP SECRET//COMINT//REL TO USA, FVE...
0.0

HIDDENSALAMANDER: Alerting and Characterization of Botnet Activity in TURMOIL

Document

Release Date: 2015-01-17
This undated NSA presentation describes techniques for detecting botnets: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
P SECRET//COMINT//REL TO USA, FVEY HIDDENSALAMANDER Alerting and Characterization of _____iyiissiQr\] CAPABILIT, ES Botnet Activity in TURMOIL Briefers: SECRET//REL TO USA, FV...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh