Results
4 Total
0.0
TRANSGRESSION Overview for Pod58
Document
Release Date:
2015-01-17
Document Date:
2010-02-07
This 7 February 2010 NSA presentation outlines techniques to “discover, understand, evaluate, and exploit foreign CNE/CNA exploits”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOPSECRET//COMINT//REL TO USA, FVEY
TRANSGRESSION Overview for Pod58
S31177
7 Feb 2010
DERIVED FROM: NSA/CSSM 1-52
DATED 08 JAN 2007
DECLASSIFY ON: 20320108
TOPSECRET//COMINT//REL T...
0.0
Profiling SSL and Attributing Private Networks
Document
Release Date:
2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL
PROFILING SSL AND ATTRIBUTING
PRIVATE NETWORKS
An introduction to FLYING PIG and HUSH PUPPY
ICTR - Network Exploitation
GCHQ
T R
J...
0.0
Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure
Document
Release Date:
2015-01-17
Document Date:
2010-06-01
This June 2010 CSEC presentation for the CSEC conference outlines counter-computer network exploitation (CCNE) techniques: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT
Pay attention to that man behind the
curtain:
Discovering aliens on CNE infrastructure
CSEC Counter-CNE
Target Analytics thread
SIGDEV Conference
NSA-June 201...
0.0
Hackers are Humans too: Cyber leads to CI leads
Document
Release Date:
2017-08-02
Document Date:
2011-01-01
This CSEC presentation from 2011 describes how poor operational security led to the successful attribution of a group of Russian-state associated hackers codenamed MAKERSMARK: see the Intercept article White House Says Russia’s Hackers Are Too Good To Be Caught But Nsa Partner Called Them “Morons”, 2 August 2017.
■ ■ Communications Security
Establishment Canada
TS//SI//REL TO CAN, AUS, GBR, NZL, and USA
Centre de la securite
des telecommunications Canada
Hackers are Humans too
Cyber leads ...