Results
6 Total
0.0
CNE Presence in CT10 Status Report
Document
Release Date:
2015-01-17
This undated NSA paper describes a project to recognise and process data that comes from third party attacks on computers: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//NOFORN//20291123
CNE Presence in CT10 Status Report
Authors:
SNIP Intern
1LT
(U//FOUO) Executive Summary
(S//SI//REL USA, FVEY) This paper discusses the work ...
0.0
Full Spectrum Cyber Effects
Document
Release Date:
2014-04-04
This presentation, prepared by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) for the 2010 SIGDEV conference describes the agency’s “effects” operations – including the use of social media for propaganda purposes: see the Intercept article: The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket, 4 April 2014.
UK TOP SECRET STRAP 1
GCHQ
Full-Spectrum Cyber Effects
name redacted
jTMii Head of JTRIG
name redacted
SD Effects Lead
SIGINT Development as an enabler
for GCHQ’s “Effects” m...
0.0
XKEYSCORE Search Forms
Document
Release Date:
2015-07-01
Document Date:
2009-03-01
This 49-page March 2009 NSA presentation explains how to conduct searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-search-forms-p1-normal.gif:
XKEYSCORE
Search Forms
March 2009
El
• *1
... ■
OK
l 1001
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL
1-52
DATED: 20...
0.0
Bad guys are everywhere, good guys are somewhere!
Document
Release Date:
2014-09-14
This undated NSA presentation sets out the network-mapping tool Treasure Map, and supplies information on some of the agency’s collection access points: see the Intercept article New Zealand Launched Mass Surveillance Project While Publicly Denying It, 15 September 2014.
Bad guys are everywhere,
good guys are somewhere!
NSA/CSS Threat Operations Center (NTOC)
NTOC Technology Development
TS//SI//REL TO USA, FVEY
(U) NTOC
• (U//FOUO) Operates under bot...
ASSOCIATION, BLACKPEARL, BYZANTINE, CERNET, DISCOROUTE, HYDROCASTLE, JOLLYROGER, LEAKYFAUCET, MASTERSHAKE, PACKAGEDGOODS (PG), RADIUS, ROUTEVIEWS, RUSTICBAGGAGE, SEASIDEFERRY, SOCIALSTAMP, S-TRICKLER, TOYGRIPPE, TREASUREMAP (TM), TUTELAGE, VITALAIR2, XKEYSCORE (XKS)
Argentina (ARG/AR), Austria (AUT/AT), Brazil (BRA/BR), China (CHN/CN), Denmark (DNK/DK), Germany (DEU/DE), India (IND/IN), Indonesia (IDN/ID), Latvia (LVA/LV), Malaysia (MYS/MY), New Zealand (NZL/NZ), Pakistan (PAK/PK), Poland (POL/PL), Russia (RUS/RU), Singapore (SGP/SG), South Africa (ZAF/ZA), Taiwan (TWN/TW), Thailand (THA/TH), Ukraine (UKR/UA), United States (USA/US)
0.0
Automated NOC Detection
Document
Release Date:
2014-12-13
Document Date:
2011-01-01
This 2011 presentation, created by GCHQ’s Network Analysis Centre describes new techniques for gathering reconnaissance on the IT personnel of targeted organisations (their “Network Operations Centres”), using Belgacom as an example in several slides: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014. Download […]
TOP SECRET STRAP 2
Automated NOC
Detection
, Head of GCHQ NAC
Senior Network Analyst, CSEC NAC
n/\c
This information is exempt from disclosure under the Freedom of Information Act ...
0.0
NIOC Maryland Advanced Computer Network Operations Course
Document
Release Date:
2015-01-17
Document Date:
2012-04-18
This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
NIOC MARYLAND ADVANCED COMPUTER
NETWORK OPERATIONS COURSE
Coordinated by
-- NAVIOCOM Maryland
Center of Excellence for Non-Kinetic Options —
1
SECRET//REL TO USA, /
Title
• C...