Filtered By
RADIUS X
Codewords [filter]
Results
6 Total
0.0

CNE Presence in CT10 Status Report

Document

Release Date: 2015-01-17
This undated NSA paper describes a project to recognise and process data that comes from third party attacks on computers: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//NOFORN//20291123 CNE Presence in CT10 Status Report Authors: SNIP Intern 1LT (U//FOUO) Executive Summary (S//SI//REL USA, FVEY) This paper discusses the work ...
0.0

Full Spectrum Cyber Effects

Document

Release Date: 2014-04-04
This presentation, prepared by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) for the 2010 SIGDEV conference describes the agency’s “effects” operations – including the use of social media for propaganda purposes: see the Intercept article: The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket, 4 April 2014.
UK TOP SECRET STRAP 1 GCHQ Full-Spectrum Cyber Effects name redacted jTMii Head of JTRIG name redacted SD Effects Lead SIGINT Development as an enabler for GCHQ’s “Effects” m...
0.0

XKEYSCORE Search Forms

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This 49-page March 2009 NSA presentation explains how to conduct searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-search-forms-p1-normal.gif: XKEYSCORE Search Forms March 2009 El • *1 ... ■ OK l 1001 SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL 1-52 DATED: 20...
0.0

Bad guys are everywhere, good guys are somewhere!

Document

Release Date: 2014-09-14
This undated NSA presentation sets out the network-mapping tool Treasure Map, and supplies information on some of the agency’s collection access points: see the Intercept article New Zealand Launched Mass Surveillance Project While Publicly Denying It, 15 September 2014.
Bad guys are everywhere, good guys are somewhere! NSA/CSS Threat Operations Center (NTOC) NTOC Technology Development TS//SI//REL TO USA, FVEY (U) NTOC • (U//FOUO) Operates under bot...
0.0

Automated NOC Detection

Document

Release Date: 2014-12-13 Document Date: 2011-01-01
This 2011 presentation, created by GCHQ’s Network Analysis Centre describes new techniques for gathering reconnaissance on the IT personnel of targeted organisations (their “Network Operations Centres”), using Belgacom as an example in several slides: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014. Download […]
TOP SECRET STRAP 2 Automated NOC Detection , Head of GCHQ NAC Senior Network Analyst, CSEC NAC n/\c This information is exempt from disclosure under the Freedom of Information Act ...
0.0

NIOC Maryland Advanced Computer Network Operations Course

Document

Release Date: 2015-01-17 Document Date: 2012-04-18
This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
NIOC MARYLAND ADVANCED COMPUTER NETWORK OPERATIONS COURSE Coordinated by -- NAVIOCOM Maryland Center of Excellence for Non-Kinetic Options — 1 SECRET//REL TO USA, / Title • C...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh