Results
5 Total
0.0
CNE End Point Requirements
Document
Release Date:
2015-01-17
This undated GCHQ reference document enumerates the processes and tools analysts use for computer network exploitation: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET STRAP1 COMINT
CNE End Point Requirements
CATEGORY O Experimt O Refinemer O Bug Fix O ALL REQTYPE O Capability O Convergenc O Query O Taskir O Viewe Oall PRIOR...
0.0
Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure
Document
Release Date:
2015-01-17
Document Date:
2010-06-01
This June 2010 CSEC presentation for the CSEC conference outlines counter-computer network exploitation (CCNE) techniques: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT
Pay attention to that man behind the
curtain:
Discovering aliens on CNE infrastructure
CSEC Counter-CNE
Target Analytics thread
SIGDEV Conference
NSA-June 201...
0.0
CSEC ITS/2NE Cyber Threat Discovery
Document
Release Date:
2015-02-25
Document Date:
2010-01-01
This 2010 CSEC document complete with speakers’ notes shows that visits to Canadian government websites were monitored, and hundreds of thousands of emails to government email addresses retained every day, for cybersecurity purposes: see the CBC News article CSE monitors millions of Canadian emails to government, 25 February 2015.
TOP SECRET
1^1 Communications Security Centre de la sécurité
Establishment Canada des télécommunications Canada
CSEC ITS/N2E
Cyber Threat Discovery
I
DISCOCON 2010
m/4
...
0.0
CSEC SIGINT Cyber Discovery: Summary of the current effort
Document
Release Date:
2015-01-17
Document Date:
2010-11-18
This CSEC presentation for a November 2010 conference outlines CSEC capabilities in the recognition of trojans and other “network based anomolies”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT
■ Communications Security
Establishment Canada
Centre de la sécurité
des télécommunications Canada
CSEC SIGINT Cyber Discovery:
Summary of the current effort
...
0.0
JTRIG Tools and Techniques
Document
Release Date:
2014-07-14
Document Date:
2012-07-01
This page from GCHQ’s internal GCWiki describes tools developed by the Joint Threat Research Intelligence Group and their status. The page was last edited in July 2012 and was accessed nearly 20,000 times: see the Intercept article Hacking Online Polls and Other Ways British Spies Seek to Control the Internet, 14 July 2014. jtrigall
navigation
■ Main Page
■ Help Pages
■ Wikipedia Mirror
■ Ask Me About...
■ Random page
■ Recent changes
■ Report a Problem
■ Contacts
■ GCWeb
search
toolbox
■ W...
AIRWOLF, EAGLE, GAMBIT, MIDDLEMAN, RADIANT, SHADOWCAT, SKYSCRAPER, SWAMP, ANGRY PIRATE, BIRDSTRIKE, BOMB BAY, BUMPERCAR, BUMPERCAR+, BURLESQUE, CLEAN SWEEP, CONCRETE DONKEY, GATEWAY, GESTATOR, GLASSBACK, GLOBAL SURGE, HACIENDA, HUSK, INTERACTION, JEDI, MINIATURE HERO, MOUTH, PHOTON TORPEDO, ROLLING THUNDER (RT), SCRAPHEAP CHALLENGE, SPRING BISHOP, SUNBLOCK, SWAMP DONKEY, UNDERPASS, WARPATH, SLIPSTREAM