Filtered By
North Korea (PRK/KP) X
Countries Mentioned [filter]
Mexico (MEX/MX) X
Countries Mentioned [filter]
Results
3 Total
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

Passing on Target Expertise... IT Support... Averting an Assassination -- An Interview with REDACTED

Document

Release Date: 2017-04-24 Document Date: 2004-12-13
The chief of intelligence security issues describes an exciting career, which began with averting an assassination attempt against a congressional delegation by narco-insurgents in Asia. In the chief's opinion, the NSA needs better IT tools and functionalities, from web access to better PCs.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Passing on Target Expertise... IT Support... Averting an<br>Assassination -- An...
0.0

'Key Reads' Effort Expands, Scores Successes

Document

Release Date: 2018-03-01 Document Date: 2005-09-26
The “key reads” process, first developed for Central Command needs in Operation Iraqi Freedom, has been expanded to more topics and customers. Key reads respond to specific customer requests in less than three days. 
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (C//SI) 'Key Reads' Effort Expands, Scores Successes FROM: Requirements Analysis Center (S114...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh