Filtered By
Afghanistan (AFG/AF) X
Countries Mentioned [filter]
Encryption and Cryptanalysis X
Document Topic [filter]
Results
3 Total
0.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

NSA intelligence relationship with Norway

Document

Release Date: 2014-04-26 Document Date: 2013-04-17
An internal NSA Information Paper dated 17 April 2013 that describes the current state of the relationship between NSA and the Norwegian intelligence service: see the Dagbladet article, NIS aquires supercomputer, 26 April 2014.
TOP SECRET//COMINT//REL TO USA, NOR National Security Agency/Central 17 April 2013 Security Service Information Paper (S//REL TO USA, NOR) Subject: NSA Intelligence Relationship with No...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh