Datesort descending Document
1/17/2015 Document About the Expansion of the Remote Operations Center (ROC) on Endpoint Operations
1/17/2015 Interview With NSA's Department For Tailored Access Operations
1/17/2015 Sample Code of A Malware Program From the Five Eyes Alliance
1/17/2015 NSA SNOWGLOBE, French Government Trojan
1/17/2015 Document Explaining the Role of the Remote Operations Center (ROC)
1/17/2015 Fifth Party Access - When Fourth Party Puts Others Under Surveillance
1/17/2015 Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job
1/17/2015 Recognize and Process Data From Third Party Attacks
1/17/2015 APEX Shaping to Put Exfiltrating Network Traffic Into Plausible Deniability
1/17/2015 Report of An NSA Employee About a Backdoor In the OpenSSH Daemon
1/17/2015 NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools
1/17/2015 Analysis of Chinese Methods and Performed Actions In the Context of Computer Network Exploitation
1/17/2015 NSA Fourth Party Access - I Drink Your Milkshake
1/17/2015 Classification Guide For Computer Network Exploitation (CNE)
1/17/2015 SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence
1/17/2015 Combination of Offensive and Defensive Missions - How Fourth-party Missions are Being Performed
1/17/2015 QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties
1/17/2015 CSEC Document About the Recognition of Trojans and Other network Based Anomaly
1/17/2015 Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline
1/17/2015 CSEC Document on the Handling of Existing Trojans When Trojanizing Computers
1/17/2015 iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID)
1/17/2015 HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data
1/17/2015 The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA
1/17/2015 Exploring and Exploiting Leaky Mobile Apps With BADASS
1/28/2015 CSE Presentation on the LEVITATION Project
2/4/2015 NATO Civilian Intelligence Council Cyber Panel
2/4/2015 Who Else Is Targeting Your Target Collecting
2/4/2015 Open Source For Cyber Defence Progress
2/4/2015 Lovely Horse
2/10/2015 Iran Current Topics - Interactions with GCHQ
2/19/2015 SIM Card Encryption Key Theft and Mobile Network Access (Collection)
3/5/2015 GCSB SIGINT Development Quarterly Report
3/10/2015 TCB Jamboree and Apple Vulnerability Targeting (Collection)
3/11/2015 New Zealand GCSB Spying (Collection)
3/16/2015 GCSB XKEYSCORE Search Query
3/23/2015 CSE Cyberwarfare Toolbox (Collection)
4/2/2015 GCHQ Operation QUITO to Shape Falklands Public Opinion (Collection)
5/5/2015 Black Budget 262
5/5/2015 Black Budget 360-364
5/5/2015 Human Language Technology
5/5/2015 RT10 Overview
5/5/2015 SID Today Finding Nuggets
5/5/2015 SID Today Future Is Now Conclusion
5/5/2015 SID Today Future Is Now FInal
5/5/2015 SID Today Is HLT Progressing
5/5/2015 SID Today Non-linguists Final
5/5/2015 SID Today Tsunami of Intercept Final
5/5/2015 WG Advice to Security Service
5/8/2015 Skynet Cloud Based Behavior
5/8/2015 Skynet Courier Detection