Datesort ascending Document Media Outlet
2/4/2015 Open Source For Cyber Defence Progress Intercept
2/4/2015 Lovely Horse Intercept
1/28/2015 CSE Presentation on the LEVITATION Project CBC
1/17/2015 Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program Der Spiegel
1/17/2015 Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE Der Spiegel
1/17/2015 Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards Der Spiegel
1/17/2015 BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools Der Spiegel
1/17/2015 Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits Der Spiegel
1/17/2015 APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked Der Spiegel
1/17/2015 Overview of Methods For NSA Integrated Cyber Operations Der Spiegel
1/17/2015 4th Party Collection - Taking Advantage of Non-partner Exploitation Der Spiegel
1/17/2015 Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets Der Spiegel
1/17/2015 QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL) Der Spiegel
1/17/2015 Technical Description of the FASHIONCLEFT Protocol Der Spiegel
1/17/2015 NSA Training Course Material on Computer Network Operations Der Spiegel
1/17/2015 Document About the Expansion of the Remote Operations Center (ROC) on Endpoint Operations Der Spiegel
1/17/2015 Interview With NSA's Department For Tailored Access Operations Der Spiegel
1/17/2015 Sample Code of A Malware Program From the Five Eyes Alliance Der Spiegel
1/17/2015 NSA SNOWGLOBE, French Government Trojan Der Spiegel
1/17/2015 Document Explaining the Role of the Remote Operations Center (ROC) Der Spiegel
1/17/2015 Fifth Party Access - When Fourth Party Puts Others Under Surveillance Der Spiegel
1/17/2015 Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job Der Spiegel
1/17/2015 Recognize and Process Data From Third Party Attacks Der Spiegel
1/17/2015 APEX Shaping to Put Exfiltrating Network Traffic Into Plausible Deniability Der Spiegel
1/17/2015 Report of An NSA Employee About a Backdoor In the OpenSSH Daemon Der Spiegel
1/17/2015 NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools Der Spiegel
1/17/2015 Analysis of Chinese Methods and Performed Actions In the Context of Computer Network Exploitation Der Spiegel
1/17/2015 NSA Fourth Party Access - I Drink Your Milkshake Der Spiegel
1/17/2015 Classification Guide For Computer Network Exploitation (CNE) Der Spiegel
1/17/2015 SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence Der Spiegel
1/17/2015 Combination of Offensive and Defensive Missions - How Fourth-party Missions are Being Performed Der Spiegel
1/17/2015 QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties Der Spiegel
1/17/2015 CSEC Document About the Recognition of Trojans and Other network Based Anomaly Der Spiegel
1/17/2015 Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline Der Spiegel
1/17/2015 CSEC Document on the Handling of Existing Trojans When Trojanizing Computers Der Spiegel
1/17/2015 iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID) Der Spiegel
1/17/2015 HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data Der Spiegel
1/17/2015 The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA Der Spiegel
1/17/2015 Exploring and Exploiting Leaky Mobile Apps With BADASS Der Spiegel
12/28/2014 Intercept With PGP Encrypted Message Der Spiegel
12/28/2014 BLUESNORT Program on Net Defense From Encrypted Communications Der Spiegel
12/28/2014 NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service Der Spiegel
12/28/2014 Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH) Der Spiegel
12/28/2014 A Potential Technique to Deanonymise Users of the TOR Network Der Spiegel
12/28/2014 NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN Der Spiegel
12/28/2014 NSA Experiment For Massive SSL-TLS Decryption Der Spiegel
12/28/2014 MALIBU Architecture Overview to Exploit VPN Communication Der Spiegel
12/28/2014 Canadian Document From CES on TLS Trends Der Spiegel
12/28/2014 Classification Guide For Cryptanalysis Der Spiegel
12/28/2014 NSA Cryptographic Modernization (CryptoMod) Classification Guide Der Spiegel