Datesort ascending Document
2/4/2015 Open Source For Cyber Defence Progress
2/4/2015 Lovely Horse
1/28/2015 CSE Presentation on the LEVITATION Project
1/17/2015 Overview on the NSA Use of Bots and the DEFIANTWARRIOR Program
1/17/2015 Excerpt From the Secret NSA Budget on Computer Network Operations - Code Word GENIE
1/17/2015 Projects of the TAO-ATO Department Such As the Remote Destruction of Network Cards
1/17/2015 BYZANTINE HADES - NSA Research on Targets of Chinese Network Exploitation Tools
1/17/2015 Overview of the TRANSGRESSION Program to Analyze and Exploit Foreign CNA-CNE Exploits
1/17/2015 APEX Method of Combining Passive With Active Methods to Exfiltrate Data From Networks Attacked
1/17/2015 Overview of Methods For NSA Integrated Cyber Operations
1/17/2015 4th Party Collection - Taking Advantage of Non-partner Exploitation
1/17/2015 Supply-chain Interdiction - Stealthy Techniques Can Crack Some of SIGINT's Hardest Targets
1/17/2015 QUANTUMTHEORY Man-on-the-side Interference Attacks on TCP-IP (STRAIGHTBIZARRE and DAREDEVIL)
1/17/2015 Technical Description of the FASHIONCLEFT Protocol
1/17/2015 NSA Training Course Material on Computer Network Operations
1/17/2015 Interview With NSA's Department For Tailored Access Operations
1/17/2015 Sample Code of A Malware Program From the Five Eyes Alliance
1/17/2015 NSA SNOWGLOBE, French Government Trojan
1/17/2015 Document About the Expansion of the Remote Operations Center (ROC) on Endpoint Operations
1/17/2015 Document Explaining the Role of the Remote Operations Center (ROC)
1/17/2015 Fifth Party Access - When Fourth Party Puts Others Under Surveillance
1/17/2015 Process Analysts Choose Their Data Requirement and Then Get to Know the Tools That Can Do the Job
1/17/2015 Recognize and Process Data From Third Party Attacks
1/17/2015 APEX Shaping to Put Exfiltrating Network Traffic Into Plausible Deniability
1/17/2015 Report of An NSA Employee About a Backdoor In the OpenSSH Daemon
1/17/2015 NSA Program TUTELAGE to Instrumentalize Third Party Attack Tools
1/17/2015 Analysis of Chinese Methods and Performed Actions In the Context of Computer Network Exploitation
1/17/2015 NSA Fourth Party Access - I Drink Your Milkshake
1/17/2015 Classification Guide For Computer Network Exploitation (CNE)
1/17/2015 SPINALTAP NSA Project to Combine Data From Active Operations and Passive Signals Intelligence
1/17/2015 Combination of Offensive and Defensive Missions - How Fourth-party Missions are Being Performed
1/17/2015 QUANTUMSHOOTER Implant to Remote-control Computers From Unknown Third Parties
1/17/2015 CSEC Document About the Recognition of Trojans and Other network Based Anomaly
1/17/2015 Methods to Exfiltrate Data Even From Devices Which are Supposed to Be Offline
1/17/2015 CSEC Document on the Handling of Existing Trojans When Trojanizing Computers
1/17/2015 iPhone Target Analysis and Exploitation With Apple's Unique Device Identifiers (UDID)
1/17/2015 HIDDENSALAMANDER -Recognition of Botnet Activity and Options For Takeover of Clients and Data
1/17/2015 The FASHIONCLEFT Protocol NSA Uses to Exfiltrate Data From Trojans and Implants to the NSA
1/17/2015 Exploring and Exploiting Leaky Mobile Apps With BADASS
12/28/2014 Intercept With PGP Encrypted Message
12/28/2014 BLUESNORT Program on Net Defense From Encrypted Communications
12/28/2014 NSA LONGHAUL Program For End-to-end Attack Orchestration and Key Recovery Service
12/28/2014 Intro to the VPN Exploitation Process Mentioning the Protocols Attacked - PPTP, IPSEC, SSL, SSH)
12/28/2014 A Potential Technique to Deanonymise Users of the TOR Network
12/28/2014 NSA High Level Description on TURMOIL - APEX Programs on Attacking VPN
12/28/2014 MALIBU Architecture Overview to Exploit VPN Communication
12/28/2014 Canadian Document From CES on TLS Trends
12/28/2014 NSA Experiment For Massive SSL-TLS Decryption
12/28/2014 Classification Guide For Cryptanalysis
12/28/2014 NSA Cryptographic Modernization (CryptoMod) Classification Guide

Pages