Directory listing for /SNOWDEN/2015/

Filename Size Content type Content encoding
20150117-derspeigel__analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf 1M [application/pdf]
20150117-derspeigel__classification_guide_for_computer_network_exploitation_cne.pdf 1M [application/pdf]
20150117-derspeigel__combination_of_offensive_and_defensive_missions_how_fourth-party_missions_are_being_performed.pdf 226K [application/pdf]
20150117-derspeigel__csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly.pdf 3M [application/pdf]
20150117-derspeigel__csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf 3M [application/pdf]
20150117-derspeigel__document_explaining_the_role_of_the_remote_operations_center_roc.pdf 167K [application/pdf]
20150117-derspeigel__expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf 228K [application/pdf]
20150117-derspeigel__nsa_example_snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests.pdf 3M [application/pdf]
20150117-derspeigel__nsa_fourth_party_access.pdf 3M [application/pdf]
20150117-derspeigel__nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf 4M [application/pdf]
20150117-derspeigel__nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf 352K [application/pdf]
20150117-derspeigel__nsa_training_course_material_on_computer_network_operations.pdf 6M [application/pdf]
20150117-derspeigel__overview_of_methods_for_nsa_integrated_cyber_operations.pdf 2M [application/pdf]
20150117-derspeigel__overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf 2M [application/pdf]
20150117-derspeigel__overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf 9M [application/pdf]
20150117-derspeigel__process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job.pdf 1M [application/pdf]
20150117-derspeigel__projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf 1M [application/pdf]
20150117-derspeigel__quantumtheory_is_a_set_of_technologies_allowing_man_on_the_side_interference_attacks_on_tcp_ip_connections_includes_straightbizarre_and_daredev.pdf 1M [application/pdf]
20150117-derspeigel__report_of_nsa_employee_about_backdoor_in_the_openssh_daemon.pdf 402K [application/pdf]
20150117-derspeigel__sample_code_of_malware_program_from_five_eyes_alliance.pdf 184K [application/pdf]
20150117-derspeigel__supply-chain_interdiction_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf 212K [application/pdf]
20150117-derspeigel__technical_description_of_the_fashioncleft_protocol.pdf 2M [application/pdf]
20150117-derspeigel__the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa.pdf 2M [application/pdf]
20150128-cbc__cse_presentation_on_the_levitation_project.pdf 3M [application/pdf]
20150128-theintercept__cse_presentation_on_the_levitation_project.pdf 3M [application/pdf]
20150204-theintercept__lovely_horse.pdf 66K [application/pdf]
20150204-theintercept__nato_civilian_intelligence_council_cyber_panel.pdf 236K [application/pdf]
20150204-theintercept__open_source_for_cyber_defence_progress.pdf 65K [application/pdf]
20150204-theintercept__who_else_is_targeting_your_target_collecting.pdf 52K [application/pdf]
20150210-theintercept__iran_current_topics_interactions_with_gchq.pdf 381K [application/pdf]
20150219-theintercept__ccne_email_addresses_jan10_mar10_trial.pdf 76K [application/pdf]
20150219-theintercept__ccne_email_harvesting_jan10_mar10_trial.pdf 77K [application/pdf]
20150219-theintercept__ccne_stats_summaries_jan10_mar10_trial.pdf 77K [application/pdf]
20150219-theintercept__ccne_successes_jan10_mar10_trial.pdf 71K [application/pdf]
20150219-theintercept__cne_access_to_core_mobile_networks.pdf 77K [application/pdf]
20150219-theintercept__dapino_gamma_cne_presence_wiki.pdf 55K [application/pdf]
20150219-theintercept__dapino_gamma_gemalto_yuaawaa_wiki.pdf 63K [application/pdf]
20150219-theintercept__dapino_gamma_target_personalisation_centres.pdf 89K [application/pdf]
20150219-theintercept__imsis_identified_with_ki_data_for_network.pdf 82K [application/pdf]
20150219-theintercept__pcs_harvesting_at_scale.pdf 2M [application/pdf]
20150219-theintercept__where_are_these_keys.pdf 80K [application/pdf]