Index of /snowden-archive/documents/2015

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]20150219-theintercept__where_are_these_keys.pdf2023-07-17 13:46 80K 
[   ]20150219-theintercept__pcs_harvesting_at_scale.pdf2023-07-17 13:46 2.8M 
[   ]20150219-theintercept__imsis_identified_with_ki_data_for_network.pdf2023-07-17 13:46 83K 
[   ]20150219-theintercept__dapino_gamma_target_personalisation_centres.pdf2023-07-17 13:46 89K 
[   ]20150219-theintercept__dapino_gamma_gemalto_yuaawaa_wiki.pdf2023-07-17 13:46 64K 
[   ]20150219-theintercept__dapino_gamma_cne_presence_wiki.pdf2023-07-17 13:46 55K 
[   ]20150219-theintercept__cne_access_to_core_mobile_networks.pdf2023-07-17 13:46 78K 
[   ]20150219-theintercept__ccne_successes_jan10_mar10_trial.pdf2023-07-17 13:46 72K 
[   ]20150219-theintercept__ccne_stats_summaries_jan10_mar10_trial.pdf2023-07-17 13:46 77K 
[   ]20150219-theintercept__ccne_email_harvesting_jan10_mar10_trial.pdf2023-07-17 13:46 77K 
[   ]20150219-theintercept__ccne_email_addresses_jan10_mar10_trial.pdf2023-07-17 13:46 77K 
[   ]20150210-theintercept__iran_current_topics_interactions_with_gchq.pdf2023-07-17 13:46 382K 
[   ]20150204-theintercept__who_else_is_targeting_your_target_collecting.pdf2023-07-17 13:46 52K 
[   ]20150204-theintercept__open_source_for_cyber_defence_progress.pdf2023-07-17 13:46 66K 
[   ]20150204-theintercept__nato_civilian_intelligence_council_cyber_panel.pdf2023-07-17 13:46 236K 
[   ]20150204-theintercept__lovely_horse.pdf2023-07-17 13:46 67K 
[   ]20150128-theintercept__cse_presentation_on_the_levitation_project.pdf2023-07-17 13:46 3.7M 
[   ]20150128-cbc__cse_presentation_on_the_levitation_project.pdf2023-07-17 13:46 3.7M 
[   ]20150117-derspeigel__the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa.pdf2023-07-17 13:46 2.6M 
[   ]20150117-derspeigel__technical_description_of_the_fashioncleft_protocol.pdf2023-07-17 13:46 2.9M 
[   ]20150117-derspeigel__supply-chain_interdiction_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf2023-07-17 13:46 213K 
[   ]20150117-derspeigel__sample_code_of_malware_program_from_five_eyes_alliance.pdf2023-07-17 13:46 185K 
[   ]20150117-derspeigel__report_of_nsa_employee_about_backdoor_in_the_openssh_daemon.pdf2023-07-17 13:46 403K 
[   ]20150117-derspeigel__quantumtheory_is_a_set_of_technologies_allowing_man_on_the_side_interference_attacks_on_tcp_ip_connections_includes_straightbizarre_and_daredev.pdf2023-07-17 13:46 1.6M 
[   ]20150117-derspeigel__projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf2023-07-17 13:46 1.4M 
[   ]20150117-derspeigel__process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job.pdf2023-07-17 13:46 1.6M 
[   ]20150117-derspeigel__overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf2023-07-17 13:46 9.4M 
[   ]20150117-derspeigel__overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf2023-07-17 13:46 2.1M 
[   ]20150117-derspeigel__overview_of_methods_for_nsa_integrated_cyber_operations.pdf2023-07-17 13:46 2.5M 
[   ]20150117-derspeigel__nsa_training_course_material_on_computer_network_operations.pdf2023-07-17 13:46 6.9M 
[   ]20150117-derspeigel__nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf2023-07-17 13:46 352K 
[   ]20150117-derspeigel__nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf2023-07-17 13:46 4.1M 
[   ]20150117-derspeigel__nsa_fourth_party_access.pdf2023-07-17 13:46 3.6M 
[   ]20150117-derspeigel__nsa_example_snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests.pdf2023-07-17 13:46 3.3M 
[   ]20150117-derspeigel__expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf2023-07-17 13:46 228K 
[   ]20150117-derspeigel__document_explaining_the_role_of_the_remote_operations_center_roc.pdf2023-07-17 13:46 168K 
[   ]20150117-derspeigel__csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf2023-07-17 13:46 3.9M 
[   ]20150117-derspeigel__csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly.pdf2023-07-17 13:46 3.4M 
[   ]20150117-derspeigel__combination_of_offensive_and_defensive_missions_how_fourth-party_missions_are_being_performed.pdf2023-07-17 13:46 226K 
[   ]20150117-derspeigel__classification_guide_for_computer_network_exploitation_cne.pdf2023-07-17 13:46 1.0M 
[   ]20150117-derspeigel__analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf2023-07-17 13:46 1.3M