This document is an extract from a report created by the Network Analysis Centre (NAC). It provides a review of the agency's offensive cyber operations during the first quarter of 2011. It describes offensive cyber operations against targets in…
This document is a training course manual from the NIOC (Navy Information Operations Command) Maryland, for computer network operations. It provides background on the need for computer network operations training (due to the risk of cyber conflict),…
This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.
This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.
This document is a report preparted by NATO's Supreme Headquarters Allied Powers Europe, it describes the military environment in Afghanistan in June 2011, after the assassination of Osama Bin Laden.
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…
This document is a selection of slides from an internal NSA presentation describing the PRISM program. This program involved mining internet metadata directly from the servers from nine leading U.S. Internet companies. The NSA's partners in this…
This document is an article from the internal NSA Yakima Research Station (YRS) newsletter, The Northwest Passage. The article celebrates the YRS 40th anniversary of operations, focusing on its role within the ECHELON program "to collect and process…
This January 2011 newsletter extract, published by the NSA's Yakima Research Station (YRS), includes two articles. The first article gives a history (covering the years 1965 to 1974) of the development of the YRS based on archival material newly…
This document is a presentation deck from the NSA's Threat Operations Center (NTOC) outlining TUTELAGE, an application that instrumentalizes 3rd party attacks. The presentation goes over TUTELAGE's current and future capabilities of alerting,…