Browse Items (626 total)

20150323-CBC-CSE Response to CBC Questions.pdf
This document is a memo prepared by CSEC addressing several questions from the media outlet CBC.

20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf
This document is a presentation overview into CSEC's analysis of TLS (Tranport Layer Security) traffic, in an effort to identify encryption capabilites, services, trends, and changes. Workflows show warranted collection and collection from a special…

20150128-intercept-cse_presentation_on_the_levitation_project.pdf
This document is a presentation prepared by CSEC. It describes the LEVITATION program, an effort to monitor file sharing sites in order to locate extremist training and propoganda materials. This program is capable of monitoring 10-15 million…

20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf
This document contains slides outlining the CSEC interception and inspection of a piece of spyware, SNOWGLOBE. Slides titled "Victimology" and "Intelligence Priorities" list the spyware's targets as Canada, Europe, Africa and Iran, incuding Iranian…

20150310-Intercept-Secure Key Extraction By Physical De Processing.pdf
This document is an abstract for a presentation created by the CIA. This presentation focused on describing methods to physically extract the Global ID (GID) key from iPhones and other Apple devices.

20150310-Intercept-Apple A4 A5 Application Processors Analysis.pdf
This document is an extract from a presentation created by the CIA. It appears to be the front page of a presentation related to CIA operations against Apple's A4/A5 Application Processors used in the iPhone.

20150310-Intercept-Differential Power Analysis on the Apple A4.pdf
This document is an abstract for a presentation by the CIA. It describes the CIA's attempts to subvert the A4 Processor used by Apple in the iPhone 4, the iPod touch, and the first generation iPad.

20150310-Intercept-TPM Vulnerabilities to Power Analysis and An.pdf
This document is an abstract for a presentation created by the CIA. The presentation focused on exploiting vulnerabilities within Microsoft's Bitlocker encrypted metadata software system.

20150310-Intercept-ROCOTO Implanting the Iphone.pdf
This document is an abstract of a presentation prepared by the CIA. It describes ROCOTO, which is a codeword for the agencies efforts to create surveillance tools for the iPhone 3G.

20150310-Intercept-Strawhorse Attacking the Macos and Ios Software.pdf
This document is an abstract for a CIA presentation. This presentation focused on the exploitation of vulnerabilities in Xcode 4.1, the proprietary code used to compile MacOS X applications and kernel extensions as well as iOS applications used in…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2