Media
_________________________________________
- "documents from the GCHQ - described emails !"
_________________________________________
- "to - and from - journalists - from the Guardian - Le Monde !"
_________________________________________
- "and from - BBC - Reuters - New York Times - and Washington Post !"
_________________________________________
- "the documents described - stored communications ! - ( to cleared staff - on their intranet ! )"
_________________________________________
- "which were sometimes simple - mass-PR emails - sent to dozens of journalists !"
_________________________________________
- "but also included - correspondence !"
_________________________________________
- "between reporters - and editors - discussing stories !"
_________________________________________
- "the documents described - an information security assessment !"
_________________________________________
- "listed - investigative journalists - beside hackers !"
_________________________________________
- "an internal security advice - was preoccupied with the activities - of journalists !"
_________________________________________
- "one document described - a potential threat - to security !"
_________________________________________
- "journalists - and reporters - represented all types - of news media !"
_________________________________________
- "the documents described - a security assessment - matrix !"
_________________________________________
- "listed journalists - near hackers !"
_________________________________________
- "journalists - "capability" score - of two - out of five !"
_________________________________________
- "and a "priority" - of three - out of five !"
______________________________________________________________________________
Cyber - Spiegel online: LINK ¤ SPIEGEL ONLINE_________________________________________
- "documents from the NSA - described the Internet !"
_________________________________________
- "computer networks - and potentially the infrastructure - they controlled !"
_________________________________________
- "( energy - communications - and transportation ! )"
_________________________________________
- "the documents described - "Phase 0" - implants in a system !"
_________________________________________
- ""Phase 3" - would control - a system - or network !"
_________________________________________
- "an internal document described - the goal - "real time control" !"
_________________________________________
- "the documents described - "plausible deniability" !"
_________________________________________
- "the author of a - cyber offensive - should not be traced !"
_________________________________________
- "the documents described - department S31177 - codenamed "Transgression" !"
_________________________________________
- "observed - and analyzed - a foreign cyber offensive !"
_________________________________________
- "the documents described - took their tools - tradecraft !"
_________________________________________
- "siphoned off insights - discoverd - understood - and evaluated !"
_________________________________________
- "the documents described - "fourth party collection" !"
_________________________________________
- "let a foreign - intelligence service - do the work !"
_________________________________________
- "the documents described - "reverse engineer - repurpose software" !"
_________________________________________
- "tried to transform a defense - into a cyber offensive !"
_________________________________________
- "botnets - potentially millions of computers - of normal users !"
_________________________________________
- "( software - had been installed ! )"
_________________________________________
- "the documents described - a program - "pervasive network analysis vantage points" !"
_________________________________________
- "and "throw-away non-attributable - CNA - computer network nodes" !"
_________________________________________
- "network operations - on people's computers !"
_________________________________________
- "that might be traced back - to an innocent person !"
_________________________________________
- "in technical terms - the ROC layed - a false track !"
_________________________________________
- "the documents described - from third-party computers - exported the data !"
_________________________________________
- "but most was not delivered directly - to ROC's - IP address !"
_________________________________________
- "rather - it had been routed to a so-called - "scapegoat target" !"
_________________________________________
- "where that information - could end up - on someone else's - server !"
_________________________________________
- "it looked as if - they were not concerned - about being caught !"
_________________________________________
- "( because they would not leave behind - evidence ! )"
_________________________________________
- "Edward Snowden says - for them defense - had a too low priority !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "instead - we must provide - protection !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "to private - Internet users !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "we need to create - new international standards - of behavior !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
MEDIA - Wikipedia EN: LINK ¤ MEDIA
______________________________________________________________________________
Medien - Spiegel online: LINK ¤ SPIEGEL ONLINE
_________________________________________
- "Dokumente vom GCHQ - beschrieben Medien !"
_________________________________________
- "E-Mails - von und an - the Guardian - Le Monde !"
_________________________________________
- "BBC - Reuters - Washington Post - und New York Times !"
_________________________________________
- "die Dokumente beschrieben - Nachrichten - in einem Intranet gespeichert !"
_________________________________________
- "PR-E-Mails - die an Dutzende Journalisten gleichzeitig - verschickt wurden !"
_________________________________________
- "aber auch Korrespondenzen - in denen sich Reporter !"
_________________________________________
- "und Redakteure - über Geschichten austauschten !"
_________________________________________
- "die Dokumente beschrieben - eine Liste mit - potenzieller Bedrohung !"
_________________________________________
- "der Begriff - "Journalist" - neben "Hacker" !"
_________________________________________
- "bei Sicherheit - besonders - "investigative Journalisten" !"
Cyber - Spiegel online: LINK ¤ SPIEGEL ONLINE
_________________________________________
- "Dokumente der NSA - beschrieben Computernetzwerke !"
_________________________________________
- "und möglicherweise die Infrastruktur - die damit zusammenhängt !"
_________________________________________
- "( Energie - Kommunikation - Transport ! )"
_________________________________________
- "die Dokumente beschrieben - eine Cyber-Strategie !"
_________________________________________
- ""Phase 0" - verborgenes Implantat - in einem System !"
_________________________________________
- ""Phase 3" - würde ein System - kontrollieren !"
_________________________________________
- "die Dokumente beschrieben - "plausible deniability" !"
_________________________________________
- "ein möglicher - Cyber-Angriff - hätte nicht nachweisbar sein sollen !"
_________________________________________
- "die Dokumente beschrieben - eine Abteilung "transgression" - übersetzt "Überschreitung" !"
_________________________________________
- "Aufspüren - und Analysieren - eines fremden Cyber-Angriffes !"
_________________________________________
- "die Dokumente beschrieben - nahm deren Werkzeuge - und Ergebnisse !"
_________________________________________
- "Abschöpfen - der Erkenntnisse !"
_________________________________________
- "die Dokumente beschrieben - "fourth party collection" !"
_________________________________________
- "Verwandlung einer Verteidigung - in einen Cyber-Angriff - umnutzen und nachbauen !"
_________________________________________
- "die Dokumente beschrieben - Botnetze - fiktiv Millionen Rechnern !"
_________________________________________
- "von Privatpersonen - auf denen eine Software - installiert worden war !"
_________________________________________
- "die Dokumente beschrieben - "Quantumbot" - ein Schutzschild !"
_________________________________________
- "Daten auf einem fremden Rechner - der Rücktransport war nicht direkt !"
_________________________________________
- "an die Internetadresse - des ROC - geleitet worden !"
_________________________________________
- "sondern an einen sogenannten - "Sündenbock-Empfänger" - "scapegoat" !"
_________________________________________
- "die Dokumente beschrieben - das Legen einer falschen Spur - "ahnungsloses Datenmaultier" !"
_________________________________________
- "es sah danach aus - als wenn diese dabei - keine Skrupel hätten !"
_________________________________________
- "( auch weil diese keine Spuren - hinterließen ! )"
_________________________________________
- "Edward Snowden sagt - die Verteidigung hatte für diese - eine zu geringe Priorität !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "stattdessen brauchen wir - einen Schutz !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "für den persönlichen - Internet Benutzer !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "wir müssen einen - neuen internationalen Verhaltenskodex - schaffen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
MEDIEN - Wikipedia DE: LINK ¤ MEDIEN