THE  TRON-DELTA.ORG  ADMINISTRATION  HAS  ISSUED  SPECIAL  NOTICE  Δ-S8X001  (2020)
 

Intelligence

The intelligence section contains several items, ranging from drafts to extensive intelligence service reports. To read through some of these intelligence articles select them from below, please.
Monday, 01 December 2014
At the end of 2014 the third ever published CSR, TRON-DELTA.ORG "Cyber Security Report 2014", was made available within this section. However as two years ago the 2014 report was also considered classified for legal and security reasons.

The CSR 2014 mainly covered the latest revelations in the intelligence sector also known as global surveillance disclosures (Wikipedia) by E. J. Snowden, G. Greenwald, L. Poitras and further individuals. Information on the present use of quantum computing and related technology like the NSA's Utah Data Center (ICCNCIDC) were also part of this CSR. Furthermore changes in malware development and new attack techniques especially in the field of human and social engineering were covered. The issue of ongoing problems with regards to GSM and UMTS security was also addressed within the report along with a coverage on the recent leak on the attack on Gemalto. The CSR also included a prediction of the most likely future developments in terms of transnational organizations in cyber crime as usual. Finally a bigger update on projects and future goals of TRON-DELTA.ORG was given.
Last Updated (Wednesday, 01 April 2015)
Saturday, 01 December 2012
At the end of 2012 the second ever published CSR, TRON-DELTA.ORG "Cyber Security Report 2012", will be made publicly available within this section. Until that time we suggest our readers to have a look at some different annual security reports, like the "BSI- Lagebericht IT-Sicherheit 2011".

Among other things the CSR will cover 2012's most discussed operating system and application flaws, and describe some mitigation strategies like BSD Capsicum in greater detail. Information on the present use of botnets in cloud computing plus related technology as a dominating factor, even confirmed by ENISA, will be part of the CSR as well. Furthermore identity fraud as a new playground with its sophisticated structures will be covered along with a note on the increased number of mobile devices under attack. Another section of the report will focus on the statement on cyber security from German CCC officials published in 2011. The CSR will also include a prediction of the most likely future developments in terms of transnational organizations in cyber crime. Along with that an appreciation of specific future cyber crime activities, regarding economic and technical aspects alike, will be attached to the report.
Last Updated (Wednesday, 01 April 2015)
 
 
Octopussy
 

DOCUMENT TIME

  2022-01-08 ✴ 20:00 UTC

CYBER THREATCON

  ✛ΔO CYBER THREATCON: No Level

SECURITY MODULE

  ᐅ REQUESTOR / YOU
  ᐊ 1&1 INTR. AG  CDN

POLL / VOTE

Should ✛ΔO engage more in counter-intelligence?
∘ Yes, there is a need for such operations.
∘ No, because it may be very dangerous.

BOOKMARK

Bookmark site Press Cmd or Ctrl + D
Bookmark page Press Cmd or Ctrl + D

STATISTICS

  Visitors: 788.250+ ℮

CAMPAIGNS

  25 Years of Linux

TECHNOLOGY BASE

COAT OF ARMS

  Code of Arms: Frankfurt

OPERATING STATUS

  Facility: open and operating
 
©  2003 - 2024   TRON-DELTA.ORG  (NGO)   –   Nongovernmental  Intelligence  Organization
Portal v5.06.102 R 1 on ✛ΔO LXCMS v1.1