Operationen

Der Operationsbereich beinhaltet verschiedene Einträge, von unabhängigen, kurzzeitigen wie auch längerfristigen, projektbezogenen Operationen. Zur Betrachtung können, aus der unten stehenden Liste, Ressourcen zu Operation ausgewählt werden, sofern vorhanden.

  • 2018: Operation #15: TrueOS
    Analysis/audit of code and documentation, of iXsystems' TrueOS (based on FreeBSD) modules trueos-core and pc-updatemanager, by ✛ΔO's directorate I: Intelligence (ICT).

  • 2018: Operation #14: Vault 8
    Analysis by ✛ΔO's directorate I: Intelligence (ICT), on CIA Vault 8 data, published on Wikileaks, finding CIA's Hive project was outdated with a 2004 Twofish 1.3 version.

  • 2017: Operation #13: KVM
    Analysis/review executed by ✛ΔO's directorate I: Intelligence (ICT), on R. Spenneberg's and BSI's 2017 »Security Analysis on KVM«, with a strong focus on MAC (NSA SELinux).

  • 2017: Operation #12: WannaCry
    Analysis and consecutive advisory by ✛ΔO's CERT (directorates C, I) on »WannaCry«; included knowledge sharing with CERTs and third parties/private organizations publicly.

  • 2017: Operation #11: Octopussy
    Analysis on the Octopussy Open Source Log Management Solution and consecutive draft of a Wikipedia article, performed by ✛ΔO's directorate C: Central Services, et al.

  • 2016: Operation #10: SIT-VV
    Analysis carried out by ✛ΔO's directorate I: Intelligence (ICT), on Fraunhofer SIT's »Volksverschlüsselung« (encryption software) client-side souce code and license.

  • 2016: Operation #09: Petya
    Analysis and consecutive advisory of ✛ΔO's CERT (directorates C, I) on »Petya« (2016); included knowledge sharing with CERTs and third parties/private organizations publicly.

  • 2015: Operation #08: Dshell
    Analysis executed by ✛ΔO's directorate I: Intelligence (ICT)/ICS unit, on U.S. Army's »Dshell« (analysis framework), considering the software promising after full code audit.

  • 2014: Operation #07: IMSI/CT
    Analysis/investigation on an IMSI catcher/cell tower near the PRC consulate in Frankfurt am Main (Germany), performed by ✛ΔO's directorate C: Central Services, et al.

  • 2014: Operation #06: MHR
    Analysis executed by ✛ΔO's directorate I: Intelligence (ICT)/ICS unit, on Team Cymru's »MHR« (add-on for Mozilla Firefox), considering the software safe after full code audit.

  • 2014: Operation #05: QUANTUM
    Analysis on NSA QUANTUM and FOXACID, based on OSINT data, and development of defense strategies (config & patches), executed by ✛ΔO's directorate I: Intelligence (ICT).

  • 2014: Operation #04: Heartbleed
    Analysis, advisory and news article by ✛ΔO's CERT (directorates C, I) and DIR R on »Heartbleed«; included knowledge sharing with CERTs and 3rd parties/organizations.

  • 2012: Operation #03: Chrome
    Analysis on Chrome OS and Browser (Google Chromium) with SELinux, and publication of a news article, carried out by ✛ΔO's directorate R: Research & Development.

  • 2011: Operation #02: XtraNotes
    Analysis and news article by ✛ΔO's directorate I: Intelligence (ICT), DIR R, on »Antenna of Freedom« and »XtraNotes« (messenger), rating the software unsafe after code audit.

  • 2011: Operation #01: Heihachi
    Analysis on Anonymous, AnonOps and Heihachi plus corresponding SPAMHAUS data, and publication of a news article, performed by ✛ΔO's directorate I: Intelligence (ICT).

 
 
 
Hypergraph
 

DOKUMENTZEIT

  2018-12-01 ✴ 20:00 UTC

CYBER THREATCON

  ✛ΔO CYBER THREATCON: Level BETA

SICHERHEITSMODUL

  ᐅ REQUESTOR / YOU
  ᐊ 1&1 INTR. AG  CDN

ABSTIMMUNG

Sollte ✛ΔO »counter- intelligence« anwenden?
∘ Ja, es gibt Bedarf für solche Operationen.
∘ Nein, denn dies zu tun ist zu risikoreich.

BOOKMARK

Bookmark site Via Cmd oder Strg + D
Bookmark page Via Cmd oder Strg + D

STATISTIK

  Besucher: 713.250+ ℮

KAMPAGNEN

  25 Jahre Linux

TECHNOLOGIE

STADTWAPPEN

  Code of Arms: Frankfurt

BETRIEBSSTATUS

  Anlage: Offen und in Betrieb
 
©  2003 - 2018   TRON-DELTA.ORG  (NGO)   –   Nongovernmental  Intelligence  Organization
Portal v5.06.098 R 2 mit ✛ΔO LXCMS v1.1