Operations

The operations section contains several entries, including such of independent short-term operations as well as project-related long-term ones. Operation-specific resources can be selected for review, from the list below, in case they are available.

  • 2018: Operation #15: TrueOS
    Analysis/audit of code and documentation, of iXsystems' TrueOS (based on FreeBSD) modules trueos-core and pc-updatemanager, by ✛ΔO's directorate I: Intelligence (ICT).

  • 2018: Operation #14: Vault 8
    Analysis by ✛ΔO's directorate I: Intelligence (ICT), on CIA Vault 8 data, published on Wikileaks, finding CIA's Hive project was outdated with a 2004 Twofish 1.3 version.

  • 2017: Operation #13: KVM
    Analysis/review executed by ✛ΔO's directorate I: Intelligence (ICT), on R. Spenneberg's and BSI's 2017 »Security Analysis on KVM«, with a strong focus on MAC (NSA SELinux).

  • 2017: Operation #12: WannaCry
    Analysis and consecutive advisory by ✛ΔO's CERT (directorates C, I) on »WannaCry«; included knowledge sharing with CERTs and third parties/private organizations publicly.

  • 2017: Operation #11: Octopussy
    Analysis on the Octopussy Open Source Log Management Solution and consecutive draft of a Wikipedia article, performed by ✛ΔO's directorate C: Central Services, et al.

  • 2016: Operation #10: SIT-VV
    Analysis carried out by ✛ΔO's directorate I: Intelligence (ICT), on Fraunhofer SIT's »Volksverschlüsselung« (encryption software) client-side souce code and license.

  • 2016: Operation #09: Petya
    Analysis and consecutive advisory of ✛ΔO's CERT (directorates C, I) on »Petya« (2016); included knowledge sharing with CERTs and third parties/private organizations publicly.

  • 2015: Operation #08: Dshell
    Analysis executed by ✛ΔO's directorate I: Intelligence (ICT)/ICS unit, on U.S. Army's »Dshell« (analysis framework), considering the software promising after full code audit.

  • 2014: Operation #07: IMSI/CT
    Analysis/investigation on an IMSI catcher/cell tower near the PRC consulate in Frankfurt am Main (Germany), performed by ✛ΔO's directorate C: Central Services, et al.

  • 2014: Operation #06: MHR
    Analysis executed by ✛ΔO's directorate I: Intelligence (ICT)/ICS unit, on Team Cymru's »MHR« (add-on for Mozilla Firefox), considering the software safe after full code audit.

  • 2014: Operation #05: QUANTUM
    Analysis on NSA QUANTUM and FOXACID, based on OSINT data, and development of defense strategies (config & patches), executed by ✛ΔO's directorate I: Intelligence (ICT).

  • 2014: Operation #04: Heartbleed
    Analysis, advisory and news article by ✛ΔO's CERT (directorates C, I) and DIR R on »Heartbleed«; included knowledge sharing with CERTs and 3rd parties/organizations.

  • 2012: Operation #03: Chrome
    Analysis on Chrome OS and Browser (Google Chromium) with SELinux, and publication of a news article, carried out by ✛ΔO's directorate R: Research & Development.

  • 2011: Operation #02: XtraNotes
    Analysis and news article by ✛ΔO's directorate I: Intelligence (ICT), DIR R, on »Antenna of Freedom« and »XtraNotes« (messenger), rating the software unsafe after code audit.

  • 2011: Operation #01: Heihachi
    Analysis on Anonymous, AnonOps and Heihachi plus corresponding SPAMHAUS data, and publication of a news article, performed by ✛ΔO's directorate I: Intelligence (ICT).

 
 
 
Hypergraph
 

DOCUMENT TIME

  2018-06-06  ☀  17:00 UTC

CYBER THREATCON

  ✛ΔO CYBER THREATCON: Level BETA

SECURITY MODULE

  ᐅ REQUESTOR / YOU
  ᐊ 1&1 INTR. AG  CDN

POLL / VOTE

Should ✛ΔO engage more in counter-intelligence?
∘ Yes, there is a need for such operations.
∘ No, because it may be very dangerous.

BOOKMARK

Bookmark site Press Cmd or Ctrl + D
Bookmark page Press Cmd or Ctrl + D

STATISTICS

  Visitors: 701.750+ ℮

CAMPAIGNS

  25 Years of Linux

TECHNOLOGY BASE

COAT OF ARMS

  Code of Arms: Frankfurt

OPERATING STATUS

  Facility: open and operating
 
©  2003 - 2018   TRON-DELTA.ORG  (NGO)   –   Nongovernmental  Intelligence  Organization
Portal v5.06.087 R 1 on ✛ΔO LXCMS v1.1