Threatcon

The threatcon section provides the public with information on the threatcon system of this organization, which basically compares to other condition systems in existence. However, unlike e.g. the U.S. DoD's condition systems, our system does yet primarily focus on cyber threats, in the field of information and telecommunication technology. Additionally our system does not specifically consider and warn about terrorist activities.

In the nearer future new threatcon groups will be added to this location with a focus on geospatial, environmental and public security.

At present we cooperate with various organizations around the world and partially employ their search and diagnostic facilities. Also we operate our own perimeter systems, dedicated to traffic analysis and network scanning. Furthermore we process worldwide CERT data as well as several thousand RSS feeds, plus other sources of intelligence, within our Delta-Pipes system. In addition to that we receive network telescope data by the operators of two powerful network telescopes located in Europe.

  • Cyber Threatcon

    The cyber threatcon system indicates threats to IT infrastructures, and thereby exclusively considers those to cyber and information security.

Level ▿ Indicator Description Operation
Alpha ✛ΔO CYBER THREATCON: Level ALPHA The level indicates possible and labor.-confirmed low-level cyber security threats. Only routine security opera- tions are recommended at this threatcon level.
Beta ✛ΔO CYBER THREATCON: Level BETA The level indicates expectable and confined medium-level cyber security threats. Stay alert, increase monitoring, secure installations and review plans/books.
Gam. ✛ΔO CYBER THREATCON: Level GAMMA The level indicates unpredictable and prevalent high-level cyber security threats. Increase monitoring and limit system access, coordinate with the intelligence.
Delta ✛ΔO CYBER THREATCON: Level DELTA The level indicates sudden and widespread extreme-level cyber security threats. Deploy forensics, shutdown systems, alert authorities and counterstrike.
None ✛ΔO CYBER THREATCON: Level NONE The level indicates that the cyber threatcon system is  not  enabled. Assign members to analyze, repair and then reactivate the threatcon system.
 
 
 
Rootkit.NL
 

DOCUMENT TIME

  2017-10-07  ☀  15:00 UTC

CYBER THREATCON

  ✛ΔO CYBER THREATCON: Level NONE

SECURITY MODULE

  ᐅ REQUESTOR / YOU
  ᐊ 1&1 INTR. AG  CDN

POLL / VOTE

Should ✛ΔO engage more in counter-intelligence?
⚫ Yes, there is a need for such operations.
⚫ No, because it may be very dangerous.

BOOKMARK

Press Cmd or Ctrl + D
Press Cmd or Ctrl + D

STATISTICS

  Visitors: 642.250+ ℮

CAMPAIGNS

  25 Years of Linux

TECHNOLOGY BASE

 
©  2003 - 2017   TRON-DELTA.ORG  (NGO)   –   Nongovernmental  Intelligence  Organization
Portal v5.05.143 R 1 on ✛ΔO LXCMS v1.1