Media





Journalists - the Guardian: LINK ¤ the GUARDIAN

_________________________________________

 

  • "documents from the GCHQ - described emails !"

 

 

 

 

_________________________________________

  • "to - and from - journalists - from the Guardian - Le Monde !"

 

 

 

 

 

_________________________________________

  • "and from - BBC - Reuters - New York Times - and Washington Post !"

 

 

 

 

 

_________________________________________

  • "the documents described - stored communications ! - ( to cleared staff - on their intranet ! )"

 

 

 

 

_________________________________________

  • "which were sometimes simple - mass-PR emails - sent to dozens of journalists !"

 

 

 

 

 

_________________________________________

  • "but also included - correspondence !"

 

 

 

 

_________________________________________

  • "between reporters - and editors - discussing stories !"

 

 

 

 

 

 

_________________________________________

  • "the documents described - an information security assessment !"

 

 

 

 

_________________________________________

  • "listed - investigative journalists - beside hackers !"

 

 


 

 

_________________________________________

  • "an internal security advice - was preoccupied with the activities - of journalists !"

 

 

 

 

 

_________________________________________

  • "one document described - a potential threat - to security !"

 

 

 

 

_________________________________________

  • "journalists - and reporters - represented all types - of news media !"

 

 

 

 

 

_________________________________________

  • "the documents described - a security assessment - matrix !"

 

 

 

 

_________________________________________

  • "listed journalists - near hackers !"

 

 

 

 

 

_________________________________________

  • "journalists - "capability" score - of two - out of five !"

 


 

 

_________________________________________

  • "and a "priority" - of three - out of five !"

 



 

 

 

 

 

 

______________________________________________________________________________

Cyber - Spiegel online: LINK ¤ SPIEGEL ONLINE

_________________________________________

 

  • "documents from the NSA - described the Internet !"

 

 

 

 

_________________________________________

  • "computer networks - and potentially the infrastructure - they controlled !"

 

 

 

 

 

_________________________________________

  • "( energy - communications - and transportation ! )"

 

 

 

 

 

_________________________________________

  • "the documents described - "Phase 0" - implants in a system !"

 

 

 

 

_________________________________________

  • ""Phase 3" - would control - a system - or network !"

 

 


 


_________________________________________

  • "an internal document described - the goal - "real time control"  !"

 

 

 

 

 

 

_________________________________________

  • "the documents described - "plausible deniability"  !"

 


 

 

_________________________________________

  • "the author of a - cyber offensive - should not be traced !"

 

 

 

 

 

_________________________________________

  • "the documents described - department S31177 - codenamed "Transgression"  !"

 

 

 

 

_________________________________________

  • "observed - and analyzed - a foreign cyber offensive !"

 


 

 

 

_________________________________________

  • "the documents described - took their tools - tradecraft !"

 

 

 

 

_________________________________________

  • "siphoned off insights - discoverd - understood - and evaluated !"

 

 

 

 

 

_________________________________________

  • "the documents described - "fourth party collection"  !"

 


 

 

_________________________________________

  • "let a foreign - intelligence service - do the work !"

 

 

 

 

 

 

_________________________________________

  • "the documents described - "reverse engineer - repurpose software"  !"

 

 

 

 

_________________________________________

  • "tried to transform a defense - into a cyber offensive !"

 

 

 

 

 

_________________________________________

  • "botnets - potentially millions of computers - of normal users !"

 

 

 

 

_________________________________________

  • "( software - had been installed ! )"

 

 

 

 

 

_________________________________________

  • "the documents described - a program - "pervasive network analysis vantage points"  !"

 

 

 

 

_________________________________________

  • "and "throw-away non-attributable - CNA - computer network nodes"  !"

 

 


 

 

_________________________________________

  • "network operations - on people's computers !"

 

 

 

 

_________________________________________

  • "that might be traced back - to an innocent person !"

 


 

 

 

_________________________________________

  • "in technical terms - the ROC layed - a false track !"

 

 

 

 

 

 

_________________________________________

  • "the documents described - from third-party computers - exported the data !"

 

 

 

 

_________________________________________

  • "but most was not delivered directly - to ROC's - IP address !"

 

 

 

 

 

_________________________________________

  • "rather - it had been routed to a so-called - "scapegoat target"  !"

 

 

 

 

_________________________________________

  • "where that information - could end up - on someone else's - server !"

 

 

 

 

 

_________________________________________

  • "it looked as if - they were not concerned - about being caught !"

 

 

 

 

_________________________________________

  • "( because they would not leave behind - evidence ! )"

 

 

 

 

 

_________________________________________

  • "Edward Snowden says - for them defense - had a too low priority !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "instead - we must provide - protection !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "to private - Internet users !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "we need to create - new international standards - of behavior !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

 

 

 

 

 

 

 

 


______________________________________________________________________________

MEDIA
- Wikipedia EN:
LINK ¤ MEDIA

______________________________________________________________________________

______________________________________________________________________________



Medien - Spiegel online:
LINK ¤ SPIEGEL ONLINE

_________________________________________

 

  • "Dokumente vom GCHQ - beschrieben Medien !"

 

 

_________________________________________

  • "E-Mails - von und an - the Guardian - Le Monde !"

 

 

 

_________________________________________

  • "BBC - Reuters - Washington Post - und New York Times !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - Nachrichten - in einem Intranet gespeichert !"

 

 

_________________________________________

  • "PR-E-Mails - die an Dutzende Journalisten gleichzeitig - verschickt wurden !"

 

 

 

_________________________________________

  • "aber auch Korrespondenzen - in denen sich Reporter !"

 

 

_________________________________________

  • "und Redakteure - über Geschichten austauschten !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - eine Liste mit - potenzieller Bedrohung !"

 

 

_________________________________________

  • "der Begriff - "Journalist" - neben "Hacker"  !"

 

 

 

_________________________________________

  • "bei Sicherheit - besonders - "investigative Journalisten"  !"

 

 

 

 

 

 


______________________________________________________________________________

Cyber - Spiegel online: LINK ¤ SPIEGEL ONLINE

_________________________________________

 

  • "Dokumente der NSA - beschrieben Computernetzwerke !"

 

 

_________________________________________

  • "und möglicherweise die Infrastruktur - die damit zusammenhängt !"

 

 

 

_________________________________________

  • "( Energie - Kommunikation - Transport ! )"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - eine Cyber-Strategie !"

 

 

_________________________________________

  • ""Phase 0" - verborgenes Implantat - in einem System !"

 


 

_________________________________________

  • ""Phase 3" - würde ein System - kontrollieren !"

 

 

 

 

_________________________________________

  • "die Dokumente beschrieben - "plausible deniability"  !"

 

 

_________________________________________

  • "ein möglicher - Cyber-Angriff - hätte nicht nachweisbar sein sollen !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - eine Abteilung "transgression" - übersetzt "Überschreitung"  !"

 

 

_________________________________________

  • "Aufspüren - und Analysieren - eines fremden Cyber-Angriffes !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - nahm deren Werkzeuge - und Ergebnisse !"

 


_________________________________________

  • "Abschöpfen - der Erkenntnisse !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - "fourth party collection"  !"

 

 

_________________________________________

  • "Verwandlung einer Verteidigung - in einen Cyber-Angriff - umnutzen und nachbauen !"

 

 

 

 

_________________________________________

  • "die Dokumente beschrieben - Botnetze - fiktiv Millionen Rechnern !"

 

 

_________________________________________

  • "von Privatpersonen - auf denen eine Software - installiert worden war !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - "Quantumbot" - ein Schutzschild !"

 

 

_________________________________________

  • "Daten auf einem fremden Rechner - der Rücktransport war nicht direkt !"

 

 

 

_________________________________________

  • "an die Internetadresse - des ROC - geleitet worden !"

 

 

_________________________________________

  • "sondern an einen sogenannten - "Sündenbock-Empfänger" - "scapegoat"  !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - das Legen einer falschen Spur - "ahnungsloses Datenmaultier"  !"

 

 

 

_________________________________________

  • "es sah danach aus - als wenn diese dabei - keine Skrupel hätten !"

 

 

_________________________________________

  • "( auch weil diese keine Spuren - hinterließen ! )"

 

 

 

 

_________________________________________

  • "Edward Snowden sagt - die Verteidigung hatte für diese - eine zu geringe Priorität !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "stattdessen brauchen wir - einen Schutz !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "für den persönlichen - Internet Benutzer !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 


 

_________________________________________

  • "wir müssen einen - neuen internationalen Verhaltenskodex - schaffen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

 

 

______________________________________________________________________________

MEDIEN - Wikipedia DE:
LINK ¤ MEDIEN
______________________________________________________________________________




media - 14389ME
designed by Free CSS Templates | powerd by pluck | hosted by akis