SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
investigations.nbcnews.com

The Snowden files: British intelligence agency describes attack on Anonymous
GCHQ, the British signals intelligence agency, prepared the following slides for a
top-secret conference in 2012, revealing that it had mounted an online attack on the
hacktivist collective known as Anonymous in September 2011.
The slides were leaked by former NSA contractor Edward Snowden and obtained
exclusively by NBC News.
NBC News is publishing the documents with minimal redactions to protect
individuals. All annotations appear in the original documents prepared by GCHQ.
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com
investigations.nbcnews.com

Más contenido relacionado

Destacado

Edward joseph snowden
Edward joseph snowdenEdward joseph snowden
Edward joseph snowdenCelina Anctil
 
Take Back Control in a Post-Snowden World
Take Back Control in a Post-Snowden WorldTake Back Control in a Post-Snowden World
Take Back Control in a Post-Snowden WorldHyun Seo
 
Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!John Wallix
 
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...Karin Wahl-Jorgensen
 
Keeping your files safe in the post-Snowden era with SXFS
Keeping your files safe in the post-Snowden era with SXFSKeeping your files safe in the post-Snowden era with SXFS
Keeping your files safe in the post-Snowden era with SXFSRobert Wojciechowski
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Andrew Schwabe
 
Treason or Loyalty? Ethics and Edward Snowden
Treason or Loyalty? Ethics and Edward SnowdenTreason or Loyalty? Ethics and Edward Snowden
Treason or Loyalty? Ethics and Edward SnowdenBarry Casey
 
Mass Internet Surveillance: The Snowden Case
Mass Internet Surveillance: The Snowden CaseMass Internet Surveillance: The Snowden Case
Mass Internet Surveillance: The Snowden CaseHacking Mom
 
Snowden as whistleblower - Future of Privacy Forum
Snowden as whistleblower - Future of Privacy ForumSnowden as whistleblower - Future of Privacy Forum
Snowden as whistleblower - Future of Privacy ForumKathleen Clark
 
EY Snowden - Mobile Transforming Retail
EY Snowden - Mobile Transforming RetailEY Snowden - Mobile Transforming Retail
EY Snowden - Mobile Transforming RetailMassTLC
 
British Newspaper Coverage of State Surveillance and the Edward Snowden Revel...
British NewspaperCoverage of State Surveillance and the Edward Snowden Revel...British NewspaperCoverage of State Surveillance and the Edward Snowden Revel...
British Newspaper Coverage of State Surveillance and the Edward Snowden Revel...Karin Wahl-Jorgensen
 
Writing a Databases Research Paper
Writing a Databases Research PaperWriting a Databases Research Paper
Writing a Databases Research PaperDamian T. Gordon
 
Python: The Iterator Pattern (Comprehensions)
Python: The Iterator Pattern (Comprehensions)Python: The Iterator Pattern (Comprehensions)
Python: The Iterator Pattern (Comprehensions)Damian T. Gordon
 
Operating Systems: The Little-Man Computer
Operating Systems: The Little-Man ComputerOperating Systems: The Little-Man Computer
Operating Systems: The Little-Man ComputerDamian T. Gordon
 

Destacado (18)

Edward joseph snowden
Edward joseph snowdenEdward joseph snowden
Edward joseph snowden
 
Take Back Control in a Post-Snowden World
Take Back Control in a Post-Snowden WorldTake Back Control in a Post-Snowden World
Take Back Control in a Post-Snowden World
 
Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!
 
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
 
From Orwell to Snowden
From Orwell to SnowdenFrom Orwell to Snowden
From Orwell to Snowden
 
Keeping your files safe in the post-Snowden era with SXFS
Keeping your files safe in the post-Snowden era with SXFSKeeping your files safe in the post-Snowden era with SXFS
Keeping your files safe in the post-Snowden era with SXFS
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Treason or Loyalty? Ethics and Edward Snowden
Treason or Loyalty? Ethics and Edward SnowdenTreason or Loyalty? Ethics and Edward Snowden
Treason or Loyalty? Ethics and Edward Snowden
 
Mass Internet Surveillance: The Snowden Case
Mass Internet Surveillance: The Snowden CaseMass Internet Surveillance: The Snowden Case
Mass Internet Surveillance: The Snowden Case
 
Snowden as whistleblower - Future of Privacy Forum
Snowden as whistleblower - Future of Privacy ForumSnowden as whistleblower - Future of Privacy Forum
Snowden as whistleblower - Future of Privacy Forum
 
EY Snowden - Mobile Transforming Retail
EY Snowden - Mobile Transforming RetailEY Snowden - Mobile Transforming Retail
EY Snowden - Mobile Transforming Retail
 
British Newspaper Coverage of State Surveillance and the Edward Snowden Revel...
British NewspaperCoverage of State Surveillance and the Edward Snowden Revel...British NewspaperCoverage of State Surveillance and the Edward Snowden Revel...
British Newspaper Coverage of State Surveillance and the Edward Snowden Revel...
 
Writing a Databases Research Paper
Writing a Databases Research PaperWriting a Databases Research Paper
Writing a Databases Research Paper
 
Python: The Iterator Pattern (Comprehensions)
Python: The Iterator Pattern (Comprehensions)Python: The Iterator Pattern (Comprehensions)
Python: The Iterator Pattern (Comprehensions)
 
Object-Orientated Design
Object-Orientated DesignObject-Orientated Design
Object-Orientated Design
 
How to Program
How to ProgramHow to Program
How to Program
 
Software Testing 1/5
Software Testing 1/5Software Testing 1/5
Software Testing 1/5
 
Operating Systems: The Little-Man Computer
Operating Systems: The Little-Man ComputerOperating Systems: The Little-Man Computer
Operating Systems: The Little-Man Computer
 

Más de Dedalo-SB

Criptografía en Webs 2.0
Criptografía en Webs 2.0Criptografía en Webs 2.0
Criptografía en Webs 2.0Dedalo-SB
 
Client Side WebApp Vulnerabilities
Client Side WebApp VulnerabilitiesClient Side WebApp Vulnerabilities
Client Side WebApp VulnerabilitiesDedalo-SB
 
Comunicándonos en Tiempos de NSA
Comunicándonos en Tiempos de NSAComunicándonos en Tiempos de NSA
Comunicándonos en Tiempos de NSADedalo-SB
 
Dedalo's presentation about nsa surveillance programs
Dedalo's presentation about nsa surveillance programsDedalo's presentation about nsa surveillance programs
Dedalo's presentation about nsa surveillance programsDedalo-SB
 
Lima hack 2011
Lima hack 2011Lima hack 2011
Lima hack 2011Dedalo-SB
 

Más de Dedalo-SB (6)

Criptografía en Webs 2.0
Criptografía en Webs 2.0Criptografía en Webs 2.0
Criptografía en Webs 2.0
 
Client Side WebApp Vulnerabilities
Client Side WebApp VulnerabilitiesClient Side WebApp Vulnerabilities
Client Side WebApp Vulnerabilities
 
Inside Tor
Inside TorInside Tor
Inside Tor
 
Comunicándonos en Tiempos de NSA
Comunicándonos en Tiempos de NSAComunicándonos en Tiempos de NSA
Comunicándonos en Tiempos de NSA
 
Dedalo's presentation about nsa surveillance programs
Dedalo's presentation about nsa surveillance programsDedalo's presentation about nsa surveillance programs
Dedalo's presentation about nsa surveillance programs
 
Lima hack 2011
Lima hack 2011Lima hack 2011
Lima hack 2011
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

GCHQ Attack on Anonymous Hacking Group Revealed