Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
430 result(s) for "Quantum Project"
Sort by:
Quantum Employed to Target Computers Used to Visit Extremist Websites
Briefly reports on use of Project Quantum to target visitors to extremists' websites.
NSA Quantum Tasking Techniques for the R&T Analyst Pages Missing
Identifies uses for Quantum Project to implant spyware into target's computer.
Getting Close to the Adversary: Forward-Based Defense with QFIRE
Explains forward-based defense system to intercept signals intelligence.
There Is More Than One Way to QUANTUM
Lists iterations of National Security Agency's Quantum Program to monitor and manipulate offline computers.
Select Accomplishments: Production
Briefly reports on National Security Agency's successful cooperation with Sweden on Quantum Project.
What You Wanted to Know Notes for Presentation on Strategies and Goals for Relationships with Foreign Partners
Briefly notes National Security Agency's success with, and roadblocks to, working with foreign intelligence partners, including with Sweden on Quantum Project.
Tor Stinks
Presents on efforts to infiltrate Tor's anonymous-web-browsing capability.
FOXACID
Depicts cartoon fox being melted in acid and packaged as \"spam.\"
Exploitation Techniques for Directing Targets to FoxAcid Servers
Describes \"Willow Vixen\" and \"Second Rate\" methods of gaining access to targets' computers by redirecting users' web browsers.
QUANTUMTHEORY 2010 Signals Intelligence Development Conference
Presents on QuantumTheory, National Security Agency's tools for computer hacking.