Documents
Special Collection Service – Pacific SIGDEV Conference March 2011 – Supply Chain Excepts
Jan. 24, 2019
TOP SECRET COMINT II REL T0 USA. AUS. CAN. GBR. NZL
Special Collecllon Service
Pacific SIGDEV Conference
March 2011
The Overall Classification of this Briefing:
TOP USA, AUS. CAN. GBR. NZL
TOP SECRET COMINT II REL T0 USA. AUS. CAN. GBR. NZL
Special Collecllon Service
Pacific SIGDEV Conference
March 2011
The Overall Classification of this Briefing:
TOP USA, AUS. CAN. GBR. NZL
Insights on infrastructure and configurations
Discov ery of targets, signatures, and behavior
Tailored intelligence products
Diverse products driven by national objectives and
local needs through formal reporting , target packages ,
analytic insigh ts, situational awar eness, threat warning
-
,
'
•
'
•
•
•
f
I•
•••
;
•
if
•
•
;. •
I
I
•
,....,
.
,
CIA enterprises and using existing authorities
TOP SECRETII COMftT II REL TO USA, AUS, CAN, GBR, NZL
Human enabled SIGINT
Employ all the capabilities of the SCS to gain access to the
targets - Maybe use a SIGINT focused mission to highlight
how it can easily contribute to a cyber focus in the CNE/CNA/
CND world? Make the use of SIGINT information operations a
liability for our adversaries in cyber operations
Unique place within the Intelligence Community where we can
and do blend CIA and NSA operations to further IC
intelligence needs
Insights on infrastructure and configurations
Discov ery of targets, signatures, and behavior
Tailored intelligence products
Diverse products driven by national objectives and
local needs through formal reporting , target packages ,
analytic insigh ts, situational awar eness, threat warning
-
,
'
•
'
•
•
•
f
I•
•••
;
•
if
•
•
;. •
I
I
•
,....,
.
,
CIA enterprises and using existing authorities
TOP SECRETII COMftT II REL TO USA, AUS, CAN, GBR, NZL
Human enabled SIGINT
Employ all the capabilities of the SCS to gain access to the
targets - Maybe use a SIGINT focused mission to highlight
how it can easily contribute to a cyber focus in the CNE/CNA/
CND world? Make the use of SIGINT information operations a
liability for our adversaries in cyber operations
Unique place within the Intelligence Community where we can
and do blend CIA and NSA operations to further IC
intelligence needs
SCS lives on the Net at worldwide Points of Presence
SCS PoPs provide
opportunities for access,
~ enabling, and analysis
Large Networks: 3,000 - 5,000
WLANs: 10,000 - 30,000
TOP SECRETII COMftT II REL TO USA,AUS, CAN, GBR, NZL
Need to know how to better survey , populate databases , and
understand what accesses we have 1 guy - 4 systems
Significant diversity in the parts of the network that we see , not
just fiber and router access
SCS lives on the Net at worldwide Points of Presence
SCS PoPs provide
opportunities for access,
~ enabling, and analysis
Large Networks: 3,000 - 5,000
WLANs: 10,000 - 30,000
TOP SECRETII COMftT II REL TO USA,AUS, CAN, GBR, NZL
Need to know how to better survey , populate databases , and
understand what accesses we have 1 guy - 4 systems
Significant diversity in the parts of the network that we see , not
just fiber and router access
SCS PoPs provide
opportunities for access,
enabling, and analysis
Look at what we are doing with a cyber viewpoint , not just
SIGINT
SCS PoPs provide
opportunities for access,
enabling, and analysis
Look at what we are doing with a cyber viewpoint , not just
SIGINT