| Name | Last modified | Size | Description |
|
| Parent Directory | | - | |
| 20130524-jurisprudentieoverzicht-Wiv2002.pdf | 2014-06-02 08:19 | 277K | |
| AFCEA-T2S2AFCEATechnetCyberRequirements.pdf | 2014-09-02 18:12 | 1.5M | |
| 1993-FarmerVenema-comp.security.unix-Improving-the-Security-of-Your-Site-by-Breaking-Into-It2.pdf | 2015-07-29 03:49 | 98K | |
| jaarverslag-mivd-2015.pdf | 2018-02-20 15:12 | 5.7M | |
| 2016-Cognitive_Bias_Codex_With_Definitions,_an_Extension_of_the_work_of_John_Manoogian_by_Brian_Morrissette.jpg | 2018-03-03 03:25 | 8.2M | |
| NL/ | 2018-05-06 20:32 | - | |
| cheatsheets/ | 2018-05-06 20:32 | - | |
| Dessens/ | 2018-05-06 20:32 | - | |
| IntegriteitOverheid/ | 2018-05-06 20:32 | - | |
| fromForeknowledge/ | 2018-05-06 20:32 | - | |
| NSA/ | 2018-05-06 20:32 | - | |
| fromBrandeis/ | 2018-05-06 20:32 | - | |
| fromENISA/ | 2018-05-06 20:32 | - | |
| EU/ | 2018-05-06 20:32 | - | |
| fromACLU/ | 2018-05-06 20:32 | - | |
| 20170817-Wiv2017-Staatsblad.pdf | 2018-05-06 20:32 | 279K | |
| LJN_staatsgeheim/ | 2018-05-06 20:32 | - | |
| 20120606_UPC-blokkade-TPB_files/ | 2018-05-06 20:32 | - | |
| 20120214_Cryptome_malware/ | 2018-05-06 20:32 | - | |
| LJN_cybercrime/ | 2018-05-06 20:32 | - | |
| 20120606_KPN-blokkade-TPB/ | 2018-05-06 20:32 | - | |
| theses/ | 2018-05-06 20:32 | - | |
| LI/ | 2018-05-06 20:32 | - | |
| fromEU/ | 2018-05-06 20:32 | - | |
| fromPhiBetaIota/ | 2018-05-06 20:32 | - | |
| dutch-intel/ | 2018-05-06 20:32 | - | |
| fromEUFP7/ | 2018-05-06 20:32 | - | |
| vanRijksoverheid/ | 2018-05-06 20:32 | - | |
| fromFAScientists/ | 2018-05-06 20:32 | - | |
| 20120309_list-of-sources.txt | 2018-05-06 20:32 | 5.8K | |
| 20120508_RTLNieuws_privacyFAIL_ibanbic.htm.txt | 2018-05-06 20:32 | 6.7K | |
| A Taxonomy For And Analysis Of Anonymous Communications Networks (2009).pdf | 2018-05-06 20:32 | 3.5M | |
| Bilderberg-and-media_2007-2011.html | 2018-05-06 20:32 | 14K | |
| DHS_Blueprint-for-a-Secure-Cyber-Future_Nov2011.pdf | 2018-05-06 20:32 | 704K | |
| NSA-SIGINT-style-manual_2010.pdf | 2018-05-06 20:32 | 6.5M | |
| NRO-WikiLeaks-Record-Circa-mid-2010.pdf | 2018-05-06 20:32 | 4.2M | |
| 20110817_asnames.txt_ripped-from-bgp.potaroo.net.gz | 2018-05-06 20:32 | 734K | |
| 20110904_DigiNotar_revocations_from_Public2025.txt.gz | 2018-05-06 20:32 | 1.5K | |
| eindrapport-privacy-scan-nw_tcm126-488190.pdf | 2018-05-06 20:32 | 1.3M | |
| ETSI certificering.pdf | 2018-05-06 20:32 | 176K | |
| 20111220_draft-SP800-155_Dec2011_SCRUBBED.pdf | 2018-05-06 20:32 | 1.5M | |
| 20111006_PvIB-2010nr3_Interview Hans Alfons over CRAMM en beveiligen in Afghanistan.pdf | 2018-05-06 20:32 | 160K | |
| 20120809_TrapWire.pdf | 2018-05-06 20:32 | 704K | |
| 20110710_gov.ir_gmail-hotmail-yahoo.txt | 2018-05-06 20:32 | 1.9K | |
| Factsheet EBB en NAVI nieuwe huisstijl_tcm91-131221.pdf | 2018-05-06 20:32 | 120K | |
| PhD-thesis_Measuring-and-Predicting-Anonymity_2012.pdf | 2018-05-06 20:32 | 2.9M | |
| 20110710_misc-.mil_gmail-hotmail-yahoo.txt | 2018-05-06 20:32 | 1.1K | |
| 20120606_statistisch-jaaroverzicht-documentfraude-2011-zonder-namen.pdf | 2018-05-06 20:32 | 705K | |
| 20120604_Factsheet_CIOT_j-14520-factsheet-ciot.pdf | 2018-05-06 20:32 | 187K | |
| 20120606_UPC-blokkade-TPB.html | 2018-05-06 20:32 | 1.1K | |
| XML Data Encoding Specification For Intelligence Publications Version 6.pdf | 2018-05-06 20:32 | 631K | |
| 20120627_toespraak-cyber-nlda2.pdf | 2018-05-06 20:32 | 101K | |
| 2012_NWO-Cyber-CfP.pdf | 2018-05-06 20:32 | 584K | |
| 20100406_ah-tk-20092010-2140.pdf | 2018-05-06 20:32 | 43K | |
| IAD/ | 2018-05-06 20:32 | - | |
| 20120207_aanbiedingsbrief-advies-over-digitale-oorlogvoering.pdf | 2018-05-06 20:32 | 22K | |
| 20111201_cavv-advies-22-digitale-oorlogsvoering.pdf | 2018-05-06 20:32 | 199K | |
| 20120426_cavv-advies-nr-22-bijlage-regeringsreactie.pdf | 2018-05-06 20:32 | 43K | |
| 20120426_cavv-advies-nr-22-digitale-oorlogsvoering-en.pdf | 2018-05-06 20:32 | 490K | |
| 20120700_GAO-on-DOD-Electronic-and-Cyber-Warfare-Operations.pdf | 2018-05-06 20:32 | 815K | |
| QCC Searchlight Data Sheet V10 TSCM.pdf | 2018-05-06 20:32 | 615K | |
| 20120706_Cybersecuritybeeld-Nederland-2.pdf | 2018-05-06 20:32 | 426K | |
| UTF-8-test.txt | 2018-05-06 20:32 | 20K | |
| 2012_NWO-CyberAgenda.pdf | 2018-05-06 20:32 | 422K | |
| 20120600_AIVD-spioneert-VIA-en-IN-de-pers_deel1.png | 2018-05-06 20:32 | 115K | |
| 20120600_AIVD-spioneert-VIA-en-IN-de-pers_deel2.png | 2018-05-06 20:32 | 118K | |
| 2010_Subversion-and-Espionage-Directed-Against-the-Army-SAEDA.pdf | 2018-05-06 20:32 | 436K | |
| 20111208_Cybersecuritybeeld-Nederland-1.pdf | 2018-05-06 20:32 | 851K | |
| 20120712_Stratfor Class Action Settlement.pdf | 2018-05-06 20:32 | 221K | |
| 20120712_fake-or-real_mail-about-Stratfor.txt | 2018-05-06 20:32 | 140K | |
| 1944_OSS_Simple-Sabotage-Field-Manual.pdf | 2018-05-06 20:32 | 2.5M | |
| 2011_Dutch-NCSS_cyber-security-strategy-uk_tcm92-379999.pdf | 2018-05-06 20:32 | 686K | |
| mp40.pdf | 2018-05-06 20:32 | 652K | |
| 20120627_Dutch-MoD_brochure-defensie-cyber-strategie.pdf | 2018-05-06 20:32 | 239K | |
| 20090400_DNI-The-Study-On-Educing-Information.pdf | 2018-05-06 20:32 | 1.5M | |
| 2011_Dutch-National-Cyber-Security-Research-Agenda_10i-NROI-240%20ncsra-finaal.pdf | 2018-05-06 20:32 | 430K | |
| 1975_EMP_An-Introduction-to-Explosive-Magnetic-Flux-Compression-Generators.pdf | 2018-05-06 20:32 | 2.2M | |
| 2012_NWO-NCSRA-excerpt.pdf | 2018-05-06 20:32 | 211K | |
| 20120726_Preventing-Unauthorized-Disclosures-of-Classified-Information_FAS_ssci-leaks.pdf | 2018-05-06 20:32 | 47K | |
| inbraakpreventie.html | 2018-05-06 20:32 | 74K | |
| 20010215_TIIT-Questions.pdf | 2018-05-06 20:32 | 28K | |
| 20120801_slides-on-APT-from-.ir-source.pdf | 2018-05-06 20:32 | 519K | |
| 20120731_AIVD-advies_BYOD.pdf | 2018-05-06 20:32 | 280K | |
| 2012_The_Principle_of_Maneuver_in_Cyber_Operations.pdf | 2018-05-06 20:32 | 154K | |
| 20110726_all_96k_.in-addr.arpa_nameservers_for_AFRINIC_APNIC_ARIN_LACNIC_RIPE.txt.gz | 2018-05-06 20:32 | 550K | |
| 201204_BestuurlijkeNetwerkKaart-21-Telecommunicatie-2012-vierde-druk.pdf | 2018-05-06 20:32 | 94K | |
| 20120808-The-Formation-of-Cyber-Militias-in-the-United-States:-Feasibility,-Structure,-and-Purpose---Michael-Mihevc.html | 2018-05-06 20:32 | 20K | |
| 20120821_jkJkt.gif | 2018-05-06 20:32 | 428K | |
| 200301-tno-fel_03c001_bescherming_vitale_infra_-_quick_scan_man1%5B1%5D.pdf | 2018-05-06 20:32 | 412K | |
| Foreign_Economic_Collection_2011.pdf | 2018-05-06 20:32 | 2.7M | |
| 20120817_Wob_HDIeF-privacyrapport.pdf | 2018-05-06 20:32 | 2.1M | |
| Clean-IT-progress-report-2011-november.pdf | 2018-05-06 20:32 | 36K | |
| 20120814_CLEAN-IT-DRAFT-DOCUMENT-066Pub.doc | 2018-05-06 20:32 | 212K | |
| Factsheet-Clean-IT.pdf | 2018-05-06 20:32 | 200K | |
| 20110915-Update2-Project-Outline-Clean-IT.pdf | 2018-05-06 20:32 | 51K | |
| 20120831_huge-sec-v6000.txt | 2018-05-06 20:32 | 111K | |
| scs-vest-madsen.htm | 2018-05-06 20:32 | 31K | |
| vulnerability_assessment.pdf | 2018-05-06 20:32 | 1.0M | |
| nsa-sci-cybersecurity.pdf | 2018-05-06 20:32 | 11M | |
| 20080928__How I Learned to Stop Ph34ring NSA and Love the Base Rate Fallacy.html | 2018-05-06 20:32 | 24K | |
| Exameneisen-N.pdf | 2018-05-06 20:32 | 92K | |
| Exameneisen-F.pdf | 2018-05-06 20:32 | 126K | |
| Examenregeling-frequentiegebruik-2008.pdf | 2018-05-06 20:32 | 127K | |
| gebruikersbepalingen-amateur-frequentiegebruik.pdf | 2018-05-06 20:32 | 63K | |
| Radiotechniek_en_voorschriften_1_F-examen.pdf | 2018-05-06 20:32 | 523K | |
| Radiotechniek_en_voorschriften_2_N-examen.pdf | 2018-05-06 20:32 | 160K | |
| studiehulpra.pdf | 2018-05-06 20:32 | 231K | |
| Cyber Incident Reporting in the EU_FINAL.pdf | 2018-05-06 20:32 | 837K | |
| 20120831_adp2_0.pdf | 2018-05-06 20:32 | 7.3M | |
| 20110815_new-botnet_Pastebin-6KfKMj2T.txt | 2018-05-06 20:32 | 4.0K | |
| MSc-thesis_Offensive-Cyber_Collin-van-Loon_June-2012.pdf | 2018-05-06 20:32 | 3.4M | |
| 20120831_adrp2_0.pdf | 2018-05-06 20:32 | 8.0M | |
| 20120901_US Army CIO-G6, Cybersecurity Directorate Newsletter September 2012.pdf | 2018-05-06 20:32 | 770K | |
| 20120601_US Army CIO-G6, Cybersecurity Directorate Newsletter June 2012.pdf | 2018-05-06 20:32 | 805K | |
| 20120301_US Army CIO-G6, Cybersecurity Directorate Newsletter March 2012.pdf | 2018-05-06 20:32 | 799K | |
| darpa-internet-design.pdf | 2018-05-06 20:32 | 63K | |
| cookbook-en.pdf | 2018-05-06 20:32 | 1.2M | |
| atp2-22-9.pdf | 2018-05-06 20:32 | 1.0M | |
| 20120619_Anti-eavesdropping-device_US8203850.pdf | 2018-05-06 20:32 | 670K | |
| csoghoian-vb-2012-exploit-sales-keynote.pdf | 2018-05-06 20:32 | 3.8M | |
| 20120914_White House's Draft Cybersecurity Executive Order_HSPD 7 Draft.pdf | 2018-05-06 20:32 | 315K | |
| bilge12_zero_day.pdf | 2018-05-06 20:32 | 1.1M | |
| CSLStudy_1_11_CompleteReportWithCovers.pdf | 2018-05-06 20:32 | 736K | |
| Use_of_Internet_for_Terrorist_Purposes.pdf | 2018-05-06 20:32 | 765K | |
| MA-thesis_Het_Trojaanse_politiepaard_-_Hacken_in_het_opsporingsonderzoek_Anne-Winters_August-2012.pdf | 2018-05-06 20:32 | 917K | |
| transforming-classification.pdf | 2018-05-06 20:32 | 2.6M | |
| pf-firewall.pdf | 2018-05-06 20:32 | 599K | |
| 20121103_weirdness_"USAF insider- 'NATO Will Nuke Washington, Omaha, Rapid City, and Colorado Springs".pdf | 2018-05-06 20:32 | 337K | |
| INSA_Expectations_of_Intelligence_in_the_Information_Age.pdf | 2018-05-06 20:32 | 2.5M | |
| 20000407_Joint_Doctrine_for_Electronic_Warfare_jp3_51.pdf | 2018-05-06 20:32 | 634K | |
| 20110818_RSA15666stats.txt | 2018-05-06 20:32 | 8.1K | |
| eindrapport-privacy-scan-nw_tcm126-488190_OCR.pdf | 2018-05-06 20:32 | 61M | |
| NATO OSINT Handbook v1.2 Jan2002.pdf | 2018-05-06 20:32 | 441K | |
| NATO OSINT Intelligence Exploitation of the Internet Oct2002.pdf | 2018-05-06 20:32 | 3.7M | |
| 20110416_NBVnbmeta.txt | 2018-05-06 20:32 | 21K | |
| NATO OSINT Reader FINAL Oct2002.pdf | 2018-05-06 20:32 | 1.2M | |
| 20100623_eindrapport-audit-ciot-2010.pdf | 2018-05-06 20:32 | 1.3M | |
| kamerbrief_hoofdlijnen_jaarplan_2013_aivd.pdf | 2018-05-06 20:32 | 60K | |
| 20110831_US-ODNI-Government-Open-Source-Handbook.pdf | 2018-05-06 20:32 | 1.1M | |
| 20110817_prefixes.txt_ripped-from-bgp.potaroo.net.gz | 2018-05-06 20:32 | 1.0M | |
| 20120321_backtracksyllabus-110518142526-phpapp01.pdf | 2018-05-06 20:32 | 176K | |
| 20110413_Settlement-hotz.pdf | 2018-05-06 20:32 | 1.2M | |
| complete_unofficial_tempest_page.pdf | 2018-05-06 20:32 | 232K | |
| vragengladioenantwoorden.pdf | 2018-05-06 20:32 | 287K | |
| 20110416_AIVDWorddoc.txt | 2018-05-06 20:32 | 1.8K | |
| 20110416_AIVDmeta.txt | 2018-05-06 20:32 | 224K | |
| 20110416_exifAIVD-csv.txt | 2018-05-06 20:32 | 85K | |
| 20110418_exifDefensieALL-csv.txt | 2018-05-06 20:32 | 385K | |
| 20110420_EXIFdump1.sql.gz | 2018-05-06 20:32 | 893K | |
| 20110420_EXIF.sql.gz | 2018-05-06 20:32 | 893K | |
| 20060900_FM_2-22.3_US-Army_Human-Intelligence-Collector-Operations.pdf | 2018-05-06 20:32 | 4.2M | |
| 20111223_US-Army_Regulation_380-53_Communications-Security-Monitoring.pdf | 2018-05-06 20:32 | 98K | |
| 20121213_CRS_Intelligence-Identities-Protection-Act.pdf | 2018-05-06 20:32 | 245K | |
| PlayboyAdvisor-Jan2007.200dpi.tif | 2018-05-06 20:32 | 4.9M | |
| cyber.opml | 2018-05-06 20:32 | 21K | |
| DHS-FBI-Expertise.pdf | 2018-05-06 20:32 | 794K | |
| 20121200_NATO_NationalCyberSecurityFrameworkManual.pdf | 2018-05-06 20:32 | 3.8M | |
| USArmy-TacticalQuestioningReference.pdf | 2018-05-06 20:32 | 437K | |
| 20111128_iRN-Columbo_MinVenJ_projectplan-verduurzaming-irn-icolumbo_tcm126-444148.pdf | 2018-05-06 20:32 | 943K | |
| 20121130_NCTV_uitgaande-brief-wob-verzoek-venj-en-ez_tcm126-477696.pdf | 2018-05-06 20:32 | 607K | |
| 20121227_bug-ipv6-gethostbyname.py | 2018-05-06 20:32 | 1.1K | |
| 20121127_JP3-13 - Information Operations (updated Nov 2012)_jp3-13.pdf | 2018-05-06 20:32 | 1.3M | |
| 20101100_U.S. Army War College - Information Operations Primer_info-ops-primer.pdf | 2018-05-06 20:32 | 3.0M | |
| 20121200_ARSTRAT_IO_Newsletter_v13_no_03.pdf | 2018-05-06 20:32 | 516K | |
| 20121100_Overview-of-USDoD-Cybersec-Policies-and-Issuances_ia_policychart.pdf | 2018-05-06 20:32 | 330K | |
| 20121100_ENISA_Honeypots_study.pdf | 2018-05-06 20:32 | 5.1M | |
| MSc-thesis_Information-Warfare-on-an-Evolving-Battlefield_Daniel-Gold_Fall-2012.pdf | 2018-05-06 20:32 | 2.0M | |
| 20091102_Espionage-and-Other-Compromises-of-National-Security_Case-Summaries-from-1975-to-2008.pdf | 2018-05-06 20:32 | 620K | |
| AFD-130327-306.pdf | 2018-05-06 20:32 | 2.2M | |
| jaarverslag-aivd-2010.pdf | 2018-05-06 20:32 | 6.0M | |
| navi_ra_brochure1.pdf | 2018-05-06 20:32 | 779K | |
| hak5.org_LinuxUnixBSDPost-ExploitationCommandList_copy-20130228.pdf | 2018-05-06 20:32 | 274K | |
| hak5.org_OSXPost-Exploitation_copy-20130228.pdf | 2018-05-06 20:32 | 110K | |
| hak5.org_WindowsPost-ExploitationCommandList_copy-20130228.pdf | 2018-05-06 20:32 | 189K | |
| advies-irn-wopr-ontwikkeltrajecten_tcm126-443870.pdf | 2018-05-06 20:32 | 259K | |
| fortheireyesonly.pdf | 2018-05-06 20:32 | 8.7M | |
| 15-2013-youonlyclicktwice.pdf | 2018-05-06 20:32 | 885K | |
| memorie-van-toelichting-wetsvoorstel-voor-versterking-aanpak-computercriminaliteit.pdf | 2018-05-06 20:32 | 699K | |
| NBS-Vol1-EPSCINS_HANDS_1968.pdf | 2018-05-06 20:32 | 1.2M | |
| calea2-wiretap.pdf | 2018-05-06 20:32 | 147K | |
| R41837.pdf | 2018-05-06 20:32 | 297K | |
| 2013 -- U.S. Army War College -- Strategic Studies Institute -- Cyber Infrastructure Protection: Vol. II.pdf | 2018-05-06 20:32 | 2.8M | |
| 2011 -- U.S. Army War College -- Strategic Studies Institute -- Cyber Infrastructure Protection: Vol. I.pdf | 2018-05-06 20:32 | 3.2M | |
| 2013 -- U.S. Army War College -- Strategic Studies Institute -- Making Strategic Sense of Cyber Power - Why the Sky Is Not Falling.pdf | 2018-05-06 20:32 | 452K | |
| 20130508-Cyber_report_final_U.pdf | 2018-05-06 20:32 | 13M | |
| erhster_vals.txt | 2018-05-06 20:32 | 1.2K | |
| ip_201305_e.pdf | 2018-05-06 20:32 | 245K | |
| 141893154-DISTRIBUTED-DENIAL-OF-SERVICE-ACTIONS-AND-THE-CHALLENGE-OF-CIVIL-DISOBEDIENCE-ON-THE-INTERNET.pdf | 2018-05-06 20:32 | 2.6M | |
| Liberty-Reserve-et-al.-Indictment_OCR'd.pdf | 2018-05-06 20:32 | 624K | |
| brief_min_bzk_aan_tweede_kamer_over_taakstelling_aivd_03_juni_2013.pdf | 2018-05-06 20:32 | 621K | |
| 201305-Computercriminaliteit.wet.cons.pdf | 2018-05-06 20:32 | 54K | |
| 201305-Computercriminaliteit.MvT.cons.pdf | 2018-05-06 20:32 | 401K | |
| 201109_Parliamentary-oversight-of-intelligence-agencies-in-the-EU_20110927ATT27674EN.pdf | 2018-05-06 20:32 | 2.8M | |
| R42114.pdf | 2018-05-06 20:32 | 598K | |
| jaarverslag-ciot-2012.pdf | 2018-05-06 20:32 | 37K | |
| 20130718_Kaspersky_KSN_DataCollectionStatement.txt | 2018-05-06 20:32 | 9.7K | |
| jaarverslag-2011-gebruik-cis-25-jan-2012.pdf | 2018-05-06 20:32 | 26K | |
| jaarverslag-aivd-2011.pdf | 2018-05-06 20:32 | 1.3M | |
| jaarverslag-aivd-2012.pdf | 2018-05-06 20:32 | 11M | |
| 20110704_lulzsec_from-openclipart-org.png | 2018-05-06 20:32 | 99K | |
| 20130913_nederlandse_kabinetsreactie_edward_snowden_13_sept_2013.pdf | 2018-05-06 20:32 | 21K | |
| brief_min_bzk_aan_tk_mbt_diverse_verzoeken_ivm_bezuinigingen_bij_de_aivd_september_2013a.pdf | 2018-05-06 20:32 | 122K | |
| jaarverslag-aivd-1994.pdf | 2018-05-06 20:32 | 2.1M | |
| R41524.pdf | 2018-05-06 20:32 | 183K | |
| eu-spying-plan.pdf | 2018-05-06 20:32 | 721K | |
| JDP 2 Inlichtingen_tcm46-193919.pdf | 2018-05-06 20:32 | 3.2M | |
| 20061027_aivd_rapport_Aanvallen-op-het-stemgeheim-via-elektromagnetisch-effecten.pdf | 2018-05-06 20:32 | 257K | |
| 20130219_instelling_Evaluatiecommissie_Wiv2002_stcrt-2013-4096.pdf | 2018-05-06 20:32 | 331K | |
| IAN_BROWN-FINAL_WITNESS_STATEMENT.pdf | 2018-05-06 20:32 | 1.7M | |
| kwetsbaarheidsanalysespionageapril2010.pdf.1 | 2018-05-06 20:32 | 533K | |
| 201004-kwetsbaarheidsanalysespionageapril2010.pdf | 2018-05-06 20:32 | 533K | |
| 201306_staatvdether_2012_digitaal.pdf | 2018-05-06 20:32 | 13M | |
| RL32544.pdf | 2018-05-06 20:32 | 190K | |
| RL31175.pdf | 2018-05-06 20:32 | 116K | |
| IB87201.pdf | 2018-05-06 20:32 | 909K | |
| R42683.pdf | 2018-05-06 20:32 | 342K | |
| 20131011_beantwoording-kamervragen-over-afluisteren-van-internationaal-telefoonverkeer.pdf | 2018-05-06 20:32 | 44K | |
| 20131011_aanbiedingsbrief-bij-beantwoording-kamervragen-over-afluisteren-via-telecomaanbieders.pdf | 2018-05-06 20:32 | 181K | |
| 201101_handleiding_kwetsbaarheidsonderzoek_spionage.pdf | 2018-05-06 20:32 | 281K | |
| 2009_toezichtsarrangement-dataretentie.pdf | 2018-05-06 20:32 | 118K | |
| 20100503_eindrapport-nulmeting-wet-bewaarplicht-telecommunicatiegegevens.pdf | 2018-05-06 20:32 | 190K | |
| 20131014_antwoorden_en_vragen_van_raak_en_oosenburg_ams_ix.pdf | 2018-05-06 20:32 | 256K | |
| R40836.pdf | 2018-05-06 20:32 | 261K | |
| 20091014_Microsoft-PowerPoint-Bewaarplicht-Telecommunicatiegegevens-samengevoegd-2.pdf | 2018-05-06 20:32 | 2.0M | |
| 201111_AIVD-Analysis-of-vulnerability-to-espionage_Espionage-risks-and-national-safety-and-security.pdf | 2018-05-06 20:32 | 539K | |
| R42660.pdf | 2018-05-06 20:32 | 282K | |
| RL31798.pdf | 2018-05-06 20:32 | 231K | |
| R42681.pdf | 2018-05-06 20:32 | 283K | |
| RS21900.pdf | 2018-05-06 20:32 | 318K | |
| R42606.pdf | 2018-05-06 20:32 | 327K | |
| R43216.pdf | 2018-05-06 20:32 | 326K | |
| 97-771.pdf | 2018-05-06 20:32 | 145K | |
| RL33494.pdf | 2018-05-06 20:32 | 204K | |
| RL33303.pdf | 2018-05-06 20:32 | 482K | |
| R43134.pdf | 2018-05-06 20:32 | 358K | |
| 98-327.pdf | 2018-05-06 20:32 | 267K | |
| 98-326.pdf | 2018-05-06 20:32 | 1.3M | |
| R40980.pdf | 2018-05-06 20:32 | 344K | |
| RL30677.pdf | 2018-05-06 20:32 | 123K | |
| m013006.pdf | 2018-05-06 20:32 | 134K | |
| 201310_IPOL-LIBE_ET(2013)493032_EN.pdf | 2018-05-06 20:32 | 1.2M | |
| 20131028_brief-aan-tk-inzake-reactie-bericht-nsa-onderschepte-18-miljoen-telefoo.pdf | 2018-05-06 20:32 | 195K | |
| 20131028_kamerbrief-en-antwoorden-op-kamervragen-bedrijfsspionage-oktober-20132.pdf | 2018-05-06 20:32 | 201K | |
| no-223-eu-intcen.pdf | 2018-05-06 20:32 | 155K | |
| 201310_ENISA-crypto_Algorithms-Key-Sizes-and-Parameters-Report.pdf | 2018-05-06 20:32 | 667K | |
| 20060602_Inlichtingen-en-Veiligheid_tcm46-95514.pdf | 2018-05-06 20:32 | 772K | |
| eu-mass-spying.pdf | 2018-05-06 20:32 | 727K | |
| fm3-38.pdf | 2018-05-06 20:32 | 2.2M | |
| wiv2002en.pdf | 2018-05-06 20:32 | 297K | |
| CI_Glossary.pdf | 2018-05-06 20:32 | 1.8M | |
| 2009_Secret-Truth.-The-EU-Joint-Situation-Centre_VanBuuren.pdf | 2018-05-06 20:32 | 807K | |
| traveltips.pdf | 2018-05-06 20:32 | 290K | |
| ICS_705-01_Physical_and_Technical_Security_Standards_for_Sensitive_Compartmented_Information_Facilities.pdf | 2018-05-06 20:32 | 2.2M | |
| ICD_501-Discovery_and_Dissemination_or_Retrieval_of_Information_within_the_IC.pdf | 2018-05-06 20:32 | 354K | |
| Charney-PsychologyofInsiderSpyAFIO-INTEL_Fall-Winter2010.pdf | 2018-05-06 20:32 | 242K | |
| MA-scriptie_Terrorismebestrijding-en-informationele-privacy_Renders2008.pdf | 2018-05-06 20:32 | 589K | |
| 03_Eijkman_Weggemans_v2[1]_1367418023.pdf | 2018-05-06 20:32 | 161K | |
| 20130328_Privacy-and-Security-Discourses-in-Selected-Dutch-Policy-Documents.pdf | 2018-05-06 20:32 | 1.1M | |
| PRISMS-D2-1-Preliminary-report-on-technology.pdf | 2018-05-06 20:32 | 2.8M | |
| 2013-11-27-report-findings-of-the-ad-hoc-eu-us-working-group-on-data-protection.pdf | 2018-05-06 20:32 | 417K | |
| art27-toezicht2.pdf | 2018-05-06 20:32 | 78K | |
| 20131130-Document03-reconstruction.pdf | 2018-05-06 20:32 | 663K | |
| 20130600_CTIVD-vacature_NJB-1323.pdf | 2018-05-06 20:32 | 62K | |
| 20131202_rapport_commissie-dessens_evaluatie_wiv_2002.pdf | 2018-05-06 20:32 | 532K | |
| 219941.pdf | 2018-05-06 20:32 | 1.3M | |
| 20140117_2014sigint.mem_.ppd_.rel_.pdf | 2018-05-06 20:32 | 149K | |
| 20131004_WODC_Glazen-privacy_Knelpuntenonderzoek-uitvoering-Wet-politiegegevens-Wpg_lp-v-j-0000004812.pdf | 2018-05-06 20:32 | 3.4M | |
| 2004_Justitiele-verkenningen_Inlichtingendiensten_-volledige-tekst_tcm44-58271.pdf | 2018-05-06 20:32 | 513K | |
| 20131219_tweede-kamerbrief-eid.pdf | 2018-05-06 20:32 | 64K | |
| slag_van_een_algemeen_overleg__gehouden_op_17_oktober_2013__over_Aftappen_gegevens_in_Nederland | 2018-05-06 20:32 | 123K | |
| 2013_Politie-Lexicon-Opsporing.pdf | 2018-05-06 20:32 | 929K | |
| 20131218_presentatie_18_december_2013_tcm46-210134.pdf | 2018-05-06 20:32 | 569K | |
| 2013_Politie-Wettenbundel-Opsporing.pdf | 2018-05-06 20:32 | 477K | |
| 2009_Intelligencegestuurd_politiewerk_Doctrine-Politieacademie.pdf | 2018-05-06 20:32 | 2.2M | |
| 20140210_WIV2002_Paragraaf 3.2.2. Bijzondere bevoegdheden van de diensten.pdf | 2018-05-06 20:32 | 94K | |
| 20140210_kamerbrief_10_feb_2014_metadata_OCR.pdf | 2018-05-06 20:32 | 606K | |
| 20140210_concept-wetsvoorstel-implementatie-richtlijn-informatiesystemen-20140122.pdf | 2018-05-06 20:32 | 56K | |
| staatscourant-19512-indexering-indicatieve-tarieven-aftappen-en-dataretentie-12-juli-2013.pdf | 2018-05-06 20:32 | 179K | |
| 199408.pdf | 2018-05-06 20:32 | 678K | |
| fm2-0.pdf | 2018-05-06 20:32 | 4.2M | |
| 20110818_RSA15666_enriched.csv.gz | 2018-05-06 20:32 | 22K | |
| 20140210_concept-mvt-implementatie-richtlijn-informatiesystemen-20140122.pdf | 2018-05-06 20:32 | 200K | |
| 2007_FBI_Digital-Evidence-Field-Guide-v1.1.pdf | 2018-05-06 20:32 | 1.3M | |
| 2012_WODC_Het-gebruik-van-de-telefoon-en-internettap-in-de-opsporing_ob304-volledige-tekst_tcm44-453677.pdf | 2018-05-06 20:32 | 1.2M | |
| 201402_Roger-Vleugels_Fringe-Shop-and-Colofon.pdf | 2018-05-06 20:32 | 275K | |
| CTIVD Toezichtsrapport gegevensverwerking telecommunicatie nr 38.pdf | 2018-05-06 20:32 | 667K | |
| 20140714_jtrigall_FirstLook.pdf | 2018-05-06 20:32 | 1.3M | |
| 12333flowchart.jpg | 2018-05-06 20:32 | 148K | |
| 20110818_RSA15666_enriched.sql.gz | 2018-05-06 20:32 | 23K | |
| 20140113_beantwoording-vragen-inzake-berichtgeving-in-nrc-handelsblad-dat-nederland-doelwit-is-geweest-van-nsa.pdf | 2018-05-06 20:32 | 226K | |
| 20140203_beantwoording-kamervragen-over-de-uitzending-van-nieuwsuur-betreffende-het-satellietcomplex-in-burum.pdf | 2018-05-06 20:32 | 88K | |
| 20140210_beantwoording-kamervragen-over-verzameling-1-8-miljoen-records-metadata-door-nso.pdf | 2018-05-06 20:32 | 170K | |
| 20140307_Snowden-testimony-before-Euro-Parliament.pdf | 2018-05-06 20:32 | 213K | |
| 20140211_Criteria-voor-goed-toezicht.pdf | 2018-05-06 20:32 | 467K | |
| 20140703_xkeyscorerules100.txt | 2018-05-06 20:32 | 5.7K | |
| 20131100_weerbaar-tegen-extreme-zonneactiviteit.pdf | 2018-05-06 20:32 | 314K | |
| 20140703_infographic_cyber-activiteiten.pdf | 2018-05-06 20:32 | 2.8M | |
| 20140703_infographic_inlichtingen_en_informatierevolutie.pdf | 2018-05-06 20:32 | 2.2M | |
| 20140709_geheime-diensten-vergelijkenderwijs.pdf | 2018-05-06 20:32 | 174K | |
| 20140709_tussen-paranoia-en-naiviteit-economische-veiligheid.pdf | 2018-05-06 20:32 | 133K | |
| 20090105_USSTRATCOM_CyberWarfare_Lexicon.pdf | 2018-05-06 20:32 | 12M | |
| 201401_WEF_RiskResponsibility_HyperconnectedWorld_Report_2014.pdf | 2018-05-06 20:32 | 1.6M | |
| MILCOM2014/ | 2018-05-06 20:32 | - | |
| 2011_DI_Style_Manual.pdf | 2018-05-06 20:32 | 7.0M | |
| 201203_WEF_IT_PartneringCyberResilience_Guidelines_2012.pdf | 2018-05-06 20:32 | 4.9M | |
| 201311_Spooky-Business-Corporate-Espionage-Against-Nonprofit-Organizations.pdf | 2018-05-06 20:32 | 1.3M | |
| 20140609_DoD-CI-Definitions.pdf | 2018-05-06 20:32 | 7.0M | |
| 201406_rnoti-p623.pdf | 2018-05-06 20:32 | 89K | |
| Anon_Terminology_v0.34.pdf | 2018-05-06 20:32 | 1.0M | |
| 201407_rapport-first-national-report-of-the-kingdom-of-the-netherlands-as-required-under-article-9-1.pdf | 2018-05-06 20:32 | 1.6M | |
| 20140804_ODNIstyleManual_2011_2013.pdf | 2018-05-06 20:32 | 8.2M | |
| 20140807_secnav-5000-38b.pdf | 2018-05-06 20:32 | 417K | |
| 20140807_secnav-3850-4a.pdf | 2018-05-06 20:32 | 135K | |
| 201111_info_ops_primer.pdf | 2018-05-06 20:32 | 2.2M | |
| 20130118_Reducing-terrorist-use-of-the-Internet_CleanIT.html | 2018-05-06 20:32 | 76K | |
| 20140814_Travel-Guide-to-the-Digital-World-Surveillanvce-and-International-Standards.pdf | 2018-05-06 20:32 | 1.7M | |
| 20140829_actieprogramma-integrale-aanpak-jihadisme-29082014.pdf | 2018-05-06 20:32 | 147K | |
| 20120812_regeling-technisch-protocol-aftappen-consultatieversie.pdf | 2018-05-06 20:32 | 27K | |
| 20140829_kamerbrief-actieprogramma-integrale-aanpak-29-08-2014.pdf | 2018-05-06 20:32 | 61K | |
| 20120208_tiit-v1-2-0-2011-09-2.pdf | 2018-05-06 20:32 | 274K | |
| 20131028_kst-30977-63.pdf | 2018-05-06 20:32 | 43K | |
| 20140908_leidraad_aanwijzing_vertrouwensfuncties_september_2014.pdf | 2018-05-06 20:32 | 289K | |
| 20120208_etsi-ip-nl-102232-v1-0-2011-09-2.pdf | 2018-05-06 20:32 | 144K | |
| 20120208_etsi-nl-v1-1-2011-09-2.pdf | 2018-05-06 20:32 | 272K | |
| 20070903_Quickscan-Onderzoek-Kostenvergoedingen-Bedrijfsleven-7096285-bijlage1.pdf | 2018-05-06 20:32 | 266K | |
| 20100701_Evaluatie-kostenregeling-aftappen_7096285-bijlage2.pdf | 2018-05-06 20:32 | 1.2M | |
| 20050524_checklist_bbgat.pdf | 2018-05-06 20:32 | 158K | |
| dsresource?objectid=48084&type=org | 2018-05-06 20:32 | 251K | |
| 20130710_ah-tk-20122013-2649.pdf | 2018-05-06 20:32 | 45K | |
| 20131012_kst-29924-103.pdf | 2018-05-06 20:32 | 37K | |
| 20140109_beantwoording-kamervragen-over-de-methode-datamining.pdf | 2018-05-06 20:32 | 57K | |
| 20121220_blg-200154.pdf | 2018-05-06 20:32 | 97K | |
| 20140305_blg-324109.pdf | 2018-05-06 20:32 | 128K | |
| 2003_ah-tk-20022003-1148.pdf | 2018-05-06 20:32 | 14K | |
| 20070709_stcrt-2007-129-p8-SC81332.pdf | 2018-05-06 20:32 | 40K | |
| 20140703_kst-29924-113.pdf | 2018-05-06 20:32 | 38K | |
| 20140123_ah-tk-20132014-925.pdf | 2018-05-06 20:32 | 37K | |
| 20140409_h-tk-20132014-73-8.pdf | 2018-05-06 20:32 | 4.7M | |
| 20100421_stcrt-2010-7042.pdf | 2018-05-06 20:32 | 330K | |
| 20120706_kst-26643-246.pdf | 2018-05-06 20:32 | 62K | |
| 20140117_Besluit-verstrekking-GBA-aan-AIVD.pdf | 2018-05-06 20:32 | 251K | |
| 20140526_kst-33945-1.pdf | 2018-05-06 20:32 | 52K | |
| 20140311_kabinetsreactie_dessens_versie_dd_11_maart_2014.pdf | 2018-05-06 20:32 | 222K | |
| 200904_Verstrekkingenwijzer-Politie-gegevens_73843.pdf | 2018-05-06 20:32 | 3.4M | |
| 20030325_Aanwijzing-onderzoeksterrein-MIVD_stcrt-2003-59-p7-SC39150.pdf | 2018-05-06 20:32 | 25K | |
| 20030325_stcrt-2003-59-p7-SC39151.pdf | 2018-05-06 20:32 | 25K | |
| 20140506_Achtergrondnotitie_vjjelg8lx7fj.pdf | 2018-05-06 20:32 | 205K | |
| 20060531_inlichtingen-en-veiligheid-defensie.pdf | 2018-05-06 20:32 | 772K | |
| 20140506_Verslag-van-gesprek-met-Brenno-en-Huib_vji1e668s8zr.pdf | 2018-05-06 20:32 | 72K | |
| 20140211_h-tk-20132014-52-18.pdf | 2018-05-06 20:32 | 6.8M | |
| 20140304_brief_aan_tweede_kamer_over_hoofdlijnen_aivd_jaarplan_2014.pdf | 2018-05-06 20:32 | 213K | |
| 20120622_Terrorismebestrijding_kst-29754-213.pdf | 2018-05-06 20:32 | 171K | |
| 20111208_Juridisch-Kader-Cyber-Security_blg-147059.pdf | 2018-05-06 20:32 | 193K | |
| 20100421_Besluit-van-de-Directeur-MIVD_stcrt-2010-7042.pdf | 2018-05-06 20:32 | 330K | |
| 20131230_AO-AIVD_kst-30977-75.pdf | 2018-05-06 20:32 | 126K | |
| 20140722_Grondwet-correspondentiegeheim_kst-33989-3.pdf | 2018-05-06 20:32 | 206K | |
| 20131030_Algemeen-organisatiebesluit-Defensie-2013_stcrt-2013-31283.pdf | 2018-05-06 20:32 | 605K | |
| 20140204_ah-tk-20132014-1084.pdf | 2018-05-06 20:32 | 42K | |
| 201204_Pilot-Dreigingsmanagement-Een-ex-ante-evaluatie_blg-248778.pdf | 2018-05-06 20:32 | 1.5M | |
| 20130911_Pilot-Dreigingsmanagement-De-implementatie-en-wijze-van-uitvoering-onder-de-loep_blg-248776.pdf | 2018-05-06 20:32 | 902K | |
| 20120130_Kamerbrief-over-AIVD_kst-30977-44.pdf | 2018-05-06 20:32 | 56K | |
| 20131216_Slechts-ten-aanzien-van-SIGINT-is-toezicht-kapot_kst-33750-VII-39.pdf | 2018-05-06 20:32 | 39K | |
| 20130826_Defensie-Cyber-Strategie_kst-33321-2.pdf | 2018-05-06 20:32 | 52K | |
| 20050708_Convenant-AIVD-MIVD_kst-30070-6-b1.pdf | 2018-05-06 20:32 | 25K | |
| toegang-kamer-restreint-docs.pdf | 2018-05-06 20:32 | 119K | |
| 20091212_Onderzoek-naar-werksfeer-binnen-MIVD-blg-47154.pdf | 2018-05-06 20:32 | 66K | |
| 20131203_inventarisatie-en-analyse-van-parlementaire-stukken-ten-behoeve-van-de-evaluatiecommissie-2.pdf | 2018-05-06 20:32 | 1.3M | |
| 20061218_Jihadisten-en-het-internet_NCTb_kst-29754-95-b1.pdf | 2018-05-06 20:32 | 388K | |
| 20020404_Grootschalig-afluisteren-van-moderne-communicatiesystemen-kst-27591-4.pdf | 2018-05-06 20:32 | 56K | |
| 20120314_PKI-na-DigiNotar_kst-26643-230.pdf | 2018-05-06 20:32 | 202K | |
| 20010709_KWINT_kst-26643-30.pdf | 2018-05-06 20:32 | 110K | |
| jp3_13_4.pdf | 2018-05-06 20:32 | 3.0M | |
| 20000600_101WAI-GT-FuncspecV1.0.1.doc | 2018-05-06 20:32 | 67K | |
| 20130901_Aanwijzing-Wet-justitiele-en-strafvorderlijke-gegevens_stcrt-2013-32596.pdf | 2018-05-06 20:32 | 543K | |
| 20130301_CBP-Richtsnoeren-Beveiliging-van-persoonsgegevens_stcrt-2013-5174.pdf | 2018-05-06 20:32 | 3.0M | |
| 20140107_Visie-op-Telecommunicatie-media-en-internet-verdieping_blg-275652.pdf | 2018-05-06 20:32 | 879K | |
| 20120607_Annex-1-bij-Samenwerkingsprotocol-Agentschap-Telecom-OPTA_stcrt-2012-12239.pdf | 2018-05-06 20:32 | 258K | |
| 20120214_Hack-bij-KPN_fil01-persoon-ztan-kamerstukken-hack-bij-kpn1.pdf | 2018-05-06 20:32 | 54K | |
| 19960201_Enquete-Opsporingsmethoden_kst-24072-14.pdf | 2018-05-06 20:32 | 1.7M | |
| 20120319_Beveiliging-van-SCADA-systemen_kst-26643-228.pdf | 2018-05-06 20:32 | 45K | |
| 20140916_Veiligheidsagenda-2015-2018_lp-v-j-0000006385.pdf | 2018-05-06 20:32 | 145K | |
| 20091000_DGET-onderzoek-Hoofdstuk-13-definitief-230210.pdf | 2018-05-06 20:32 | 511K | |
| 20091123_Kamerbriefing-Tapstatistieken-Bits-of-Freedom-231109.pdf | 2018-05-06 20:32 | 612K | |
| 20060700_ISOC-Member-Briefing-22-Lawful-Intercept_briefing22.txt | 2018-05-06 20:32 | 29K | |
| FOIA-CIA-the-need-for-ethical-norms.pdf | 2018-05-06 20:32 | 1.4M | |
| 20140417_ep-LIBE-Inquiry-NSA-Surveillance.pdf | 2018-05-06 20:32 | 1.9M | |
| 20160429_Wiv20xx-versie-naar-RvS_MvT.pdf | 2018-05-06 20:32 | 2.8M | |
| 20140910_FOIA-CIA-The-Evolution-of-US-Government-Restrictions-on-Using-and-Exporting-Encryption-Technologies.pdf | 2018-05-06 20:32 | 369K | |
| 1983_FOIA-CIA-Ethics-and-Clandestine-Collection_DOC_0000619183.pdf | 2018-05-06 20:32 | 461K | |
| 20071211_UK-interception-comms-code-practice-RIPA2000.pdf | 2018-05-06 20:32 | 833K | |
| 20140923_Eerste-Kamerdebat-over-Privacy-en-toezicht-op-de-IVDs_deel2_h-ek-20142015-1-11.pdf | 2018-05-06 20:32 | 3.5M | |
| 20140506_input-brief-van-MinBZK-nov2013_vjeufpr5oozx.pdf | 2018-05-06 20:32 | 49K | |
| 20141001_Sabu-FBI-gained-access-to-these-docroots.txt | 2018-05-06 20:32 | 49K | |
| 20140506_Verslag-expertmeeting-Technische-aspecten-van-spionage-juridische-normering-en-privacy_kst-CVIII-C.pdf | 2018-05-06 20:32 | 149K | |
| 20140805_besluit-op-bezwaar-wob-inzake-transparantie-gegevensvordering-door-opsporingsdiensten-en-of-internetdienstverleners_05-08-2014.pdf | 2018-05-06 20:32 | 166K | |
| 20050205_Regulation-of-Interception-of-Communications-in-UK-US-Australia_0405rp02e.pdf | 2018-05-06 20:32 | 319K | |
| 20140923_Eerste-Kamerdebat-over-Privacy-en-toezicht-op-de-IVDs_h-ek-20142015-1-9.pdf | 2018-05-06 20:32 | 2.2M | |
| 20110423_kamerleden.xml | 2018-05-06 20:32 | 573K | |
| fromNCIX/ | 2018-05-06 20:32 | - | |
| 20070311_AIVD-Violent-Jihad-in-the-Netherlands.pdf | 2018-05-06 20:32 | 368K | |
| 20121004_Impact-of-Counter-Terrorism-on-Communities-Netherlands_FINAL.pdf | 2018-05-06 20:32 | 773K | |
| 1976_report-on-inquiry-into-cia-related-electronic_released-by-James-Bamford-20141003.pdf | 2018-05-06 20:32 | 20M | |
| 1976_prosecutive-summary_released-by-James-Bamford-20141003.pdf | 2018-05-06 20:32 | 7.5M | |
| 2007_Critical-Thinking-and-Intelligence-Analysos_ndic_moore_crit_analysis_hires.pdf | 2018-05-06 20:32 | 12M | |
| 2009_13-F-0676_The_DoD_Strategy_for_CI_in_Cyberspace.pdf | 2018-05-06 20:32 | 3.4M | |
| 20110423_kamerledenQID.html | 2018-05-06 20:32 | 43K | |
| 20140500_CHARNEY_The_Psychology_of_Espionage_DRAFT_2014May12.pdf | 2018-05-06 20:32 | 1.2M | |
| 20141008_FOI-in-EU_On-the-application-in-2013-of-EC-1049-2001_eu-com-ann-rep-access-com-619-14.pdf | 2018-05-06 20:32 | 64K | |
| CIAsPsychologicalOperationsInGuerrillaWarfareCIAContraManual.pdf | 2018-05-06 20:32 | 191K | |
| 20141008_FOI-in-EU_On-the-application-in-2013-of-EC-1049-2001_eu-com-ann-rep-access-com-619-annex-14.pdf | 2018-05-06 20:32 | 79K | |
| 20140911_Veiligheidsagenda-2015-2018_blg-380496.pdf | 2018-05-06 20:32 | 145K | |
| 20130205_Joint-Publication-3-12-R-Cyberspace-Operations_jp3_12r.pdf | 2018-05-06 20:32 | 1.3M | |
| 20140924_UN-Report-on-human-rights-and-terrorism_un-report-on-human-rights-and-terrorism.pdf | 2018-05-06 20:32 | 350K | |
| 20060301_Ontwerp-Nationale-Infrastructuur-Bestrijding-Cybercrime_kst-26671-24-b2.pdf | 2018-05-06 20:32 | 919K | |
| 20140703_kritische-reflectie-op-toetsbaarheid-Logius-norm-voor-DigiD.pdf | 2018-05-06 20:32 | 134K | |
| 20141022_Het-Defensie-Cyber-Commando-een-nieuwe-operationele-capaciteit_magazine-nationale-veiligheid-en-crisisbeheersing-2014-5.pdf | 2018-05-06 20:32 | 141K | |
| 20140401_Beschouwing-overeenkomsten-en-verschillen-tussen-cyber-en-EOV.pdf | 2018-05-06 20:32 | 345K | |
| 20140925_Toespraak+Minister+Hennis-Plasschaert+bij+lancering+van+het+Defensie+Cyber+Commando+in+Den+Haag.pdf | 2018-05-06 20:32 | 71K | |
| 20130500_Aanpak-toenemende-digitale-dreiging-Defensie-geeft-vorm-aan-cybercapaciteit_marineblad_mei13.pdf | 2018-05-06 20:32 | 200K | |
| 20130324_NCSC-lijst-van-incidenten_Bigwobber_2593_0001.pdf | 2018-05-06 20:32 | 45M | |
| 20140124_Pitch Ministerie Defensie thema 9 SBIR cyber security II.pdf | 2018-05-06 20:32 | 371K | |
| 20120524_Folmer-in-NOREA-Defensie-ontwikkelt-een-nieuw-wapen-Cyber-Operations_0000038649_Cyberoperations.pdf | 2018-05-06 20:32 | 1.9M | |
| 20140100_ISOC_Digital Footprints - An Internet Society Reference Framework.pdf | 2018-05-06 20:32 | 9.5M | |
| 20140000_Criteria Transparantiebenchmark 2014 v2.pdf | 2018-05-06 20:32 | 4.4M | |
| 20140226_BuroJansen-Overheid-benadert-hackers.pdf | 2018-05-06 20:32 | 139K | |
| 20141020_Hans-van-der-Meer_UvA_Syllabus-Cryptografie-voor-beta-studies_syllabus-info-s.pdf | 2018-05-06 20:32 | 5.9M | |
| 20141020_Hans-van-der-Meer_UvA_Syllabus-Cryptografie-voor-niet-beta-studies_syllabus-minor-s.pdf | 2018-05-06 20:32 | 5.3M | |
| 20120103_NCSC.nl-screenshot.png | 2018-05-06 20:32 | 143K | |
| 20110517_CompSci-journals.pdf | 2018-05-06 20:32 | 71K | |
| 20131223_Hans-van-der-Meer_UvA_Practicumboek-voor-alle-studierichtingen_practicum.pdf | 2018-05-06 20:32 | 1.6M | |
| 2006.173 nl.pdf | 2018-05-06 20:32 | 96K | |
| 20110509_pixmania.nl_10k-sample_freq.txt | 2018-05-06 20:32 | 188 | |
| 20120106_FAKE-STRATFOR-MAIL_Rate Stratfor's Incident Response.html | 2018-05-06 20:32 | 1.7K | |
| 20110509_pixmania.nl_10k-sample.txt.bz2 | 2018-05-06 20:32 | 41K | |
| 20110515_Regeling-burgerservicenummer.rtf.bz2 | 2018-05-06 20:32 | 705K | |
| 20111229_Important_security_information_from_STRATFOR.html | 2018-05-06 20:32 | 4.2K | |
| in-touch-2010-2.pdf | 2018-05-06 20:32 | 1.1M | |
| fundamentals_ci.pdf | 2018-05-06 20:32 | 663K | |
| 1941-The_Garrison_State.pdf | 2018-05-06 20:32 | 1.3M | |
| 20120106b_Stratfor_Beware_of_false_communications.html | 2018-05-06 20:32 | 4.0K | |
| 20120112_Programma_Opening_NCSC.pdf | 2018-05-06 20:32 | 2.1M | |
| 20110709_list_of_in-addr_nameservers.txt.gz | 2018-05-06 20:32 | 265K | |
| 20110308_CyberSecIndustry-whitepaper_Improving our Nation's Cybersecurity through the Public-Private Partnership.pdf | 2018-05-06 20:32 | 369K | |
| 20120111_Stratfor_ Backonline + new Geopolitical Weekly.html | 2018-05-06 20:32 | 19K | |
| 20110610_diasporaUsersOn20110329-csv.txt.gz | 2018-05-06 20:32 | 893K | |
| AJP-3.10 nov 2009.pdf | 2018-05-06 20:32 | 948K | |
| Stuxnet-Sourcecode.rar | 2018-05-06 20:32 | 518K | |
| 20120214_Nepmail_ABN-AMRO_Pas op voor internetcriminelen.pdf | 2018-05-06 20:32 | 86K | |
| 20120222_CTIVD-screenshot.jpg | 2018-05-06 20:32 | 65K | |
| 20120501_DF-114-Cryptanalytic-Device.pdf | 2018-05-06 20:32 | 5.4M | |
| 20020000_Voordelen-en-nadelen-van-signals-intelligence_Wiebes-2002.txt | 2018-05-06 20:32 | 26K | |
| 20020000_Voordelen-en-nadelen-van-signals-intelligence_Wiebes-2002_scan.pdf | 2018-05-06 20:32 | 494K | |
| fromPublicIntelligence.net/ | 2018-05-06 20:32 | - | |
| 20121011_ResilientMilitarySystems.CyberThreat.pdf | 2018-05-06 20:32 | 10M | |
| jaarverslag-ciot-2011.pdf | 2018-05-06 20:32 | 26K | |
| fromDSS.mil/ | 2018-05-06 20:32 | - | |
| 19901231_EMP_c-1.pdf | 2018-05-06 20:32 | 19K | |
| 20130200_The Fog of Cyber Defence NDU 2013.pdf | 2018-05-06 20:32 | 2.1M | |
| 20130200_Offensive-Cyber-Capabilities-are-Needed-Because-of-Deterrence_Jarno-Limnell.pdf | 2018-05-06 20:32 | 72K | |
| 20140828_Peeking-in-China_source-Globaltimes.cn.jpg | 2018-05-06 20:32 | 907K | |
| 20140325_MIVD_Bureau-Industrieveiligheid_formulierenset-autorisatieprocedure-bij-gerubriceerde-defensieopdrachten.pdf | 2018-05-06 20:32 | 59K | |
| jaarverslag-ciot-2013.pdf | 2018-05-06 20:32 | 33K | |
| 20010000_The-Ten-Commandments-of-Counterintelligence_James-Olson_a529667.pdf | 2018-05-06 20:32 | 429K | |
| 19901231_EMP_c-2.pdf | 2018-05-06 20:32 | 2.6M | |
| 20050800_Democratische-Controle-Inlichtingen-en-Veiligheidsdiensten_Clingendael-CCSS-iov-AIVD_kst-29876-8-b1.pdf | 2018-05-06 20:32 | 584K | |
| 20141000_DoD-Cybersecurity-policy-chart_ia_policychart.pdf | 2018-05-06 20:32 | 324K | |
| 20140600_Cyber-Warfare_Gary-D-Solis_219-spring-2014.pdf | 2018-05-06 20:32 | 430K | |
| 20140700_The-Structure-of-the-Cyber-Military-Revolution_Paul-Rosenzweig_220-summer-2014.pdf | 2018-05-06 20:32 | 187K | |
| 20131130_Notes-for-Dutch-SIGINT-Cyber-Analytic-Exchange_NRC.pdf | 2018-05-06 20:32 | 567K | |
| fromStatewatchEU/ | 2018-05-06 20:32 | - | |
| fromNSA.gov/ | 2018-05-06 20:32 | - | |
| fromStichtingArgus/ | 2018-05-06 20:32 | - | |
| 20141121_bijlage-diagram-interceptiebestel.pdf | 2018-05-06 20:32 | 131K | |
| 20081100_Surveillance_Project_International_Survey_Findings_Summary_2008.pdf | 2018-05-06 20:32 | 2.8M | |
| 20141121_kabinetsstandpunt-herziening-interceptiestelsel-wiv-2002.pdf | 2018-05-06 20:32 | 218K | |
| 20141122_bijlage-diagram-interceptiebestel-UK.pdf | 2018-05-06 20:32 | 180K | |
| 20140917_Belgium-intelligence-annual-report-2013_Activiteitenverslag-Staatsveiligheid-en-ADIV-2013_Dutch-only.pdf | 2018-05-06 20:32 | 2.9M | |
| 20060300_Submarine-cables_CPNI-UK.pdf | 2018-05-06 20:32 | 635K | |
| fromTheIntercept/ | 2018-05-06 20:32 | - | |
| 20140917_Belgium-intelligence-annual-report-2013_Activiteitenverslag-Staatsveiligheid-en-ADIV-2013_Dutch-and-French.pdf | 2018-05-06 20:33 | 3.8M | |
| 20141205_EU-Working-Document-on-surveillance-of-electronic-communications-for-intelligence-and-national-security-purposes_wp228_en.pdf | 2018-05-06 20:33 | 773K | |
| 20140819_The-Internet-and-the-State-a-Survey-of-Key-Developments_VanEeten-Mueller-VanEijk_RMO1395.pdf | 2018-05-06 20:33 | 661K | |
| 20141209_Free-Software-and-Open-Standards-under-the-Rules-of-Procedure-of-the-European-Parliament_Ensuring-Utmost-Transparency--Piana-Oberg-Korff.pdf | 2018-05-06 20:33 | 2.2M | |
| 20141211_twee-stukjes-van-AIVD-over-economische-veiligheid_magazine-nationale-veiligheid-en-crisisbeheersing-2014-6_tcm126-575059.pdf | 2018-05-06 20:33 | 189K | |
| 20141100_AIV_Het-internet-een-wereldwijde-vrije-ruimte-met-begrensde-staatsmacht_webversie_AIV_92NL.pdf | 2018-05-06 20:33 | 1.2M | |
| 20140128_Arrest-Ziggo-XS4ALL-versus-BREIN-over-TPB-blokkade.pdf | 2018-05-06 20:33 | 836K | |
| 20140630_The-right-to-privacy-in-the-digital-age_Report-to-the-UN-OHCHR_A.HRC.27.37_en.pdf | 2018-05-06 20:33 | 315K | |
| 20140829_actieprogramma-integrale-aanpak-jihadisme_20140902_OPGEMAAKT_a5-nctvjihadismedef3-lr.pdf | 2018-05-06 20:33 | 460K | |
| 1998_Operatie-Homerus_Louis-Seveke_BOEK_operatie_homerus_via-archive.squat.net.pdf | 2018-05-06 20:33 | 81M | |
| 20140410_EU-Opinion-05-2014-on-Anonymisation-Techniques_wp216_en.pdf | 2018-05-06 20:33 | 721K | |
| fromInlichtingendiensten.nl/ | 2018-05-06 20:33 | - | |
| 20150112_@Centcom-Twitter-compromise-timeline_blurred.png | 2018-05-06 20:33 | 426K | |
| 20140800_US-DoD-SECNAV-Instruction-3850.4a-TSCM_3850.4A.pdf | 2018-05-06 20:33 | 135K | |
| 20150124_MotoE_UPDATE-SuperSU-v2.45_MIRROR.zip | 2018-05-06 20:33 | 3.8M | |
| 20150124_MotoE_cwm6.0.4.9_recovery_MIRROR.img | 2018-05-06 20:33 | 8.0M | |
| 20111118_FBI-Elicitation-Brochure.pdf | 2018-05-06 20:33 | 4.6M | |
| 20150126-MassSurveillance-EN.pdf | 2018-05-06 20:33 | 394K | |
| 20150206_Rapportage-onderzoek-interceptiefaciliteit_lp-v-j-0000007492.pdf | 2018-05-06 20:33 | 109K | |
| 20150206_Kamerbrief-Opstelten-nav-toezeggingen-tappen_lp-v-j-0000007500.pdf | 2018-05-06 20:33 | 284K | |
| 20150223_Actualisering-Defensie-Cyber-Strategie.docx | 2018-05-06 20:33 | 108K | |
| 20150112_PPD-28_DNI-Principles-of-Intelligence-Transparency-for-the-Intelligence-Community_FINAL_Transparency_poster_v1.pdf | 2018-05-06 20:33 | 2.5M | |
| 20150216_CBP-advies-wijziging-telecom-dataretentie_z2014-00885_bewaarplicht.pdf | 2018-05-06 20:33 | 276K | |
| 20150525_CTIVD-rapporten-1tm42_pdftohtml.html | 2018-05-06 20:33 | 5.0M | |
| 20150226_JSCU-AIVD-MIVD-samenwerking-in-de-praktijk_magazine-nationale-veiligheid-en-crisisbeheersing-2015-nr-1.pdf | 2018-05-06 20:33 | 2.0M | |
| 20150226_Kamerbrief-Reactie-Plasterk-op-verzoek-Van-Raak-omwisselen-simkaarten-na-Gemalto-hack.pdf | 2018-05-06 20:33 | 36K | |
| 20141028_US-DoD-Counterintelligence-Best-Practices-for-Cleared-Industry_CIBooklet.pdf | 2018-05-06 20:33 | 667K | |
| 20150225_UK-Current-and-future-uses-of-biometric-data-and-technologies_uk-parl-technology-cttee-biometrics-report.pdf | 2018-05-06 20:33 | 680K | |
| 20050500_US-DoD-Reporting-of-Counterintelligence-and-Security-Indicators-by-Supervisors-and-Coworkers_PERSEREC-CI-Reporting.pdf | 2018-05-06 20:33 | 376K | |
| 20150312_Brief-regering_Preventie-en-bestrijding-van-corruptie.docx | 2018-05-06 20:33 | 117K | |
| 20150126_PACE-Mass-surveillance_Omtzigt.pdf | 2018-05-06 20:33 | 394K | |
| 20050500_US-DoD-Counterintelligence-Reporting-Essentials-CORE-A-Practical-Guide-for-Reporting-Counterintelligence-and-Security-Indicators_PERSEREC-CORE.pdf | 2018-05-06 20:33 | 190K | |
| 20150213_Catalogus-Nationale-Operaties_gids-Defensie-bijstand-hulpddiensten-civiele-autoriteiten_Catalogus+Nationale+Operaties+2015-1+opt_1.pdf | 2018-05-06 20:33 | 29M | |
| 20101102_Niet-voor-persoonlijk-gebruik_Omkoping-van-ambtenaren-in-de-civiele-openbare-sector_niet_voor_persoonlijk_gebruik_1.pdf | 2018-05-06 20:33 | 4.9M | |
| bord-gevangenpoort-DenHaag_muntschennis.jpg | 2018-05-06 20:33 | 788K | |
| 20150209_Surreptitiously-Weakening-Cryptographic-Systems_Schneier-Fredrikson-Kohno-Ristenpart.pdf | 2018-05-06 20:33 | 399K | |
| 20150317_Plasterk-brief-IVD-aangelegenheden_technische-briefing-en-PIA-en-procedure.docx | 2018-05-06 20:33 | 72K | |
| 20150318_EU-PACE-Improving-the-Protection-of-Whistleblowers_Omtzigt.pdf | 2018-05-06 20:33 | 479K | |
| 20150300_Islamic-State-and-Encryption_Bartlett-and-KrasodomskiJones.pdf | 2018-05-06 20:33 | 910K | |
| 20101027_2010-10-27-Memo-VDC-Onderzoek-compleet1_via_kkcuracao.info.pdf | 2018-05-06 20:33 | 202K | |
| poster-cnv-jongeren_ik-werk-veilig-of-ik-werk-niet.jpg | 2018-05-06 20:33 | 468K | |
| 20150310_Erfgoedinspectie-AIVD-DMS_Inspectierapport-duurzame-toegankelijkheid-digitale-informatiehuishouding-AIVD.pdf | 2018-05-06 20:33 | 386K | |
| 20150326_Brief-regering_Beleid-ten-aanzien-van-preventie-radicalisering.docx | 2018-05-06 20:33 | 84K | |
| 20150323_rapport-van-Politie-en-OM_De-bewaarplicht-telecomgegevens-en-de-opsporing-Het-belang-van-historische-telecommunicatie-gegevens-voor-de-opsporing.pdf | 2018-05-06 20:33 | 278K | |
| 20150401_Inspectierapport-Aanpak-van-internetoplichting-door-de-politie.pdf | 2018-05-06 20:33 | 868K | |
| logical-fallacies_Pirie2006.txt | 2018-05-06 20:33 | 2.4K | |
| 20150401_Verslag_van_een_algemeen_overleg,_gehouden_op_10_februari_2015,_over_IVD-aangelegenheden.rtf | 2018-05-06 20:33 | 339K | |
| 20140811_NCTV-Uw-waakzaamheid-maakt-het-verschil_leaflet-chemische-producten_nctv-a4-poster-v31082014-invulbaar_tcm126-564241.pdf | 2018-05-06 20:33 | 169K | |
| 20150403_Internetconsultatie_Handreiking-VOBK-Dutch-Safety-Requirements_concept-regeling.pdf | 2018-05-06 20:33 | 2.3M | |
| 20140918_NCTV-Uw-waakzaamheid-maakt-het-verschil_folder-uw-waakzaamheid-maakt-het-verschil_tcm126-564240.pdf | 2018-05-06 20:33 | 498K | |
| jaarverslag-aivd-1991.pdf | 2018-05-06 20:33 | 1.8M | |
| 20150403_Internetconsultatie_Handreiking-VOBK-Inleiding_ontwerp-toelichting.pdf | 2018-05-06 20:33 | 269K | |
| 20140723_AdviespuntKlokkenluiders_Veilig-misstanden-melden-op-het-werk-Eindrapport-23072014.pddf | 2018-05-06 20:33 | 2.2M | |
| 20150410_WRR_Policy_Brief__2015__The_Public_Core_of_the_Internet.pdf | 2018-05-06 20:33 | 2.8M | |
| 20150200_Business-Executives-for-NatSec_BENS_Domestic-Security-Report_Feb2015.pdf | 2018-05-06 20:33 | 518K | |
| 20080416_MinJus-HirschBallin_Beleidsbrief_over_de_taakuitoefening_door_de_bijzondere_opsporingsidensten.pdf | 2018-05-06 20:33 | 40K | |
| 20130000_Waarom-organisaties-de-regels-naleven_Over-individuele-motieven-de-ethische-bedrijfscultuur-en-de-mores-in-de-branch.pdf | 2018-05-06 20:33 | 3.2M | |
| bord-gevangenpoort-DenHaag_diefstal-met-valsche-sleutel.jpg | 2018-05-06 20:33 | 634K | |
| poster-cnv-jongeren_ik-werk-veilig-of-ik-werk-niet2.jpg | 2018-05-06 20:33 | 557K | |
| 20061200_MinJus_Gids-Programmatisch-handhaven-voor-centrale-overheden.pdf | 2018-05-06 20:33 | 370K | |
| 20150420_Tor-node-176.126.252.11-Romania_Alistar Security Subpoena 41715-1.pdf | 2018-05-06 20:33 | 513K | |
| 20150424_US-DoD_Final_2015_DoD_CYBER_STRATEGY_for_web.pdf | 2018-05-06 20:33 | 6.2M | |
| 20060413_BIG-Werkgroep-Risicoanalyse_Leidraad-objectgericht-risicomanagement-door-rijkstoezichthouders.pdf | 2018-05-06 20:33 | 1.1M | |
| 20060413_BIG-Werkgroep-Risicoanalyse_Nadere-uitwerking-van-de-Leidraad-objectgericht-risicomanagement-door-rijkstoezichthouders.pdf | 2018-05-06 20:33 | 2.8M | |
| 20060101_VNG-Handreiking-Radicalisme-Signaleren-en-Aanpakken_Vroegtijdige-aanpak-van-radicaliserende-jongeren_vng-handreiking-radicalisering.pdf | 2018-05-06 20:33 | 1.6M | |
| 20150416_AO-9april2015-SZW-BiZa_conceptverslag-Notitie-antidemocratische-groeperingen.docx | 2018-05-06 20:33 | 100K | |
| 20150501_Declassified-tekstje-NSA-over-Henri-Koot_nsa-history-today-2011-15.pdf | 2018-05-06 20:33 | 219K | |
| 20100913_Defcon18-SocEng-CTF-list-of-25-social-engineering-information-targets.txt | 2018-05-06 20:33 | 2.0K | |
| 20150509-legitimate-reasons-for-privacy.txt | 2018-05-06 20:33 | 4.6K | |
| 20150511_MNVenC_Ducheine_Zes-noties-over-digitale-oorlogsvoering.pdf | 2018-05-06 20:33 | 242K | |
| 20150511_Magazine-Nationale-veiligheid-en-crisisbeheersing-2015-nr2-thema-cyberspace.pdf | 2018-05-06 20:33 | 3.7M | |
| 20150513_Rapportage-Mensenrechten-in-Nederland-2014_Hoofdstuk-over-privacy.pdf | 2018-05-06 20:33 | 288K | |
| 20150519_Rekenkamer-rapport_Bezuinigingen-en-intensiveringen-bij-de-AIVD_Gevolgen-van-de-budgettaire-turbulentie-in-de-periode-2012-2015.pdf | 2018-05-06 20:33 | 5.0M | |
| 20150416_AO-9april2015-SZW-BiZa_definitief-verslag-Notitie-antidemocratische-groeperingen.rtf | 2018-05-06 20:33 | 272K | |
| 20141122_bijlage-diagram-interceptiebestel-UK.png | 2018-05-06 20:33 | 110K | |
| 20150604_Universiteit-Twente_voor_MinBZK_Modellenboek_trainingen_agressie_en_geweld_in_de_publieke_context.pdf | 2018-05-06 20:33 | 1.0M | |
| 2009_Sean-Watts_Combatant-Status-and-Computer-Network-Attack.pdf | 2018-05-06 20:33 | 283K | |
| 1998_Joint-Publication-3-13_Information-Operations_jp3-13.pdf | 2018-05-06 20:33 | 1.6M | |
| 20150604_Fiche_Mededeling-Europese-Veiligheidsagenda_COM-2015-185.doc | 2018-05-06 20:33 | 73K | |
| 20150603_Speech-by-Dutch-Minister-of-Defense-at-The-Hague-Institute-For-Global-Justice_Global-Justice-in-a-Multipolar-World.pdf | 2018-05-06 20:33 | 85K | |
| 20150425_Zorgplichten-tegen-cybercrime_TjongTjinTai-Koops_NJB-1516.pdf | 2018-05-06 20:33 | 404K | |
| 2008_NAVI-Handreiking-Risicoanalyse_10-praktische-modellen-voor-de-risicoanalist.pdf | 2018-05-06 20:33 | 779K | |
| 20150702_wiv-voorstel-bijlage3-nl.pdf | 2018-05-06 20:33 | 262K | |
| 20141208_CoE-CHR_Issue-Paper_The-rule-of-law-on-the-Internet-and-in-the-wider-digital-world.pdf | 2018-05-06 20:33 | 2.5M | |
| 20150602_CoE-CHR_Democratic-and-effective-oversight-of-national-security-services_coe-secint-oversight-report.pdf | 2018-05-06 20:33 | 620K | |
| 20150612_US-DoD-Law-of-War_ChapterXVI_Cyber-Operations_269684434.pdf | 2018-05-06 20:33 | 293K | |
| 20150702_wiv-voorstel-bijlage3-en.pdf | 2018-05-06 20:33 | 460K | |
| 20150829_Wiv-consultatie_reactie-Van-Hoboken-en-Koot.pdf | 2018-05-06 20:33 | 153K | |
| jaarverslag-aivd-1992.pdf | 2018-05-06 20:33 | 1.9M | |
| 20170817-Wiv2017-MvT.pdf | 2018-05-06 20:33 | 2.4M | |
| 20150828_Nadere-uitwerking-kabinetsstandpunt-drones.docx | 2018-05-06 20:33 | 104K | |
| 20150526_Rapport_Evaluatie-beleidsregel-veiligheidsonderzoeken-Defensie_VGB.pdf | 2018-05-06 20:33 | 1.5M | |
| 20151014_Cybersecuritybeeld-Nederland-5.pdf | 2018-05-06 20:33 | 2.4M | |
| 20130703_Cybersecuritybeeld-Nederland-3.pdf | 2018-05-06 20:33 | 0 | |
| 20141006_Cybersecuritybeeld-Nederland-4.pdf | 2018-05-06 20:33 | 1.3M | |
| jaarverslag-aivd-1993.pdf | 2018-05-06 20:33 | 12M | |
| jaarverslag-mivd-2007.pdf | 2018-05-06 20:33 | 4.2M | |
| jaarverslag-mivd-2008.pdf | 2018-05-06 20:33 | 5.9M | |
| jaarverslag-mivd-2009.pdf | 2018-05-06 20:33 | 1.1M | |
| jaarverslag-mivd-2011.pdf | 2018-05-06 20:33 | 3.3M | |
| fm3_12.pdf | 2018-05-06 20:33 | 12M | |
| jaarverslag-mivd-2013.pdf | 2018-05-06 20:33 | 2.8M | |
| jaarverslag-mivd-2014.pdf | 2018-05-06 20:33 | 6.2M | |
| jaarverslag-mivd-2012.pdf | 2018-05-06 20:33 | 2.8M | |
| jaarverslag-mivd-2006.pdf | 2018-05-06 20:33 | 3.9M | |
| jaarverslag-aivd-1995.pdf | 2018-05-06 20:33 | 17M | |
| jaarverslag-aivd-1996.pdf | 2018-05-06 20:33 | 16M | |
| jaarverslag-aivd-1997.pdf | 2018-05-06 20:33 | 16M | |
| jaarverslag-aivd-1998.pdf | 2018-05-06 20:33 | 843K | |
| jaarverslag-aivd-1999.pdf | 2018-05-06 20:33 | 459K | |
| jaarverslag-aivd-2000.pdf | 2018-05-06 20:33 | 125K | |
| jaarverslag-aivd-2001.pdf | 2018-05-06 20:33 | 794K | |
| jaarverslag-aivd-2002.pdf | 2018-05-06 20:33 | 931K | |
| jaarverslag-aivd-2003.pdf | 2018-05-06 20:33 | 761K | |
| jaarverslag-aivd-2004.pdf | 2018-05-06 20:33 | 910K | |
| jaarverslag-aivd-2005.pdf | 2018-05-06 20:33 | 748K | |
| jaarverslag-aivd-2006.pdf | 2018-05-06 20:33 | 1.5M | |
| jaarverslag-aivd-2007.pdf | 2018-05-06 20:33 | 1.8M | |
| jaarverslag-aivd-2008.pdf | 2018-05-06 20:33 | 1.1M | |
| jaarverslag-aivd-2009.pdf | 2018-05-06 20:33 | 1.5M | |
| jaarverslag-aivd-2013.pdf | 2018-05-06 20:33 | 2.2M | |
| jaarverslag-aivd-2014.pdf | 2018-05-06 20:33 | 4.1M | |
| jaarverslag-ctivd-2003.pdf | 2018-05-06 20:33 | 87K | |
| jaarverslag-ctivd-2004.pdf | 2018-05-06 20:33 | 931K | |
| jaarverslag-ctivd-2005-2006.pdf | 2018-05-06 20:33 | 261K | |
| jaarverslag-ctivd-2006-2007.pdf | 2018-05-06 20:33 | 623K | |
| jaarverslag-ctivd-2007-2008.pdf | 2018-05-06 20:33 | 900K | |
| jaarverslag-ctivd-2008-2009.pdf | 2018-05-06 20:33 | 491K | |
| jaarverslag-ctivd-2009-2010.pdf | 2018-05-06 20:33 | 628K | |
| jaarverslag-ctivd-2010-2011.pdf | 2018-05-06 20:33 | 497K | |
| jaarverslag-ctivd-2011-2012.pdf | 2018-05-06 20:33 | 891K | |
| jaarverslag-ctivd-2012_2013.pdf | 2018-05-06 20:33 | 809K | |
| jaarverslag-ctivd-2013-2014.pdf | 2018-05-06 20:33 | 2.5M | |
| jaarverslag-ctivd-2014-2015.pdf | 2018-05-06 20:33 | 2.8M | |
| 20151104_UK-Factsheet-Investigatory_Powers_Commission.pdf | 2018-05-06 20:33 | 427K | |
| 20160109_broken-links-to-aivd.nl.txt | 2018-05-06 20:33 | 2.3K | |
| 20141216_kamerbrief_over_informeren_kwetsbaarheden_op_internet.pdf | 2018-05-06 20:33 | 181K | |
| 20151221_UK-RIP-Bill_The-Tor-Project_written-evidence-IPB0122_26373.pdf | 2018-05-06 20:33 | 99K | |
| 20131216_kamerbrief-met-reactie-op-moties-rechtmatigheid-informatiewinning-aivd-en-mivd.pdf | 2018-05-06 20:33 | 185K | |
| 20140703_Kamerbrief-over-convenant-joint-sigint-cyber-unit-jscu.pdf | 2018-05-06 20:33 | 78K | |
| 20110708_1mAXFR_breakdown-by-tld.html | 2018-05-06 20:33 | 63K | |
| 20160429_Wiv20xx-versie-naar-RvS_uitgelekt-naar-Volkskrant.pdf | 2018-05-06 20:33 | 2.5M | |
| 20170802-Russian-IP-blocklist-today_NL-ASNs-only.txt | 2018-05-06 20:33 | 264K | |
| 20170802-Russian-IP-blocklist-today_dump.csv | 2018-05-06 20:33 | 9.4M | |
| 20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-1-Transponeringstabel.pdf | 2018-05-06 20:33 | 344K | |
| 20171109-Wiv2017-Wiv20xx-beantwoording-kamervragen-betreft-ontwerp-besluit-dna-onderzoek-wiv-2017.pdf | 2018-05-06 20:33 | 11K | |
| 20001019_Transport-of-Intercepted-IP-Traffic-TIIT-v0.1.2_TIITv012.pdf | 2018-05-06 20:33 | 313K | |
| 201408xx-US-Army-ATP-2-33.4-Intelligence-Analysis_USArmy-IntelAnalysis.pdf | 2018-05-06 20:33 | 1.9M | |
| 20140506-Rathenau-Notitie-cyberintelligence-en-publiek-belang_Expertmeeting-EersteKamer.pdf | 2018-05-06 20:33 | 205K | |
| jaarplanbrief-aivd-2014.pdf | 2018-05-06 20:33 | 316K | |
| 20160429_Wiv20xx-versie-naar-RvS_wetsvoorstel.pdf | 2018-05-06 20:33 | 843K | |
| jaarplanbrief-aivd-2015.pdf | 2018-05-06 20:33 | 316K | |
| 20171004_NRC-advertentie-vacature-voorzitter-en-leden-TIB-commisie-Wiv20xx.gif | 2018-05-06 20:33 | 179K | |
| 20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-2-Opbouw-wetsvoorstel.pdf | 2018-05-06 20:33 | 144K | |
| 20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-3-Overzicht-bijzondere-bevoegdheden-en-waarborgen.pdf | 2018-05-06 20:33 | 203K | |
| 20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-3-Overzicht-bijzondere-bevoegdheden-en-waarborgen.png | 2018-05-06 20:33 | 67K | |
| 20160xxx_MichaelBest_slides_Exclusively-Relying-on-Tor-Risks-Detection-and-Exposure-for-Whistleblowers.pdf | 2018-05-06 20:33 | 2.2M | |
| 20171005_US-Army-Field-Manual-FM-3-0-Operations.pdf | 2018-05-06 20:33 | 8.6M | |
| 20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-4-Schematische-weergave-onderzoeksopdrachtgerichte-interceptie.pdf | 2018-05-06 20:33 | 149K | |
| 20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-4-Schematische-weergave-onderzoeksopdrachtgerichte-interceptie_reconstructie.png | 2018-05-06 20:33 | 119K | |
| 20171104-actiecampagne-BoF-nepbrief-'Rijksveiligheidsdienst'_via_AlexanderNL.jpg | 2018-05-06 20:33 | 190K | |
| fromNISA/ | 2018-05-06 20:33 | - | |
| nor2007xxxx-SDU-Handboek-voor-de-Opsporingspraktijk-deel-2_PIDS_5216B.pdf | 2018-05-06 20:33 | 1.5M | |
| 20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-5-Schematisch-overzicht-wetgeving-van-enkele-andere-landen.pdf | 2018-05-06 20:33 | 165K | |
| 20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-5-Schematisch-overzicht-wetgeving-van-enkele-andere-landen.png | 2018-05-06 20:33 | 59K | |
| 201406xx-NCTV-Handleiding-Screening-Medewerkers-CBRN_j-23977-nw-handleiding-screening-cbrn_tcm31-32681.pdf | 2018-05-06 20:33 | 2.1M | |
| 20060516-Project-Nationale-Veiligheid_Geintegreerde-rapportage-interdepartementale-zelfevaluatie_Digitale-verlamming.pdf | 2018-05-06 20:33 | 208K | |
| 1984xxxx-Psychological-operations-in-guerilla-warfare_Psy-Ops-Booklet_by-CIA-for-Nicaraguan-rebels_MuckRock-FOIA.pdf | 2018-05-06 20:33 | 2.5M | |
| jaarplanbrief-aivd-2016.pdf | 2018-05-06 20:33 | 256K | |
| jaarplanbrief-aivd-2017.pdf | 2018-05-06 20:33 | 198K | |
| jaarplanbrief-aivd-2018.pdf | 2018-05-06 20:33 | 190K | |
| 201801xx-US-Army-TRADOC-Pamphlet-525-8-6-Cyberspace-and-Electronic-Warfare-Operations-2025-2040_tp525-8-6.pdf | 2018-05-06 20:33 | 433K | |
| c27b9650-fa06-11e7-8d47-f705e73cadb7.png | 2018-05-06 20:33 | 7.3K | |
| 201409xx-PwC-Verkenning-naar-gescheiden-ICT-netwerken-en-diensten-in-Nederland_blg-419668.pdf | 2018-05-06 20:33 | 1.8M | |
| 20180122-kamerbrief-over-toezegging-digitalisering-infrastructuur-en-cybersecurity-elektriciteitssector.pdf | 2018-05-06 20:33 | 71K | |
| fromGovernmentAttic.org/ | 2018-07-03 08:16 | - | |
| jaarverslag-mivd-2016.pdf | 2018-08-08 13:56 | 1.9M | |
| jaarverslag-mivd-2017.pdf | 2018-08-08 13:56 | 1.9M | |
| 1993-FarmerVenema-comp.security.unix-Improving-the-Security-of-Your-Site-by-Breaking-Into-It.pdf | 2018-08-12 17:52 | 42K | |
| 2016-Cognitive-Bias-Codex_critical-thinking.jpg | 2019-04-07 19:01 | 471K | |
| 1988-McIntosh-White-Privilege.pdf | 2019-04-27 09:05 | 1.1M | |
| 2010xxxx-Dimitriu-Tjepkema-NLDA-Inlichtingenondersteuning-bij-handhaving-en-bevordering-van-de-internationale-rechtsorde.pdf | 2019-05-03 10:48 | 166K | |
| fromAIVD/ | 2019-05-06 18:50 | - | |
| fromSnowden/ | 2019-07-29 14:34 | - | |
| fromDNI.gov/ | 2019-07-29 14:37 | - | |
| fromFBI.gov/ | 2019-08-01 07:07 | - | |
| fromCIA.gov/ | 2019-08-03 06:29 | - | |
| fromAF.mil/ | 2019-08-03 10:54 | - | |
| fromCryptome/ | 2019-10-07 12:49 | - | |
| 20191121-NISA-conference-booklet.pdf | 2019-11-17 13:09 | 5.6M | |
| 20190207-USAvSmego-Plea-Argreement.pdf | 2019-12-04 20:24 | 486K | |
| 20191203-dcypher-divd-mrkoot.pdf | 2019-12-06 09:00 | 692K | |
| teaching.jpg | 2019-12-17 16:37 | 160K | |
| fromRIVM/ | 2019-12-17 16:57 | - | |
| 20191218-JosWetzels-36C3_harry_potter_and_the_not_so_smart_proxy_war_36C3_wetzels_final.pdf | 2020-01-03 15:30 | 7.0M | |
| 20191228-JosWetzels-36C3_harry_potter_and_the_not_so_smart_proxy_war_36C3_wetzels_final.pdf | 2020-01-03 15:30 | 7.0M | |
| 201908xx-tk-bijlage-onderzoeksrapport-wodc-kwetsbaarheden-industriele-controle-systemen.pdf | 2020-01-06 07:32 | 1.2M | |
| 48-laws-of-power-infographic-list.png | 2020-01-10 06:27 | 380K | |
| 20200211-tk-analyse-vpn-software-pulse-secure-nav-mondelinge-vragen-dd-1-oktober-2019.pdf | 2020-02-12 09:07 | 181K | |
| 20200306-USA-v-Firsov-complaint.pdf | 2020-03-11 13:14 | 173K | |
| 202003xx_ConspiracyTheoryHandbook.pdf | 2020-03-19 00:26 | 561K | |
| Conficker_Working_Group_Lessons_Learned_17_June_2010_final.pdf | 2020-04-04 10:41 | 5.4M | |
| 20200503-Anti-Money-Laundering-Centre-AMLC.nl-witwasindicatoren-april-2020-1.pdf | 2020-04-15 16:07 | 466K | |
| fromAP.org/ | 2020-05-17 17:59 | - | |
| 20200526-AIVD-Spionage-hoe-herken-je-het-en-wat-kun-je-ertegen-doen.txt | 2020-05-28 15:58 | 8.5K | |
| 20130211-Basic-Spy-Tradecraft_Edward-Howard-Lee.pdf | 2020-05-30 18:01 | 246K | |
| 20151221-Generieke-selectielijst-voor-de-archiefbescheiden-van-de-Militaire-Inlichtingen-en-Veiligheidsdienst-en-taakvoorgangers-vanaf-1945_blg-646463.pdf | 2020-06-16 06:26 | 4.3M | |
| 20140815-Spionage-en-activiteiten-van-inmenging-door-buitenlandse-inlichtingendiensten_masterscriptie_ANTUNOVIC-Kresimir_UGent.pdf | 2020-08-02 10:45 | 4.8M | |
| 00README.txt | 2020-08-21 10:29 | 1.2K | |
| 20201215-US-Court-5-20-cr-00332-SLP-indictment.pdf | 2020-12-19 15:09 | 1.0M | |
| 202010xx-Quote-Edmond-Fokker-MIVD.pdf | 2020-12-26 12:28 | 17M | |
| 202010xx-Quote-Edmond-Fokker-MIVD.txt | 2020-12-26 12:58 | 20K | |
| 201911xx-TNO-Co-existence-of-5G-mobile-networks-with-Burum-Satellite-Access-Station-operating-in-C-band.pdf | 2021-01-08 15:13 | 2.4M | |
| 20201019-Factual-Resume-re-Technician-Who-Pleads-Guilty-to-Hacking-Home-Security-Footage.pdf | 2021-01-24 19:07 | 5.0M | |
| 20210120-Rapport+Evaluatie+2020+-Wet+op+de+inlichtingen-+en+veiligheidsdiensten+2017.pdf | 2021-02-26 17:24 | 2.1M | |
| 202103xx-USA-vs-Kriuchkov-re-attempted-ransomware-against-Tesla_complaint.pdf | 2021-03-20 12:08 | 428K | |
| 202103xx-USA-vs-Kriuchkov-re-attempted-ransomware-against-Tesla_indictment.pdf | 2021-03-20 12:08 | 511K | |
| 202103xx-USA-vs-Kriuchkov-re-attempted-ransomware-against-Tesla_plea-agreement.pdf | 2021-03-20 12:08 | 3.1M | |
| jaarplanbrief-aivd-2021.pdf | 2021-12-17 13:44 | 139K | |
| norobots/ | 2023-04-24 09:32 | - | |
| 0sky/ | 2023-09-26 18:56 | - | |
|