Index of /d

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[DIR]0sky/2023-09-26 18:56 -  
[DIR]20120214_Cryptome_malware/2018-05-06 20:32 -  
[DIR]20120606_KPN-blokkade-TPB/2018-05-06 20:32 -  
[DIR]20120606_UPC-blokkade-TPB_files/2018-05-06 20:32 -  
[DIR]Dessens/2018-05-06 20:32 -  
[DIR]EU/2018-05-06 20:32 -  
[DIR]IAD/2018-05-06 20:32 -  
[DIR]IntegriteitOverheid/2018-05-06 20:32 -  
[DIR]LI/2018-05-06 20:32 -  
[DIR]LJN_cybercrime/2018-05-06 20:32 -  
[DIR]LJN_staatsgeheim/2018-05-06 20:32 -  
[DIR]MILCOM2014/2018-05-06 20:32 -  
[DIR]NL/2018-05-06 20:32 -  
[DIR]NSA/2018-05-06 20:32 -  
[DIR]cheatsheets/2018-05-06 20:32 -  
[DIR]dutch-intel/2018-05-06 20:32 -  
[DIR]fromACLU/2018-05-06 20:32 -  
[DIR]fromAF.mil/2019-08-03 10:54 -  
[DIR]fromAIVD/2019-05-06 18:50 -  
[DIR]fromAP.org/2020-05-17 17:59 -  
[DIR]fromBrandeis/2018-05-06 20:32 -  
[DIR]fromCIA.gov/2019-08-03 06:29 -  
[DIR]fromCryptome/2019-10-07 12:49 -  
[DIR]fromDNI.gov/2019-07-29 14:37 -  
[DIR]fromDSS.mil/2018-05-06 20:32 -  
[DIR]fromENISA/2018-05-06 20:32 -  
[DIR]fromEU/2018-05-06 20:32 -  
[DIR]fromEUFP7/2018-05-06 20:32 -  
[DIR]fromFAScientists/2018-05-06 20:32 -  
[DIR]fromFBI.gov/2019-08-01 07:07 -  
[DIR]fromForeknowledge/2018-05-06 20:32 -  
[DIR]fromGovernmentAttic.org/2018-07-03 08:16 -  
[DIR]fromInlichtingendiensten.nl/2018-05-06 20:33 -  
[DIR]fromNCIX/2018-05-06 20:32 -  
[DIR]fromNISA/2018-05-06 20:33 -  
[DIR]fromNSA.gov/2018-05-06 20:32 -  
[DIR]fromPhiBetaIota/2018-05-06 20:32 -  
[DIR]fromPublicIntelligence.net/2018-05-06 20:32 -  
[DIR]fromRIVM/2019-12-17 16:57 -  
[DIR]fromSnowden/2019-07-29 14:34 -  
[DIR]fromStatewatchEU/2018-05-06 20:32 -  
[DIR]fromStichtingArgus/2018-05-06 20:32 -  
[DIR]fromTheIntercept/2018-05-06 20:32 -  
[DIR]norobots/2023-04-24 09:32 -  
[DIR]theses/2018-05-06 20:32 -  
[DIR]vanRijksoverheid/2018-05-06 20:32 -  
[   ]20130703_Cybersecuritybeeld-Nederland-3.pdf2018-05-06 20:33 0  
[TXT]20110509_pixmania.nl_10k-sample_freq.txt2018-05-06 20:32 188  
[TXT]20110710_misc-.mil_gmail-hotmail-yahoo.txt2018-05-06 20:32 1.1K 
[TXT]20121227_bug-ipv6-gethostbyname.py2018-05-06 20:32 1.1K 
[TXT]20120606_UPC-blokkade-TPB.html2018-05-06 20:32 1.1K 
[TXT]00README.txt2020-08-21 10:29 1.2K 
[TXT]erhster_vals.txt2018-05-06 20:32 1.2K 
[   ]20110904_DigiNotar_revocations_from_Public2025.txt.gz2018-05-06 20:32 1.5K 
[TXT]20120106_FAKE-STRATFOR-MAIL_Rate Stratfor's Incident Response.html2018-05-06 20:32 1.7K 
[TXT]20110416_AIVDWorddoc.txt2018-05-06 20:32 1.8K 
[TXT]20110710_gov.ir_gmail-hotmail-yahoo.txt2018-05-06 20:32 1.9K 
[TXT]20100913_Defcon18-SocEng-CTF-list-of-25-social-engineering-information-targets.txt2018-05-06 20:33 2.0K 
[TXT]20160109_broken-links-to-aivd.nl.txt2018-05-06 20:33 2.3K 
[TXT]logical-fallacies_Pirie2006.txt2018-05-06 20:33 2.4K 
[TXT]20110815_new-botnet_Pastebin-6KfKMj2T.txt2018-05-06 20:32 4.0K 
[TXT]20120106b_Stratfor_Beware_of_false_communications.html2018-05-06 20:32 4.0K 
[TXT]20111229_Important_security_information_from_STRATFOR.html2018-05-06 20:32 4.2K 
[TXT]20150509-legitimate-reasons-for-privacy.txt2018-05-06 20:33 4.6K 
[TXT]20140703_xkeyscorerules100.txt2018-05-06 20:32 5.7K 
[TXT]20120309_list-of-sources.txt2018-05-06 20:32 5.8K 
[TXT]20120508_RTLNieuws_privacyFAIL_ibanbic.htm.txt2018-05-06 20:32 6.7K 
[IMG]c27b9650-fa06-11e7-8d47-f705e73cadb7.png2018-05-06 20:33 7.3K 
[TXT]20110818_RSA15666stats.txt2018-05-06 20:32 8.1K 
[TXT]20200526-AIVD-Spionage-hoe-herken-je-het-en-wat-kun-je-ertegen-doen.txt2020-05-28 15:58 8.5K 
[TXT]20130718_Kaspersky_KSN_DataCollectionStatement.txt2018-05-06 20:32 9.7K 
[   ]20171109-Wiv2017-Wiv20xx-beantwoording-kamervragen-betreft-ontwerp-besluit-dna-onderzoek-wiv-2017.pdf2018-05-06 20:33 11K 
[TXT]Bilderberg-and-media_2007-2011.html2018-05-06 20:32 14K 
[   ]2003_ah-tk-20022003-1148.pdf2018-05-06 20:32 14K 
[   ]19901231_EMP_c-1.pdf2018-05-06 20:32 19K 
[TXT]20120111_Stratfor_ Backonline + new Geopolitical Weekly.html2018-05-06 20:32 19K 
[TXT]UTF-8-test.txt2018-05-06 20:32 20K 
[TXT]20120808-The-Formation-of-Cyber-Militias-in-the-United-States:-Feasibility,-Structure,-and-Purpose---Michael-Mihevc.html2018-05-06 20:32 20K 
[TXT]202010xx-Quote-Edmond-Fokker-MIVD.txt2020-12-26 12:58 20K 
[TXT]20110416_NBVnbmeta.txt2018-05-06 20:32 21K 
[   ]cyber.opml2018-05-06 20:32 21K 
[   ]20130913_nederlandse_kabinetsreactie_edward_snowden_13_sept_2013.pdf2018-05-06 20:32 21K 
[   ]20120207_aanbiedingsbrief-advies-over-digitale-oorlogvoering.pdf2018-05-06 20:32 22K 
[   ]20110818_RSA15666_enriched.csv.gz2018-05-06 20:32 22K 
[   ]20110818_RSA15666_enriched.sql.gz2018-05-06 20:32 23K 
[TXT]20080928__How I Learned to Stop Ph34ring NSA and Love the Base Rate Fallacy.html2018-05-06 20:32 24K 
[   ]20030325_Aanwijzing-onderzoeksterrein-MIVD_stcrt-2003-59-p7-SC39150.pdf2018-05-06 20:32 25K 
[   ]20050708_Convenant-AIVD-MIVD_kst-30070-6-b1.pdf2018-05-06 20:32 25K 
[   ]20030325_stcrt-2003-59-p7-SC39151.pdf2018-05-06 20:32 25K 
[   ]jaarverslag-2011-gebruik-cis-25-jan-2012.pdf2018-05-06 20:32 26K 
[   ]jaarverslag-ciot-2011.pdf2018-05-06 20:32 26K 
[TXT]20020000_Voordelen-en-nadelen-van-signals-intelligence_Wiebes-2002.txt2018-05-06 20:32 26K 
[   ]20120812_regeling-technisch-protocol-aftappen-consultatieversie.pdf2018-05-06 20:32 27K 
[   ]20010215_TIIT-Questions.pdf2018-05-06 20:32 28K 
[TXT]20060700_ISOC-Member-Briefing-22-Lawful-Intercept_briefing22.txt2018-05-06 20:32 29K 
[TXT]scs-vest-madsen.htm2018-05-06 20:32 31K 
[   ]jaarverslag-ciot-2013.pdf2018-05-06 20:32 33K 
[   ]Clean-IT-progress-report-2011-november.pdf2018-05-06 20:32 36K 
[   ]20150226_Kamerbrief-Reactie-Plasterk-op-verzoek-Van-Raak-omwisselen-simkaarten-na-Gemalto-hack.pdf2018-05-06 20:33 36K 
[   ]20140123_ah-tk-20132014-925.pdf2018-05-06 20:32 37K 
[   ]jaarverslag-ciot-2012.pdf2018-05-06 20:32 37K 
[   ]20131012_kst-29924-103.pdf2018-05-06 20:32 37K 
[   ]20140703_kst-29924-113.pdf2018-05-06 20:32 38K 
[   ]20131216_Slechts-ten-aanzien-van-SIGINT-is-toezicht-kapot_kst-33750-VII-39.pdf2018-05-06 20:32 39K 
[   ]20070709_stcrt-2007-129-p8-SC81332.pdf2018-05-06 20:32 40K 
[   ]20080416_MinJus-HirschBallin_Beleidsbrief_over_de_taakuitoefening_door_de_bijzondere_opsporingsidensten.pdf2018-05-06 20:33 40K 
[   ]20110509_pixmania.nl_10k-sample.txt.bz22018-05-06 20:32 41K 
[   ]20140204_ah-tk-20132014-1084.pdf2018-05-06 20:32 42K 
[   ]1993-FarmerVenema-comp.security.unix-Improving-the-Security-of-Your-Site-by-Breaking-Into-It.pdf2018-08-12 17:52 42K 
[TXT]20110423_kamerledenQID.html2018-05-06 20:32 43K 
[   ]20120426_cavv-advies-nr-22-bijlage-regeringsreactie.pdf2018-05-06 20:32 43K 
[   ]20100406_ah-tk-20092010-2140.pdf2018-05-06 20:32 43K 
[   ]20131028_kst-30977-63.pdf2018-05-06 20:32 43K 
[   ]20131011_beantwoording-kamervragen-over-afluisteren-van-internationaal-telefoonverkeer.pdf2018-05-06 20:32 44K 
[   ]20130710_ah-tk-20122013-2649.pdf2018-05-06 20:32 45K 
[   ]20120319_Beveiliging-van-SCADA-systemen_kst-26643-228.pdf2018-05-06 20:32 45K 
[   ]20120726_Preventing-Unauthorized-Disclosures-of-Classified-Information_FAS_ssci-leaks.pdf2018-05-06 20:32 47K 
[   ]20140506_input-brief-van-MinBZK-nov2013_vjeufpr5oozx.pdf2018-05-06 20:32 49K 
[TXT]20141001_Sabu-FBI-gained-access-to-these-docroots.txt2018-05-06 20:32 49K 
[   ]20110915-Update2-Project-Outline-Clean-IT.pdf2018-05-06 20:32 51K 
[   ]20130826_Defensie-Cyber-Strategie_kst-33321-2.pdf2018-05-06 20:32 52K 
[   ]20140526_kst-33945-1.pdf2018-05-06 20:32 52K 
[   ]20120214_Hack-bij-KPN_fil01-persoon-ztan-kamerstukken-hack-bij-kpn1.pdf2018-05-06 20:32 54K 
[   ]201305-Computercriminaliteit.wet.cons.pdf2018-05-06 20:32 54K 
[   ]20020404_Grootschalig-afluisteren-van-moderne-communicatiesystemen-kst-27591-4.pdf2018-05-06 20:32 56K 
[   ]20120130_Kamerbrief-over-AIVD_kst-30977-44.pdf2018-05-06 20:32 56K 
[   ]20140210_concept-wetsvoorstel-implementatie-richtlijn-informatiesystemen-20140122.pdf2018-05-06 20:32 56K 
[   ]20140109_beantwoording-kamervragen-over-de-methode-datamining.pdf2018-05-06 20:32 57K 
[IMG]20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-5-Schematisch-overzicht-wetgeving-van-enkele-andere-landen.png2018-05-06 20:33 59K 
[   ]20140325_MIVD_Bureau-Industrieveiligheid_formulierenset-autorisatieprocedure-bij-gerubriceerde-defensieopdrachten.pdf2018-05-06 20:32 59K 
[   ]kamerbrief_hoofdlijnen_jaarplan_2013_aivd.pdf2018-05-06 20:32 60K 
[   ]20140829_kamerbrief-actieprogramma-integrale-aanpak-29-08-2014.pdf2018-05-06 20:32 61K 
[   ]20130600_CTIVD-vacature_NJB-1323.pdf2018-05-06 20:32 62K 
[   ]20120706_kst-26643-246.pdf2018-05-06 20:32 62K 
[   ]gebruikersbepalingen-amateur-frequentiegebruik.pdf2018-05-06 20:32 63K 
[TXT]20110708_1mAXFR_breakdown-by-tld.html2018-05-06 20:33 63K 
[   ]darpa-internet-design.pdf2018-05-06 20:32 63K 
[   ]20131219_tweede-kamerbrief-eid.pdf2018-05-06 20:32 64K 
[   ]20141008_FOI-in-EU_On-the-application-in-2013-of-EC-1049-2001_eu-com-ann-rep-access-com-619-14.pdf2018-05-06 20:32 64K 
[IMG]20120222_CTIVD-screenshot.jpg2018-05-06 20:32 65K 
[   ]20091212_Onderzoek-naar-werksfeer-binnen-MIVD-blg-47154.pdf2018-05-06 20:32 66K 
[   ]20000600_101WAI-GT-FuncspecV1.0.1.doc2018-05-06 20:32 67K 
[IMG]20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-3-Overzicht-bijzondere-bevoegdheden-en-waarborgen.png2018-05-06 20:33 67K 
[   ]20180122-kamerbrief-over-toezegging-digitalisering-infrastructuur-en-cybersecurity-elektriciteitssector.pdf2018-05-06 20:33 71K 
[   ]20140925_Toespraak+Minister+Hennis-Plasschaert+bij+lancering+van+het+Defensie+Cyber+Commando+in+Den+Haag.pdf2018-05-06 20:32 71K 
[   ]20110517_CompSci-journals.pdf2018-05-06 20:32 71K 
[   ]20140506_Verslag-van-gesprek-met-Brenno-en-Huib_vji1e668s8zr.pdf2018-05-06 20:32 72K 
[   ]20150317_Plasterk-brief-IVD-aangelegenheden_technische-briefing-en-PIA-en-procedure.docx2018-05-06 20:33 72K 
[   ]20130200_Offensive-Cyber-Capabilities-are-Needed-Because-of-Deterrence_Jarno-Limnell.pdf2018-05-06 20:32 72K 
[   ]20150604_Fiche_Mededeling-Europese-Veiligheidsagenda_COM-2015-185.doc2018-05-06 20:33 73K 
[TXT]inbraakpreventie.html2018-05-06 20:32 74K 
[TXT]20130118_Reducing-terrorist-use-of-the-Internet_CleanIT.html2018-05-06 20:32 76K 
[   ]art27-toezicht2.pdf2018-05-06 20:32 78K 
[   ]20140703_Kamerbrief-over-convenant-joint-sigint-cyber-unit-jscu.pdf2018-05-06 20:33 78K 
[   ]20141008_FOI-in-EU_On-the-application-in-2013-of-EC-1049-2001_eu-com-ann-rep-access-com-619-annex-14.pdf2018-05-06 20:32 79K 
[   ]20150326_Brief-regering_Beleid-ten-aanzien-van-preventie-radicalisering.docx2018-05-06 20:33 84K 
[   ]20150603_Speech-by-Dutch-Minister-of-Defense-at-The-Hague-Institute-For-Global-Justice_Global-Justice-in-a-Multipolar-World.pdf2018-05-06 20:33 85K 
[TXT]20110416_exifAIVD-csv.txt2018-05-06 20:32 85K 
[   ]20120214_Nepmail_ABN-AMRO_Pas op voor internetcriminelen.pdf2018-05-06 20:32 86K 
[   ]jaarverslag-ctivd-2003.pdf2018-05-06 20:33 87K 
[   ]20140203_beantwoording-kamervragen-over-de-uitzending-van-nieuwsuur-betreffende-het-satellietcomplex-in-burum.pdf2018-05-06 20:32 88K 
[   ]201406_rnoti-p623.pdf2018-05-06 20:32 89K 
[   ]Exameneisen-N.pdf2018-05-06 20:32 92K 
[   ]201204_BestuurlijkeNetwerkKaart-21-Telecommunicatie-2012-vierde-druk.pdf2018-05-06 20:32 94K 
[   ]20140210_WIV2002_Paragraaf 3.2.2. Bijzondere bevoegdheden van de diensten.pdf2018-05-06 20:32 94K 
[   ]2006.173 nl.pdf2018-05-06 20:32 96K 
[   ]20121220_blg-200154.pdf2018-05-06 20:32 97K 
[   ]20111223_US-Army_Regulation_380-53_Communications-Security-Monitoring.pdf2018-05-06 20:32 98K 
[   ]1993-FarmerVenema-comp.security.unix-Improving-the-Security-of-Your-Site-by-Breaking-Into-It2.pdf2015-07-29 03:49 98K 
[IMG]20110704_lulzsec_from-openclipart-org.png2018-05-06 20:32 99K 
[   ]20151221_UK-RIP-Bill_The-Tor-Project_written-evidence-IPB0122_26373.pdf2018-05-06 20:33 99K 
[   ]20150416_AO-9april2015-SZW-BiZa_conceptverslag-Notitie-antidemocratische-groeperingen.docx2018-05-06 20:33 100K 
[   ]20120627_toespraak-cyber-nlda2.pdf2018-05-06 20:32 101K 
[   ]20150828_Nadere-uitwerking-kabinetsstandpunt-drones.docx2018-05-06 20:33 104K 
[   ]20150223_Actualisering-Defensie-Cyber-Strategie.docx2018-05-06 20:33 108K 
[   ]20150206_Rapportage-onderzoek-interceptiefaciliteit_lp-v-j-0000007492.pdf2018-05-06 20:33 109K 
[   ]hak5.org_OSXPost-Exploitation_copy-20130228.pdf2018-05-06 20:32 110K 
[IMG]20141122_bijlage-diagram-interceptiebestel-UK.png2018-05-06 20:33 110K 
[   ]20010709_KWINT_kst-26643-30.pdf2018-05-06 20:32 110K 
[TXT]20120831_huge-sec-v6000.txt2018-05-06 20:32 111K 
[IMG]20120600_AIVD-spioneert-VIA-en-IN-de-pers_deel1.png2018-05-06 20:32 115K 
[   ]RL31175.pdf2018-05-06 20:32 116K 
[   ]20150312_Brief-regering_Preventie-en-bestrijding-van-corruptie.docx2018-05-06 20:33 117K 
[   ]2009_toezichtsarrangement-dataretentie.pdf2018-05-06 20:32 118K 
[IMG]20120600_AIVD-spioneert-VIA-en-IN-de-pers_deel2.png2018-05-06 20:32 118K 
[   ]toegang-kamer-restreint-docs.pdf2018-05-06 20:32 119K 
[IMG]20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-4-Schematische-weergave-onderzoeksopdrachtgerichte-interceptie_reconstructie.png2018-05-06 20:33 119K 
[   ]Factsheet EBB en NAVI nieuwe huisstijl_tcm91-131221.pdf2018-05-06 20:32 120K 
[   ]brief_min_bzk_aan_tk_mbt_diverse_verzoeken_ivm_bezuinigingen_bij_de_aivd_september_2013a.pdf2018-05-06 20:32 122K 
[   ]slag_van_een_algemeen_overleg__gehouden_op_17_oktober_2013__over_Aftappen_gegevens_in_Nederland2018-05-06 20:32 123K 
[   ]RL30677.pdf2018-05-06 20:32 123K 
[   ]jaarverslag-aivd-2000.pdf2018-05-06 20:33 125K 
[   ]Exameneisen-F.pdf2018-05-06 20:32 126K 
[   ]20131230_AO-AIVD_kst-30977-75.pdf2018-05-06 20:32 126K 
[   ]Examenregeling-frequentiegebruik-2008.pdf2018-05-06 20:32 127K 
[   ]20140305_blg-324109.pdf2018-05-06 20:32 128K 
[   ]20141121_bijlage-diagram-interceptiebestel.pdf2018-05-06 20:32 131K 
[   ]20140709_tussen-paranoia-en-naiviteit-economische-veiligheid.pdf2018-05-06 20:32 133K 
[   ]20140703_kritische-reflectie-op-toetsbaarheid-Logius-norm-voor-DigiD.pdf2018-05-06 20:32 134K 
[   ]m013006.pdf2018-05-06 20:32 134K 
[   ]20140800_US-DoD-SECNAV-Instruction-3850.4a-TSCM_3850.4A.pdf2018-05-06 20:33 135K 
[   ]20140807_secnav-3850-4a.pdf2018-05-06 20:32 135K 
[   ]20140226_BuroJansen-Overheid-benadert-hackers.pdf2018-05-06 20:32 139K 
[   ]jaarplanbrief-aivd-2021.pdf2021-12-17 13:44 139K 
[TXT]20120712_fake-or-real_mail-about-Stratfor.txt2018-05-06 20:32 140K 
[   ]20141022_Het-Defensie-Cyber-Commando-een-nieuwe-operationele-capaciteit_magazine-nationale-veiligheid-en-crisisbeheersing-2014-5.pdf2018-05-06 20:32 141K 
[IMG]20120103_NCSC.nl-screenshot.png2018-05-06 20:32 143K 
[   ]20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-2-Opbouw-wetsvoorstel.pdf2018-05-06 20:33 144K 
[   ]20120208_etsi-ip-nl-102232-v1-0-2011-09-2.pdf2018-05-06 20:32 144K 
[   ]97-771.pdf2018-05-06 20:32 145K 
[   ]20140911_Veiligheidsagenda-2015-2018_blg-380496.pdf2018-05-06 20:32 145K 
[   ]20140916_Veiligheidsagenda-2015-2018_lp-v-j-0000006385.pdf2018-05-06 20:32 145K 
[   ]calea2-wiretap.pdf2018-05-06 20:32 147K 
[   ]20140829_actieprogramma-integrale-aanpak-jihadisme-29082014.pdf2018-05-06 20:32 147K 
[IMG]12333flowchart.jpg2018-05-06 20:32 148K 
[   ]20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-4-Schematische-weergave-onderzoeksopdrachtgerichte-interceptie.pdf2018-05-06 20:33 149K 
[   ]20140117_2014sigint.mem_.ppd_.rel_.pdf2018-05-06 20:32 149K 
[   ]20140506_Verslag-expertmeeting-Technische-aspecten-van-spionage-juridische-normering-en-privacy_kst-CVIII-C.pdf2018-05-06 20:32 149K 
[   ]20150829_Wiv-consultatie_reactie-Van-Hoboken-en-Koot.pdf2018-05-06 20:33 153K 
[   ]2012_The_Principle_of_Maneuver_in_Cyber_Operations.pdf2018-05-06 20:32 154K 
[   ]no-223-eu-intcen.pdf2018-05-06 20:32 155K 
[   ]20050524_checklist_bbgat.pdf2018-05-06 20:32 158K 
[   ]20111006_PvIB-2010nr3_Interview Hans Alfons over CRAMM en beveiligen in Afghanistan.pdf2018-05-06 20:32 160K 
[   ]Radiotechniek_en_voorschriften_2_N-examen.pdf2018-05-06 20:32 160K 
[IMG]teaching.jpg2019-12-17 16:37 160K 
[   ]03_Eijkman_Weggemans_v2[1]_1367418023.pdf2018-05-06 20:32 161K 
[   ]20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-5-Schematisch-overzicht-wetgeving-van-enkele-andere-landen.pdf2018-05-06 20:33 165K 
[   ]20140805_besluit-op-bezwaar-wob-inzake-transparantie-gegevensvordering-door-opsporingsdiensten-en-of-internetdienstverleners_05-08-2014.pdf2018-05-06 20:32 166K 
[   ]2010xxxx-Dimitriu-Tjepkema-NLDA-Inlichtingenondersteuning-bij-handhaving-en-bevordering-van-de-internationale-rechtsorde.pdf2019-05-03 10:48 166K 
[   ]20140811_NCTV-Uw-waakzaamheid-maakt-het-verschil_leaflet-chemische-producten_nctv-a4-poster-v31082014-invulbaar_tcm126-564241.pdf2018-05-06 20:33 169K 
[   ]20140210_beantwoording-kamervragen-over-verzameling-1-8-miljoen-records-metadata-door-nso.pdf2018-05-06 20:32 170K 
[   ]20120622_Terrorismebestrijding_kst-29754-213.pdf2018-05-06 20:32 171K 
[   ]20200306-USA-v-Firsov-complaint.pdf2020-03-11 13:14 173K 
[   ]20140709_geheime-diensten-vergelijkenderwijs.pdf2018-05-06 20:32 174K 
[   ]ETSI certificering.pdf2018-05-06 20:32 176K 
[   ]20120321_backtracksyllabus-110518142526-phpapp01.pdf2018-05-06 20:32 176K 
[   ]staatscourant-19512-indexering-indicatieve-tarieven-aftappen-en-dataretentie-12-juli-2013.pdf2018-05-06 20:32 179K 
[IMG]20171004_NRC-advertentie-vacature-voorzitter-en-leden-TIB-commisie-Wiv20xx.gif2018-05-06 20:33 179K 
[   ]20141122_bijlage-diagram-interceptiebestel-UK.pdf2018-05-06 20:32 180K 
[   ]20141216_kamerbrief_over_informeren_kwetsbaarheden_op_internet.pdf2018-05-06 20:33 181K 
[   ]20200211-tk-analyse-vpn-software-pulse-secure-nav-mondelinge-vragen-dd-1-oktober-2019.pdf2020-02-12 09:07 181K 
[   ]20131011_aanbiedingsbrief-bij-beantwoording-kamervragen-over-afluisteren-via-telecomaanbieders.pdf2018-05-06 20:32 181K 
[   ]R41524.pdf2018-05-06 20:32 183K 
[   ]20131216_kamerbrief-met-reactie-op-moties-rechtmatigheid-informatiewinning-aivd-en-mivd.pdf2018-05-06 20:33 185K 
[   ]20120604_Factsheet_CIOT_j-14520-factsheet-ciot.pdf2018-05-06 20:32 187K 
[   ]20140700_The-Structure-of-the-Cyber-Military-Revolution_Paul-Rosenzweig_220-summer-2014.pdf2018-05-06 20:32 187K 
[   ]hak5.org_WindowsPost-ExploitationCommandList_copy-20130228.pdf2018-05-06 20:32 189K 
[   ]20141211_twee-stukjes-van-AIVD-over-economische-veiligheid_magazine-nationale-veiligheid-en-crisisbeheersing-2014-6_tcm126-575059.pdf2018-05-06 20:33 189K 
[   ]RL32544.pdf2018-05-06 20:32 190K 
[IMG]20171104-actiecampagne-BoF-nepbrief-'Rijksveiligheidsdienst'_via_AlexanderNL.jpg2018-05-06 20:33 190K 
[   ]jaarplanbrief-aivd-2018.pdf2018-05-06 20:33 190K 
[   ]20050500_US-DoD-Counterintelligence-Reporting-Essentials-CORE-A-Practical-Guide-for-Reporting-Counterintelligence-and-Security-Indicators_PERSEREC-CORE.pdf2018-05-06 20:33 190K 
[   ]20100503_eindrapport-nulmeting-wet-bewaarplicht-telecommunicatiegegevens.pdf2018-05-06 20:32 190K 
[   ]CIAsPsychologicalOperationsInGuerrillaWarfareCIAContraManual.pdf2018-05-06 20:32 191K 
[   ]20111208_Juridisch-Kader-Cyber-Security_blg-147059.pdf2018-05-06 20:32 193K 
[   ]20131028_brief-aan-tk-inzake-reactie-bericht-nsa-onderschepte-18-miljoen-telefoo.pdf2018-05-06 20:32 195K 
[   ]jaarplanbrief-aivd-2017.pdf2018-05-06 20:33 198K 
[   ]20111201_cavv-advies-22-digitale-oorlogsvoering.pdf2018-05-06 20:32 199K 
[   ]20130500_Aanpak-toenemende-digitale-dreiging-Defensie-geeft-vorm-aan-cybercapaciteit_marineblad_mei13.pdf2018-05-06 20:32 200K 
[   ]20140210_concept-mvt-implementatie-richtlijn-informatiesystemen-20140122.pdf2018-05-06 20:32 200K 
[   ]Factsheet-Clean-IT.pdf2018-05-06 20:32 200K 
[   ]20131028_kamerbrief-en-antwoorden-op-kamervragen-bedrijfsspionage-oktober-20132.pdf2018-05-06 20:32 201K 
[   ]20120314_PKI-na-DigiNotar_kst-26643-230.pdf2018-05-06 20:32 202K 
[   ]20101027_2010-10-27-Memo-VDC-Onderzoek-compleet1_via_kkcuracao.info.pdf2018-05-06 20:33 202K 
[   ]20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-3-Overzicht-bijzondere-bevoegdheden-en-waarborgen.pdf2018-05-06 20:33 203K 
[   ]RL33494.pdf2018-05-06 20:32 204K 
[   ]20140506-Rathenau-Notitie-cyberintelligence-en-publiek-belang_Expertmeeting-EersteKamer.pdf2018-05-06 20:33 205K 
[   ]20140506_Achtergrondnotitie_vjjelg8lx7fj.pdf2018-05-06 20:32 205K 
[   ]20140722_Grondwet-correspondentiegeheim_kst-33989-3.pdf2018-05-06 20:32 206K 
[   ]20060516-Project-Nationale-Veiligheid_Geintegreerde-rapportage-interdepartementale-zelfevaluatie_Digitale-verlamming.pdf2018-05-06 20:33 208K 
[   ]2012_NWO-NCSRA-excerpt.pdf2018-05-06 20:32 211K 
[   ]20120814_CLEAN-IT-DRAFT-DOCUMENT-066Pub.doc2018-05-06 20:32 212K 
[   ]20140307_Snowden-testimony-before-Euro-Parliament.pdf2018-05-06 20:32 213K 
[   ]20140304_brief_aan_tweede_kamer_over_hoofdlijnen_aivd_jaarplan_2014.pdf2018-05-06 20:32 213K 
[   ]20141121_kabinetsstandpunt-herziening-interceptiestelsel-wiv-2002.pdf2018-05-06 20:32 218K 
[   ]20150501_Declassified-tekstje-NSA-over-Henri-Koot_nsa-history-today-2011-15.pdf2018-05-06 20:33 219K 
[   ]20120712_Stratfor Class Action Settlement.pdf2018-05-06 20:32 221K 
[   ]20140311_kabinetsreactie_dessens_versie_dd_11_maart_2014.pdf2018-05-06 20:32 222K 
[TXT]20110416_AIVDmeta.txt2018-05-06 20:32 224K 
[   ]20140113_beantwoording-vragen-inzake-berichtgeving-in-nrc-handelsblad-dat-nederland-doelwit-is-geweest-van-nsa.pdf2018-05-06 20:32 226K 
[   ]studiehulpra.pdf2018-05-06 20:32 231K 
[   ]RL31798.pdf2018-05-06 20:32 231K 
[   ]complete_unofficial_tempest_page.pdf2018-05-06 20:32 232K 
[   ]20120627_Dutch-MoD_brochure-defensie-cyber-strategie.pdf2018-05-06 20:32 239K 
[   ]20150511_MNVenC_Ducheine_Zes-noties-over-digitale-oorlogsvoering.pdf2018-05-06 20:33 242K 
[   ]Charney-PsychologyofInsiderSpyAFIO-INTEL_Fall-Winter2010.pdf2018-05-06 20:32 242K 
[   ]20121213_CRS_Intelligence-Identities-Protection-Act.pdf2018-05-06 20:32 245K 
[   ]ip_201305_e.pdf2018-05-06 20:32 245K 
[   ]20130211-Basic-Spy-Tradecraft_Edward-Howard-Lee.pdf2020-05-30 18:01 246K 
[   ]20140117_Besluit-verstrekking-GBA-aan-AIVD.pdf2018-05-06 20:32 251K 
[   ]dsresource?objectid=48084&type=org2018-05-06 20:32 251K 
[   ]20131014_antwoorden_en_vragen_van_raak_en_oosenburg_ams_ix.pdf2018-05-06 20:32 256K 
[   ]jaarplanbrief-aivd-2016.pdf2018-05-06 20:33 256K 
[   ]20061027_aivd_rapport_Aanvallen-op-het-stemgeheim-via-elektromagnetisch-effecten.pdf2018-05-06 20:32 257K 
[   ]20120607_Annex-1-bij-Samenwerkingsprotocol-Agentschap-Telecom-OPTA_stcrt-2012-12239.pdf2018-05-06 20:32 258K 
[   ]advies-irn-wopr-ontwikkeltrajecten_tcm126-443870.pdf2018-05-06 20:32 259K 
[   ]jaarverslag-ctivd-2005-2006.pdf2018-05-06 20:33 261K 
[   ]R40836.pdf2018-05-06 20:32 261K 
[   ]20150702_wiv-voorstel-bijlage3-nl.pdf2018-05-06 20:33 262K 
[TXT]20170802-Russian-IP-blocklist-today_NL-ASNs-only.txt2018-05-06 20:33 264K 
[   ]20110709_list_of_in-addr_nameservers.txt.gz2018-05-06 20:32 265K 
[   ]20070903_Quickscan-Onderzoek-Kostenvergoedingen-Bedrijfsleven-7096285-bijlage1.pdf2018-05-06 20:32 266K 
[   ]98-327.pdf2018-05-06 20:32 267K 
[   ]20150403_Internetconsultatie_Handreiking-VOBK-Inleiding_ontwerp-toelichting.pdf2018-05-06 20:33 269K 
[   ]20120208_etsi-nl-v1-1-2011-09-2.pdf2018-05-06 20:32 272K 
[   ]20150416_AO-9april2015-SZW-BiZa_definitief-verslag-Notitie-antidemocratische-groeperingen.rtf2018-05-06 20:33 272K 
[   ]hak5.org_LinuxUnixBSDPost-ExploitationCommandList_copy-20130228.pdf2018-05-06 20:32 274K 
[   ]20120208_tiit-v1-2-0-2011-09-2.pdf2018-05-06 20:32 274K 
[   ]201402_Roger-Vleugels_Fringe-Shop-and-Colofon.pdf2018-05-06 20:32 275K 
[   ]20150216_CBP-advies-wijziging-telecom-dataretentie_z2014-00885_bewaarplicht.pdf2018-05-06 20:33 276K 
[   ]20130524-jurisprudentieoverzicht-Wiv2002.pdf2014-06-02 08:19 277K 
[   ]20150323_rapport-van-Politie-en-OM_De-bewaarplicht-telecomgegevens-en-de-opsporing-Het-belang-van-historische-telecommunicatie-gegevens-voor-de-opsporing.pdf2018-05-06 20:33 278K 
[   ]20170817-Wiv2017-Staatsblad.pdf2018-05-06 20:32 279K 
[   ]20120731_AIVD-advies_BYOD.pdf2018-05-06 20:32 280K 
[   ]201101_handleiding_kwetsbaarheidsonderzoek_spionage.pdf2018-05-06 20:32 281K 
[   ]R42660.pdf2018-05-06 20:32 282K 
[   ]2009_Sean-Watts_Combatant-Status-and-Computer-Network-Attack.pdf2018-05-06 20:33 283K 
[   ]R42681.pdf2018-05-06 20:32 283K 
[   ]20150206_Kamerbrief-Opstelten-nav-toezeggingen-tappen_lp-v-j-0000007500.pdf2018-05-06 20:33 284K 
[   ]vragengladioenantwoorden.pdf2018-05-06 20:32 287K 
[   ]20150513_Rapportage-Mensenrechten-in-Nederland-2014_Hoofdstuk-over-privacy.pdf2018-05-06 20:33 288K 
[   ]20140908_leidraad_aanwijzing_vertrouwensfuncties_september_2014.pdf2018-05-06 20:32 289K 
[   ]traveltips.pdf2018-05-06 20:32 290K 
[   ]20150612_US-DoD-Law-of-War_ChapterXVI_Cyber-Operations_269684434.pdf2018-05-06 20:33 293K 
[   ]wiv2002en.pdf2018-05-06 20:32 297K 
[   ]R41837.pdf2018-05-06 20:32 297K 
[   ]20001019_Transport-of-Intercepted-IP-Traffic-TIIT-v0.1.2_TIITv012.pdf2018-05-06 20:33 313K 
[   ]20131100_weerbaar-tegen-extreme-zonneactiviteit.pdf2018-05-06 20:32 314K 
[   ]20140630_The-right-to-privacy-in-the-digital-age_Report-to-the-UN-OHCHR_A.HRC.27.37_en.pdf2018-05-06 20:33 315K 
[   ]20120914_White House's Draft Cybersecurity Executive Order_HSPD 7 Draft.pdf2018-05-06 20:32 315K 
[   ]jaarplanbrief-aivd-2014.pdf2018-05-06 20:33 316K 
[   ]jaarplanbrief-aivd-2015.pdf2018-05-06 20:33 316K 
[   ]RS21900.pdf2018-05-06 20:32 318K 
[   ]20050205_Regulation-of-Interception-of-Communications-in-UK-US-Australia_0405rp02e.pdf2018-05-06 20:32 319K 
[   ]20141000_DoD-Cybersecurity-policy-chart_ia_policychart.pdf2018-05-06 20:32 324K 
[   ]R43216.pdf2018-05-06 20:32 326K 
[   ]R42606.pdf2018-05-06 20:32 327K 
[   ]20100421_Besluit-van-de-Directeur-MIVD_stcrt-2010-7042.pdf2018-05-06 20:32 330K 
[   ]20100421_stcrt-2010-7042.pdf2018-05-06 20:32 330K 
[   ]20121100_Overview-of-USDoD-Cybersec-Policies-and-Issuances_ia_policychart.pdf2018-05-06 20:32 330K 
[   ]20130219_instelling_Evaluatiecommissie_Wiv2002_stcrt-2013-4096.pdf2018-05-06 20:32 331K 
[   ]20121103_weirdness_"USAF insider- 'NATO Will Nuke Washington, Omaha, Rapid City, and Colorado Springs".pdf2018-05-06 20:32 337K 
[   ]20150401_Verslag_van_een_algemeen_overleg,_gehouden_op_10_februari_2015,_over_IVD-aangelegenheden.rtf2018-05-06 20:33 339K 
[   ]R42683.pdf2018-05-06 20:32 342K 
[   ]20160429_Wiv20xx-versie-naar-RvS_MvT-Bijlage-1-Transponeringstabel.pdf2018-05-06 20:33 344K 
[   ]R40980.pdf2018-05-06 20:32 344K 
[   ]20140401_Beschouwing-overeenkomsten-en-verschillen-tussen-cyber-en-EOV.pdf2018-05-06 20:32 345K 
[   ]20140924_UN-Report-on-human-rights-and-terrorism_un-report-on-human-rights-and-terrorism.pdf2018-05-06 20:32 350K 
[   ]ICD_501-Discovery_and_Dissemination_or_Retrieval_of_Information_within_the_IC.pdf2018-05-06 20:32 354K 
[   ]R43134.pdf2018-05-06 20:32 358K 
[   ]20070311_AIVD-Violent-Jihad-in-the-Netherlands.pdf2018-05-06 20:32 368K 
[   ]20140910_FOIA-CIA-The-Evolution-of-US-Government-Restrictions-on-Using-and-Exporting-Encryption-Technologies.pdf2018-05-06 20:32 369K 
[   ]20110308_CyberSecIndustry-whitepaper_Improving our Nation's Cybersecurity through the Public-Private Partnership.pdf2018-05-06 20:32 369K 
[   ]20061200_MinJus_Gids-Programmatisch-handhaven-voor-centrale-overheden.pdf2018-05-06 20:33 370K 
[   ]20140124_Pitch Ministerie Defensie thema 9 SBIR cyber security II.pdf2018-05-06 20:32 371K 
[   ]20050500_US-DoD-Reporting-of-Counterintelligence-and-Security-Indicators-by-Supervisors-and-Coworkers_PERSEREC-CI-Reporting.pdf2018-05-06 20:33 376K 
[IMG]48-laws-of-power-infographic-list.png2020-01-10 06:27 380K 
[TXT]20110418_exifDefensieALL-csv.txt2018-05-06 20:32 385K 
[   ]20150310_Erfgoedinspectie-AIVD-DMS_Inspectierapport-duurzame-toegankelijkheid-digitale-informatiehuishouding-AIVD.pdf2018-05-06 20:33 386K 
[   ]20061218_Jihadisten-en-het-internet_NCTb_kst-29754-95-b1.pdf2018-05-06 20:32 388K 
[   ]20150126-MassSurveillance-EN.pdf2018-05-06 20:33 394K 
[   ]20150126_PACE-Mass-surveillance_Omtzigt.pdf2018-05-06 20:33 394K 
[   ]20150209_Surreptitiously-Weakening-Cryptographic-Systems_Schneier-Fredrikson-Kohno-Ristenpart.pdf2018-05-06 20:33 399K 
[   ]201305-Computercriminaliteit.MvT.cons.pdf2018-05-06 20:32 401K 
[   ]20150425_Zorgplichten-tegen-cybercrime_TjongTjinTai-Koops_NJB-1516.pdf2018-05-06 20:33 404K 
[   ]200301-tno-fel_03c001_bescherming_vitale_infra_-_quick_scan_man1%5B1%5D.pdf2018-05-06 20:32 412K 
[   ]2013-11-27-report-findings-of-the-ad-hoc-eu-us-working-group-on-data-protection.pdf2018-05-06 20:32 417K 
[   ]20140807_secnav-5000-38b.pdf2018-05-06 20:32 417K 
[   ]2012_NWO-CyberAgenda.pdf2018-05-06 20:32 422K 
[IMG]20150112_@Centcom-Twitter-compromise-timeline_blurred.png2018-05-06 20:33 426K 
[   ]20120706_Cybersecuritybeeld-Nederland-2.pdf2018-05-06 20:32 426K 
[   ]20151104_UK-Factsheet-Investigatory_Powers_Commission.pdf2018-05-06 20:33 427K 
[IMG]20120821_jkJkt.gif2018-05-06 20:32 428K 
[   ]202103xx-USA-vs-Kriuchkov-re-attempted-ransomware-against-Tesla_complaint.pdf2021-03-20 12:08 428K 
[   ]20010000_The-Ten-Commandments-of-Counterintelligence_James-Olson_a529667.pdf2018-05-06 20:32 429K 
[   ]20140600_Cyber-Warfare_Gary-D-Solis_219-spring-2014.pdf2018-05-06 20:32 430K 
[   ]2011_Dutch-National-Cyber-Security-Research-Agenda_10i-NROI-240%20ncsra-finaal.pdf2018-05-06 20:32 430K 
[   ]201801xx-US-Army-TRADOC-Pamphlet-525-8-6-Cyberspace-and-Electronic-Warfare-Operations-2025-2040_tp525-8-6.pdf2018-05-06 20:33 433K 
[   ]2010_Subversion-and-Espionage-Directed-Against-the-Army-SAEDA.pdf2018-05-06 20:32 436K 
[   ]USArmy-TacticalQuestioningReference.pdf2018-05-06 20:32 437K 
[   ]NATO OSINT Handbook v1.2 Jan2002.pdf2018-05-06 20:32 441K 
[   ]2013 -- U.S. Army War College -- Strategic Studies Institute -- Making Strategic Sense of Cyber Power - Why the Sky Is Not Falling.pdf2018-05-06 20:32 452K 
[   ]jaarverslag-aivd-1999.pdf2018-05-06 20:33 459K 
[   ]20150702_wiv-voorstel-bijlage3-en.pdf2018-05-06 20:33 460K 
[   ]20140829_actieprogramma-integrale-aanpak-jihadisme_20140902_OPGEMAAKT_a5-nctvjihadismedef3-lr.pdf2018-05-06 20:33 460K 
[   ]1983_FOIA-CIA-Ethics-and-Clandestine-Collection_DOC_0000619183.pdf2018-05-06 20:32 461K 
[   ]20200503-Anti-Money-Laundering-Centre-AMLC.nl-witwasindicatoren-april-2020-1.pdf2020-04-15 16:07 466K 
[   ]20140211_Criteria-voor-goed-toezicht.pdf2018-05-06 20:32 467K 
[IMG]poster-cnv-jongeren_ik-werk-veilig-of-ik-werk-niet.jpg2018-05-06 20:33 468K 
[IMG]2016-Cognitive-Bias-Codex_critical-thinking.jpg2019-04-07 19:01 471K 
[   ]2013_Politie-Wettenbundel-Opsporing.pdf2018-05-06 20:32 477K 
[   ]20150318_EU-PACE-Improving-the-Protection-of-Whistleblowers_Omtzigt.pdf2018-05-06 20:33 479K 
[   ]RL33303.pdf2018-05-06 20:32 482K 
[   ]20190207-USAvSmego-Plea-Argreement.pdf2019-12-04 20:24 486K 
[   ]20120426_cavv-advies-nr-22-digitale-oorlogsvoering-en.pdf2018-05-06 20:32 490K 
[   ]jaarverslag-ctivd-2008-2009.pdf2018-05-06 20:33 491K 
[   ]20020000_Voordelen-en-nadelen-van-signals-intelligence_Wiebes-2002_scan.pdf2018-05-06 20:32 494K 
[   ]jaarverslag-ctivd-2010-2011.pdf2018-05-06 20:33 497K 
[   ]20140918_NCTV-Uw-waakzaamheid-maakt-het-verschil_folder-uw-waakzaamheid-maakt-het-verschil_tcm126-564240.pdf2018-05-06 20:33 498K 
[   ]20091000_DGET-onderzoek-Hoofdstuk-13-definitief-230210.pdf2018-05-06 20:32 511K 
[   ]202103xx-USA-vs-Kriuchkov-re-attempted-ransomware-against-Tesla_indictment.pdf2021-03-20 12:08 511K 
[   ]20150420_Tor-node-176.126.252.11-Romania_Alistar Security Subpoena 41715-1.pdf2018-05-06 20:33 513K 
[   ]2004_Justitiele-verkenningen_Inlichtingendiensten_-volledige-tekst_tcm44-58271.pdf2018-05-06 20:32 513K 
[   ]20121200_ARSTRAT_IO_Newsletter_v13_no_03.pdf2018-05-06 20:32 516K 
[   ]20150200_Business-Executives-for-NatSec_BENS_Domestic-Security-Report_Feb2015.pdf2018-05-06 20:33 518K 
[   ]Stuxnet-Sourcecode.rar2018-05-06 20:32 518K 
[   ]20120801_slides-on-APT-from-.ir-source.pdf2018-05-06 20:32 519K 
[   ]Radiotechniek_en_voorschriften_1_F-examen.pdf2018-05-06 20:32 523K 
[   ]20131202_rapport_commissie-dessens_evaluatie_wiv_2002.pdf2018-05-06 20:32 532K 
[   ]201004-kwetsbaarheidsanalysespionageapril2010.pdf2018-05-06 20:32 533K 
[   ]kwetsbaarheidsanalysespionageapril2010.pdf.12018-05-06 20:32 533K 
[   ]201111_AIVD-Analysis-of-vulnerability-to-espionage_Espionage-risks-and-national-safety-and-security.pdf2018-05-06 20:32 539K 
[   ]20130901_Aanwijzing-Wet-justitiele-en-strafvorderlijke-gegevens_stcrt-2013-32596.pdf2018-05-06 20:32 543K 
[   ]20110726_all_96k_.in-addr.arpa_nameservers_for_AFRINIC_APNIC_ARIN_LACNIC_RIPE.txt.gz2018-05-06 20:32 550K 
[IMG]poster-cnv-jongeren_ik-werk-veilig-of-ik-werk-niet2.jpg2018-05-06 20:33 557K 
[   ]202003xx_ConspiracyTheoryHandbook.pdf2020-03-19 00:26 561K 
[   ]20131130_Notes-for-Dutch-SIGINT-Cyber-Analytic-Exchange_NRC.pdf2018-05-06 20:32 567K 
[   ]20131218_presentatie_18_december_2013_tcm46-210134.pdf2018-05-06 20:32 569K 
[   ]20110423_kamerleden.xml2018-05-06 20:32 573K 
[   ]2012_NWO-Cyber-CfP.pdf2018-05-06 20:32 584K 
[   ]20050800_Democratische-Controle-Inlichtingen-en-Veiligheidsdiensten_Clingendael-CCSS-iov-AIVD_kst-29876-8-b1.pdf2018-05-06 20:32 584K 
[   ]MA-scriptie_Terrorismebestrijding-en-informationele-privacy_Renders2008.pdf2018-05-06 20:32 589K 
[   ]R42114.pdf2018-05-06 20:32 598K 
[   ]pf-firewall.pdf2018-05-06 20:32 599K 
[   ]20131030_Algemeen-organisatiebesluit-Defensie-2013_stcrt-2013-31283.pdf2018-05-06 20:32 605K 
[   ]20140210_kamerbrief_10_feb_2014_metadata_OCR.pdf2018-05-06 20:32 606K 
[   ]20121130_NCTV_uitgaande-brief-wob-verzoek-venj-en-ez_tcm126-477696.pdf2018-05-06 20:32 607K 
[   ]20091123_Kamerbriefing-Tapstatistieken-Bits-of-Freedom-231109.pdf2018-05-06 20:32 612K 
[   ]QCC Searchlight Data Sheet V10 TSCM.pdf2018-05-06 20:32 615K 
[   ]20091102_Espionage-and-Other-Compromises-of-National-Security_Case-Summaries-from-1975-to-2008.pdf2018-05-06 20:32 620K 
[   ]20150602_CoE-CHR_Democratic-and-effective-oversight-of-national-security-services_coe-secint-oversight-report.pdf2018-05-06 20:33 620K 
[   ]brief_min_bzk_aan_tweede_kamer_over_taakstelling_aivd_03_juni_2013.pdf2018-05-06 20:32 621K 
[   ]jaarverslag-ctivd-2006-2007.pdf2018-05-06 20:33 623K 
[   ]Liberty-Reserve-et-al.-Indictment_OCR'd.pdf2018-05-06 20:32 624K 
[   ]jaarverslag-ctivd-2009-2010.pdf2018-05-06 20:33 628K 
[   ]XML Data Encoding Specification For Intelligence Publications Version 6.pdf2018-05-06 20:32 631K 
[IMG]bord-gevangenpoort-DenHaag_diefstal-met-valsche-sleutel.jpg2018-05-06 20:33 634K 
[   ]20000407_Joint_Doctrine_for_Electronic_Warfare_jp3_51.pdf2018-05-06 20:32 634K 
[   ]20060300_Submarine-cables_CPNI-UK.pdf2018-05-06 20:32 635K 
[   ]mp40.pdf2018-05-06 20:32 652K 
[   ]20140819_The-Internet-and-the-State-a-Survey-of-Key-Developments_VanEeten-Mueller-VanEijk_RMO1395.pdf2018-05-06 20:33 661K 
[   ]20131130-Document03-reconstruction.pdf2018-05-06 20:32 663K 
[   ]fundamentals_ci.pdf2018-05-06 20:32 663K 
[   ]CTIVD Toezichtsrapport gegevensverwerking telecommunicatie nr 38.pdf2018-05-06 20:32 667K 
[   ]201310_ENISA-crypto_Algorithms-Key-Sizes-and-Parameters-Report.pdf2018-05-06 20:32 667K 
[   ]20141028_US-DoD-Counterintelligence-Best-Practices-for-Cleared-Industry_CIBooklet.pdf2018-05-06 20:33 667K 
[   ]20120619_Anti-eavesdropping-device_US8203850.pdf2018-05-06 20:32 670K 
[   ]199408.pdf2018-05-06 20:32 678K 
[   ]20150225_UK-Current-and-future-uses-of-biometric-data-and-technologies_uk-parl-technology-cttee-biometrics-report.pdf2018-05-06 20:33 680K 
[   ]2011_Dutch-NCSS_cyber-security-strategy-uk_tcm92-379999.pdf2018-05-06 20:32 686K 
[   ]20191203-dcypher-divd-mrkoot.pdf2019-12-06 09:00 692K 
[   ]memorie-van-toelichting-wetsvoorstel-voor-versterking-aanpak-computercriminaliteit.pdf2018-05-06 20:32 699K 
[   ]20120809_TrapWire.pdf2018-05-06 20:32 704K 
[   ]DHS_Blueprint-for-a-Secure-Cyber-Future_Nov2011.pdf2018-05-06 20:32 704K 
[   ]20120606_statistisch-jaaroverzicht-documentfraude-2011-zonder-namen.pdf2018-05-06 20:32 705K 
[   ]20110515_Regeling-burgerservicenummer.rtf.bz22018-05-06 20:32 705K 
[   ]eu-spying-plan.pdf2018-05-06 20:32 721K 
[   ]20140410_EU-Opinion-05-2014-on-Anonymisation-Techniques_wp216_en.pdf2018-05-06 20:33 721K 
[   ]eu-mass-spying.pdf2018-05-06 20:32 727K 
[   ]20110817_asnames.txt_ripped-from-bgp.potaroo.net.gz2018-05-06 20:32 734K 
[   ]CSLStudy_1_11_CompleteReportWithCovers.pdf2018-05-06 20:32 736K 
[   ]jaarverslag-aivd-2005.pdf2018-05-06 20:33 748K 
[   ]jaarverslag-aivd-2003.pdf2018-05-06 20:33 761K 
[   ]Use_of_Internet_for_Terrorist_Purposes.pdf2018-05-06 20:32 765K 
[   ]20120901_US Army CIO-G6, Cybersecurity Directorate Newsletter September 2012.pdf2018-05-06 20:32 770K 
[   ]20060531_inlichtingen-en-veiligheid-defensie.pdf2018-05-06 20:32 772K 
[   ]20060602_Inlichtingen-en-Veiligheid_tcm46-95514.pdf2018-05-06 20:32 772K 
[   ]20141205_EU-Working-Document-on-surveillance-of-electronic-communications-for-intelligence-and-national-security-purposes_wp228_en.pdf2018-05-06 20:33 773K 
[   ]20121004_Impact-of-Counter-Terrorism-on-Communities-Netherlands_FINAL.pdf2018-05-06 20:32 773K 
[   ]2008_NAVI-Handreiking-Risicoanalyse_10-praktische-modellen-voor-de-risicoanalist.pdf2018-05-06 20:33 779K 
[   ]navi_ra_brochure1.pdf2018-05-06 20:32 779K 
[IMG]bord-gevangenpoort-DenHaag_muntschennis.jpg2018-05-06 20:33 788K 
[   ]jaarverslag-aivd-2001.pdf2018-05-06 20:33 794K 
[   ]DHS-FBI-Expertise.pdf2018-05-06 20:32 794K 
[   ]20120301_US Army CIO-G6, Cybersecurity Directorate Newsletter March 2012.pdf2018-05-06 20:32 799K 
[   ]20120601_US Army CIO-G6, Cybersecurity Directorate Newsletter June 2012.pdf2018-05-06 20:32 805K 
[   ]2009_Secret-Truth.-The-EU-Joint-Situation-Centre_VanBuuren.pdf2018-05-06 20:32 807K 
[   ]jaarverslag-ctivd-2012_2013.pdf2018-05-06 20:33 809K 
[   ]20120700_GAO-on-DOD-Electronic-and-Cyber-Warfare-Operations.pdf2018-05-06 20:32 815K 
[   ]20071211_UK-interception-comms-code-practice-RIPA2000.pdf2018-05-06 20:32 833K 
[   ]20140128_Arrest-Ziggo-XS4ALL-versus-BREIN-over-TPB-blokkade.pdf2018-05-06 20:33 836K 
[   ]Cyber Incident Reporting in the EU_FINAL.pdf2018-05-06 20:32 837K 
[   ]20160429_Wiv20xx-versie-naar-RvS_wetsvoorstel.pdf2018-05-06 20:33 843K 
[   ]jaarverslag-aivd-1998.pdf2018-05-06 20:33 843K 
[   ]20111208_Cybersecuritybeeld-Nederland-1.pdf2018-05-06 20:32 851K 
[   ]20150401_Inspectierapport-Aanpak-van-internetoplichting-door-de-politie.pdf2018-05-06 20:33 868K 
[   ]20140107_Visie-op-Telecommunicatie-media-en-internet-verdieping_blg-275652.pdf2018-05-06 20:32 879K 
[   ]15-2013-youonlyclicktwice.pdf2018-05-06 20:32 885K 
[   ]jaarverslag-ctivd-2011-2012.pdf2018-05-06 20:33 891K 
[   ]20110420_EXIF.sql.gz2018-05-06 20:32 893K 
[   ]20110610_diasporaUsersOn20110329-csv.txt.gz2018-05-06 20:32 893K 
[   ]20110420_EXIFdump1.sql.gz2018-05-06 20:32 893K 
[   ]jaarverslag-ctivd-2007-2008.pdf2018-05-06 20:33 900K 
[   ]20130911_Pilot-Dreigingsmanagement-De-implementatie-en-wijze-van-uitvoering-onder-de-loep_blg-248776.pdf2018-05-06 20:32 902K 
[IMG]20140828_Peeking-in-China_source-Globaltimes.cn.jpg2018-05-06 20:32 907K 
[   ]IB87201.pdf2018-05-06 20:32 909K 
[   ]20150300_Islamic-State-and-Encryption_Bartlett-and-KrasodomskiJones.pdf2018-05-06 20:33 910K 
[   ]jaarverslag-aivd-2004.pdf2018-05-06 20:33 910K 
[   ]MA-thesis_Het_Trojaanse_politiepaard_-_Hacken_in_het_opsporingsonderzoek_Anne-Winters_August-2012.pdf2018-05-06 20:32 917K 
[   ]20060301_Ontwerp-Nationale-Infrastructuur-Bestrijding-Cybercrime_kst-26671-24-b2.pdf2018-05-06 20:32 919K 
[   ]2013_Politie-Lexicon-Opsporing.pdf2018-05-06 20:32 929K 
[   ]jaarverslag-aivd-2002.pdf2018-05-06 20:33 931K 
[   ]jaarverslag-ctivd-2004.pdf2018-05-06 20:33 931K 
[   ]20111128_iRN-Columbo_MinVenJ_projectplan-verduurzaming-irn-icolumbo_tcm126-444148.pdf2018-05-06 20:32 943K 
[   ]AJP-3.10 nov 2009.pdf2018-05-06 20:32 948K 
[   ]Anon_Terminology_v0.34.pdf2018-05-06 20:32 1.0M 
[   ]20110817_prefixes.txt_ripped-from-bgp.potaroo.net.gz2018-05-06 20:32 1.0M 
[   ]20201215-US-Court-5-20-cr-00332-SLP-indictment.pdf2020-12-19 15:09 1.0M 
[   ]atp2-22-9.pdf2018-05-06 20:32 1.0M 
[   ]20150604_Universiteit-Twente_voor_MinBZK_Modellenboek_trainingen_agressie_en_geweld_in_de_publieke_context.pdf2018-05-06 20:33 1.0M 
[   ]vulnerability_assessment.pdf2018-05-06 20:32 1.0M 
[   ]1988-McIntosh-White-Privilege.pdf2019-04-27 09:05 1.1M 
[   ]20110831_US-ODNI-Government-Open-Source-Handbook.pdf2018-05-06 20:32 1.1M 
[   ]jaarverslag-aivd-2008.pdf2018-05-06 20:33 1.1M 
[   ]bilge12_zero_day.pdf2018-05-06 20:32 1.1M 
[   ]20060413_BIG-Werkgroep-Risicoanalyse_Leidraad-objectgericht-risicomanagement-door-rijkstoezichthouders.pdf2018-05-06 20:33 1.1M 
[   ]20130328_Privacy-and-Security-Discourses-in-Selected-Dutch-Policy-Documents.pdf2018-05-06 20:32 1.1M 
[   ]jaarverslag-mivd-2009.pdf2018-05-06 20:33 1.1M 
[   ]in-touch-2010-2.pdf2018-05-06 20:32 1.1M 
[   ]201908xx-tk-bijlage-onderzoeksrapport-wodc-kwetsbaarheden-industriele-controle-systemen.pdf2020-01-06 07:32 1.2M 
[   ]20140500_CHARNEY_The_Psychology_of_Espionage_DRAFT_2014May12.pdf2018-05-06 20:32 1.2M 
[   ]201310_IPOL-LIBE_ET(2013)493032_EN.pdf2018-05-06 20:32 1.2M 
[   ]NBS-Vol1-EPSCINS_HANDS_1968.pdf2018-05-06 20:32 1.2M 
[   ]20141100_AIV_Het-internet-een-wereldwijde-vrije-ruimte-met-begrensde-staatsmacht_webversie_AIV_92NL.pdf2018-05-06 20:33 1.2M 
[   ]NATO OSINT Reader FINAL Oct2002.pdf2018-05-06 20:32 1.2M 
[   ]cookbook-en.pdf2018-05-06 20:32 1.2M 
[   ]20100701_Evaluatie-kostenregeling-aftappen_7096285-bijlage2.pdf2018-05-06 20:32 1.2M 
[   ]20110413_Settlement-hotz.pdf2018-05-06 20:32 1.2M 
[   ]2012_WODC_Het-gebruik-van-de-telefoon-en-internettap-in-de-opsporing_ob304-volledige-tekst_tcm44-453677.pdf2018-05-06 20:32 1.2M 
[   ]201311_Spooky-Business-Corporate-Espionage-Against-Nonprofit-Organizations.pdf2018-05-06 20:32 1.3M 
[   ]20100623_eindrapport-audit-ciot-2010.pdf2018-05-06 20:32 1.3M 
[   ]98-326.pdf2018-05-06 20:32 1.3M 
[   ]20130205_Joint-Publication-3-12-R-Cyberspace-Operations_jp3_12r.pdf2018-05-06 20:32 1.3M 
[   ]20121127_JP3-13 - Information Operations (updated Nov 2012)_jp3-13.pdf2018-05-06 20:32 1.3M 
[   ]1941-The_Garrison_State.pdf2018-05-06 20:32 1.3M 
[   ]eindrapport-privacy-scan-nw_tcm126-488190.pdf2018-05-06 20:32 1.3M 
[   ]2007_FBI_Digital-Evidence-Field-Guide-v1.1.pdf2018-05-06 20:32 1.3M 
[   ]20131203_inventarisatie-en-analyse-van-parlementaire-stukken-ten-behoeve-van-de-evaluatiecommissie-2.pdf2018-05-06 20:32 1.3M 
[   ]20140714_jtrigall_FirstLook.pdf2018-05-06 20:32 1.3M 
[   ]219941.pdf2018-05-06 20:32 1.3M 
[   ]jaarverslag-aivd-2011.pdf2018-05-06 20:32 1.3M 
[   ]20141006_Cybersecuritybeeld-Nederland-4.pdf2018-05-06 20:33 1.3M 
[   ]FOIA-CIA-the-need-for-ethical-norms.pdf2018-05-06 20:32 1.4M 
[   ]AFCEA-T2S2AFCEATechnetCyberRequirements.pdf2014-09-02 18:12 1.5M 
[   ]20111220_draft-SP800-155_Dec2011_SCRUBBED.pdf2018-05-06 20:32 1.5M 
[   ]20150526_Rapport_Evaluatie-beleidsregel-veiligheidsonderzoeken-Defensie_VGB.pdf2018-05-06 20:33 1.5M 
[   ]nor2007xxxx-SDU-Handboek-voor-de-Opsporingspraktijk-deel-2_PIDS_5216B.pdf2018-05-06 20:33 1.5M 
[   ]201204_Pilot-Dreigingsmanagement-Een-ex-ante-evaluatie_blg-248778.pdf2018-05-06 20:32 1.5M 
[   ]20090400_DNI-The-Study-On-Educing-Information.pdf2018-05-06 20:32 1.5M 
[   ]jaarverslag-aivd-2009.pdf2018-05-06 20:33 1.5M 
[   ]jaarverslag-aivd-2006.pdf2018-05-06 20:33 1.5M 
[   ]20131223_Hans-van-der-Meer_UvA_Practicumboek-voor-alle-studierichtingen_practicum.pdf2018-05-06 20:32 1.6M 
[   ]201407_rapport-first-national-report-of-the-kingdom-of-the-netherlands-as-required-under-article-9-1.pdf2018-05-06 20:32 1.6M 
[   ]1998_Joint-Publication-3-13_Information-Operations_jp3-13.pdf2018-05-06 20:33 1.6M 
[   ]20060101_VNG-Handreiking-Radicalisme-Signaleren-en-Aanpakken_Vroegtijdige-aanpak-van-radicaliserende-jongeren_vng-handreiking-radicalisering.pdf2018-05-06 20:33 1.6M 
[   ]201401_WEF_RiskResponsibility_HyperconnectedWorld_Report_2014.pdf2018-05-06 20:32 1.6M 
[   ]19960201_Enquete-Opsporingsmethoden_kst-24072-14.pdf2018-05-06 20:32 1.7M 
[   ]IAN_BROWN-FINAL_WITNESS_STATEMENT.pdf2018-05-06 20:32 1.7M 
[   ]20140814_Travel-Guide-to-the-Digital-World-Surveillanvce-and-International-Standards.pdf2018-05-06 20:32 1.7M 
[   ]201409xx-PwC-Verkenning-naar-gescheiden-ICT-netwerken-en-diensten-in-Nederland_blg-419668.pdf2018-05-06 20:33 1.8M 
[   ]jaarverslag-aivd-2007.pdf2018-05-06 20:33 1.8M 
[   ]CI_Glossary.pdf2018-05-06 20:32 1.8M 
[   ]jaarverslag-aivd-1991.pdf2018-05-06 20:33 1.8M 
[   ]20140417_ep-LIBE-Inquiry-NSA-Surveillance.pdf2018-05-06 20:32 1.9M 
[   ]jaarverslag-mivd-2016.pdf2018-08-08 13:56 1.9M 
[   ]201408xx-US-Army-ATP-2-33.4-Intelligence-Analysis_USArmy-IntelAnalysis.pdf2018-05-06 20:33 1.9M 
[   ]jaarverslag-aivd-1992.pdf2018-05-06 20:33 1.9M 
[   ]jaarverslag-mivd-2017.pdf2018-08-08 13:56 1.9M 
[   ]20120524_Folmer-in-NOREA-Defensie-ontwikkelt-een-nieuw-wapen-Cyber-Operations_0000038649_Cyberoperations.pdf2018-05-06 20:32 1.9M 
[   ]20091014_Microsoft-PowerPoint-Bewaarplicht-Telecommunicatiegegevens-samengevoegd-2.pdf2018-05-06 20:32 2.0M 
[   ]MSc-thesis_Information-Warfare-on-an-Evolving-Battlefield_Daniel-Gold_Fall-2012.pdf2018-05-06 20:32 2.0M 
[   ]20150226_JSCU-AIVD-MIVD-samenwerking-in-de-praktijk_magazine-nationale-veiligheid-en-crisisbeheersing-2015-nr-1.pdf2018-05-06 20:33 2.0M 
[   ]20120112_Programma_Opening_NCSC.pdf2018-05-06 20:32 2.1M 
[   ]20120817_Wob_HDIeF-privacyrapport.pdf2018-05-06 20:32 2.1M 
[   ]201406xx-NCTV-Handleiding-Screening-Medewerkers-CBRN_j-23977-nw-handleiding-screening-cbrn_tcm31-32681.pdf2018-05-06 20:33 2.1M 
[   ]20210120-Rapport+Evaluatie+2020+-Wet+op+de+inlichtingen-+en+veiligheidsdiensten+2017.pdf2021-02-26 17:24 2.1M 
[   ]jaarverslag-aivd-1994.pdf2018-05-06 20:32 2.1M 
[   ]20130200_The Fog of Cyber Defence NDU 2013.pdf2018-05-06 20:32 2.1M 
[   ]20140923_Eerste-Kamerdebat-over-Privacy-en-toezicht-op-de-IVDs_h-ek-20142015-1-9.pdf2018-05-06 20:32 2.2M 
[   ]20140723_AdviespuntKlokkenluiders_Veilig-misstanden-melden-op-het-werk-Eindrapport-23072014.pddf2018-05-06 20:33 2.2M 
[   ]fm3-38.pdf2018-05-06 20:32 2.2M 
[   ]20160xxx_MichaelBest_slides_Exclusively-Relying-on-Tor-Risks-Detection-and-Exposure-for-Whistleblowers.pdf2018-05-06 20:33 2.2M 
[   ]ICS_705-01_Physical_and_Technical_Security_Standards_for_Sensitive_Compartmented_Information_Facilities.pdf2018-05-06 20:32 2.2M 
[   ]20141209_Free-Software-and-Open-Standards-under-the-Rules-of-Procedure-of-the-European-Parliament_Ensuring-Utmost-Transparency--Piana-Oberg-Korff.pdf2018-05-06 20:33 2.2M 
[   ]1975_EMP_An-Introduction-to-Explosive-Magnetic-Flux-Compression-Generators.pdf2018-05-06 20:32 2.2M 
[   ]2009_Intelligencegestuurd_politiewerk_Doctrine-Politieacademie.pdf2018-05-06 20:32 2.2M 
[   ]201111_info_ops_primer.pdf2018-05-06 20:32 2.2M 
[   ]AFD-130327-306.pdf2018-05-06 20:32 2.2M 
[   ]20140703_infographic_inlichtingen_en_informatierevolutie.pdf2018-05-06 20:32 2.2M 
[   ]jaarverslag-aivd-2013.pdf2018-05-06 20:33 2.2M 
[   ]20150403_Internetconsultatie_Handreiking-VOBK-Dutch-Safety-Requirements_concept-regeling.pdf2018-05-06 20:33 2.3M 
[   ]20151014_Cybersecuritybeeld-Nederland-5.pdf2018-05-06 20:33 2.4M 
[   ]201911xx-TNO-Co-existence-of-5G-mobile-networks-with-Burum-Satellite-Access-Station-operating-in-C-band.pdf2021-01-08 15:13 2.4M 
[   ]20170817-Wiv2017-MvT.pdf2018-05-06 20:33 2.4M 
[   ]1944_OSS_Simple-Sabotage-Field-Manual.pdf2018-05-06 20:32 2.5M 
[   ]INSA_Expectations_of_Intelligence_in_the_Information_Age.pdf2018-05-06 20:32 2.5M 
[   ]20141208_CoE-CHR_Issue-Paper_The-rule-of-law-on-the-Internet-and-in-the-wider-digital-world.pdf2018-05-06 20:33 2.5M 
[   ]jaarverslag-ctivd-2013-2014.pdf2018-05-06 20:33 2.5M 
[   ]20150112_PPD-28_DNI-Principles-of-Intelligence-Transparency-for-the-Intelligence-Community_FINAL_Transparency_poster_v1.pdf2018-05-06 20:33 2.5M 
[   ]1984xxxx-Psychological-operations-in-guerilla-warfare_Psy-Ops-Booklet_by-CIA-for-Nicaraguan-rebels_MuckRock-FOIA.pdf2018-05-06 20:33 2.5M 
[   ]20160429_Wiv20xx-versie-naar-RvS_uitgelekt-naar-Volkskrant.pdf2018-05-06 20:33 2.5M 
[   ]141893154-DISTRIBUTED-DENIAL-OF-SERVICE-ACTIONS-AND-THE-CHALLENGE-OF-CIVIL-DISOBEDIENCE-ON-THE-INTERNET.pdf2018-05-06 20:32 2.6M 
[   ]transforming-classification.pdf2018-05-06 20:32 2.6M 
[   ]19901231_EMP_c-2.pdf2018-05-06 20:32 2.6M 
[   ]Foreign_Economic_Collection_2011.pdf2018-05-06 20:32 2.7M 
[   ]PRISMS-D2-1-Preliminary-report-on-technology.pdf2018-05-06 20:32 2.8M 
[   ]20150410_WRR_Policy_Brief__2015__The_Public_Core_of_the_Internet.pdf2018-05-06 20:33 2.8M 
[   ]20160429_Wiv20xx-versie-naar-RvS_MvT.pdf2018-05-06 20:32 2.8M 
[   ]jaarverslag-ctivd-2014-2015.pdf2018-05-06 20:33 2.8M 
[   ]201109_Parliamentary-oversight-of-intelligence-agencies-in-the-EU_20110927ATT27674EN.pdf2018-05-06 20:32 2.8M 
[   ]2013 -- U.S. Army War College -- Strategic Studies Institute -- Cyber Infrastructure Protection: Vol. II.pdf2018-05-06 20:32 2.8M 
[   ]20060413_BIG-Werkgroep-Risicoanalyse_Nadere-uitwerking-van-de-Leidraad-objectgericht-risicomanagement-door-rijkstoezichthouders.pdf2018-05-06 20:33 2.8M 
[   ]20140703_infographic_cyber-activiteiten.pdf2018-05-06 20:32 2.8M 
[   ]jaarverslag-mivd-2013.pdf2018-05-06 20:33 2.8M 
[   ]jaarverslag-mivd-2012.pdf2018-05-06 20:33 2.8M 
[   ]20081100_Surveillance_Project_International_Survey_Findings_Summary_2008.pdf2018-05-06 20:32 2.8M 
[   ]PhD-thesis_Measuring-and-Predicting-Anonymity_2012.pdf2018-05-06 20:32 2.9M 
[   ]20140917_Belgium-intelligence-annual-report-2013_Activiteitenverslag-Staatsveiligheid-en-ADIV-2013_Dutch-only.pdf2018-05-06 20:32 2.9M 
[   ]20101100_U.S. Army War College - Information Operations Primer_info-ops-primer.pdf2018-05-06 20:32 3.0M 
[   ]20130301_CBP-Richtsnoeren-Beveiliging-van-persoonsgegevens_stcrt-2013-5174.pdf2018-05-06 20:32 3.0M 
[   ]jp3_13_4.pdf2018-05-06 20:32 3.0M 
[   ]202103xx-USA-vs-Kriuchkov-re-attempted-ransomware-against-Tesla_plea-agreement.pdf2021-03-20 12:08 3.1M 
[   ]JDP 2 Inlichtingen_tcm46-193919.pdf2018-05-06 20:32 3.2M 
[   ]20130000_Waarom-organisaties-de-regels-naleven_Over-individuele-motieven-de-ethische-bedrijfscultuur-en-de-mores-in-de-branch.pdf2018-05-06 20:33 3.2M 
[   ]2011 -- U.S. Army War College -- Strategic Studies Institute -- Cyber Infrastructure Protection: Vol. I.pdf2018-05-06 20:32 3.2M 
[   ]jaarverslag-mivd-2011.pdf2018-05-06 20:33 3.3M 
[   ]2009_13-F-0676_The_DoD_Strategy_for_CI_in_Cyberspace.pdf2018-05-06 20:32 3.4M 
[   ]20131004_WODC_Glazen-privacy_Knelpuntenonderzoek-uitvoering-Wet-politiegegevens-Wpg_lp-v-j-0000004812.pdf2018-05-06 20:32 3.4M 
[   ]200904_Verstrekkingenwijzer-Politie-gegevens_73843.pdf2018-05-06 20:32 3.4M 
[   ]MSc-thesis_Offensive-Cyber_Collin-van-Loon_June-2012.pdf2018-05-06 20:32 3.4M 
[   ]20140923_Eerste-Kamerdebat-over-Privacy-en-toezicht-op-de-IVDs_deel2_h-ek-20142015-1-11.pdf2018-05-06 20:32 3.5M 
[   ]A Taxonomy For And Analysis Of Anonymous Communications Networks (2009).pdf2018-05-06 20:32 3.5M 
[   ]NATO OSINT Intelligence Exploitation of the Internet Oct2002.pdf2018-05-06 20:32 3.7M 
[   ]20150511_Magazine-Nationale-veiligheid-en-crisisbeheersing-2015-nr2-thema-cyberspace.pdf2018-05-06 20:33 3.7M 
[   ]20140917_Belgium-intelligence-annual-report-2013_Activiteitenverslag-Staatsveiligheid-en-ADIV-2013_Dutch-and-French.pdf2018-05-06 20:33 3.8M 
[   ]20121200_NATO_NationalCyberSecurityFrameworkManual.pdf2018-05-06 20:32 3.8M 
[   ]csoghoian-vb-2012-exploit-sales-keynote.pdf2018-05-06 20:32 3.8M 
[   ]20150124_MotoE_UPDATE-SuperSU-v2.45_MIRROR.zip2018-05-06 20:33 3.8M 
[   ]jaarverslag-mivd-2006.pdf2018-05-06 20:33 3.9M 
[   ]jaarverslag-aivd-2014.pdf2018-05-06 20:33 4.1M 
[   ]20060900_FM_2-22.3_US-Army_Human-Intelligence-Collector-Operations.pdf2018-05-06 20:32 4.2M 
[   ]NRO-WikiLeaks-Record-Circa-mid-2010.pdf2018-05-06 20:32 4.2M 
[   ]fm2-0.pdf2018-05-06 20:32 4.2M 
[   ]jaarverslag-mivd-2007.pdf2018-05-06 20:33 4.2M 
[   ]20151221-Generieke-selectielijst-voor-de-archiefbescheiden-van-de-Militaire-Inlichtingen-en-Veiligheidsdienst-en-taakvoorgangers-vanaf-1945_blg-646463.pdf2020-06-16 06:26 4.3M 
[   ]20140000_Criteria Transparantiebenchmark 2014 v2.pdf2018-05-06 20:32 4.4M 
[   ]20111118_FBI-Elicitation-Brochure.pdf2018-05-06 20:33 4.6M 
[   ]20140409_h-tk-20132014-73-8.pdf2018-05-06 20:32 4.7M 
[   ]20140815-Spionage-en-activiteiten-van-inmenging-door-buitenlandse-inlichtingendiensten_masterscriptie_ANTUNOVIC-Kresimir_UGent.pdf2020-08-02 10:45 4.8M 
[   ]20101102_Niet-voor-persoonlijk-gebruik_Omkoping-van-ambtenaren-in-de-civiele-openbare-sector_niet_voor_persoonlijk_gebruik_1.pdf2018-05-06 20:33 4.9M 
[   ]201203_WEF_IT_PartneringCyberResilience_Guidelines_2012.pdf2018-05-06 20:32 4.9M 
[IMG]PlayboyAdvisor-Jan2007.200dpi.tif2018-05-06 20:32 4.9M 
[TXT]20150525_CTIVD-rapporten-1tm42_pdftohtml.html2018-05-06 20:33 5.0M 
[   ]20150519_Rekenkamer-rapport_Bezuinigingen-en-intensiveringen-bij-de-AIVD_Gevolgen-van-de-budgettaire-turbulentie-in-de-periode-2012-2015.pdf2018-05-06 20:33 5.0M 
[   ]20201019-Factual-Resume-re-Technician-Who-Pleads-Guilty-to-Hacking-Home-Security-Footage.pdf2021-01-24 19:07 5.0M 
[   ]20121100_ENISA_Honeypots_study.pdf2018-05-06 20:32 5.1M 
[   ]20141020_Hans-van-der-Meer_UvA_Syllabus-Cryptografie-voor-niet-beta-studies_syllabus-minor-s.pdf2018-05-06 20:32 5.3M 
[   ]20120501_DF-114-Cryptanalytic-Device.pdf2018-05-06 20:32 5.4M 
[   ]Conficker_Working_Group_Lessons_Learned_17_June_2010_final.pdf2020-04-04 10:41 5.4M 
[   ]20191121-NISA-conference-booklet.pdf2019-11-17 13:09 5.6M 
[   ]jaarverslag-mivd-2015.pdf2018-02-20 15:12 5.7M 
[   ]jaarverslag-mivd-2008.pdf2018-05-06 20:33 5.9M 
[   ]20141020_Hans-van-der-Meer_UvA_Syllabus-Cryptografie-voor-beta-studies_syllabus-info-s.pdf2018-05-06 20:32 5.9M 
[   ]jaarverslag-aivd-2010.pdf2018-05-06 20:32 6.0M 
[   ]20150424_US-DoD_Final_2015_DoD_CYBER_STRATEGY_for_web.pdf2018-05-06 20:33 6.2M 
[   ]jaarverslag-mivd-2014.pdf2018-05-06 20:33 6.2M 
[   ]NSA-SIGINT-style-manual_2010.pdf2018-05-06 20:32 6.5M 
[   ]20140211_h-tk-20132014-52-18.pdf2018-05-06 20:32 6.8M 
[   ]2011_DI_Style_Manual.pdf2018-05-06 20:32 7.0M 
[   ]20191218-JosWetzels-36C3_harry_potter_and_the_not_so_smart_proxy_war_36C3_wetzels_final.pdf2020-01-03 15:30 7.0M 
[   ]20191228-JosWetzels-36C3_harry_potter_and_the_not_so_smart_proxy_war_36C3_wetzels_final.pdf2020-01-03 15:30 7.0M 
[   ]20140609_DoD-CI-Definitions.pdf2018-05-06 20:32 7.0M 
[   ]20120831_adp2_0.pdf2018-05-06 20:32 7.3M 
[   ]1976_prosecutive-summary_released-by-James-Bamford-20141003.pdf2018-05-06 20:32 7.5M 
[   ]20120831_adrp2_0.pdf2018-05-06 20:32 8.0M 
[   ]20150124_MotoE_cwm6.0.4.9_recovery_MIRROR.img2018-05-06 20:33 8.0M 
[   ]20140804_ODNIstyleManual_2011_2013.pdf2018-05-06 20:32 8.2M 
[IMG]2016-Cognitive_Bias_Codex_With_Definitions,_an_Extension_of_the_work_of_John_Manoogian_by_Brian_Morrissette.jpg2018-03-03 03:25 8.2M 
[   ]20171005_US-Army-Field-Manual-FM-3-0-Operations.pdf2018-05-06 20:33 8.6M 
[   ]fortheireyesonly.pdf2018-05-06 20:32 8.7M 
[TXT]20170802-Russian-IP-blocklist-today_dump.csv2018-05-06 20:33 9.4M 
[   ]20140100_ISOC_Digital Footprints - An Internet Society Reference Framework.pdf2018-05-06 20:32 9.5M 
[   ]20121011_ResilientMilitarySystems.CyberThreat.pdf2018-05-06 20:32 10M 
[   ]jaarverslag-aivd-2012.pdf2018-05-06 20:32 11M 
[   ]nsa-sci-cybersecurity.pdf2018-05-06 20:32 11M 
[   ]fm3_12.pdf2018-05-06 20:33 12M 
[   ]2007_Critical-Thinking-and-Intelligence-Analysos_ndic_moore_crit_analysis_hires.pdf2018-05-06 20:32 12M 
[   ]20090105_USSTRATCOM_CyberWarfare_Lexicon.pdf2018-05-06 20:32 12M 
[   ]jaarverslag-aivd-1993.pdf2018-05-06 20:33 12M 
[   ]20130508-Cyber_report_final_U.pdf2018-05-06 20:32 13M 
[   ]201306_staatvdether_2012_digitaal.pdf2018-05-06 20:32 13M 
[   ]jaarverslag-aivd-1996.pdf2018-05-06 20:33 16M 
[   ]jaarverslag-aivd-1997.pdf2018-05-06 20:33 16M 
[   ]jaarverslag-aivd-1995.pdf2018-05-06 20:33 17M 
[   ]202010xx-Quote-Edmond-Fokker-MIVD.pdf2020-12-26 12:28 17M 
[   ]1976_report-on-inquiry-into-cia-related-electronic_released-by-James-Bamford-20141003.pdf2018-05-06 20:32 20M 
[   ]20150213_Catalogus-Nationale-Operaties_gids-Defensie-bijstand-hulpddiensten-civiele-autoriteiten_Catalogus+Nationale+Operaties+2015-1+opt_1.pdf2018-05-06 20:33 29M 
[   ]20130324_NCSC-lijst-van-incidenten_Bigwobber_2593_0001.pdf2018-05-06 20:32 45M 
[   ]eindrapport-privacy-scan-nw_tcm126-488190_OCR.pdf2018-05-06 20:32 61M 
[   ]1998_Operatie-Homerus_Louis-Seveke_BOEK_operatie_homerus_via-archive.squat.net.pdf2018-05-06 20:33 81M