Title: GCHQ NAC Business Review – October to December 2011
Release Date: 2014-12-13
Document Date: 2011-01-01
Description: This extract from a 2011 GCHQ document details progress in the operation against Belgian telecommunications company Belgacom in the final quarter of 2011: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
Document: CNE Access to BELGACOM GRX Operator: (GREEN) This work has been very
successful and has enabled not only CNE but also Crypt Ops by identifying a large
number of VPN exploitation opportunities. The NAC held a joint MyNOC with Crypt
Ops (OP SOCIALIST II) to identify the huge extent of opportunity that this work has
identified. Work continues on a reduced number of CNE requirements.
MERION ZETA (support for NEP and Crypt Ops teams): This surge - which included
contributors from other areas - was a continuation of the NAC’s involvement in the
project to exploit Belgacom’s GRX network, as required by the Mobile Theme. This
particular surge, which was completed successfully, included efforts to: identify the
mobile network operators that connect to the Belgacom network via VPN;
characterise each VPN and determine those that contain GTP: facilitate the
processing of these GTP events to enable the extraction and use of target selectors;
conduct access analysis to identify the best point of access for the key networks;
make recommendations for further sustained GTP processing.
• Successful VERACIOUS Project-enabling conducted; key requirements for upcoming work
identified, which are key to reducing risk exposure. Network Analysis on BELGACOM hugely
successful enabling exploitation.