Results
3 Total
0.0
Intrusion Analysis / JeAC
Document
Release Date:
2015-06-22
Document Date:
2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1
Intrusion Analysis/JeAC
The IA team conducts all-source analysis both of emerging and current electronic
attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...
0.0
Software reverse engineering
Document
Release Date:
2015-06-22
Document Date:
2008-07-15
This GCHQ document last updated on 15 June 2008 describes the purpose of the agency’s attempts to reverse engineer commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET
Software Reverse Engineering
Network Defence performs reverse engineering both of malicious and of non-
malicious code - i.e,.code is translated from machine-readable to human-re...
0.0
Cyber Defence Operations Legal and Policy
Document
Release Date:
2015-09-25
This undated page from GCHQ’s internal GCWiki shows that the agency’s usual retention periods for metadata and content can be extended for cyber defence purposes: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
cyber-defence-operations-legal-and-policy-p1-normal.gif:
TOP SECRET STRAP 1 COMINT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report
inappropriate cont...