Filtered By
GCHQ X
Agency [filter]
Encryption and Cryptanalysis X
Document Topic [filter]
Results
13 Total
0.0

TLS Trends at GCHQ

Document

Release Date: 2014-12-28
This undated GCHQ presentation explains the agency’s FLYING PIG database and its role in undermining SSL/TLS encryption: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TS//SI//REL TLS trends at GCHQ TS//S1//REL TS//SI//REL Source of data Our TLS events come from our TLS app - Runs on special source (approx. 200 x 10G) and Comsat data -Produ...
0.0

BULLRUN

Document

Release Date: 2014-12-28
This undated presentation from GCHQ’s PTD (Penetrating Target Defences) unit gives an overview of BULLRUN efforts to defeat encryption: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET STRAP1 BULLRUN PTD Lead for Special Operations and Policy PTD "We penetrate targets' defences." This information is exempt from disclosure under the Freedom of Information A...
0.0

BULLRUN CoI – Briefing Sheet

Document

Release Date: 2013-09-05
This undated GCHQ document provides a classification guide for BULLRUN – NSA and GCHQ’s attempts to weaken or defeat cryptographic protocols – and specifies some of its achievements: see the ProPublica article Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security, 5 September 2013.
TOP SECRET STRAP1 COMINT BULLRUN Col - Briefing Sheet Introduction 1. The ability to exploit targets’ encrypted communications is extremely fragile and is often enabled through sensiti...
0.0

WOLFRAMITE

Document

Release Date: 2014-12-04 Document Date: 2011-03-09
This extract from a GCHQ document dated 9 March 2011 describes WOLFRAMITE, an agency project to defeat the A5/3 GSM cipher: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
TOP SECRET STRAP 1 Strategic Objective Goal/Aim Programme Outcomes Target Capability deliveries for 2011/12 Meet the Mobile Broadband challenge. • Scaling up the exploitation of handse...
0.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
0.0

Tor: Overview of Existing Techniques

Document

Release Date: 2014-12-28 Document Date: 2012-01-01
This undated GCHQ presentation indicates the agency’s Tor research efforts as of 2012: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET STRAP1 Tor: Overview of Existing Techniques (15 minutes) TOP SECRET STRAP 1 C! X R «two THIS INCDRHftTION IS EXEMPT UNDER THE FREEDOM QC I hJTOR M ATIG R FTF n -SV “Q A ...
0.0

A potential technique to deanonymise users of the TOR network (presentation)

Document

Release Date: 2014-12-28
This undated GCHQ presentation proposes a deanonymisation attack against Tor users based on the collection of data from exit nodes owned by the agency: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
UK TOP SECRET STRAP1 COMINT A potential technique to deanonymise users of the TOR network OPC-MCR, GCHQ This information is exempt from disclosure under the Freedom of Information Act 20...
0.0

A potential technique to deanonymise users of the TOR network (proposal)

Document

Release Date: 2014-12-28 Document Date: 2011-06-13
This GCHQ paper dated 13 June 2011 proposes an attack to deanonymise Tor users: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
UK TOP SECRET STRAP1 COMINT Reference: OPC-M/TECH.B/61 Date: 13 June 2011 Copy no: A potential technique to deanonymise users of the TOR network OPC-MCR, GCHQ Summary A new techn...
0.0

Crypt Ops Data Store User Guide

Document

Release Date: 2014-12-28
This undated GCHQ document provides guidance for analysts on how to handle encrypted data: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
SECRET Crypt Ops Data StoreUserGuide Crypt Ops Datastore DataStore Rota: -Data Store to be reviewed weekly at the DataStore management meeting The Tasking Process Submitting a Ta...
0.0

OPULENT PUP

Document

Release Date: 2014-12-04 Document Date: 2009-09-18
This extract from a September 2009 GCHQ document describes a project codenamed OPULENT PUP, intended to clear the way for exploitation of the A5/3 GSM cipher: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
TOP SECRET STRAP1 TALKS Pnase 2 Test & TTO Plan SMO/00007CPO/4524/P02003/000/05 18 September 2009 3.6 A5/3 crypt attack proof-of-concept demonstrator 3.6.1 Scope To successfully pr...
0.0

SSL/TLS Experiment Profile

Document

Release Date: 2014-12-28 Document Date: 2010-01-01
This GCHQ Experiment Profile from 2010 proposes a joint NSA/GCHQ trial of SSL decryption on a massive scale: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET STRAP1 Experiment Profile Experiment Name Cryptanalytic Services Experiment Reference Version Date Experiment Owner (GCHQ) Department NSA/S3/CES GCHQ/PTD Experiment Start...
0.0

VoIP NSA alias

Document

Release Date: 2014-12-28
This undated page from GCHQ’s GCWiki describes agents attending meetings of the Internet Engineering Task Force (IETF), primarily concerning emerging voice over IP technologies: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
VoIP NSA alias - GCWiki UKTOP SECRET The maximum classification allowed on GCWiki is TOP SECRET STRAP 1 COMINT. VoIP NS A alias From GCWiki Jump to: navigation, search SAMESHEET...
0.0

Tor Hidden Services: How Hidden is ‘Hidden’?

Document

Release Date: 2014-12-28
This undated GCHQ presentation describes Tor Hidden Services and potential attacks against them: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
Tor Hidden Services How Hidden is ‘Hidden’? - ICTR Network Exploitation © This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK inf...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh