Results
2 Total
0.0
Intrusion Analysis / JeAC
Document
Release Date:
2015-06-22
Document Date:
2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1
Intrusion Analysis/JeAC
The IA team conducts all-source analysis both of emerging and current electronic
attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...
0.0
Cyber Defence Operations Legal and Policy
Document
Release Date:
2015-09-25
This undated page from GCHQ’s internal GCWiki shows that the agency’s usual retention periods for metadata and content can be extended for cyber defence purposes: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
cyber-defence-operations-legal-and-policy-p1-normal.gif:
TOP SECRET STRAP 1 COMINT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report
inappropriate cont...