Results
3 Total
0.0
Making Network Sense of the encryption problem
Document
Release Date:
2014-12-13
Document Date:
2011-01-01
This 2011 presentation by the head of GCHQ’s Network Analysis Centre outlines the agency’s interest in exploiting telecommunications companies, namely to “get at the data before it is encrypted”: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
TOP SECRET STRAP 2 // REL TO USA, AUS, CAN, GBR, NZL
------m/\cz
NETWORK ^IM^ySIS CSfSJTRe
Making Network Sense of
the encryption problem
Roundtable
Head of GCHQ NAC
This info...
0.0
Crypt Ops Data Store User Guide
Document
Release Date:
2014-12-28
This undated GCHQ document provides guidance for analysts on how to handle encrypted data: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
SECRET
Crypt Ops Data StoreUserGuide
Crypt Ops Datastore
DataStore Rota:
-Data Store to be reviewed weekly at the DataStore management meeting
The Tasking Process
Submitting a Ta...
0.0
Crypt Discovery Joint Collaboration Activity
Document
Release Date:
2015-09-25
Document Date:
2011-01-20
This joint NSA/GCHQ research paper dated 20 January 2011 cites encryption as a threat impacting on both agencies: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
crypt-discovery-activity-p1-normal.gif:
TOP SECRET
Crypt Discovery
Joint Collaboration Activity
20 January 2011
Activity Owners
I H/nsa
Overview
Our Internet Exploitation capabil...