Results
6 Total
0.0
TLS Trends at GCHQ
Document
Release Date:
2014-12-28
This undated GCHQ presentation explains the agency’s FLYING PIG database and its role in undermining SSL/TLS encryption: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TS//SI//REL
TLS trends at GCHQ
TS//S1//REL
TS//SI//REL
Source of data
Our TLS events come from our TLS app
- Runs on special source (approx. 200 x 10G) and
Comsat data
-Produ...
0.0
BULLRUN
Document
Release Date:
2014-12-28
This undated presentation from GCHQ’s PTD (Penetrating Target Defences) unit gives an overview of BULLRUN efforts to defeat encryption: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET STRAP1
BULLRUN
PTD Lead for Special Operations and Policy
PTD "We penetrate targets' defences."
This information is exempt from disclosure under the Freedom of Information A...
0.0
BULLRUN CoI – Briefing Sheet
Document
Release Date:
2013-09-05
This undated GCHQ document provides a classification guide for BULLRUN – NSA and GCHQ’s attempts to weaken or defeat cryptographic protocols – and specifies some of its achievements: see the ProPublica article Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security, 5 September 2013.
TOP SECRET STRAP1 COMINT
BULLRUN Col - Briefing Sheet
Introduction
1. The ability to exploit targets’ encrypted communications is extremely fragile and is
often enabled through sensiti...
0.0
Crypt Ops Data Store User Guide
Document
Release Date:
2014-12-28
This undated GCHQ document provides guidance for analysts on how to handle encrypted data: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
SECRET
Crypt Ops Data StoreUserGuide
Crypt Ops Datastore
DataStore Rota:
-Data Store to be reviewed weekly at the DataStore management meeting
The Tasking Process
Submitting a Ta...
0.0
TURMOIL GALLANTWAVE
Document
Release Date:
2014-12-28
This undated page from NSA’s internal WikiInfo describes tools for attacking VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TURMOIL GALLANTWAVE - Wikiinfo
The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEiHOLEZ/OHCON/PHOPIN/RELIDO/RELTOUSiV FVE¥ *
TOPSECRETOSIf/RELTO USA, FVEY
(U//F...
0.0
SIGINT Strategy Threads 4 and 7
Document
Release Date:
2014-12-28
Document Date:
2011-09-14
This 14 September 2011 post from the NSA internal newsletter SIDToday from the agency’s Cryptanalysis and Exploitation Services division explains why ubiquitous encryption presents a “major threat” to the agency: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
SIDToday - SIGINT Strategy Threads 4 and 7
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
• Web search
• Agency-all Emails
• SID...