Filtered By
CORINTH X
Codewords [filter]
Results
2 Total
0.0

Intrusion Analysis / JeAC

Document

Release Date: 2015-06-22 Document Date: 2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1 Intrusion Analysis/JeAC The IA team conducts all-source analysis both of emerging and current electronic attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...
0.0

PHANTOM PARROT

Document

Release Date: 2017-09-23 Document Date: 2009-05-27
This page from GCHQ’s internal GCWiki, dated 27 May 2009 describes a system for querying mobile phone information acquired during port stops: see the Intercept article Airport Police Demanded An Activist’s Passwords. He Refused. Now He Faces Prison In The UK, 23 September 2017.
UK SECRET The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam RUSSETT Support page PHANTOM PA...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh