Filtered By
EREPO X
Codewords [filter]
Top Secret X
Classification [filter]
Results
5 Total
0.0

CNE End Point Requirements

Document

Release Date: 2015-01-17
This undated GCHQ reference document enumerates the processes and tools analysts use for computer network exploitation: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET STRAP1 COMINT CNE End Point Requirements CATEGORY O Experimt O Refinemer O Bug Fix O ALL REQTYPE O Capability O Convergenc O Query O Taskir O Viewe Oall PRIOR...
0.0

Mobile Apps – Checkpoint meeting Archives

Document

Release Date: 2016-06-07 Document Date: 2012-05-01
This page from GCHQ’s internal GCWiki, last updated on 1 May 2012 documents progress in a variety of the agency’ projects: see Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam Support page Mob...
0.0

Mobile Networks in MyNOC World

Document

Release Date: 2014-12-13 Document Date: 2011-01-01
This GCHQ presentation from 2011 provides the background to the agency’s hacking attack on Belgacom: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014. gchq-mobile-networks-in-my-noc-world
TOP SECRET STRAP 2 Mobile Networks in World Head of GCHQ NAC n/\c This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptio...
0.0

SIGNIT Development Forum (SDF) Minutes

Document

Release Date: 2015-03-10 Document Date: 2009-06-09
These intenal NSA minutes from a meeting that took place on 8 June 2009 discuss GCSB activities and interoperability between NSA systems: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL SIGINT Development Forum (SDF) Minutes Location: NSA-W Date: 8-9 June 2009 8 June 2009 Developments in SD - NSA 5 key imperatives f...
0.0

Computer Network Exploitation

Document

Release Date: 2018-02-17
This undated GCHQ presentation gives an overview of the agency’s use of hacking techniques, including an explanation of what it perceived the legal position to be at the time: see the Intercept
TOP SECRET STRAP1 Contents • What is CNE? • Why do CNE? • CNE Teams • Partners • Challenges • Contacts PTD "We penetrate targets' defences." This information is exempt un...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh