Filtered By
Computer Network Operations X
Document Topic [filter]
Internal Procedures X
Document Topic [filter]
2 Total

Intrusion Analysis / JeAC


Release Date: 2015-06-22 Document Date: 2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1 Intrusion Analysis/JeAC The IA team conducts all-source analysis both of emerging and current electronic attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...

Iran – Current Topics, Interaction with GCHQ


Release Date: 2015-02-10 Document Date: 2013-04-12
This NSA talking points memo dated 12 April 2013 notes that Iran “has demonstrated a clear ability to learn from the capabilities and actions of others”: see the Intercept article NSA Claims Iran Learned from Western Cyberattacks, 10 February 2015.
TOP SECRET//COMINT//NOFORN (U) Topic: Iran - Current Topics, Interaction with GCHQ (U) Director's Talking Points: * (TS//SI//REL TO USA, FVEY) Emphasize that we have successfully worked mu...


Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh