DocumentRelease Date: 2015-02-19 Document Date: 2010-01-01
This slide from a 2010 GCHQ presentation shows that the agency believed it had penetrated “the entire network” of GEMALTO, the world’s largest mobile SIM manufacturer: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
SECRET STRAP 1 CNE access to core mobile networks CNE access to core mobile networks - Billing servers to suppress SMS billing - Authentication servers to obtain K’s, Ki’s and OTA k...
DocumentRelease Date: 2015-02-04 Document Date: 2011-09-14
This US National Intelligence Council memo dated 14 September 2011 provides US talking points for a forthcoming NATO meeting and includes the assessment that the threat presented by Anonymous and hacktivist activity is “minimal”: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
SECRET//REL TO USA, NATO NIM/Cyber 14 September 2011 Talking Points Subject: (S//REL NATO) NATO Civilian Intelligence Council—Cyber Panel National Input A. Threat Overview (U) (U...
DocumentRelease Date: 2015-06-22 Document Date: 2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1 Intrusion Analysis/JeAC The IA team conducts all-source analysis both of emerging and current electronic attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...
DocumentRelease Date: 2014-12-13
This undated page taken from GCHQ’s internal GCWiki cites the codename LEGSPIN (highlighted) also found in an analysis of Regin malware: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014. gchq-stargate-cne-requirements
SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam Support page STA...
DocumentRelease Date: 2014-01-27 Document Date: 2010-05-28
Six slides from a 28 May 2010 GCHQ presentation on intercepting mobile phone data, describing the agency’s many tools for compromising individual handsets and weaknesses within national networks and international roaming exchanges (GRXs). Note that these are the first versions of these documents to be released online: see the Guardian article NSA and GCHQ target […]
SECRET STRAP 1 MOBILE THEME BRIEFING MAY 28 2010 MORE - mobile technologies, networks, signals & locations FASTER - developments against new mobile internet applications BETTER - ...
DocumentRelease Date: 2015-01-17
This undated NSA presentation describes techniques for detecting botnets: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
P SECRET//COMINT//REL TO USA, FVEY HIDDENSALAMANDER Alerting and Characterization of _____iyiissiQr\] CAPABILIT, ES Botnet Activity in TURMOIL Briefers: SECRET//REL TO USA, FV...
DocumentRelease Date: 2014-03-12 Document Date: 2004-09-17
In this extract from an NSA presentation dated 17 September 2004, growth for the agency’s Tailored Access Operations is envisaged to the point where “thousands” of malware implants could be managed at any one time. The agency’s aims would grow steadily more abitious over the next decade: see the Intercept article How the NSA Plans […]
(S//SI) Building the operations floor and increasing the number of break-out rooms will enable us to grow from the current average of 20-25 of these operations per day to over 100 per day and wil...
DocumentRelease Date: 2014-10-10 Document Date: 2012-02-06
This 2012 classification guide details the NSA’s human intelligence (TAREX) operations: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
SECRET//SI//NOFORN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR THE NSA/CSS TARGET EXPLOITATION (TAREX) PROGRAM 2-52 Effective Date: 6 February 2012...