Browse Items (626 total)

Preston-Architecture.pdf
This document is a report detailing the architecture of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.

20141214-intercept-gchq_nac_review_october_december_2011.pdf
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It involves virtual private network (VPN) exploitation and GPRS tunneling protocol (GTP)…

20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf
This document is a presentation illustrating the strengths of Network Operations Centre(NOC) analysis for aiding in computer network exploitation (CNE) opertations. NOC analysis provides network maps, access points and key members of a target's…

20141214-intercept-gchq_hopscotch.pdf
This document is an extract from a larger report the content of which is unclear. HOPSCOTCH is allegedly a malware program for accessing network data.

20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf
This document is a presentation from the GCHQ's Network Analysis Centre (NAC) examining ways to use network knowledge to help bypass the use of privacy-protected encryption. The Belgacom computer network exploitation (CNE) operation is used as an…

20141214-intercept-gchq_nac_review_january_march_2012.pdf

20141214-intercept-gchq_nac_review_july_sept_2011.pdf
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It states that the Network Analysis Center (NAC) helped to infiltrate the devices of the…

20150622-intercept-ndist_-_gchqs_developing_cyber_defence_mission.pdf
This presentation outlines the focus of GCHQ's developing Cyber Defence Mission. It also includes a map of the Northern Hemisphere indicating how many malware events are collected by GCHQ every day.

20150622-intercept-ndist_-_gchqs_developing_cyber_defence_mission.pdf
This presentation outlines the focus of GCHQ's developing Cyber Defence Mission. It also includes a map of the Northern Hemisphere indicating how many malware events are collected by GCHQ every day.

20131117-spiegel-royal_concierge.pdf
This document is a presentation slide describing GCHQ's ROYAL CONCIERGE program. This "SIGINT driven hotel reservation tip-off service" enables analysts to exploit hotel reservation confirmation emails to enable more directed targeting of specified…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2