Browse Items (626 total)

20141214-intercept-gchq_nac_review_july_sept_2011.pdf
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It states that the Network Analysis Center (NAC) helped to infiltrate the devices of the…

20141214-intercept-gchq_nac_review_october_december_2011.pdf
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It involves virtual private network (VPN) exploitation and GPRS tunneling protocol (GTP)…

20150219-Intercept-CNE Access to Core Mobile Networks.pdf
This document is an extract from an internal GCHQ presentation. It describes the CNE (Computer Network Exploitation) attack against the SIM card manufacturer, Gemalto.

20141214-intercept-gchq_nac_review_january_march_2012.pdf

20150117-spiegel-process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job_0.pdf
This document is a spreadsheet containing "the collated CNE (computer network exploitation) user requirements captured by the Endpoint initiative lead." The spreadsheet lists requirements with their priority, the amount of innovation needed to…

20141125-sz-cne_endpoint_project_load.pdf
This document is a GCHQ project overview for the EndPoint project, a GCHQ CNE (Computer Network Exploitation) program. This document describes exploitation of Flag Telecom's linux infrastructure to retrieve weekly router monitoring webpages and perf…

20150117-spiegel-nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf
This document is a report from the NSA's TAO (Tailer Access Operations) CT10 Pilot Project, on the inclusion of (CNE) computer network exploitation data. The report gives the current status of the project, near and short term goals, and challenges.

20140831-spiegel-collaboration_in_overdrive.pdf
This document is a NSA release announcing the NSA International Security Issues collaboration success in acheiving the "first-ever computer network exploitation against Turkish leadership."

20131104-nyt-collection_accesses.pdf
This document is a chart showing the varied sources of 103 "accesses" to communications or computers collected in a single week in 2009 at the NSA's station in San Antonio, Texas.

20150402-Intercept-Comet News March 2010.pdf
This document is an extract from a newsletter created by GCHQ. It describes the Overhead constellation, which was a series of programs designed to collect high-priority Argentinian military and leadership communications.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2