Browse Items (626 total)

20141125-sz-cne_endpoint_project_load.pdf
This document is a GCHQ project overview for the EndPoint project, a GCHQ CNE (Computer Network Exploitation) program. This document describes exploitation of Flag Telecom's linux infrastructure to retrieve weekly router monitoring webpages and perf…

20150117-spiegel-process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job_0.pdf
This document is a spreadsheet containing "the collated CNE (computer network exploitation) user requirements captured by the Endpoint initiative lead." The spreadsheet lists requirements with their priority, the amount of innovation needed to…

20141214-intercept-gchq_nac_review_january_march_2012.pdf

20150219-Intercept-CNE Access to Core Mobile Networks.pdf
This document is an extract from an internal GCHQ presentation. It describes the CNE (Computer Network Exploitation) attack against the SIM card manufacturer, Gemalto.

20141214-intercept-gchq_nac_review_october_december_2011.pdf
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It involves virtual private network (VPN) exploitation and GPRS tunneling protocol (GTP)…

20141214-intercept-gchq_nac_review_july_sept_2011.pdf
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It states that the Network Analysis Center (NAC) helped to infiltrate the devices of the…

20131021-monde-close_access_sigads.pdf
This document is a NSA briefing of the close access SIGADs used by the NSA's Tailored Access Operations to perform diplomatic surveillance on embassies in New York and Washington, DC. The document also contains a glossary defining certain key SIGADs…

20141010-intercept-tarex_classification_guide.pdf
This document is a NSA classification guide for the NSA's Target Exploitation (TAREX) program. TAREX conducts worldwide signals intelligence (SIGINT) close-access operations and overt and clandestine human intelligence (HUMINT) in direct support of…

20140618-der_spiegel-guidelines_for_the_classification_of_nsa_sigint_details_1945-1967.pdf
This document is a classification guide for NSA Signals Intelligence material collected between 1945 and 1967. It also includes a glossary defining key terms used in U.S. intelligence material.

20140102-wapo-quantum_computing.pdf
This document is a classification guide for the NSA's quantum computing research program. The guide outlines the security levels of the specific aspects of the program, from an unclassified level that acknowledges the fact that the NSA conducts…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2