This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It states that the Network Analysis Center (NAC) helped to infiltrate the devices of the…
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It involves virtual private network (VPN) exploitation and GPRS tunneling protocol (GTP)…
This document is an extract from an internal GCHQ presentation. It describes the CNE (Computer Network Exploitation) attack against the SIM card manufacturer, Gemalto.
This document is a spreadsheet containing "the collated CNE (computer network exploitation) user requirements captured by the Endpoint initiative lead." The spreadsheet lists requirements with their priority, the amount of innovation needed to…
This document is a GCHQ project overview for the EndPoint project, a GCHQ CNE (Computer Network Exploitation) program. This document describes exploitation of Flag Telecom's linux infrastructure to retrieve weekly router monitoring webpages and perf…
This document is a report from the NSA's TAO (Tailer Access Operations) CT10 Pilot Project, on the inclusion of (CNE) computer network exploitation data. The report gives the current status of the project, near and short term goals, and challenges.
This document is a NSA release announcing the NSA International Security Issues collaboration success in acheiving the "first-ever computer network exploitation against Turkish leadership."
This document is a chart showing the varied sources of 103 "accesses" to communications or computers collected in a single week in 2009 at the NSA's station in San Antonio, Texas.
This document is an extract from a newsletter created by GCHQ. It describes the Overhead constellation, which was a series of programs designed to collect high-priority Argentinian military and leadership communications.