This document is a report detailing the architecture of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It involves virtual private network (VPN) exploitation and GPRS tunneling protocol (GTP)…
This document is a presentation illustrating the strengths of Network Operations Centre(NOC) analysis for aiding in computer network exploitation (CNE) opertations. NOC analysis provides network maps, access points and key members of a target's…
This document is a presentation from the GCHQ's Network Analysis Centre (NAC) examining ways to use network knowledge to help bypass the use of privacy-protected encryption. The Belgacom computer network exploitation (CNE) operation is used as an…
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It states that the Network Analysis Center (NAC) helped to infiltrate the devices of the…
This presentation outlines the focus of GCHQ's developing Cyber Defence Mission. It also includes a map of the Northern Hemisphere indicating how many malware events are collected by GCHQ every day.
This presentation outlines the focus of GCHQ's developing Cyber Defence Mission. It also includes a map of the Northern Hemisphere indicating how many malware events are collected by GCHQ every day.
This document is a presentation slide describing GCHQ's ROYAL CONCIERGE program. This "SIGINT driven hotel reservation tip-off service" enables analysts to exploit hotel reservation confirmation emails to enable more directed targeting of specified…