This document is a presentation from the GCHQ's Network Analysis Centre (NAC) examining ways to use network knowledge to help bypass the use of privacy-protected encryption. The Belgacom computer network exploitation (CNE) operation is used as an…
This document is a presentation illustrating the strengths of Network Operations Centre(NOC) analysis for aiding in computer network exploitation (CNE) opertations. NOC analysis provides network maps, access points and key members of a target's…
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It involves virtual private network (VPN) exploitation and GPRS tunneling protocol (GTP)…
This document is a report detailing the architecture of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.
This document is a report detailing the business processes behind the operation of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.
This document is from the GCwiki, an internal information resource of the GCHQ. This entry gives an overview of the JTB team in JTAC, which is the "thematic assessment team for Islamist Attack Methodogy. The JTB team provides "all-source intelligence…
This document is an extract from a newsletter created by GCHQ's JTRIG division. It describes the planning processes behind operation QUITO, an effort to manipulate Latin American public opinion regarding the country's claims to the Falkland Islands /…