Chapter
GCHQ hacking of Belgacom possibly targeted mobile traffic
The GCHQ's legal computer network exploitation or hacking of Belgacom potentially aimed to attack and gain access to the routers in their international networks to intercept mobile traffic communications going through other countries.
Clips
The highly advanced Regin malware hides stolen data in the extended attributes section within a packet, while communicating back to hackers both directly and through a central hub, making it difficult to detect for years.
36:15 - 41:04 (04:48)
Summary
The highly advanced Regin malware hides stolen data in the extended attributes section within a packet, while communicating back to hackers both directly and through a central hub, making it difficult to detect for years.
ChapterGCHQ hacking of Belgacom possibly targeted mobile traffic
EpisodeEp 48: Operation Socialist
PodcastDarknet Diaries
The UK's Investigatory Powers Tribunal has found that GCHQ's hacking activities are legal and do not infringe upon individual rights.
41:04 - 43:01 (01:56)
Summary
The UK's Investigatory Powers Tribunal has found that GCHQ's hacking activities are legal and do not infringe upon individual rights. The ruling also confirmed that hacking is sometimes necessary to gather intelligence that protects society from threats.