Browse Items (626 total)

20140618-der_spiegel-restrictions_on_the_technical_surveillance_performed_by_jsa.pdf
This document contains pages from a website outlining the governmental web domains and private business sites restricted from the Joint Signals Activity (JSA) US-German intelligence partnership.

20150622-intercept-reverse_engineering_-_gchq_wiki.pdf
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…

20150622-intercept-software_reverse_engineering_gchq.pdf
This document is a report outlining GCHQ's reverse engineering operations, targeting both malicious code (i.e. malware) and non-malicious code (i.e. commercially available products and tools). The report also outlines GCHQ's understanding of the…

20141125-sz-cne_endpoint_project_load.pdf
This document is a GCHQ project overview for the EndPoint project, a GCHQ CNE (Computer Network Exploitation) program. This document describes exploitation of Flag Telecom's linux infrastructure to retrieve weekly router monitoring webpages and perf…

20141204-intercept-opulant_pup_encryption_attack.pdf
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing "A5/3 enciphered GSM air-interface." The programme name is OPULENT PUP.

20150925-intercept-event_analysis.pdf
This document describes the surveillance tools SALAMANCA, HAUSTORIUM, THUGGEE and IMMINGLE at a high level of abstraction.

Preston-Study.pdf
This document is an internal GCHQ slideshow. It documents a series of case studies of the use of the PRESTON program, used to intercept phone calls, text messages and internet data.

20150622-intercept-gchq_ministry_stakeholder_relationships_spreadsheets.pdf
This document contains a selection of spreadsheets composed by GCHQ. Each spreadsheet identifies a specific UK government ministry, and contains information about the objectives of the office, and GCHQ's desired operations involving that department.…

20150925-intercept-hra_auditing.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It describes the purpose and policies underlying the agency's HRA {Human Rights Act} audit process. The standards were designed to ensure that these audits prove that GCHQ meets the legal…

20150622-intercept-intrusion_analysis_-_gchq.pdf
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2