Browse Items (626 total)

20150219-Intercept-IMSIs Identified With Ki Data For Network.pdf
This document is an extract from an internal GCHQ presentation. It shows a chart describing the number of ISMI (International Mobile Subscriber Identity) numbers retrieved using encryption keys sourced from a CNE (Computer Network Exploitation)…

20140803-Intercept-Israel-US-1999-Agreement.pdf
This document describes the intelligence relationship between the United States and Israel.

20140831-spiegel-jordan_belgium.pdf
This document appears to be an GCHQ analysis of "transit calls" of potential target: "This informal report has been issued to highlight a link of potential interest for tasking." Transit calls, likely tracking data/voice transmission through one…

20140618-der_spiegel-restrictions_on_the_technical_surveillance_performed_by_jsa.pdf
This document contains pages from a website outlining the governmental web domains and private business sites restricted from the Joint Signals Activity (JSA) US-German intelligence partnership.

20150518_intercept_jtac-attack-methodology-team.pdf
This document is from the GCwiki, an internal information resource of the GCHQ. This entry gives an overview of the JTB team in JTAC, which is the "thematic assessment team for Islamist Attack Methodogy. The JTB team provides "all-source intelligence…

20140714-Intercept-jtrigall.pdf
This document is a page from GCHQ's internal wiki, GCWiki. This page details the SIGINT and CNE (Computer Network Exploitation) tools and programs available to the JTRIG (Joint Threat Research Intelligence Group). The document lists programs…

20150622-intercept-kaspersky_user-agent_strings_-_nsa.pdf
This document is a Report created by the NSA. It describes attempts to exploit weaknesses in anti-virus systems created by the Russian company, Kapersky Lab.

20140914-intercept-key_activities_in_progress.pdf
This document contains an excerpted and heavily redacted NSA presentation slide. Slide is a progress report from the NSA; the information provided refers the New Zealand cable access partner program, allegedly SPEARGUN, and confirms that phase 1 is…

20150604-nyt-cyber-surveillance-documents.pdf
This item is a collection of documents released by The New York Times. They cover a wide range of surveillance activities within the NSA. It includes: Extracts from a slide presentation detailing major developments in the Special Source Operations…

20140831-spiegel-kurdistan_regional_government.pdf
This document is a briefing by the GCHQ pertaining to the Kurdish people in Iraq. It includes definitions of the Kurds and Kurdistan, details about the decentralized governement of Iraq and the Kurdistan Regional Government (KRG), and discusses…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2