Browse Items (626 total)

20150925-intercept-access_vision_2013.pdf
This document is a presentation prepared by GCHQ. It describes, in broad terms, the agency's visision for their surveillance capabilities by the year 2013.

20150219-Intercept-Dapino Gamma Target Personalisation Centres.pdf
This document appears to be an extract from an internal GCHQ wiki article. It describes active operations against the SIM card manufacturer Gemalto's SIM personaliztion centers worldwide.

20140831-spiegel-iraq_uk_load_sharing_carriers.pdf
This document displays telecommunications data about load-sharing traffic between Iraq and R.O.W. (Turkey, Syria, Saudi Arabia, UAE, Egypt & UK) indicating a potential target: "This informal report has been issued to highlight IRAQ/UK load sharing…

20141125-sz-partner_cables.pdf
This document is a GCHQ report listing their corporate partners assisting in telecommunications cable interception.

20140312-intercept-turbine_and_turmoil.pdf
This document contains two slides detailing the computer network operations programs which intercept, passively and actively, communications as they "transit the globe." Diagrams also show the "automated management and control" of surveillance…

20150925-intercept-operational_engineering_november_2010_0.pdf
This document is a power point presentation from the GCHQ, outlining different event analysis products, including SOCIAL ANTHROPOID, LUSTRE, SAMUEL PEPYS, and GUIDING LIGHT. It includes screen shots of query forms and result lists.

20141228-spiegel-description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf
This document is an update from an internal intelligence community discussion group for media, including both the NSA and GCHQ. The topic is a summary of the main take aways of the recent IETF - Internet Engineering Task Force conference and…

20140831-spiegel-jordan_belgium.pdf
This document appears to be an GCHQ analysis of "transit calls" of potential target: "This informal report has been issued to highlight a link of potential interest for tasking." Transit calls, likely tracking data/voice transmission through one…

20150204-intercept-open_source_for_cyber_defence_progress.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It provides a list of the data sources used in the social media monitoring programs HAPPY TRIGGER, LOVELY HORSE, ZOOL and TWOFACE.

20150219-Intercept-Dapino Gamma CNE Presence Wiki.pdf
This document appears to be an extract from an internal GCHQ wiki article. It describes how GCHQ made use of the SIM card manufacturer Gemalto's computer network after gaining access through a CNE (Computer Network Exploitation) attack.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2