Browse Items (626 total)

20150925-intercept-crypt_discovery_activity.pdf
This document is a report prepared in conjunction between the NSA and GCHQ. It documents a collaborative plan to develop and use various surveillance tools aimed at subverting encryption technologies.

20141125-sz-ptc_glossary.pdf
This document is a page from GCHQ's internal wiki, GCWiki. It is an extract from a glossary describing terms relating to INCENSER, a component of the GERONTIC program supplying data with assistance from Cable and Wireless using a rival company's…

20150219-Intercept-CCNE Email Addresses Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It lists email addresses associated with trials aimed at extracting encryption keys and other personalized data from individual mobile phone devices. The extraction keys were retrieved…

20141228-spiegel-explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf
This document is a presentation on a potential approach to circumventing TOR (The Onion Router) which allows users to remain anonymous on the web. The presentation explores one method of correlating TOR "exit node traffic, and traffic between client…

20140227-guard-gchq_optic.pdf
This document is a report on the development of OPTIC NERVE, a web interface used to display Yahoo Webcam images. It also describes the procedures put in place by GCHQ to control exposure to "undesirable" webcam imagery.

20150219-Intercept-IMSIs Identified With Ki Data For Network.pdf
This document is an extract from an internal GCHQ presentation. It shows a chart describing the number of ISMI (International Mobile Subscriber Identity) numbers retrieved using encryption keys sourced from a CNE (Computer Network Exploitation)…

20150925-intercept-sensitive_targeting_authorisation.pdf
This document is an approval form used by the GCHQ to request surveillance approval for individuals with "a sensitive nationality or in a sensitive location." It provides details on tasking and datamining of individuals both inside and outside of the…

20150925-intercept-events.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It defines the word "event" in a Signals Intelligence context.

20141125-sz-cable_regions.pdf
This document is a report listing the region, cable, location and capacity of telecommunications cables intercepted by GCHQ.

20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
This document contains Menwith Hill Station presentation slides from the 2010 SIGINT Development Conference. The slides outline the QUANTUMTHEORY program and its sub-programs, from legacy programs to those in experimental stages.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2