This document contains pages from a website outlining the governmental web domains and private business sites restricted from the Joint Signals Activity (JSA) US-German intelligence partnership.
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…
This document is a report outlining GCHQ's reverse engineering operations, targeting both malicious code (i.e. malware) and non-malicious code (i.e. commercially available products and tools). The report also outlines GCHQ's understanding of the…
This document is a GCHQ project overview for the EndPoint project, a GCHQ CNE (Computer Network Exploitation) program. This document describes exploitation of Flag Telecom's linux infrastructure to retrieve weekly router monitoring webpages and perf…
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing "A5/3 enciphered GSM air-interface." The programme name is OPULENT PUP.
This document is an internal GCHQ slideshow. It documents a series of case studies of the use of the PRESTON program, used to intercept phone calls, text messages and internet data.
This document contains a selection of spreadsheets composed by GCHQ. Each spreadsheet identifies a specific UK government ministry, and contains information about the objectives of the office, and GCHQ's desired operations involving that department.…
This document is an article from GCHQ's internal Wiki, GCWiki. It describes the purpose and policies underlying the agency's HRA {Human Rights Act} audit process. The standards were designed to ensure that these audits prove that GCHQ meets the legal…
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).