Browse Items (626 total)

20131211-svt-quantum_from_gchq.pdf
This document is an extract from an internal GCHQ document. It describes an example of how QUANTUM was used to target the computers of extremists in an unnamed African country through CNE (Computer Network Exploitation). QUANTUM is a suite of attack…

20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf
This document is a report from the US Office of the National Director of Intelligence, titled the "Quadrenial Intelligence Community Review" (QICR). It is produced every four years as guide to long-term (10-20 years) intelligence strategic planning.…

20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf
This document is a report from the US Office of the National Director of Intelligence, titled the "Quadrenial Intelligence Community Review" (QICR). It is produced every four years as guide to long-term (10-20 years) intelligence strategic planning.…

20150925-intercept-qfd_blackhole_technology_behind_inoc.pdf
This document is a presentation from the GCHQ Applied Research Unit. It includes images and graphs illustrating bulk web data collection, and gives an brief overview of the programs which are used to query and analyse this data.

20150925-intercept-pullthrough_steering_group_minutes.pdf
This document is meeting notes from the GCHQ PullThrough Steering Group Meeting #16. Brief descriptions and status updates are given for various bulk collection programs, such as KARMA POLICE, ORB Finder, LIGHTWOOD, SALTY OTTER and MOOSE MILK.

20141125-sz-ptc_glossary.pdf
This document is a page from GCHQ's internal wiki, GCWiki. It is an extract from a glossary describing terms relating to INCENSER, a component of the GERONTIC program supplying data with assistance from Cable and Wireless using a rival company's…

20140127-nbc-squeaky_dolphin.pdf
This document contains a presentation prepared by GCHQ that demonstrates the real-time monitoring of online activity, through a program called SQUEAKY DOLPHIN. This program uses data from a GCHQ unit, GTE - Global Telecoms Exploitation, which…

20140218-intercept-gchq_sigdev_.pdf
This document is an internal GCHQ presentation. It describes various operations aimed at monitoring target's activities on social media using the SQEAKY DOLPHIN and ANTICRISISGIRL applications. It also more generally describes the value of the social…

20140618-der_spiegel-excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf
This is an extract from an internal NSA presentation. It relates to the provision of XKEYSCORE analytics program to the German BfV (Federal Office for the Protection of the Constitution).

20140318-wapo-adding_another_country_to_mystic_program.pdf
This document contains an extract from the FY13 Congressional Budget Justification for the National Intelligence Program discussing the addition of another country to the MYSTIC program. The MYSTIC program monitors voice call metadata and content.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2