This document is a presentation that outlines the OSINT fusion project, performed in tandem by contractors of the NSA and GCHQ. The OSINT fusion project aims to compile OSINT (open source intelligence) enabling analysts to further perform computer…
This document is a report on the development of OPTIC NERVE, a web interface used to display Yahoo Webcam images. It also describes the procedures put in place by GCHQ to control exposure to "undesirable" webcam imagery.
This document is an internal presentation prepared by officers at GCHQ. It establishes the legal framework of surveillance activities performed by British intelligence agencies, notably GCHQ. It also outlines the features of the BROAD OAK database…
This document is an extract from a newsletter created by GCHQ's JTRIG division. It describes the planning processes behind operation QUITO, an effort to manipulate Latin American public opinion regarding the country's claims to the Falkland Islands /…
This document is an extract from an internal NSA presentation. It outlines how NSA analysts used the data analysis tool XKEYSCORE to gain access to the talking points of the U.N. Secretary General prior to their meeting with President Barack Obama.
This document is an extract from an internal NSA presentation. It outlines how NSA analysts used the data analysis tool XKEYSCORE to gain access to the talking points of the U.N. Secretary General prior to their meeting with President Barack Obama.
This document is an article from GCHQ's internal Wiki, GCWiki. It provides a list of the data sources used in the social media monitoring programs HAPPY TRIGGER, LOVELY HORSE, ZOOL and TWOFACE.
This document is a memo composed by an official within the Signals Intelligence Directorate (SID) of the NSA. In this memo, the author describes the importance of inter-agency cooperation in sharing intelligence.
This document is a selection of slides from a GCHQ presentation describing Operation SOCIALIST, a cyber-attack against Belgacom, a partly state owned Belgian telecoms company. The presentation describes the utilization of Quantum Insert attack…