Browse Items (626 total)

20141125-sz-ptc_glossary.pdf
This document is a page from GCHQ's internal wiki, GCWiki. It is an extract from a glossary describing terms relating to INCENSER, a component of the GERONTIC program supplying data with assistance from Cable and Wireless using a rival company's…

20150925-intercept-pullthrough_steering_group_minutes.pdf
This document is meeting notes from the GCHQ PullThrough Steering Group Meeting #16. Brief descriptions and status updates are given for various bulk collection programs, such as KARMA POLICE, ORB Finder, LIGHTWOOD, SALTY OTTER and MOOSE MILK.

20150925-intercept-qfd_blackhole_technology_behind_inoc.pdf
This document is a presentation from the GCHQ Applied Research Unit. It includes images and graphs illustrating bulk web data collection, and gives an brief overview of the programs which are used to query and analyse this data.

20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf
This document is a report from the US Office of the National Director of Intelligence, titled the "Quadrenial Intelligence Community Review" (QICR). It is produced every four years as guide to long-term (10-20 years) intelligence strategic planning.…

20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf
This document is a report from the US Office of the National Director of Intelligence, titled the "Quadrenial Intelligence Community Review" (QICR). It is produced every four years as guide to long-term (10-20 years) intelligence strategic planning.…

20131211-svt-quantum_from_gchq.pdf
This document is an extract from an internal GCHQ document. It describes an example of how QUANTUM was used to target the computers of extremists in an unnamed African country through CNE (Computer Network Exploitation). QUANTUM is a suite of attack…

20140312-intercept-quantum_insert_diagrams.pdf
This document contains slides displaying the operations of the QUANTUMINSERT computer network exploitation (CNE) program. Through partner programs such as TURBINE and TURMOIL, the NSA is able to exploit target computer networks by redirecting…

20150117-spiegel-quantumtheory_is_a_set_of_technologies_allowing_man-on-the-side_interference_attacks_on_tcp-ip_connections_includes_straightbizarre_and_daredev.pdf
This document contains presentation slides from the 2010 SIGINT Development Conference outlining the QUANTUMTHEORY program and its sub-programs, from legacy to those in experimental stages.

20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
This document contains Menwith Hill Station presentation slides from the 2010 SIGINT Development Conference. The slides outline the QUANTUMTHEORY program and its sub-programs, from legacy programs to those in experimental stages.

20131126-wapo-microsoft_monkey_puzzle.pdf
This document is an email from the Development Team of MONKEY PUZZLE (GCHQ) to a Residential Integree - OPASSOS (NSA). It describes MONKEY PUZZLE, GCHQ's UTT (Unified Targeting Tool). It suggests that Yahoo, Google and Microsoft were subject to the…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2