Browse Items (626 total)

20140914-intercept-speargun_underway.pdf
This GCSB document contains one slide pertaining to the SPEARHEAD project in New Zealand, an alleged collaboration with the NSA which sought to access to underwater cable for mass surveillance puposes. The slide only says that the SPEARHEAD project…

20150305-nzherald-gcsb_sigint_development_quarterly_report_0.pdf
This document is an internal quarterly report created by New Zealand's Government Communications Security Bureau (GCSB), addressed to the Deputy Director of Signals Intelligence. It describes the agency's development of SIGINT operations against New…

20150316-intercept-gcsb_xkeyscore_search_query.pdf
This document is a view of code used to define a query using the NSA's XKEYSCORE analysis tool. The query relates to retrieve information relating to the government of the Solomon Islands.

20131126-wapo-microsoft_monkey_puzzle.pdf
This document is an email from the Development Team of MONKEY PUZZLE (GCHQ) to a Residential Integree - OPASSOS (NSA). It describes MONKEY PUZZLE, GCHQ's UTT (Unified Targeting Tool). It suggests that Yahoo, Google and Microsoft were subject to the…

20141204-intercept-auroragold_working_aid.pdf
This document is a NSA working aid for AURORAGOLD, a "team of SSG4 analysts, developers, and wireless SMEs" working on a database of Mobile Network Operators (MNO), target development, fusion of open source, licenses and commercial data within…

20140127-nbc-squeaky_dolphin.pdf
This document contains a presentation prepared by GCHQ that demonstrates the real-time monitoring of online activity, through a program called SQUEAKY DOLPHIN. This program uses data from a GCHQ unit, GTE - Global Telecoms Exploitation, which…

20131117-spiegel-royal_concierge.pdf
This document is a presentation slide describing GCHQ's ROYAL CONCIERGE program. This "SIGINT driven hotel reservation tip-off service" enables analysts to exploit hotel reservation confirmation emails to enable more directed targeting of specified…

20150622-intercept-ndist_-_gchqs_developing_cyber_defence_mission.pdf
This presentation outlines the focus of GCHQ's developing Cyber Defence Mission. It also includes a map of the Northern Hemisphere indicating how many malware events are collected by GCHQ every day.

20150622-intercept-ndist_-_gchqs_developing_cyber_defence_mission.pdf
This presentation outlines the focus of GCHQ's developing Cyber Defence Mission. It also includes a map of the Northern Hemisphere indicating how many malware events are collected by GCHQ every day.

20141214-intercept-gchq_nac_review_july_sept_2011.pdf
This document is an extract from a progress report on a GCHQ computer network exploitation operation against the Belguim telecommunications company BELGACOM. It states that the Network Analysis Center (NAC) helped to infiltrate the devices of the…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2