This document is an internal GCHQ Wiki article. It outlines the legal and policy frameworks informing the activities of the agency's Cyber Defence Operations. It includes a description of the various sources of different data sources, the retention…
This document is a policy guideline for use by GCHQ. It details what elements of online communications can be classified as "Metadata" or "Content". It also provides a content schema for data classes.
This document is an extract from a larger piece. It gives limited information, with little context, about the GCHQ program BLACK HOLE, in regards to bulk metadata collection, processing and analysis.
This document is a GCHQ report detailing the cable access points utilized by GCHQ to intercept communications using the infrastructure of major British telecommunications companies.
This document is an article from the NSA's newsletter, SIDtoday. It originally appeared in GCHQ Menwith Hill Station's newsletter, Horizon in March 2012. This article describes INTOLERANT, an effort to identify when surveillance targets are…
This document appears to be an extract from a GCHQ wiki article. It describes Gemalto's Yuaawaa secure file sharing device, and GCHQ attempts to gain access to it.
This document is an internal GCHQ wiki page. It describes BLACK HOLE, a data repository holding a variety of differnent data sources including: webmail, email transfers, ftp transfers, internet browsing metadata and website logins. The document also…
This document is a report authored by a Project Manager at GCHQ. It details the technical abilities of an operation codenamed TEMPORA, an Internet Buffer capability enabling the storage of intercepted data for up to three days and metadata for up to…
This document is a GCHQ presentation that gives an overview of the internet communications collection program SOCIAL ANTHROPOID, which can track and link users to seperate events on seperate medias (ie. chat and phone).
This document is an extract from a newsletter created by GCHQ. It describes the Overhead constellation, which was a series of programs designed to collect high-priority Argentinian military and leadership communications.