Browse Items (626 total)

20150925-intercept-nge_black_hole_conop.pdf
This document is a report detailing the concept of BLACK HOLE for BLAZING SADDLES. This comprised a part of the NGE {Next Generation Events} Project.

20150925-intercept-jce_uk_legalities_context.pdf
This document is an internal GCHQ presentation. It describes the legal and regulatory framework that UK based intelligence services operate within. It describes key pieces of legislation, key commissions and regulatory watchdogs, and also compares…

20141125-sz-cables_where_we_want_to_be.pdf
This document lists the cable interceptions desired by GCHQ. The document lists the cable's name, relationship (i.e. owner) and the desired access and egress capacities.

20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf
This document is a GCHQ brief on the NSA BULLRUN Col - a program described as protecting "our abilities to defeat the encryption used in network communications technologies." The document outlines procedures for BULLRUN and includes a glossary of…

20150622-intercept-reverse_engineering_-_gchq_wiki.pdf
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…

20141214-intercept-gchq_stargate_cne_requirements.pdf
This document is a page from the GCWiki to facilitate planning a new file system (STARGATE) for computer network exploitation (CNE).

20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf
This document is a report describing the status of GCHQ's MTI Access Project during the week ending 28 November 2008.

20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf
This document is a report from GCHQ's internal wiki, GCWiki. It describes the status of GCHQ's MTI Access Project during the week ending June 27 2008.

20140218-intercept-gchq_sigdev_.pdf
This document is an internal GCHQ presentation. It describes various operations aimed at monitoring target's activities on social media using the SQEAKY DOLPHIN and ANTICRISISGIRL applications. It also more generally describes the value of the social…

20141125-sz-cables_where_we_are.pdf
This document is a report listing GCHQ's current operational telecommunications cable interceptions.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2