This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing "A5/3 enciphered GSM air-interface." The programme name is OPULENT PUP.
This document is a GCHQ project overview for the EndPoint project, a GCHQ CNE (Computer Network Exploitation) program. This document describes exploitation of Flag Telecom's linux infrastructure to retrieve weekly router monitoring webpages and perf…
This document is a report outlining GCHQ's reverse engineering operations, targeting both malicious code (i.e. malware) and non-malicious code (i.e. commercially available products and tools). The report also outlines GCHQ's understanding of the…
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…
This document contains pages from a website outlining the governmental web domains and private business sites restricted from the Joint Signals Activity (JSA) US-German intelligence partnership.
This document contains Menwith Hill Station presentation slides from the 2010 SIGINT Development Conference. The slides outline the QUANTUMTHEORY program and its sub-programs, from legacy programs to those in experimental stages.
This document is an approval form used by the GCHQ to request surveillance approval for individuals with "a sensitive nationality or in a sensitive location." It provides details on tasking and datamining of individuals both inside and outside of the…