Browse Items (626 total)

20150925-intercept-event_analysis.pdf
This document describes the surveillance tools SALAMANCA, HAUSTORIUM, THUGGEE and IMMINGLE at a high level of abstraction.

20141204-intercept-opulant_pup_encryption_attack.pdf
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing "A5/3 enciphered GSM air-interface." The programme name is OPULENT PUP.

20141125-sz-cne_endpoint_project_load.pdf
This document is a GCHQ project overview for the EndPoint project, a GCHQ CNE (Computer Network Exploitation) program. This document describes exploitation of Flag Telecom's linux infrastructure to retrieve weekly router monitoring webpages and perf…

20150622-intercept-software_reverse_engineering_gchq.pdf
This document is a report outlining GCHQ's reverse engineering operations, targeting both malicious code (i.e. malware) and non-malicious code (i.e. commercially available products and tools). The report also outlines GCHQ's understanding of the…

20150622-intercept-reverse_engineering_-_gchq_wiki.pdf
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…

20140618-der_spiegel-restrictions_on_the_technical_surveillance_performed_by_jsa.pdf
This document contains pages from a website outlining the governmental web domains and private business sites restricted from the Joint Signals Activity (JSA) US-German intelligence partnership.

20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
This document contains Menwith Hill Station presentation slides from the 2010 SIGINT Development Conference. The slides outline the QUANTUMTHEORY program and its sub-programs, from legacy programs to those in experimental stages.

20141125-sz-cable_regions.pdf
This document is a report listing the region, cable, location and capacity of telecommunications cables intercepted by GCHQ.

20150925-intercept-events.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It defines the word "event" in a Signals Intelligence context.

20150925-intercept-sensitive_targeting_authorisation.pdf
This document is an approval form used by the GCHQ to request surveillance approval for individuals with "a sensitive nationality or in a sensitive location." It provides details on tasking and datamining of individuals both inside and outside of the…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2