Browse Items (626 total)

20150219-Intercept-IMSIs Identified With Ki Data For Network.pdf
This document is an extract from an internal GCHQ presentation. It shows a chart describing the number of ISMI (International Mobile Subscriber Identity) numbers retrieved using encryption keys sourced from a CNE (Computer Network Exploitation)…

20140227-guard-gchq_optic.pdf
This document is a report on the development of OPTIC NERVE, a web interface used to display Yahoo Webcam images. It also describes the procedures put in place by GCHQ to control exposure to "undesirable" webcam imagery.

20141228-spiegel-explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf
This document is a presentation on a potential approach to circumventing TOR (The Onion Router) which allows users to remain anonymous on the web. The presentation explores one method of correlating TOR "exit node traffic, and traffic between client…

20150219-Intercept-CCNE Email Addresses Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It lists email addresses associated with trials aimed at extracting encryption keys and other personalized data from individual mobile phone devices. The extraction keys were retrieved…

20141125-sz-ptc_glossary.pdf
This document is a page from GCHQ's internal wiki, GCWiki. It is an extract from a glossary describing terms relating to INCENSER, a component of the GERONTIC program supplying data with assistance from Cable and Wireless using a rival company's…

20150925-intercept-crypt_discovery_activity.pdf
This document is a report prepared in conjunction between the NSA and GCHQ. It documents a collaborative plan to develop and use various surveillance tools aimed at subverting encryption technologies.

20140831-spiegel-kurdistan_regional_government.pdf
This document is a briefing by the GCHQ pertaining to the Kurdish people in Iraq. It includes definitions of the Kurds and Kurdistan, details about the decentralized governement of Iraq and the Kurdistan Regional Government (KRG), and discusses…

20150925-intercept-broadcast_analysis.pdf
This document is a report prepared by GCHQ. It outlines research and data analyses performed by the agency on users of internet radio stations using information gleaned from a variety of difference surveillance tools such as BLAZING SADDLES and KARMA…

20150803-intercept-comsat_background.pdf
This GCHQ document discusses the collaboration between the NSA and the GCHQ on initiatives in COMSAT (Communications satellites access). The report focuses on funding and budget concerns for the future of the projects.

20150622-intercept-teca_product_centre_gchq_wiki.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It outlines the products made available to intelligence analysts by The Technical Enabling Access Product Centre (TECA). TECA is a division of GCHQ focused on reverse engineering…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2