Browse Items (626 total)

20140714-Intercept-jtrigall.pdf
This document is a page from GCHQ's internal wiki, GCWiki. This page details the SIGINT and CNE (Computer Network Exploitation) tools and programs available to the JTRIG (Joint Threat Research Intelligence Group). The document lists programs…

20150219-Intercept-Where are These Keys.pdf
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.

20150803-intercept-comsat_cyrpus_technical_capability.pdf
This document is an excerpt from a draft report produced by the GCHQ. It discusses the NSA/GCHQ operations in Cyprus, their technical capabilities, current initatives in COMSAT (communications satellite access), funding, governance, and facility…

20131211-svt-quantum_from_gchq.pdf
This document is an extract from an internal GCHQ document. It describes an example of how QUANTUM was used to target the computers of extremists in an unnamed African country through CNE (Computer Network Exploitation). QUANTUM is a suite of attack…

20150219-Intercept-CNE Access to Core Mobile Networks.pdf
This document is an extract from an internal GCHQ presentation. It describes the CNE (Computer Network Exploitation) attack against the SIM card manufacturer, Gemalto.

20140128-guard-leaky_phone_apps.pdf
This document contain extracts from presentations by the NSA and GCHQ describing programs for mobile device tracking and surveillance. The slides outline the surveillance and collection capabilities for accessing mobile devices, which include:…

20150219-Intercept-Dapino Gamma CNE Presence Wiki.pdf
This document appears to be an extract from an internal GCHQ wiki article. It describes how GCHQ made use of the SIM card manufacturer Gemalto's computer network after gaining access through a CNE (Computer Network Exploitation) attack.

20150204-intercept-open_source_for_cyber_defence_progress.pdf
This document is an article from GCHQ's internal Wiki, GCWiki. It provides a list of the data sources used in the social media monitoring programs HAPPY TRIGGER, LOVELY HORSE, ZOOL and TWOFACE.

20140831-spiegel-jordan_belgium.pdf
This document appears to be an GCHQ analysis of "transit calls" of potential target: "This informal report has been issued to highlight a link of potential interest for tasking." Transit calls, likely tracking data/voice transmission through one…

20141228-spiegel-description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf
This document is an update from an internal intelligence community discussion group for media, including both the NSA and GCHQ. The topic is a summary of the main take aways of the recent IETF - Internet Engineering Task Force conference and…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2