Browse Items (626 total)

20150925-intercept-operational_engineering_november_2010_0.pdf
This document is a power point presentation from the GCHQ, outlining different event analysis products, including SOCIAL ANTHROPOID, LUSTRE, SAMUEL PEPYS, and GUIDING LIGHT. It includes screen shots of query forms and result lists.

20140312-intercept-turbine_and_turmoil.pdf
This document contains two slides detailing the computer network operations programs which intercept, passively and actively, communications as they "transit the globe." Diagrams also show the "automated management and control" of surveillance…

20141125-sz-partner_cables.pdf
This document is a GCHQ report listing their corporate partners assisting in telecommunications cable interception.

20140831-spiegel-iraq_uk_load_sharing_carriers.pdf
This document displays telecommunications data about load-sharing traffic between Iraq and R.O.W. (Turkey, Syria, Saudi Arabia, UAE, Egypt & UK) indicating a potential target: "This informal report has been issued to highlight IRAQ/UK load sharing…

20150219-Intercept-Dapino Gamma Target Personalisation Centres.pdf
This document appears to be an extract from an internal GCHQ wiki article. It describes active operations against the SIM card manufacturer Gemalto's SIM personaliztion centers worldwide.

20150925-intercept-access_vision_2013.pdf
This document is a presentation prepared by GCHQ. It describes, in broad terms, the agency's visision for their surveillance capabilities by the year 2013.

20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf
This document is a report from GCHQ's internal wiki, GCWiki. It describes the status of GCHQ's MTI Access Project during the week ending February 6 2009.

20150622-intercept-gchq_ministry_stakeholder_relationships_spreadsheets.pdf
This document contains a selection of spreadsheets composed by GCHQ. Each spreadsheet identifies a specific UK government ministry, and contains information about the objectives of the office, and GCHQ's desired operations involving that department.…

20150219-Intercept-PCS Harvesting At Scale.pdf
This document is a report that describes the introduction of an automated approach to retrieving Individual Subscriber Authentication Keys (KIs) from networks of the SIM card manufacturer Gemalto, which was compromised by a GCHQ CNE (Computer Network…

20150622-intercept-intrusion_analysis_-_gchq.pdf
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2