This document is a power point presentation from the GCHQ, outlining different event analysis products, including SOCIAL ANTHROPOID, LUSTRE, SAMUEL PEPYS, and GUIDING LIGHT. It includes screen shots of query forms and result lists.
This document contains two slides detailing the computer network operations programs which intercept, passively and actively, communications as they "transit the globe." Diagrams also show the "automated management and control" of surveillance…
This document displays telecommunications data about load-sharing traffic between Iraq and R.O.W. (Turkey, Syria, Saudi Arabia, UAE, Egypt & UK) indicating a potential target: "This informal report has been issued to highlight IRAQ/UK load sharing…
This document appears to be an extract from an internal GCHQ wiki article. It describes active operations against the SIM card manufacturer Gemalto's SIM personaliztion centers worldwide.
This document is a presentation prepared by GCHQ. It describes, in broad terms, the agency's visision for their surveillance capabilities by the year 2013.
This document is a report from GCHQ's internal wiki, GCWiki. It describes the status of GCHQ's MTI Access Project during the week ending February 6 2009.
This document contains a selection of spreadsheets composed by GCHQ. Each spreadsheet identifies a specific UK government ministry, and contains information about the objectives of the office, and GCHQ's desired operations involving that department.…
This document is a report that describes the introduction of an automated approach to retrieving Individual Subscriber Authentication Keys (KIs) from networks of the SIM card manufacturer Gemalto, which was compromised by a GCHQ CNE (Computer Network…
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).