Browse Items (626 total)

20150117-spiegel-process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job_0.pdf
This document is a spreadsheet containing "the collated CNE (computer network exploitation) user requirements captured by the Endpoint initiative lead." The spreadsheet lists requirements with their priority, the amount of innovation needed to…

20141228-speigel-a_potential_technique_to_deanonymise_users_of_the_tor_network_0.pdf
This document is a technical brief on decryption, specifically outling a "technique that can deanonymisc TOR web-browsing." TOR (The Onion Router) is "used by individuals and organisations that want to hide the originating IP address of their…

20140831-spiegel-kurdistan_regional_government.pdf
This document is a briefing by the GCHQ pertaining to the Kurdish people in Iraq. It includes definitions of the Kurds and Kurdistan, details about the decentralized governement of Iraq and the Kurdistan Regional Government (KRG), and discusses…

20150219-Intercept-CCNE Successes Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It describes the accomplishments of an attack against the SIM card manufacturer Gemalto, retrieving encryption keys used in mobile communications.

20150204-intercept-lovely_horse_0.pdf
This document is a page from GCHQ's internal wiki, GCWiki. It is an article describing the LOVELY HORSE program. This program aimed to monitor and index discussion on social media sites such as Twitter. The main targets of the program appear to have…

20141204-intercept-wolframite_encryption_attack.pdf
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing mobile devices and apps. The programme name is WOLFRAMITE.

20141125-sz-cable_master_list_ac.pdf
This document is a report detailing telecommunications cable access points intercepted by GCHQ.

20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf
This document contains briefing for Turkish involvement at an upcoming G20 pre-meeting and discusses objectives and targets for the occaision. Concerns include financial system stability, global trade, reform, and sustainable recovery, as well as…

20150219-Intercept-IMSIs Identified With Ki Data For Network.pdf
This document is an extract from an internal GCHQ presentation. It shows a chart describing the number of ISMI (International Mobile Subscriber Identity) numbers retrieved using encryption keys sourced from a CNE (Computer Network Exploitation)…

20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf
This is a presentation report which gives an overview of the GCHQ program for monitoring unselected TLS events over popular websites such as Facebook, Twitter and Gmail. Transport Layer Security is "cryptographic protocol designed to provide…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2