Browse Items (626 total)

20150925-intercept-op_highland_fling_event_log.pdf
This document from the GCHQ internal wiki presents the event log from Jan 17 2011 - Jan 19 2011 for an operation titled HIGHLAND FLING. Events in this document refer to the tracking of employees at the Netherlands-based SIM card company, Gemalto.

20150622-intercept-operational_legalities_gchq_powerpoint_presentation.pdf
This document is an internal presentation prepared by officers at GCHQ. It establishes the legal framework of surveillance activities performed by British intelligence agencies, notably GCHQ. It also outlines the features of the BROAD OAK database…

20150622-intercept-malware_analysis_reverse_engineering_-_acno_skill_levels_-_gchq.pdf
This document is a list of core competencies required for GCHQ analysts working on Malware Analysis and Reverse Engineering.

20150925-intercept-legalities.pdf
This document is a chart that details the legalities of particular repositories and data sources used by both GCHQ and the NSA such as Pilbeam, Salamanca and UDAQ {UK} and Marina, Mainway and Dishfire {USA}.

20140127-nyt-mobile_theme_briefing.pdf
This document is a presentation introducing the Mobile Applications Project, whereby mobile device location and application data will be collected and analysed. The project will work against mobile and core internet networks, and will provide…

20150402-Intercept-Extended Enterprise Documents.pdf
This document is an extract from a report created by GCHQ. It describes NSA activities of interest for GCHQ relating to surveillance operations against Latin America.

20140224-intercept-training_for_covert_online_operations.pdf
This document is an internal GCHQ presentation prepared by the Joint Threat Intelligence Research Group (JTRIG). It describes the division's covert online operations, specifically the control, infiltration and manipulation of online communication…

20150925-intercept-cloud_developers_exchange_july_2011.pdf
This document is an internal GCHQ presentation. It document's the agency's efforts in utilizing cloud analytics to drive Signals Intelligence "canonical operations", to facilitate target discover at the "population scale" and to supprot the…

20150219-Intercept-CCNE Stats Summaries Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It provides statistics and summaries for the data identified in various mobile phone networks retrieved using compromised SIM encyption keys gained from an attack on the SIM card…

20150925-intercept-architecture_risk_2012.pdf
This document is a summary of a report prepared by GCHQ. It analyzes GCHQ's broader surveillance architecture in light of "changes in mission and changes in external environment", and how the agency should repsond to these changes over time.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2