Browse Items (626 total)

20141125-sz-cables_no_current_access.pdf
This document is a report listing the telecommunications intercepts to which GCHQ does not have adequate access.

20141125-sz-cables_where_we_are.pdf
This document is a report listing GCHQ's current operational telecommunications cable interceptions.

20131004-wapo-gchq_mullenize.pdf
This document is an internal memo created by GCHQ describing Operation MULLENIZE, an attempt to distinguish othewise anonymous internet users. The agency uses "User Agent Staining" to change the way in which the user's web browser identifies itself…

20150310-Intercept-Smurf Capability Iphone.pdf
This document is an extract from an internal GCHQ presentation. It describes the existing tools used by GCHQ to intercept communications from iPhones. Programs include: WARRIOR PRIDE, DREAMY SMURF, NOSEY SMURF. TRACKER SMURF, PORUS and PARANOID…

20140404-intercept-gchq_full_spectrum_cyber_effects.pdf
This document contains GCHQ presentation slides detailing the GCHQ Full-Spectrum Cyber Effects program, presented at the 2010 SIGDEV conference. The program includes computer network attacks, computer network information operations, and social media…

20150925-intercept-demystifying_nge_rock_ridge.pdf
This document is an internal GCHQ presentation. It describes ROCKRIDGE, which is a GCHQ program that seeks to improve the agency's capabilities to ingest more data and provide more comprehensive analytics utilizing the BLACK HOLE content depository.

20150505_intercept_wg-advice-to-security-service.pdf
This document is an assessment report from the SIRDCC Speech Technology Working Group on the current state of speech to text (STT) technology. The working group was established by the Securiy Service and the GCHQ. The report discusses competing…

20130605-guard-verizon_215_secondary_order.pdf
This document contains a court order signed by the judge of the Foreign Intelligence Surveillance Court, Roger Vinson. The order compels the telecommunications company Verizon to produce "tangible things" to the National Security Agency. These…

20140630-WaPo-fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf
This document is a court order originating from the Foreign Intelligence Surveillance Court, signed by judge John D. Bates. It determines that the certification included in Docket Number 702(i)-10-02 is consistent with the Foreign Intelligence…

20150117-spiegel-sample_code_of_a_malware_program_from_the_five_eyes_alliance.pdf
This document contains code for the malware program QWERTY which, as part of the CNO program WARRIORPRIDE, collects the key strokes of an infected computer. Der Spiegel is releasing the code, found in the Snowden document collection, "in order to…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2