Browse Items (626 total)

20150925-intercept-demystifying_nge_rock_ridge.pdf
This document is an internal GCHQ presentation. It describes ROCKRIDGE, which is a GCHQ program that seeks to improve the agency's capabilities to ingest more data and provide more comprehensive analytics utilizing the BLACK HOLE content depository.

20140404-intercept-gchq_full_spectrum_cyber_effects.pdf
This document contains GCHQ presentation slides detailing the GCHQ Full-Spectrum Cyber Effects program, presented at the 2010 SIGDEV conference. The program includes computer network attacks, computer network information operations, and social media…

20150310-Intercept-Smurf Capability Iphone.pdf
This document is an extract from an internal GCHQ presentation. It describes the existing tools used by GCHQ to intercept communications from iPhones. Programs include: WARRIOR PRIDE, DREAMY SMURF, NOSEY SMURF. TRACKER SMURF, PORUS and PARANOID…

20131004-wapo-gchq_mullenize.pdf
This document is an internal memo created by GCHQ describing Operation MULLENIZE, an attempt to distinguish othewise anonymous internet users. The agency uses "User Agent Staining" to change the way in which the user's web browser identifies itself…

20141125-sz-cables_where_we_are.pdf
This document is a report listing GCHQ's current operational telecommunications cable interceptions.

20141125-sz-cables_no_current_access.pdf
This document is a report listing the telecommunications intercepts to which GCHQ does not have adequate access.

20150925-intercept-architecture_risk_2012.pdf
This document is a summary of a report prepared by GCHQ. It analyzes GCHQ's broader surveillance architecture in light of "changes in mission and changes in external environment", and how the agency should repsond to these changes over time.

20150219-Intercept-CCNE Stats Summaries Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It provides statistics and summaries for the data identified in various mobile phone networks retrieved using compromised SIM encyption keys gained from an attack on the SIM card…

20150925-intercept-cloud_developers_exchange_july_2011.pdf
This document is an internal GCHQ presentation. It document's the agency's efforts in utilizing cloud analytics to drive Signals Intelligence "canonical operations", to facilitate target discover at the "population scale" and to supprot the…

20140224-intercept-training_for_covert_online_operations.pdf
This document is an internal GCHQ presentation prepared by the Joint Threat Intelligence Research Group (JTRIG). It describes the division's covert online operations, specifically the control, infiltration and manipulation of online communication…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2