Browse Items (626 total)

20140815-Heise-HACIENDA-Program.pdf
This document is a selection of presentation slides prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG), CSEC and the NSA. They describe several surveillance programs. The first of these is HACIENDA, a program that involved port…

20150219-Intercept-Where are These Keys.pdf
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.

20150219-Intercept-Where are These Keys.pdf
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.

20141125-sz-cables_where_we_are.pdf
This document is a report listing GCHQ's current operational telecommunications cable interceptions.

20141125-sz-cables_where_we_are.pdf
This document is a report listing GCHQ's current operational telecommunications cable interceptions.

20141125-sz-cables_where_we_want_to_be.pdf
This document lists the cable interceptions desired by GCHQ. The document lists the cable's name, relationship (i.e. owner) and the desired access and egress capacities.

20150204-intercept-who_else_is_targeting_your_target_collecting.pdf
This document is an article from the NSA's newsletter, SIDtoday. It originally appeared in GCHQ Menwith Hill Station's newsletter, Horizon in March 2012. This article describes INTOLERANT, an effort to identify when surveillance targets are…

20131104-wapo-windstop.pdf
This document is a report on the data gathered by the WINDSTOP program between December 10 2012 and January 08 2013.

20141125-sz-windstop_system_highlights.pdf
This document is an extract from a presentation created by the NSA's Special Source Operations (SSO) division. It describes the key operational developments in the WINDSTOP program, including the implementation of an upgrade to the XKEYSCORE tool and…

20131030-wapo-muscular.pdf
This document contains of NSA Special Source Operations slides and speaking remarks related to the MUSCULAR program. WINDSTOP is a trusted secondary component of this program. MUSCULAR involves the interception of the data flows across the fibre…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2