Browse Items (626 total)

20150402-Intercept-Extended Enterprise Documents.pdf
This document is an extract from a report created by GCHQ. It describes NSA activities of interest for GCHQ relating to surveillance operations against Latin America.

20140127-nyt-mobile_theme_briefing.pdf
This document is a presentation introducing the Mobile Applications Project, whereby mobile device location and application data will be collected and analysed. The project will work against mobile and core internet networks, and will provide…

20150925-intercept-legalities.pdf
This document is a chart that details the legalities of particular repositories and data sources used by both GCHQ and the NSA such as Pilbeam, Salamanca and UDAQ {UK} and Marina, Mainway and Dishfire {USA}.

20150622-intercept-malware_analysis_reverse_engineering_-_acno_skill_levels_-_gchq.pdf
This document is a list of core competencies required for GCHQ analysts working on Malware Analysis and Reverse Engineering.

20150622-intercept-operational_legalities_gchq_powerpoint_presentation.pdf
This document is an internal presentation prepared by officers at GCHQ. It establishes the legal framework of surveillance activities performed by British intelligence agencies, notably GCHQ. It also outlines the features of the BROAD OAK database…

20150925-intercept-op_highland_fling_event_log.pdf
This document from the GCHQ internal wiki presents the event log from Jan 17 2011 - Jan 19 2011 for an operation titled HIGHLAND FLING. Events in this document refer to the tracking of employees at the Netherlands-based SIM card company, Gemalto.

20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf
This is a presentation report which gives an overview of the GCHQ program for monitoring unselected TLS events over popular websites such as Facebook, Twitter and Gmail. Transport Layer Security is "cryptographic protocol designed to provide…

20150219-Intercept-IMSIs Identified With Ki Data For Network.pdf
This document is an extract from an internal GCHQ presentation. It shows a chart describing the number of ISMI (International Mobile Subscriber Identity) numbers retrieved using encryption keys sourced from a CNE (Computer Network Exploitation)…

20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf
This document contains briefing for Turkish involvement at an upcoming G20 pre-meeting and discusses objectives and targets for the occaision. Concerns include financial system stability, global trade, reform, and sustainable recovery, as well as…

20141125-sz-cable_master_list_ac.pdf
This document is a report detailing telecommunications cable access points intercepted by GCHQ.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2