Browse Items (626 total)

20141204-intercept-wolframite_encryption_attack.pdf
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing mobile devices and apps. The programme name is WOLFRAMITE.

20150204-intercept-lovely_horse_0.pdf
This document is a page from GCHQ's internal wiki, GCWiki. It is an article describing the LOVELY HORSE program. This program aimed to monitor and index discussion on social media sites such as Twitter. The main targets of the program appear to have…

20150219-Intercept-CCNE Successes Jan10 Mar10 Trial.pdf
This document is an extract from an internal GCHQ presentation. It describes the accomplishments of an attack against the SIM card manufacturer Gemalto, retrieving encryption keys used in mobile communications.

20140831-spiegel-kurdistan_regional_government.pdf
This document is a briefing by the GCHQ pertaining to the Kurdish people in Iraq. It includes definitions of the Kurds and Kurdistan, details about the decentralized governement of Iraq and the Kurdistan Regional Government (KRG), and discusses…

20141228-speigel-a_potential_technique_to_deanonymise_users_of_the_tor_network_0.pdf
This document is a technical brief on decryption, specifically outling a "technique that can deanonymisc TOR web-browsing." TOR (The Onion Router) is "used by individuals and organisations that want to hide the originating IP address of their…

20150117-spiegel-process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job_0.pdf
This document is a spreadsheet containing "the collated CNE (computer network exploitation) user requirements captured by the Endpoint initiative lead." The spreadsheet lists requirements with their priority, the amount of innovation needed to…

20150622-intercept-intrusion_analysis_-_gchq.pdf
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).

20150219-Intercept-PCS Harvesting At Scale.pdf
This document is a report that describes the introduction of an automated approach to retrieving Individual Subscriber Authentication Keys (KIs) from networks of the SIM card manufacturer Gemalto, which was compromised by a GCHQ CNE (Computer Network…

20150622-intercept-gchq_ministry_stakeholder_relationships_spreadsheets.pdf
This document contains a selection of spreadsheets composed by GCHQ. Each spreadsheet identifies a specific UK government ministry, and contains information about the objectives of the office, and GCHQ's desired operations involving that department.…

20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf
This document is a report from GCHQ's internal wiki, GCWiki. It describes the status of GCHQ's MTI Access Project during the week ending February 6 2009.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2