This document is a presentation prepared by GCHQ. It describes, in broad terms, the agency's visision for their surveillance capabilities by the year 2013.
This document appears to be an extract from an internal GCHQ wiki article. It describes active operations against the SIM card manufacturer Gemalto's SIM personaliztion centers worldwide.
This document displays telecommunications data about load-sharing traffic between Iraq and R.O.W. (Turkey, Syria, Saudi Arabia, UAE, Egypt & UK) indicating a potential target: "This informal report has been issued to highlight IRAQ/UK load sharing…
This document contains two slides detailing the computer network operations programs which intercept, passively and actively, communications as they "transit the globe." Diagrams also show the "automated management and control" of surveillance…
This document is a power point presentation from the GCHQ, outlining different event analysis products, including SOCIAL ANTHROPOID, LUSTRE, SAMUEL PEPYS, and GUIDING LIGHT. It includes screen shots of query forms and result lists.
This document is an update from an internal intelligence community discussion group for media, including both the NSA and GCHQ. The topic is a summary of the main take aways of the recent IETF - Internet Engineering Task Force conference and…
This document appears to be an GCHQ analysis of "transit calls" of potential target: "This informal report has been issued to highlight a link of potential interest for tasking." Transit calls, likely tracking data/voice transmission through one…
This document is an article from GCHQ's internal Wiki, GCWiki. It provides a list of the data sources used in the social media monitoring programs HAPPY TRIGGER, LOVELY HORSE, ZOOL and TWOFACE.
This document appears to be an extract from an internal GCHQ wiki article. It describes how GCHQ made use of the SIM card manufacturer Gemalto's computer network after gaining access through a CNE (Computer Network Exploitation) attack.