This document appears to be an extract from a GCHQ wiki article. It describes Gemalto's Yuaawaa secure file sharing device, and GCHQ attempts to gain access to it.
This document is an article from the NSA's newsletter, SIDtoday. It originally appeared in GCHQ Menwith Hill Station's newsletter, Horizon in March 2012. This article describes INTOLERANT, an effort to identify when surveillance targets are…
This document is a GCHQ report detailing the cable access points utilized by GCHQ to intercept communications using the infrastructure of major British telecommunications companies.
This document is an extract from a larger piece. It gives limited information, with little context, about the GCHQ program BLACK HOLE, in regards to bulk metadata collection, processing and analysis.
This document is a policy guideline for use by GCHQ. It details what elements of online communications can be classified as "Metadata" or "Content". It also provides a content schema for data classes.
This document is an internal GCHQ Wiki article. It outlines the legal and policy frameworks informing the activities of the agency's Cyber Defence Operations. It includes a description of the various sources of different data sources, the retention…
This document is an article from GCHQ's internal wiki, GCWiki. It describes the Communications Capability Development (CCD) programme. This programme was used as a way to maintain the UK's Intercept and Communications Data capabilities throughout…
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.
This document is a report from GCHQ. It details the challenges facing the agency in managing its strategic communications intelligence requirements for 2010 and 2011
This document is a report detailing GCHQ's MILKWHITE program. This program supported the operations of the Home Office Communications Capabilites Directorate (CCD).