This document is an extract from an internal GCHQ document. It describes an example of how QUANTUM was used to target the computers of extremists in an unnamed African country through CNE (Computer Network Exploitation). QUANTUM is a suite of attack…
This document is a report from the US Office of the National Director of Intelligence, titled the "Quadrenial Intelligence Community Review" (QICR). It is produced every four years as guide to long-term (10-20 years) intelligence strategic planning.…
This document is a report from the US Office of the National Director of Intelligence, titled the "Quadrenial Intelligence Community Review" (QICR). It is produced every four years as guide to long-term (10-20 years) intelligence strategic planning.…
This document is a presentation from the GCHQ Applied Research Unit. It includes images and graphs illustrating bulk web data collection, and gives an brief overview of the programs which are used to query and analyse this data.
This document is meeting notes from the GCHQ PullThrough Steering Group Meeting #16. Brief descriptions and status updates are given for various bulk collection programs, such as KARMA POLICE, ORB Finder, LIGHTWOOD, SALTY OTTER and MOOSE MILK.
This document is a page from GCHQ's internal wiki, GCWiki. It is an extract from a glossary describing terms relating to INCENSER, a component of the GERONTIC program supplying data with assistance from Cable and Wireless using a rival company's…
This document contains a presentation prepared by GCHQ that demonstrates the real-time monitoring of online activity, through a program called SQUEAKY DOLPHIN. This program uses data from a GCHQ unit, GTE - Global Telecoms Exploitation, which…
This document is an internal GCHQ presentation. It describes various operations aimed at monitoring target's activities on social media using the SQEAKY DOLPHIN and ANTICRISISGIRL applications. It also more generally describes the value of the social…
This is an extract from an internal NSA presentation. It relates to the provision of XKEYSCORE analytics program to the German BfV (Federal Office for the Protection of the Constitution).
This document contains an extract from the FY13 Congressional Budget Justification for the National Intelligence Program discussing the addition of another country to the MYSTIC program. The MYSTIC program monitors voice call metadata and content.