This document is an extract from an internal GCHQ presentation. It shows a chart describing the number of ISMI (International Mobile Subscriber Identity) numbers retrieved using encryption keys sourced from a CNE (Computer Network Exploitation)…
This document is an approval form used by the GCHQ to request surveillance approval for individuals with "a sensitive nationality or in a sensitive location." It provides details on tasking and datamining of individuals both inside and outside of the…
This is a document from the internal NSA newsletter, SIDtoday, written by a representative from the Human Language Technology (HLT) research project. It discusses the agency-wide program REAL TIME (RT-10) which is a initiative that aims to provide…
This document is an entry in an internal NSA wiki. It describes the MYSTIC program, developed by Special Source Operations (SSO) for the installation of embedded collection systems into target networks. The program primarily focuses upon the…
This document is also known as United States Signals Intelligence Directive 18. It prescribes policies and procedures, and assigns responsibilities to ensure that the NSA's signals intelligence activities are aligned with the U.S. Constitution's 4th…
This document is a report created by GCHQ and the NSA's UK Satellite Station, MHS. It describes the (then) state of the video gaming industry. The potential use of this industry for recruitment into Islamic terrorist organizations is discussed, as…
This document is an extract from a NSA presentation describing the nature of the NSA's intelligence relationship with Sweden. It mentions Swedish intelligence service's assistance with the QUANTUM program.
This presentation outlines the focus of GCHQ's developing Cyber Defence Mission. It also includes a map of the Northern Hemisphere indicating how many malware events are collected by GCHQ every day.