This document is an internal GCHQ presentation. It describes the legal and regulatory framework that UK based intelligence services operate within. It describes key pieces of legislation, key commissions and regulatory watchdogs, and also compares…
This document lists the cable interceptions desired by GCHQ. The document lists the cable's name, relationship (i.e. owner) and the desired access and egress capacities.
This document is a GCHQ brief on the NSA BULLRUN Col - a program described as protecting "our abilities to defeat the encryption used in network communications technologies." The document outlines procedures for BULLRUN and includes a glossary of…
This document is an article retrieved from GCHQ's internal Wiki, GCWiki. It outlines the operations of GCHQ's TEA-RE Reverse Engineering team, who provide the NSA with research and development into a variety of cyrptographic related products and…
This document is an internal GCHQ presentation. It describes various operations aimed at monitoring target's activities on social media using the SQEAKY DOLPHIN and ANTICRISISGIRL applications. It also more generally describes the value of the social…