This document is meeting notes from the GCHQ PullThrough Steering Group Meeting #16. Brief descriptions and status updates are given for various bulk collection programs, such as KARMA POLICE, ORB Finder, LIGHTWOOD, SALTY OTTER and MOOSE MILK.
This document is a page from GCHQ's internal Wiki, GCWiki. It describes GCHQ's BLAZING SADDLES program. This is the TDB portion of the second pilot of the Next Generation Events Program under the Better Analysis Programme. The primary purpose of…
This document is an internal GCHQ presentation. It describes the agency's efforts to scale their surveillance activity using data stores at various GCHQ sites across the UK.
This document is a presentation from the GCHQ on the capabilities, sensitivities and protocol of the cryptanalytical BULLRUN project - which "covers the ability to defeat encryption used in specific network communications," such as VPN, SSH, TLS/SSL,…
This document is an extract from an internal GCHQ presentation. It provides an example of an email harvested using SIM encryption keys compromised in a CNE attack on the SIM card manufacturer, Gemalto.
This document is a memo detailing the composition and operations of GCHQ's Intrusion Analysis (IA) team. It forms part of the Joint Electronic Attack Cell (JeAC).
This document is an article from GCHQ's internal Wiki, GCWiki. It describes the purpose and policies underlying the agency's HRA {Human Rights Act} audit process. The standards were designed to ensure that these audits prove that GCHQ meets the legal…
This document contains a selection of spreadsheets composed by GCHQ. Each spreadsheet identifies a specific UK government ministry, and contains information about the objectives of the office, and GCHQ's desired operations involving that department.…
This document is an internal GCHQ slideshow. It documents a series of case studies of the use of the PRESTON program, used to intercept phone calls, text messages and internet data.