This document is an extract from an internal GCHQ presentation. It shows a chart describing the number of ISMI (International Mobile Subscriber Identity) numbers retrieved using encryption keys sourced from a CNE (Computer Network Exploitation)…
This document is a report on the development of OPTIC NERVE, a web interface used to display Yahoo Webcam images. It also describes the procedures put in place by GCHQ to control exposure to "undesirable" webcam imagery.
This document is a presentation on a potential approach to circumventing TOR (The Onion Router) which allows users to remain anonymous on the web. The presentation explores one method of correlating TOR "exit node traffic, and traffic between client…
This document is an extract from an internal GCHQ presentation. It lists email addresses associated with trials aimed at extracting encryption keys and other personalized data from individual mobile phone devices. The extraction keys were retrieved…
This document is a page from GCHQ's internal wiki, GCWiki. It is an extract from a glossary describing terms relating to INCENSER, a component of the GERONTIC program supplying data with assistance from Cable and Wireless using a rival company's…
This document is a report prepared in conjunction between the NSA and GCHQ. It documents a collaborative plan to develop and use various surveillance tools aimed at subverting encryption technologies.
This document is a briefing by the GCHQ pertaining to the Kurdish people in Iraq. It includes definitions of the Kurds and Kurdistan, details about the decentralized governement of Iraq and the Kurdistan Regional Government (KRG), and discusses…
This document is a report prepared by GCHQ. It outlines research and data analyses performed by the agency on users of internet radio stations using information gleaned from a variety of difference surveillance tools such as BLAZING SADDLES and KARMA…
This GCHQ document discusses the collaboration between the NSA and the GCHQ on initiatives in COMSAT (Communications satellites access). The report focuses on funding and budget concerns for the future of the projects.
This document is an article from GCHQ's internal Wiki, GCWiki. It outlines the products made available to intelligence analysts by The Technical Enabling Access Product Centre (TECA). TECA is a division of GCHQ focused on reverse engineering…