This document is a spreadsheet containing "the collated CNE (computer network exploitation) user requirements captured by the Endpoint initiative lead." The spreadsheet lists requirements with their priority, the amount of innovation needed to…
This document is a technical brief on decryption, specifically outling a "technique that can deanonymisc TOR web-browsing." TOR (The Onion Router) is "used by individuals and organisations that want to hide the originating IP address of their…
This document is a briefing by the GCHQ pertaining to the Kurdish people in Iraq. It includes definitions of the Kurds and Kurdistan, details about the decentralized governement of Iraq and the Kurdistan Regional Government (KRG), and discusses…
This document is an extract from an internal GCHQ presentation. It describes the accomplishments of an attack against the SIM card manufacturer Gemalto, retrieving encryption keys used in mobile communications.
This document is a page from GCHQ's internal wiki, GCWiki. It is an article describing the LOVELY HORSE program. This program aimed to monitor and index discussion on social media sites such as Twitter. The main targets of the program appear to have…
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing mobile devices and apps. The programme name is WOLFRAMITE.
This document contains briefing for Turkish involvement at an upcoming G20 pre-meeting and discusses objectives and targets for the occaision. Concerns include financial system stability, global trade, reform, and sustainable recovery, as well as…
This document is an extract from an internal GCHQ presentation. It shows a chart describing the number of ISMI (International Mobile Subscriber Identity) numbers retrieved using encryption keys sourced from a CNE (Computer Network Exploitation)…
This is a presentation report which gives an overview of the GCHQ program for monitoring unselected TLS events over popular websites such as Facebook, Twitter and Gmail. Transport Layer Security is "cryptographic protocol designed to provide…