This document is a selection of presentation slides prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG), CSEC and the NSA. They describe several surveillance programs. The first of these is HACIENDA, a program that involved port…
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.
This document is an extract from an internal GCHQ presentation. It describes the operation of a traditional mobile telecommunications network, and the position of Individual Subscriber Authentication Keys (KI values) within it.
This document lists the cable interceptions desired by GCHQ. The document lists the cable's name, relationship (i.e. owner) and the desired access and egress capacities.
This document is an article from the NSA's newsletter, SIDtoday. It originally appeared in GCHQ Menwith Hill Station's newsletter, Horizon in March 2012. This article describes INTOLERANT, an effort to identify when surveillance targets are…
This document is an extract from a presentation created by the NSA's Special Source Operations (SSO) division. It describes the key operational developments in the WINDSTOP program, including the implementation of an upgrade to the XKEYSCORE tool and…
This document contains of NSA Special Source Operations slides and speaking remarks related to the MUSCULAR program. WINDSTOP is a trusted secondary component of this program. MUSCULAR involves the interception of the data flows across the fibre…