This document is a GCHQ report detailing the cable access points utilized by GCHQ to intercept communications using the infrastructure of major British telecommunications companies.
This document is an extract from a GCHQ programme report that discusses decryption research and development for accessing "A5/3 enciphered GSM air-interface." The programme name is OPULENT PUP.
This document is a presentation on a potential approach to circumventing TOR (The Onion Router) which allows users to remain anonymous on the web. The presentation explores one method of correlating TOR "exit node traffic, and traffic between client…
This document is a technical brief on decryption, specifically outling a "technique that can deanonymisc TOR web-browsing." TOR (The Onion Router) is "used by individuals and organisations that want to hide the originating IP address of their…
This document is a DSD presentation describing Australia's Defence Signals Directorates' (now the Australian Signals Directorate) efforts to intercept the communications of various Indonesian politicians, including the president, Susilo Bambang…
This document is an extract of a presentation discussing the collaboration between CSE, NSA and GSHQ on various aspects of signals intelligence, including VPN exploitation, network intelligence, IP analysis, and IR21 processing.
This document is an excerpt from the United States Intelligence Community 2013 "Black Budget". This secret budget was used to describe covert programs. This extract describes the Special Source Operations (SSO) project, designed to assist the…
This document is an extract from the 2013 "Black Budget", a budget covering expenses related to the Unites States Intelligence Community's covert operations and programs. This extract describes the Foreign Partner Access Program, comprised of the…
This document is a report from GCHQ. It details the challenges facing the agency in managing its strategic communications intelligence requirements for 2010 and 2011