DocumentDocument Date: 2011-01-20Release Date: 2014-12-28
This document dated 20 January 2011 provides the research agenda for a joint NSA/GCHQ group tasked with developing “a sound understanding of the threat that encryption brings to our ability to do target discovery/development as well as devising mitigations”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December […]
TOP SECRET Crypt Discovery Joint Collaboration Activity 20 January 2011 Activity Owners [NSA GCHQ Overview Our Internet Exploitation capability is built upon our ability to eff...
DocumentDocument Date: 2012-12-31Release Date: 2014-05-13
This 31 December 2012 post from the NSA’s intranet describes the scale of the metadata records handled by the SHELLTRUMPET analysis tool: see the book No Place To Hide, 13 May 2014.
Page 100 (S//SI//REL TO USA, FVEY) SHELLTRUMPET Processes it|'s One Trillionth Metadata Record (S//SI//REL TO USA, FVEY) On December 21, 2012 SHELLTRUMPET processed its One Trillionth meta...
DocumentDocument Date: 2010-10-01Release Date: 2014-06-18
This NSA presentation from 1 October 2010 describes RAMPART-A, the agency’s “unconventional special access program”: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 19 June 2014.
RAMPART-A Project Overview 1 October 2010 TOP SECRET//COMINT//NOFORN This briefing is classified TOP SECRET//COMINT//NOF TOP SECRET//COMINT//NOFORN RAMP ART-A Overview Covern...
DocumentDocument Date: 2013-01-17Release Date: 2014-06-18
This internal NSA briefing dated 17 January 2013 describes the current state of the US-German intelligence relationship and mentions that “The BND has been working to influence the German Government to relax interpretation of the privacy laws over the long term to provide greater opportunity for intelligence sharing”: see the Der Spiegel article New NSA […]
TOP SECRET//S1//NOFORN National Security Agency/Central Security Service Information Paper 17 January 2013 Subject: (StfREL TO USA, FVEY} NS A Intelligence Relationship with Germany - B...
Afghanistan (AFG/AF), Australia (AUS/AU), Belgium (BEL/BE), Canada (CAN/CA), Denmark (DNK/DK), France (FRA/FR), Germany (DEU/DE), Italy (ITA/IT), Netherlands (NLD/NL), New Zealand (NZL/NZ), Norway (NOR/NO), Spain (ESP/ES), Sweden (SWE/SE), United Kingdom (GBR/GB), United States (USA/US)
DocumentDocument Date: 2012-07-01Release Date: 2014-07-14
This page from GCHQ’s internal GCWiki describes tools developed by the Joint Threat Research Intelligence Group and their status. The page was last edited in July 2012 and was accessed nearly 20,000 times: see the Intercept article Hacking Online Polls and Other Ways British Spies Seek to Control the Internet, 14 July 2014. jtrigall
navigation ■ Main Page ■ Help Pages ■ Wikipedia Mirror ■ Ask Me About... ■ Random page ■ Recent changes ■ Report a Problem ■ Contacts ■ GCWeb search toolbox ■ W...
AIRWOLF, EAGLE, GAMBIT, MIDDLEMAN, RADIANT, SHADOWCAT, SKYSCRAPER, SWAMP, ANGRY PIRATE, BIRDSTRIKE, BOMB BAY, BUMPERCAR, BUMPERCAR+, BURLESQUE, CLEAN SWEEP, CONCRETE DONKEY, GATEWAY, GESTATOR, GLASSBACK, GLOBAL SURGE, HACIENDA, HUSK, INTERACTION, JEDI, MINIATURE HERO, MOUTH, PHOTON TORPEDO, ROLLING THUNDER (RT), SCRAPHEAP CHALLENGE, SPRING BISHOP, SUNBLOCK, SWAMP DONKEY, UNDERPASS, WARPATH, SLIPSTREAM
DocumentDocument Date: 2011-01-01Release Date: 2014-12-13
This GCHQ presentation from 2011 provides the background to the agency’s hacking attack on Belgacom: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014. gchq-mobile-networks-in-my-noc-world
TOP SECRET STRAP 2 Mobile Networks in World Head of GCHQ NAC n/\c This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptio...