Filtered By
GCHQ X
Agency [filter]
United Kingdom (GBR/GB) X
Countries Mentioned [filter]
Internal Procedures X
Document Topic [filter]
Results
22 Total
0.0

Content or Metadata?

Document

Release Date: 2015-09-25
This undated GCHQ spreadshhet clarifies how the agency categorises different aspects of intercepted communications: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
content-metadata-matrix-p1-normal.gif: UK SECRET STRAP1 COMINT AUSiCAN'NZiUMJS EYES ONLY ORCON CONTENT OR METADATA? Categorisation of aspects of intercepted communications - GCHQ policy ...
0.0

HRA auditing

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki describes the agency’s audit procedure to document compliance with the UK Human Rights Act: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
hra-auditing-p1-normal.gif: UK CONFIDENTIAL The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webtea...
0.0

Events analysis

Document

Release Date: 2015-09-25 Document Date: 2008-11-27
This GCHQ slide taken from a presentation dates 27 November 2008 confirms that agency metadata repositories can be datamined for information relating to individuals within the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
Events analysis SALAMANCA, HAUSTORIUM, THUGGEE, IMMINGLE less intrusive than communications content authorisation not needed for individuals in the UK necessity and proportionality st...
0.0

Legal Authorisation Flowcharts: TARGETING and COLLECTION

Document

Release Date: 2015-06-22 Document Date: 2008-11-01
This GCHQ document from November 2008 provides a guide to the legal authorisations required for different forms of agency activity: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
UK CONFIDENTIAL Version 6, dated 11/08 Side l The issue on GCVYeb is die definitive version; printed copies may be out of date. Terms are defined in the glossary at http w.v ope rations^'po...
0.0

Intrusion Analysis / JeAC

Document

Release Date: 2015-06-22 Document Date: 2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1 Intrusion Analysis/JeAC The IA team conducts all-source analysis both of emerging and current electronic attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...
0.0

ACNO Skill Levels: Malware Analysis & Reverse Engineering

Document

Release Date: 2015-06-22
This undated GCHQ training document details the requirements for analysts engaged in the reverse engineering of commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
SECRET ACNO Skill 12: Malware Analysis & Reverse Engineering Knowledge of: • Relevant Operating Systems. • Current trends in attack vectors & targeted applications / protocols / services...
0.0

OPA~TAS Covert Mobile Phones Policy

Document

Release Date: 2014-08-12 Document Date: 2010-06-28
These GCHQ guidelines from 23 June 2010 describe procedures for operating mobile phones overseas which are not intended to be associated with agency activity: see the Intercept article NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting, 12 August 2014.
SECRET Ref: DOT/1636/5040/102 28 June 2010 OPA~TAS Covert Mobile Phones Policy Author: Issue 1.0 Page 1 of 6 SECRET This information is exempt from disclosure under the Fr...
0.0

GCHQ Cyprus

Document

Release Date: 2015-08-03
This two-page extract from a longer, undated, GCHQ document describing its presence in Cyprus, states that “Under the ECHELON Agreement, NSA provides 50% of the funding for the SOUNDER Comsat facility”: see the Intercept article GCHQ and Me: My Life Unmasking British Eavesdroppers, 3 August 2015.
TOP SECRET STRAP1 Technical Capability 24. Improve Mission Management to ensure efficient use of our Sigint resources. The UK hubs/Access Services will continue to simplify and improve per...
0.0

Reverse Engineering

Document

Release Date: 2015-06-22 Document Date: 2011-11-18
This page taken from GCHQ’s internal GCWiki, last modified on 18 November 2011, provides some basic information on the agency’s reverse engineering efforts: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
Reverse Engineering - GCWiki UK SECRET The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam R...
0.0

GCSB access

Document

Release Date: 2015-03-06 Document Date: 2011-01-01
This extract from a 2011 GCHQ document indicates that the agency had access to satellite and full take data from South Pacific sources collected by New Zealand’s GCSB via XKeyScore: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March 2015.
I edit! GCSB access For GCSB access GCSB have given us access to their XKS deployments at IRONS AND ; a GCSB comsat site, which is rich in data for the South Pacific region. Specifically we can...
0.0

GCHQ Ministry Stakeholder Relationships spreadsheets

Document

Release Date: 2015-06-22 Document Date: 2008-01-01
This collection of 13 spreadsheets illustrates the relationship between GCHQ and various ministries within the UK government and that agency’s work is by no means restricted to matters of national security, but also extends to domestic issues: see the Intercept article Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research, 22 June […]
 Bank of England GCO Name(s) 3CHQ Top level Aim with Customer BANK MISSION Contribute to Bank decision-making on issues affecting UK economic stability. To support UK economic stability. ...
0.0

Laws on interception – Oversight – Implications for JCE

Document

Release Date: 2015-09-25
This undated GCHQ presentation includes, in its speakers notes, the statements that “We have a light oversight regime compared to [the] US” and “judicial oversight… [is] the main issue for us”: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
jce-uk-legality-context-p1-normal.gif: èâ Laws on interception Oversight Implications for JCE ^GCHQi This intormaton is exempt und« the Freedom ol ln(Ofina!iOf^^00^roiA^n^n3W> legis...
0.0

Palestinian Authority Security Forces (PASF)

Document

Release Date: 2014-08-04 Document Date: 2008-07-01
This extract from a July 2008 GCHQ reveals that the agency received information from the Palestine Authority Security Forces (PASF): see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
Since the Gaza Strip is the centre of the HAMAS organizations popularity and the site of frequent clashes between HAMAS and FATAH supporters, Israeli forces and Palestinian militants as well as...
0.0

Why TARMAC?

Document

Release Date: 2014-05-13
This slide from a GCHQ presentation to the 2010 Five Eyes conference outlines features of the agency’s interception of satellite traffic, based at Menwith Hill in the UK: see the book No Place To Hide, 13 May 2014.
Page 97 TOP SECRET//COMINT/REL TO USA, FVEY Why TARMAC? • MHS has a growing FORNSAT mission. - SHAREDVISION mission. - SigDev (“Difficult Signals collection”). I - ASPHALT (“Coll...
0.0

Access: The Vision

Document

Release Date: 2015-09-25 Document Date: 2010-07-01
This GCHQ document from July 2010 looks forward to agency goals for 2013, including the aspiration to build “the world’s biggest SIGINT engine”: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
access-the-vision-for-2013-p1-normal.gif: ACCESS: THE VISION SECRET In 2013, we will have access to, and make readily available, data of the highest value possible to facilitate cyber ope...
0.0

Operational Legalities

Document

Release Date: 2015-06-22
This 78-page GCHQ presentation, repeated with speaking notes, provides a full overview of the legal and oversight framework governing the agency’s activities: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015. operational-legalities-gchq-nov-28-2008
Operational Legalities Not for display • Beware: there are several hidden slides in this presentation. If you see this you will also see the other hidden ones. • To find which are hidde...
0.0

Legalities

Document

Release Date: 2015-09-25 Document Date: 2007-10-01
This GCHQ spreadsheet from October 2007 provides a guide to the permissibility of using named GCHQ and NSA databases and shows the absence of safeguards against exploiting the metadata of persons located in the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
As of Oct 2007 Legalities - GCHQ Databases eg Pilbeam. Salamanca, UDAQ etc in the event that both the nabo w/.<V and the location of the tar get is confirmed metadata content UK pers...
0.0

Sensitive Targeting Authorisation (STA) Reference COP5377

Document

Release Date: 2015-09-25
This internal GCHQ form, which is undated, shows the procedure UK analysts follow for surveilling, or searching through already-acquired data for information from a person or organisation in a “sensitive” location – including the British Isles: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
sensitive-targeting-authorisation-p1-normal.gif: Sensitive Targeting Authorisation (STA) Reference COP5377 STA: AUTHORITY TO TARGET AN INDIVIDUAL/ORGANISATION WITH A SENSITIVE NATIONALITY OR ...
0.0

GCHQ COMSAT Report

Document

Release Date: 2015-08-03 Document Date: 2010-07-02
This page taken from a longer 2 July 2010 GCHQ report on the state of its COMSAT capabilities (against communications satellites) confirms that “NSA has historically been a large source of funding” for this aspect of the agency’s activies: see the Intercept article GCHQ and Me: My Life Unmasking British Eavesdroppers, 3 August 2015. Download […]
SECRET MTI/00001CPO/4521/S03006/000/07 TCP-MP69-STG-001 2 July 2010 I. BACKGROUND 5. GCHQ currently owns three sites that are involved in COMSAT access: CARBOY, SOUNDER and SNICK. Thes...
0.0

TECA Product Centre

Document

Release Date: 2015-06-22 Document Date: 2011-04-28
This page from GCHQ’s internal GCWiki, last modified on 28 April 2011 provides a brief introduction to the work of the agency’s Technical Enabling Covert Access (TECA) Project Centre: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
TECA Product Centre - GCWiki TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help con...
0.0

Report on Architectural Risk 2012 – Summary

Document

Release Date: 2015-09-25 Document Date: 2012-03-12
This GCHQ report summary from 12 March 2012 discusses the impact of the move to a “end-end big data strategy” on the agency’s infrastructure: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
architecture-risk-2012-p1-normal.gif: TOP SECRET STRAP 1 Report on Architectural Risk 2012 - Summary TOP SECRET STRAP 1architecture-risk-2012-p2-normal.gif: TOP SECRET STRAP1 Introduc...
0.0

Supporting HMG’s Climate Change Ambitions (… or, “A GCO’s tales from Cancun”)

Document

Release Date: 2014-11-01 Document Date: 2011-02-01
This joint GCHQ/MI6 presentation from February 2011 documents the process of international climate change negotiations becoming a “serious intelligence priority” for the UK: see the Dagbladet Information article Snowden documents reveal British climate espionage – Copenhagen climate summit targeted, 1 November 2014.  
GCHQ SECRET INTELLIGENCE SERVICE Supporting HMG’s Climate Change Ambitions (...or, “A GCO’s tales from Cancún”) 27 November - 10 December 2010 GCHQ SECRET INTELLI...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh