Filtered By
GCHQ X
Agency [filter]
United Kingdom (GBR/GB) X
Countries Mentioned [filter]
Internet Content X
Document Topic [filter]
Results
12 Total
0.0

HIMR Data Mining Research Problem Book

Document

Release Date: 2016-02-02 Document Date: 2011-09-20
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT AUS/CAN/NZ/UK/US EYES ONLY Reference: OPC-M/TECH.A/455 (v1.0, r206) Date: 20 September 2011 Copy no: HIMR Data Mining Research Problem Book OPC-MCR, G...
0.0

PullThrough Steering Group Meeting #16

Document

Release Date: 2015-09-25 Document Date: 2008-02-29
This set of GCHQ minutes from 29 February 2008 describes a set of tools that were under development at that point, including the metadata analysis tool KARMA POLICE: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
pull-through-steering-group-minutes-p1-normal.gif: TOP SECRET STRAP1 THQ/1202THQ/1900/0058 29 February 2008 PullThrough Steering Group Meeting #16 29 February 2008. Distribute to: In...
0.0

XKeyScoreTabs XKS Development

Document

Release Date: 2014-06-18
This page from GCHQ’s internal GCWiki provides a guide to the NSA’s XKeyScore tool: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
XKeyscoreTabs XKS Development Jump to: navigation. search N BWS Getting __ . I Using an ---- „ XKevscure Account Training XKS Development XKS Cuntacts Requirem...
0.0

PRESTON Business Processes

Document

Release Date: 2016-06-07 Document Date: 2007-05-08
This GCHQ document dated 8 May 2007 provides technical information about PRESTON, the British system for intercepting the communications of targets under warrant: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
SECRET STRAP 1 PRESTON Business Processes Sigmod/00003CPO/4502/SIG010900/23 8 May 2007 PRESTON Business Processes Version 1.0 Synopsis The purpose of this document is to present ...
0.0

Artemis DGO and DOC Special

Document

Release Date: 2016-06-07 Document Date: 2009-01-01
This extract from a 2009 GCHQ presentation includes a report on PRESTON, the agency’s programme for intercepting the communications of individuals or organisations who are subject to surveillance warrants. The report found that, in one six-month period, 97% of such communications had not been viewed by the authorities: see the Intercept article Facing Data Deluge, […]
TOP SECRET STRAP 1 DGO and DOC Special TOP SECRET STRAP 1 This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other...
0.0

GCSB access

Document

Release Date: 2015-03-06 Document Date: 2011-01-01
This extract from a 2011 GCHQ document indicates that the agency had access to satellite and full take data from South Pacific sources collected by New Zealand’s GCSB via XKeyScore: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March 2015.
I edit! GCSB access For GCSB access GCSB have given us access to their XKS deployments at IRONS AND ; a GCSB comsat site, which is rich in data for the South Pacific region. Specifically we can...
0.0

Mobile Apps – Checkpoint meeting Archives

Document

Release Date: 2016-06-07 Document Date: 2012-05-01
This page from GCHQ’s internal GCWiki, last updated on 1 May 2012 documents progress in a variety of the agency’ projects: see Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam Support page Mob...
0.0

Cable Master List

Document

Release Date: 2014-11-25 Document Date: 2009-07-27
These July 2009 documents provide a full list of the fibre-optic cables GCHQ had access to at that point, including details of location, bandwidth and corporate partners: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. […]
partner_cables.pdf:  Partner Cable UK? REMEDY GERONTIC DACRON LITTLE PINNAGE STREET CAR VITREOUS Apolo UK IRU/LC DCO IRU/LC IRU/LC IRU/LC CANTAT 3 UK DCO IRU/LC Concerto UK D...
0.0

ISUAV Video Descrambling

Document

Release Date: 2016-01-29 Document Date: 2008-01-01
This GCHQ manual from 2008 explains how analysts would unscramble the video signals from Israeli drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
SECRET ISUAV Video Descrambling Author: vereîon^ra Introduction Analogue video from Israeli UAVs has been intercepted in both clear (i.e. unencrypted) and scrambled (i.e. encrypted...
0.0

Broadcast/Intenet Radio Exploitation and Analysis

Document

Release Date: 2015-09-25 Document Date: 2009-11-06
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif: UK TOP SECRET//COMINT//REL FVEY Broadcast/lnternet Radio Exploitation and Analysis 6th November 2009 OPD-NAC Distribution (via email) (ST2) BS...
0.0

GCHQ’s Developing Cyber Defence Mission

Document

Release Date: 2015-06-22
These undated slides from GCHQ’s National Defence Intelligence and Security Team claim that the agency collects “around 100,000,000 malware events per day”: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
GCHQ's developing Cyber Defence Mission Reduce vulnerability Reduce harm Enable prosperity TOP SECRET 5EYES The Cyber Defence Mission Support national situational awareness - Supp...
0.0

Supporting Internet Operations

Document

Release Date: 2015-09-25 Document Date: 2009-01-01
This GCHQ presentation from 2010 describes the extent of the agency’s cable-tapping and plans for the future: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
200g-iris-access-p1-normal.gif: Supporting Internet Operations Supporting Internet Operations Special Source Access200g-iris-access-p2-normal.gif: StEPM—O MamiOpi«HM> 15 mins to cover:...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh