Filtered By
GCHQ X
Agency [filter]
United States (USA/US) X
Countries Mentioned [filter]
Results
17 Total
0.0

HIMR Data Mining Research Problem Book

Document

Release Date: 2016-02-02 Document Date: 2011-09-20
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT AUS/CAN/NZ/UK/US EYES ONLY Reference: OPC-M/TECH.A/455 (v1.0, r206) Date: 20 September 2011 Copy no: HIMR Data Mining Research Problem Book OPC-MCR, G...
0.0

MHS FISINT Successfully Collects Israeli F-16 Heads Up Display

Document

Release Date: 2016-01-29 Document Date: 2008-02-01
This March 2008 post from the internal NSA newsletter SIDToday, describes the Menwith Hill station’s success in intercepting the video feeds from Israeli F-16 fighter jets and drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
TOP SECRET//COMINT/TALENT KEYHOLE// REL TO USA, FVEY published March 2008 MHS FISINT Successfully Collects Israeli F-16 Heads-Up Display (S//SI//REL) , Menwith Hill Station (F77) (S...
0.0

Assessment of Intelligence Opportunity – Juniper

Document

Release Date: 2015-12-23 Document Date: 2011-02-03
This GCHQ report dated 3 February 2011 and written by a seconded NSA staff member, alludes to the agencies’ capabilities against 13 models of firewalls produced by Juniper Networks, Inc: see the Intercept article NSA Helped British Spies Find Security Holes In Juniper Firewalls, 23 December 2015.
TOP SECRET STRAP1 ASSESSMENT OF INTELLIGENCE OPPORTUNITY - JUNIPER 03 February 2011 Executive Summary Background • Juniper Networks, Inc. headquartered in Sunnyvale, California, USA is...
0.0

Mobile apps doubleheader: BADASS Angry Birds

Document

Release Date: 2015-01-17
This undated joint GCHQ/CSEC presentation provides an overview of “exploring and exploiting leaky mobile apps”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Mobile apps doubleheader: BADASS Angry Birds From 6 weeks to 6 minutes: protocols exploitation in a rapidly changing world Exploring and Exploiting Leaky Mobile Apps with BADASS GTE/GCHQ GA...
0.0

GCHQ Analytic Cloud Challenges

Document

Release Date: 2015-09-25 Document Date: 2012-05-14
This GCHQ presentation dated 14 May 2012 describes the agency receiving “more than 50 billion events [metadata records] per day” and some of the tools available for analysing that mass of data: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
gchq-analytic-cloud-challenges-p1-normal.gif: GCHQ Analytic Cloud Challenges Innovation Lead for Data, Analytics & Visualisation Engineering This information is exempt from Disclosure unde...
0.0

The Art of Deception: Training for a New Generation of Online Covert Operations

Document

Release Date: 2014-02-25
This training presentation from GCHQ’s Human Science Operations Cell (HSOC) and Joint Threat Research Intelligence Group (JTRIG) describes the elements of “online covert action”: see the Intercept article How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, 25 February 2014.
impress SI//REL TO USA, FVEY SECRET//SI//REL TO USA, FVEY SECRET//SI//RELTO USA, FVEY SECRET//SI//RELTO USA, FVEY JTRIG Online HUMINT Strategie Influence Disru ption and CNA ...
0.0

Making Network Sense of the encryption problem

Document

Release Date: 2014-12-13 Document Date: 2011-01-01
This 2011 presentation by the head of GCHQ’s Network Analysis Centre outlines the agency’s interest in exploiting telecommunications companies, namely to “get at the data before it is encrypted”: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
TOP SECRET STRAP 2 // REL TO USA, AUS, CAN, GBR, NZL ------m/\cz NETWORK ^IM^ySIS CSfSJTRe Making Network Sense of the encryption problem Roundtable Head of GCHQ NAC This info...
0.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
0.0

QUANTUMTHEORY

Document

Release Date: 2014-03-12 Document Date: 2010-01-01
This presentation from the 2010 SIGDEV Conference describes the contribution made by GCHQ to the development of Quantum techniques: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, FVEY//20320108 TOP SECRET//COMINT//REL TO USA, FVEY//20320108 SIGDEV: Discovery in the Cyber Ag> TOP SECRET//COMINT//REL TO USA, FVEY//20320108 (U) Clas...
0.0

Cyber Offensive Session: Pushing the Boundaries and Action Against Hactivism

Document

Release Date: 2014-02-25
This undated GCHQ presentation outlines some of the tactics employed in the agency’s Effects operations: see the Intercept article How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, 25 February 2014.
Cyber Offsensive Session: Pushing the Boundaries and Action Against Hacktivism | name redacted |- Serious Crime Effects, GCHQ I NAME REDACTED ~\ - JTRIG, GCHQ JTRIG TOP SECRET//COMIN...
0.0

Private Networks are Important

Document

Release Date: 2014-05-13
This undated and redacted slide, taken from a presentation given by the NSA and GCHQ, names surveillance targets, some of which appear to be primarily economic in nature: see the book No Place To Hide, 13 May 2014.
Page 135 TOP SECRET//SI//REL TO USA, FVEY Private Networks are Important ) a Many targets use private networks. Google infrastructure SWIFT Network REDACTED REDACTED REDACTED Gazp...
0.0

Why TARMAC?

Document

Release Date: 2014-05-13
This slide from a GCHQ presentation to the 2010 Five Eyes conference outlines features of the agency’s interception of satellite traffic, based at Menwith Hill in the UK: see the book No Place To Hide, 13 May 2014.
Page 97 TOP SECRET//COMINT/REL TO USA, FVEY Why TARMAC? • MHS has a growing FORNSAT mission. - SHAREDVISION mission. - SigDev (“Difficult Signals collection”). I - ASPHALT (“Coll...
0.0

Broadcast/Intenet Radio Exploitation and Analysis

Document

Release Date: 2015-09-25 Document Date: 2009-11-06
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif: UK TOP SECRET//COMINT//REL FVEY Broadcast/lnternet Radio Exploitation and Analysis 6th November 2009 OPD-NAC Distribution (via email) (ST2) BS...
0.0

Psychology: a new kind of SIGDEV

Document

Release Date: 2014-01-27 Document Date: 2012-01-01
This GCHQ presentation from 2012 outlines the agency’s ability to monitor internet use major social media networks in real time, using tools called Squeaky Dolphin, Fire Ant and Anticrisis Girl: see the NBC News article Snowden docs reveal British spies snooped on YouTube and Facebook, 27 January 2014.
TOP SECRET//SI//REL TO USA, FVEY GCHQ Psychology A New Kind of SIGDEV Establishing the Human Science Operations Cell TOP SECRET//SI//REL TO USA, FVEY TOP SECRET//SI//REL TO USA, ...
0.0

Operational Legalities

Document

Release Date: 2015-06-22
This 78-page GCHQ presentation, repeated with speaking notes, provides a full overview of the legal and oversight framework governing the agency’s activities: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015. operational-legalities-gchq-nov-28-2008
Operational Legalities Not for display • Beware: there are several hidden slides in this presentation. If you see this you will also see the other hidden ones. • To find which are hidde...
0.0

Supporting HMG’s Climate Change Ambitions (… or, “A GCO’s tales from Cancun”)

Document

Release Date: 2014-11-01 Document Date: 2011-02-01
This joint GCHQ/MI6 presentation from February 2011 documents the process of international climate change negotiations becoming a “serious intelligence priority” for the UK: see the Dagbladet Information article Snowden documents reveal British climate espionage – Copenhagen climate summit targeted, 1 November 2014.  
GCHQ SECRET INTELLIGENCE SERVICE Supporting HMG’s Climate Change Ambitions (...or, “A GCO’s tales from Cancún”) 27 November - 10 December 2010 GCHQ SECRET INTELLI...
0.0

Network Tradecraft Advancement Team

Document

Release Date: 2014-12-04 Document Date: 2010-06-10
This GCHQ document from June 2010 describes cooperation between members of the Five Eyes alliance, particularly Canada’s CSEC, on the technical analysis of international mobile phone networks: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
Network Tradecraft Advancement Team (NTAT) 3G > 2nd SCAMP at CSEC process ■ Worked with CSEC H3 developers to implement IRASCIABLE RABBIT into OLYMPIA ■ Developed 41 use cases ■ Devel...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh