Results
15 Total
0.0
Mobile apps doubleheader: BADASS Angry Birds
Document
Release Date:
2015-01-17
This undated joint GCHQ/CSEC presentation provides an overview of “exploring and exploiting leaky mobile apps”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Mobile apps doubleheader: BADASS Angry Birds
From 6 weeks to 6 minutes: protocols exploitation in a rapidly changing world
Exploring and Exploiting Leaky Mobile Apps with BADASS
GTE/GCHQ GA...
0.0
ROCKRIDGE
Document
Release Date:
2015-09-03
This undated GCHQ presentation describes some of the Question Focused Databases (QFDs) developed to analyse the massive amount of raw data the agency collects from undersea cables: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
demystifying-nge-rock-ridge-p1-normal.gif:
demystifying-nge-rock-ridge-p2-normal.gif:
tr tr tr tr
Scope and Aims
Increase
maturity and
availability of
QFDs
Pull through
more QFDs
...
0.0
GCHQ Analytic Cloud Challenges
Document
Release Date:
2015-09-25
Document Date:
2012-05-14
This GCHQ presentation dated 14 May 2012 describes the agency receiving “more than 50 billion events [metadata records] per day” and some of the tools available for analysing that mass of data: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
gchq-analytic-cloud-challenges-p1-normal.gif:
GCHQ Analytic Cloud Challenges
Innovation Lead for Data, Analytics &
Visualisation Engineering
This information is exempt from Disclosure unde...
0.0
QFDs and BLACKHOLE Technology behind GCHQ/INOC
Document
Release Date:
2015-09-25
Document Date:
2009-03-01
This GCHQ presentation from March 2009 describes the BLACKHOLE database used to store raw metadata records from TEMPORA, with about 10 billion records being added each day: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
qfd-blackhole-technology-behind-inoc-p1-normal.gif:
QFDsand BLACHOLE
Technology behind GCHQ/INOCqfd-blackhole-technology-behind-inoc-p2-normal.gif:
TRAP2 COMINT
Probes Flat Store Analytic e...
0.0
TINT external
Document
Release Date:
2015-09-25
Document Date:
2009-07-01
This short extract from a July 2009 GCHQ document describes BLACK HOLE, the agency’s massive respository for unselected metadata: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
Purpose For exporting bulk, unselected metadata (in SLR format) to a repository where higher-order analytics can be carried out.
Data To/From GCHQ
Connection To/From GCHQ
Anticipated Volume V...
0.0
Full Spectrum Cyber Effects
Document
Release Date:
2014-04-04
This presentation, prepared by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) for the 2010 SIGDEV conference describes the agency’s “effects” operations – including the use of social media for propaganda purposes: see the Intercept article: The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket, 4 April 2014.
UK TOP SECRET STRAP 1
GCHQ
Full-Spectrum Cyber Effects
name redacted
jTMii Head of JTRIG
name redacted
SD Effects Lead
SIGINT Development as an enabler
for GCHQ’s “Effects” m...
0.0
Exceptionally Controlled Information (ECI) Compartments January 2013
Document
Release Date:
2014-10-10
Document Date:
2013-01-01
This NSA document from January 2013 lists the codenames of those agency activities sufficiently sensitive to qualify as “exceptionally controlled information”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.ah
CONFIDENTIAL//REL TO USA, AUS, CAN, GBR, NZL
(U) Exceptionally Controlled Information (ECI) Compartments
January 2013
ECI Name and Trigraph Organization Control Authority
AMBULANT AMB...
0.0
Black Hole Analytics
Document
Release Date:
2015-09-25
Document Date:
2009-09-01
This GCHQ briefing from September 2009 describes the tools then available to analyse metadata collected on a massive scale: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
add-sd-blackhole-p1-normal.gif:
BLACK HOLE ANALYTICS
ADD/SD briefing, September 2009
TOP SECRET STRAP 1add-sd-blackhole-p2-normal.gif:
TOP SECRET STRAP1
Contents
■ Describe the new ...
0.0
Mobile Apps – Checkpoint meeting Archives
Document
Release Date:
2016-06-07
Document Date:
2012-05-01
This page from GCHQ’s internal GCWiki, last updated on 1 May 2012 documents progress in a variety of the agency’ projects: see Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
TOP SECRET STRAP1 COMINT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content.
For GCWiki help contact: webteam Support page
Mob...
0.0
Blazing Saddles
Document
Release Date:
2015-09-25
This page from GCHQ’s internal GCWiki describes the BLAZING SADDLES tool for handling huge amounts of metadata and the specialised analysis it supports: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
blazing-saddles-tools-p1-normal.gif:
TOP SECRET STRAP 1 COMINT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report
inappropriate content.
For GCWiki h...
0.0
Data Stored in BLACK HOLE
Document
Release Date:
2015-09-25
This undated page from GCHQ’s internal GCWiki provides technical information about the agency’s BLACK HOLE repository: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
data-stored-in-black-hole-p1-normal.gif:
TOP SECRET STRAP 1 COMINT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report
inappropriate content.
For GCWi...
0.0
iPhone target analysis and exploitation with unique device identifiers
Document
Release Date:
2015-01-17
Document Date:
2010-11-12
This GCHQ research paper dated 12 November 2010 discuss some of the agency’s attacks against iPhone handsets: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET STRAP1
12th November 2010
ICTR-MCT Team (ICTR-MCT-GCHQ-dl)
MHE Team (MHETeam-GCHQ-dl)
OPDSDHQ^^^H
TEA
Benhall Records Centre
iPhone target analysis and exploitation wit...
0.0
Broadcast/Intenet Radio Exploitation and Analysis
Document
Release Date:
2015-09-25
Document Date:
2009-11-06
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif:
UK TOP SECRET//COMINT//REL FVEY
Broadcast/lnternet Radio
Exploitation and Analysis
6th November 2009
OPD-NAC
Distribution (via email)
(ST2)
BS...
Afghanistan (AFG/AF), Algeria (DZA/DZ), Argentina (ARG/AR), China (CHN/CN), Czech Republic (CZE/CZ), Egypt (EGY/EG), France (FRA/FR), Germany (DEU/DE), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Italy (ITA/IT), Japan (JPN/JP), Kazakhstan (KAZ/KZ), Mauritania (MRT/MR), Mexico (MEX/MX), Netherlands (NLD/NL), Pakistan (PAK/PK), Romania (ROU/RO), Russia (RUS/RU), Singapore (SGP/SG), South Africa (ZAF/ZA), Spain (ESP/ES), Sudan (SDN/SD), Tanzania (TZA/TZ), Ukraine (UKR/UA), United Kingdom (GBR/GB), United States (USA/US), Zimbabwe (ZWE/ZW)
0.0
Next Generation Events (NGE) – BLACK HOLE ConOp
Document
Release Date:
2015-09-25
Document Date:
2009-08-18
This GCHQ document from 18 August 2009 describes BLACK HOLE, a massive data repository, and describes how this interacts with other systems developed by the agency: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
nge-black-hole-conop-p1-normal.gif:
SECRET STRAP1
18th August 2009
Next Generation Events (NGE) - BLACK HOLE ConOp
Author:
l(TDB),|
l(TSE), I
|(TDB)
Issue Date Author Amendm...
0.0
Report on Architectural Risk 2012 – Summary
Document
Release Date:
2015-09-25
Document Date:
2012-03-12
This GCHQ report summary from 12 March 2012 discusses the impact of the move to a “end-end big data strategy” on the agency’s infrastructure: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
architecture-risk-2012-p1-normal.gif:
TOP SECRET STRAP 1
Report on Architectural
Risk 2012 - Summary
TOP SECRET STRAP 1architecture-risk-2012-p2-normal.gif:
TOP SECRET STRAP1
Introduc...