Results
15 Total
0.0
ROCKRIDGE
Document
Release Date:
2015-09-03
This undated GCHQ presentation describes some of the Question Focused Databases (QFDs) developed to analyse the massive amount of raw data the agency collects from undersea cables: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
demystifying-nge-rock-ridge-p1-normal.gif:
demystifying-nge-rock-ridge-p2-normal.gif:
tr tr tr tr
Scope and Aims
Increase
maturity and
availability of
QFDs
Pull through
more QFDs
...
0.0
GCHQ Analytic Cloud Challenges
Document
Release Date:
2015-09-25
Document Date:
2012-05-14
This GCHQ presentation dated 14 May 2012 describes the agency receiving “more than 50 billion events [metadata records] per day” and some of the tools available for analysing that mass of data: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
gchq-analytic-cloud-challenges-p1-normal.gif:
GCHQ Analytic Cloud Challenges
Innovation Lead for Data, Analytics &
Visualisation Engineering
This information is exempt from Disclosure unde...
0.0
Next Generation Events
Document
Release Date:
2015-09-25
Document Date:
2009-03-23
This GCHQ presentation from 23 March 2009 discusses the agency’s plan for “processing Events [metadata] at scale”: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
nge-anyst-exch-redacted-p1-normal.gif:
TOP SECRET STRAP 1
Analysis
Next Generation Events
TOP SECRET STRAP 1
23 March 2009nge-anyst-exch-redacted-p2-normal.gif:
TOP SECRET STRAP 1
...
0.0
PullThrough Steering Group Meeting #16
Document
Release Date:
2015-09-25
Document Date:
2008-02-29
This set of GCHQ minutes from 29 February 2008 describes a set of tools that were under development at that point, including the metadata analysis tool KARMA POLICE: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
pull-through-steering-group-minutes-p1-normal.gif:
TOP SECRET STRAP1
THQ/1202THQ/1900/0058
29 February 2008
PullThrough Steering Group Meeting #16
29 February 2008.
Distribute to: In...
0.0
QFDs and BLACKHOLE Technology behind GCHQ/INOC
Document
Release Date:
2015-09-25
Document Date:
2009-03-01
This GCHQ presentation from March 2009 describes the BLACKHOLE database used to store raw metadata records from TEMPORA, with about 10 billion records being added each day: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
qfd-blackhole-technology-behind-inoc-p1-normal.gif:
QFDsand BLACHOLE
Technology behind GCHQ/INOCqfd-blackhole-technology-behind-inoc-p2-normal.gif:
TRAP2 COMINT
Probes Flat Store Analytic e...
0.0
Black Hole Analytics
Document
Release Date:
2015-09-25
Document Date:
2009-09-01
This GCHQ briefing from September 2009 describes the tools then available to analyse metadata collected on a massive scale: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
add-sd-blackhole-p1-normal.gif:
BLACK HOLE ANALYTICS
ADD/SD briefing, September 2009
TOP SECRET STRAP 1add-sd-blackhole-p2-normal.gif:
TOP SECRET STRAP1
Contents
■ Describe the new ...
0.0
Blazing Saddles
Document
Release Date:
2015-09-25
This page from GCHQ’s internal GCWiki describes the BLAZING SADDLES tool for handling huge amounts of metadata and the specialised analysis it supports: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
blazing-saddles-tools-p1-normal.gif:
TOP SECRET STRAP 1 COMINT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report
inappropriate content.
For GCWiki h...
0.0
Data Stored in BLACK HOLE
Document
Release Date:
2015-09-25
This undated page from GCHQ’s internal GCWiki provides technical information about the agency’s BLACK HOLE repository: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
data-stored-in-black-hole-p1-normal.gif:
TOP SECRET STRAP 1 COMINT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report
inappropriate content.
For GCWi...
0.0
Crypt Discovery Joint Collaboration Activity
Document
Release Date:
2014-12-28
Document Date:
2011-01-20
This document dated 20 January 2011 provides the research agenda for a joint NSA/GCHQ group tasked with developing “a sound understanding of the threat that encryption brings to our ability to do target discovery/development as well as devising mitigations”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December […]
TOP SECRET
Crypt Discovery
Joint Collaboration Activity
20 January 2011
Activity Owners
[NSA
GCHQ
Overview
Our Internet Exploitation capability is built upon our ability to eff...
0.0
Target Detection Identifiers
Document
Release Date:
2015-09-25
Document Date:
2009-03-01
This GCHQ presentation from March 2009 shows that the agency has targeted a number of popular websites in a concerted effort to harvest cookies (“target detection indentifiers”) on a massive scale: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
tdi-introduction-p1-normal.gif:
Target Detection Identifiers
c This rtcrmation is exempt under the Freedom of Irfbrmation Act 2000 (FOIA) and may be exempt under other UK information legislati...
0.0
Broadcast/Intenet Radio Exploitation and Analysis
Document
Release Date:
2015-09-25
Document Date:
2009-11-06
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif:
UK TOP SECRET//COMINT//REL FVEY
Broadcast/lnternet Radio
Exploitation and Analysis
6th November 2009
OPD-NAC
Distribution (via email)
(ST2)
BS...
Afghanistan (AFG/AF), Algeria (DZA/DZ), Argentina (ARG/AR), China (CHN/CN), Czech Republic (CZE/CZ), Egypt (EGY/EG), France (FRA/FR), Germany (DEU/DE), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Italy (ITA/IT), Japan (JPN/JP), Kazakhstan (KAZ/KZ), Mauritania (MRT/MR), Mexico (MEX/MX), Netherlands (NLD/NL), Pakistan (PAK/PK), Romania (ROU/RO), Russia (RUS/RU), Singapore (SGP/SG), South Africa (ZAF/ZA), Spain (ESP/ES), Sudan (SDN/SD), Tanzania (TZA/TZ), Ukraine (UKR/UA), United Kingdom (GBR/GB), United States (USA/US), Zimbabwe (ZWE/ZW)
0.0
Crypt Discovery Joint Collaboration Activity
Document
Release Date:
2015-09-25
Document Date:
2011-01-20
This joint NSA/GCHQ research paper dated 20 January 2011 cites encryption as a threat impacting on both agencies: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
crypt-discovery-activity-p1-normal.gif:
TOP SECRET
Crypt Discovery
Joint Collaboration Activity
20 January 2011
Activity Owners
I H/nsa
Overview
Our Internet Exploitation capabil...
0.0
Event (SIGINT)
Document
Release Date:
2015-09-25
This undated page from GCHQ’s internal GCWiki provides a definition of “event”, the term the agency uses to refer to a metadata record, showing the variety of data collected: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
events-p1-normal.gif:
SECRET STRAP 1 COMiNT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report
inappropriate content.
For GCWiki help contact: webtea...
0.0
Next Generation Events (NGE) – BLACK HOLE ConOp
Document
Release Date:
2015-09-25
Document Date:
2009-08-18
This GCHQ document from 18 August 2009 describes BLACK HOLE, a massive data repository, and describes how this interacts with other systems developed by the agency: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
nge-black-hole-conop-p1-normal.gif:
SECRET STRAP1
18th August 2009
Next Generation Events (NGE) - BLACK HOLE ConOp
Author:
l(TDB),|
l(TSE), I
|(TDB)
Issue Date Author Amendm...
0.0
ICTR Cloud Effects
Document
Release Date:
2015-09-25
Document Date:
2011-07-01
This GCHQ presentation from July 2011 discusses various technical aspects of “population-scale” datamining: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
cloud-developers-exchange-july-2011-p1-normal.gif:
“ICTR Cloud Efforts”
developing “canonical” SIGINT
analytics, finding hard targets and
exploratory data analysis at scale
Data Mining Re...