Filtered By
United Kingdom (GBR/GB)X
Countries Mentioned [filter]
Results
140 Total
1.0

ISUAV Video Descrambling

Document

Document Date: 2008-01-01Release Date: 2016-01-29
This GCHQ manual from 2008 explains how analysts would unscramble the video signals from Israeli drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
SECRET ISUAV Video Descrambling Author: vereîon^ra Introduction Analogue video from Israeli UAVs has been intercepted in both clear (i.e. unencrypted) and scrambled (i.e. encrypted...
1.0

ICTR Cloud Effects

Document

Document Date: 2011-07-01Release Date: 2015-09-25
This GCHQ presentation from July 2011 discusses various technical aspects of “population-scale” datamining: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
cloud-developers-exchange-july-2011-p1-normal.gif: “ICTR Cloud Efforts” developing “canonical” SIGINT analytics, finding hard targets and exploratory data analysis at scale Data Mining Re...
1.0

Next Generation Events (NGE) – BLACK HOLE ConOp

Document

Document Date: 2009-08-18Release Date: 2015-09-25
This GCHQ document from 18 August 2009 describes BLACK HOLE, a massive data repository, and describes how this interacts with other systems developed by the agency: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
nge-black-hole-conop-p1-normal.gif: SECRET STRAP1 18th August 2009 Next Generation Events (NGE) - BLACK HOLE ConOp Author: l(TDB),| l(TSE), I |(TDB) Issue Date Author Amendm...
1.0

Royal Concierge

Document

Release Date: 2013-11-17
Two slides from a GCHQ presentation describe the Royal Concierge programme “a SIGINT driven hotel reservation tip-off service”: see the Der Spiegel article ‘Royal Concierge’: GCHQ Monitors Hotel Reservations to Track Diplomats, 17 November 2013.
image-568949-galleryV9-sitq1.jpg: TOP SECRET//COMINT//REL TO USA, AUS. CAN, GBR, NZL * ^CCHQ^ (TS//SI//REL) Contact mapping - tip-off to Diplomatic travel plans (TS//SI//REL) - ROYAL ...
1.0

Third Party Partners

Document

Release Date: 2013-12-08
This short excerpt from an NSA document shows that nine European States – Belgium, Denmark, France, Germany, Italy, The Netherlands, Norway, Spain and Sweden – have a second-tier ‘third party’ relationship with the agency: see the SVT article NSA “asking for” specific exchanges from FRA – Secret treaty since 1954, 8 December 2013.
* (S//SI. REU) SSEU’R. members are the Five Eyes nations (Australia, Canada. New Zealand, United Kingdom and United States] and the following Tliird Party partners: Belgium, Denmark, France, Germ...
1.0

What is HACIENDA

Document

Release Date: 2014-08-15
This undated GCHQ presentation describes the agency’s HACIENDA system, capable of port scanning entire countries, which became a standard tool in 2009 available to all FIve Eyes partners: see the Heise article The HACIENDA Program for Internet Colonization, 15 August 2014. <
Abbildung01-dc8cb7bf5376218d.png: What is HACIENDA? • Data reconnaissance tool developed by the CITD team in JTRIG • Port Scans entire countries - Uses nmap as port scanning tool - U...
1.0

TEMPORA — “The World’s Largest XKEYSCORE” — Is Now Available to Qualified NSA Users

Document

Document Date: 2012-09-19Release Date: 2014-06-18
This internal NSA post dated 19 September 2012, describes GCHQ’s operation Tempora which, make “more than 40 billion pieces of content a day” available to analysts from both agencies: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
(C//REL) TEMPORA -- "The World s Largest XKEYSCORE" - Is Now Available to Qualified NSA Users (U//FOUO) NSA Integree at GCIIQ Run Date: 09/19/2012 (U//FOUO) SIGINT analysts: We have all...
1.0

Turkey at the G20 Pre-Meeting in London, September 2-5, 2009

Document

Document Date: 2009-01-01Release Date: 2014-08-31
This GCHQ document from 2009 sets out surveillance priorities from a meeting of the G20’s Finance Ministers, which include the personal surveillance of the then Turkish Finance Minister Mehmet Simsek, who also holds UK and Turkish dual citizenship: see the Intercept article How the NSA Helped Turkey Kill Kurdish Rebels, 31 August 2014.
TOP SECRET STRAP 1 COMINT Turkey at the G20 pre-meeting in London September 2-5 2009 Contents ■ 1 (520 pre-meeting in London <#G20_pre-meeting_in_London> ■ 2 Objective <#Objective> ...
1.0

JTRIG Tools and Techniques

Document

Document Date: 2012-07-01Release Date: 2014-07-14
This page from GCHQ’s internal GCWiki describes tools developed by the Joint Threat Research Intelligence Group and their status. The page was last edited in July 2012 and was accessed nearly 20,000 times: see the Intercept article Hacking Online Polls and Other Ways British Spies Seek to Control the Internet, 14 July 2014. jtrigall
navigation ■ Main Page ■ Help Pages ■ Wikipedia Mirror ■ Ask Me About... ■ Random page ■ Recent changes ■ Report a Problem ■ Contacts ■ GCWeb search toolbox ■ W...
1.0

GCHQ NAC Business Review – April to June 2011

Document

Document Date: 2011-02-01Release Date: 2014-12-13
This extract from a 2011 GCHQ document details progress in the operation against Belgian telecommunications company Belgacom in the second quarter of 2011: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
CNE Access to BELGACOM GRX Operator: (GREEN) Following the successful NAC MyNOC OP SOCIALIST to provide CNE access to the BELGACOM GRX Operator (MERION ZETA), the NAC have continued to provide a...
1.0

BULLRUN CoI – Briefing Sheet

Document

Release Date: 2013-09-05
This undated GCHQ document provides a classification guide for BULLRUN – NSA and GCHQ’s attempts to weaken or defeat cryptographic protocols – and specifies some of its achievements: see the ProPublica article Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security, 5 September 2013.
TOP SECRET STRAP1 COMINT BULLRUN Col - Briefing Sheet Introduction 1. The ability to exploit targets’ encrypted communications is extremely fragile and is often enabled through sensiti...
1.0

BULLRUN

Document

Release Date: 2014-12-28
This undated presentation from GCHQ’s PTD (Penetrating Target Defences) unit gives an overview of BULLRUN efforts to defeat encryption: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET STRAP1 BULLRUN PTD Lead for Special Operations and Policy PTD "We penetrate targets' defences." This information is exempt from disclosure under the Freedom of Information A...
1.0

Mobile Networks in MyNOC World

Document

Document Date: 2011-01-01Release Date: 2014-12-13
This GCHQ presentation from 2011 provides the background to the agency’s hacking attack on Belgacom: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014. gchq-mobile-networks-in-my-noc-world
TOP SECRET STRAP 2 Mobile Networks in World Head of GCHQ NAC n/\c This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptio...
1.0

GCHQ NAC Business Review – January to March 2011

Document

Document Date: 2011-01-01Release Date: 2014-12-13
This extract from a 2011 GCHQ Network Analysis Centre document details progress in the operation against Belgian telecommunications company Belgacom in the first quarter of 2011: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
Successful MyNOC surge effort against GRX Operators, that enhanced network knowledge of the various operators, their customer sets, knowledge of and access to both encrypted and unencrypted GRX ...
1.0

A potential technique to deanonymise users of the TOR network (presentation)

Document

Release Date: 2014-12-28
This undated GCHQ presentation proposes a deanonymisation attack against Tor users based on the collection of data from exit nodes owned by the agency: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
UK TOP SECRET STRAP1 COMINT A potential technique to deanonymise users of the TOR network OPC-MCR, GCHQ This information is exempt from disclosure under the Freedom of Information Act 20...
1.0

Cable Master List

Document

Document Date: 2009-07-27Release Date: 2014-11-25
These July 2009 documents provide a full list of the fibre-optic cables GCHQ had access to at that point, including details of location, bandwidth and corporate partners: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. […]
partner_cables.pdf:  Partner Cable UK? REMEDY GERONTIC DACRON LITTLE PINNAGE STREET CAR VITREOUS Apolo UK IRU/LC DCO IRU/LC IRU/LC IRU/LC CANTAT 3 UK DCO IRU/LC Concerto UK D...
1.0

Software reverse engineering

Document

Document Date: 2008-07-15Release Date: 2015-06-22
This GCHQ document last updated on 15 June 2008 describes the purpose of the agency’s attempts to reverse engineer commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET Software Reverse Engineering Network Defence performs reverse engineering both of malicious and of non- malicious code - i.e,.code is translated from machine-readable to human-re...
1.0

TECA Product Centre

Document

Document Date: 2011-04-28Release Date: 2015-06-22
This page from GCHQ’s internal GCWiki, last modified on 28 April 2011 provides a brief introduction to the work of the agency’s Technical Enabling Covert Access (TECA) Project Centre: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
TECA Product Centre - GCWiki TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help con...
1.0

ISA-94: Application for renewal of warrant GPW/1160 in respect of activities which involve the modification of commercial software

Document

Document Date: 2008-06-13Release Date: 2015-06-22
This GCHQ application for warrant renewal from June 2008 shows that the agency has been engaged in the reverse engineering of commercial antivirus software for the purposes of facilitating its hacking operations: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET STRAP2 UK EYES ONLY Date: 13 June 2008 GCHQ Reference: A/9014/9105/55 Sian MacLeod Mariot Leslie Foreign Secretary ISA-94: APPLICATION FOR RENEWAL OF WARRANT GPW/1160 IN...
1.0

GCHQ Ministry Stakeholder Relationships spreadsheets

Document

Document Date: 2008-01-01Release Date: 2015-06-22
This collection of 13 spreadsheets illustrates the relationship between GCHQ and various ministries within the UK government and that agency’s work is by no means restricted to matters of national security, but also extends to domestic issues: see the Intercept article Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research, 22 June […]
 Bank of England GCO Name(s) 3CHQ Top level Aim with Customer BANK MISSION Contribute to Bank decision-making on issues affecting UK economic stability. To support UK economic stability. ...
1.0

HTTP Activity vs. User Activity

Document

Document Date: 2009-06-19Release Date: 2015-07-01
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL m V HTTP Activity vs User Activity 19 June 2009 Derived From: NSA/CSSM 1-52 Bated :l2007i MM TOP SEC...
1.0

PullThrough Steering Group Meeting #16

Document

Document Date: 2008-02-29Release Date: 2015-09-25
This set of GCHQ minutes from 29 February 2008 describes a set of tools that were under development at that point, including the metadata analysis tool KARMA POLICE: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
pull-through-steering-group-minutes-p1-normal.gif: TOP SECRET STRAP1 THQ/1202THQ/1900/0058 29 February 2008 PullThrough Steering Group Meeting #16 29 February 2008. Distribute to: In...
1.0

Content or Metadata?

Document

Release Date: 2015-09-25
This undated GCHQ spreadshhet clarifies how the agency categorises different aspects of intercepted communications: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
content-metadata-matrix-p1-normal.gif: UK SECRET STRAP1 COMINT AUSiCAN'NZiUMJS EYES ONLY ORCON CONTENT OR METADATA? Categorisation of aspects of intercepted communications - GCHQ policy ...
1.0

What’s the worst that could happen?

Document

Document Date: 2010-03-01Release Date: 2016-02-02
This GCHQ document from March 2010 presents a checklist of factors analysts should consider before going ahead with an operation to infiltrate a communications network, by physical or other means. Among the concerns raised is the risk that British actions may enable US authorities to conduct operations “which we would not consider permissible”: see the […]
TOP SECRET STRAP 1 What’s the worst that could happen? This document contains examples of specific risk which may affect operations and which may need to be considered when writing submissi...
1.0

Crypt Discovery Joint Collaboration Activity

Document

Document Date: 2011-01-20Release Date: 2015-09-25
This joint NSA/GCHQ research paper dated 20 January 2011 cites encryption as a threat impacting on both agencies: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
crypt-discovery-activity-p1-normal.gif: TOP SECRET Crypt Discovery Joint Collaboration Activity 20 January 2011 Activity Owners I H/nsa Overview Our Internet Exploitation capabil...
1.0

Events analysis

Document

Document Date: 2008-11-27Release Date: 2015-09-25
This GCHQ slide taken from a presentation dates 27 November 2008 confirms that agency metadata repositories can be datamined for information relating to individuals within the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
Events analysis SALAMANCA, HAUSTORIUM, THUGGEE, IMMINGLE less intrusive than communications content authorisation not needed for individuals in the UK necessity and proportionality st...
1.0

HRA auditing

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki describes the agency’s audit procedure to document compliance with the UK Human Rights Act: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
hra-auditing-p1-normal.gif: UK CONFIDENTIAL The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webtea...
1.0

Report on Architectural Risk 2012 – Summary

Document

Document Date: 2012-03-12Release Date: 2015-09-25
This GCHQ report summary from 12 March 2012 discusses the impact of the move to a “end-end big data strategy” on the agency’s infrastructure: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
architecture-risk-2012-p1-normal.gif: TOP SECRET STRAP 1 Report on Architectural Risk 2012 - Summary TOP SECRET STRAP 1architecture-risk-2012-p2-normal.gif: TOP SECRET STRAP1 Introduc...
1.0

GCHQ Analytic Cloud Challenges

Document

Document Date: 2012-05-14Release Date: 2015-09-25
This GCHQ presentation dated 14 May 2012 describes the agency receiving “more than 50 billion events [metadata records] per day” and some of the tools available for analysing that mass of data: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
gchq-analytic-cloud-challenges-p1-normal.gif: GCHQ Analytic Cloud Challenges Innovation Lead for Data, Analytics & Visualisation Engineering This information is exempt from Disclosure unde...
1.0

HIMR Data Mining Research Problem Book

Document

Document Date: 2011-09-20Release Date: 2016-02-02
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT AUS/CAN/NZ/UK/US EYES ONLY Reference: OPC-M/TECH.A/455 (v1.0, r206) Date: 20 September 2011 Copy no: HIMR Data Mining Research Problem Book OPC-MCR, G...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh