Filtered By
United Kingdom (GBR/GB) X
Countries Mentioned [filter]
Internal Procedures X
Document Topic [filter]
Results
39 Total
0.0

Content or Metadata?

Document

Release Date: 2015-09-25
This undated GCHQ spreadshhet clarifies how the agency categorises different aspects of intercepted communications: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
content-metadata-matrix-p1-normal.gif: UK SECRET STRAP1 COMINT AUSiCAN'NZiUMJS EYES ONLY ORCON CONTENT OR METADATA? Categorisation of aspects of intercepted communications - GCHQ policy ...
0.0

HRA auditing

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki describes the agency’s audit procedure to document compliance with the UK Human Rights Act: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
hra-auditing-p1-normal.gif: UK CONFIDENTIAL The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webtea...
0.0

Events analysis

Document

Release Date: 2015-09-25 Document Date: 2008-11-27
This GCHQ slide taken from a presentation dates 27 November 2008 confirms that agency metadata repositories can be datamined for information relating to individuals within the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
Events analysis SALAMANCA, HAUSTORIUM, THUGGEE, IMMINGLE less intrusive than communications content authorisation not needed for individuals in the UK necessity and proportionality st...
0.0

NSA Extended Enterprise Report: July 2008

Document

Release Date: 2015-04-02 Document Date: 2008-07-08
This extract from a July 2008 NSA document describes Argentina as GCHQ’s “primary interest” in Latin America: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET//REL TO USA, AUS, CAN, GBR, NZL//20291123 Extended Enterprise Report: July 2008 This document summarises key activities of interest to GCHQ at the NSA Regional Cryptologic Center...
0.0

Legal Authorisation Flowcharts: TARGETING and COLLECTION

Document

Release Date: 2015-06-22 Document Date: 2008-11-01
This GCHQ document from November 2008 provides a guide to the legal authorisations required for different forms of agency activity: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
UK CONFIDENTIAL Version 6, dated 11/08 Side l The issue on GCVYeb is die definitive version; printed copies may be out of date. Terms are defined in the glossary at http w.v ope rations^'po...
0.0

Intrusion Analysis / JeAC

Document

Release Date: 2015-06-22 Document Date: 2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1 Intrusion Analysis/JeAC The IA team conducts all-source analysis both of emerging and current electronic attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...
0.0

ACNO Skill Levels: Malware Analysis & Reverse Engineering

Document

Release Date: 2015-06-22
This undated GCHQ training document details the requirements for analysts engaged in the reverse engineering of commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
SECRET ACNO Skill 12: Malware Analysis & Reverse Engineering Knowledge of: • Relevant Operating Systems. • Current trends in attack vectors & targeted applications / protocols / services...
0.0

Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities

Document

Release Date: 2013-12-09 Document Date: 2007-01-01
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Table of Contents FORWARD......................................................................4 ...
0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

Tier B allies

Document

Release Date: 2014-05-13
This undated internal NSA document illustrates the degrees of cooperation in the agency’s relationships with different foreign powers. “Tier A” and “Tier B” are elsewhere referred to as Second and Third Parties: see the book No Place To Hide, 13 May 2014.
Page 123 CONFIDENT1AL//NOFORN//20291123 TIER A Comprehensive Cooperation Australia Canada New Zealand United Kingdom TIERB Focused Cooperation Austria Belgium Czech Republic Denmark G...
0.0

Visit Precis: Sir Iain Lobban

Document

Release Date: 2014-04-30 Document Date: 2013-04-01
This internal NSA document from April 2013 gives background information to prepare for the then GCHQ Director’s visit on 30 April and 1 May; included topics include access to PRISM data, FLAME malware, Iran, Syria and Israel: see the Intercept article British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools, 30 April 2014. […]
TOPSECRET//SI//NOFORN VISIT PRÉCIS Sir Iain Lobban, KCMG, CB Director, Government Communications Headquarters (GCHQ) 30 April 2013 - 1 May 2013 GEN A Hosted Dinner: 30 April 2013//1...
0.0

OPA~TAS Covert Mobile Phones Policy

Document

Release Date: 2014-08-12 Document Date: 2010-06-28
These GCHQ guidelines from 23 June 2010 describe procedures for operating mobile phones overseas which are not intended to be associated with agency activity: see the Intercept article NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting, 12 August 2014.
SECRET Ref: DOT/1636/5040/102 28 June 2010 OPA~TAS Covert Mobile Phones Policy Author: Issue 1.0 Page 1 of 6 SECRET This information is exempt from disclosure under the Fr...
0.0

Counterterrorism Analytic Working Group Meets in Madrid

Document

Release Date: 2018-03-01 Document Date: 2007-08-01
This 2007 post from the NSA’s internal SIDToday newsletter describes the 11th annual meeting of the Sigint Seniors Counterterrorism (SISECT) Analytic Working Group (AWG), which focused on terrorists’ use of the internet: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI//REL) Counterterrorism Analytic Working Group Meets in Madrid FROM: Foreign ...
0.0

GCHQ Cyprus

Document

Release Date: 2015-08-03
This two-page extract from a longer, undated, GCHQ document describing its presence in Cyprus, states that “Under the ECHELON Agreement, NSA provides 50% of the funding for the SOUNDER Comsat facility”: see the Intercept article GCHQ and Me: My Life Unmasking British Eavesdroppers, 3 August 2015.
TOP SECRET STRAP1 Technical Capability 24. Improve Mission Management to ensure efficient use of our Sigint resources. The UK hubs/Access Services will continue to simplify and improve per...
0.0

Reverse Engineering

Document

Release Date: 2015-06-22 Document Date: 2011-11-18
This page taken from GCHQ’s internal GCWiki, last modified on 18 November 2011, provides some basic information on the agency’s reverse engineering efforts: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
Reverse Engineering - GCWiki UK SECRET The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam R...
0.0

JFK Assassination Records Classification/Declassification Guide Number: 385-00

Document

Release Date: 2017-10-25 Document Date: 2000-06-23
This classification guide from 2000 shows that aspects of NSA investigations related to the Kennedy assassination were still classed as top secret, decades later: see the Intercept article NSA Concealed Records on JFK Assassination for Decades, 25 October 2017.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 (U) JFK ASSASSINATION RECORDS CLASSIFICATION/ DECLASSIFICATION GUIDE NUMBER: 385-00 (U) PUBLICATION DATE: 23 JUNE 2000 (U) PRO...
0.0

GCSB access

Document

Release Date: 2015-03-06 Document Date: 2011-01-01
This extract from a 2011 GCHQ document indicates that the agency had access to satellite and full take data from South Pacific sources collected by New Zealand’s GCSB via XKeyScore: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March 2015.
I edit! GCSB access For GCSB access GCSB have given us access to their XKS deployments at IRONS AND ; a GCSB comsat site, which is rich in data for the South Pacific region. Specifically we can...
0.0

Iran – Current Topics, Interaction with GCHQ

Document

Release Date: 2015-02-10 Document Date: 2013-04-12
This NSA talking points memo dated 12 April 2013 notes that Iran “has demonstrated a clear ability to learn from the capabilities and actions of others”: see the Intercept article NSA Claims Iran Learned from Western Cyberattacks, 10 February 2015.
TOP SECRET//COMINT//NOFORN (U) Topic: Iran - Current Topics, Interaction with GCHQ (U) Director's Talking Points: * (TS//SI//REL TO USA, FVEY) Emphasize that we have successfully worked mu...
0.0

Primary FORNSAT Collection Operations

Document

Release Date: 2014-06-18
This undated NSA slide provides the locations of FORNSAT sites run by the agency and its Five Eyes partners worldwide: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
.fc-L' 11K: ¿UribtA I---. :RET//CDMINT//REL TO USA, AUS, CAN, GBR, and NZLy/Xl JIMKKNIPB Yakima TI M BE RU N E S ugar Grove CORALINE Sabena Seca, Geraldto S...
0.0

Manhunting Timeline 2010

Document

Release Date: 2014-02-18
This NSA wiki page details “the start of an international effort to focus the legal element of national power upon non-state actor [WikiLeaks editor Julian] Assange, and the human network that supports WikiLeaks”: see the Intercept article: Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters, 18 February 2014.
manhunting.png: Page Otscussion Read Edit Page history Search (U) Manhunting Timeline 2010 ____________rrrr£ > TOP SECRET//SI/TK//NOFORN Main article: Manhunting See also: Manhu...
0.0

GCHQ Ministry Stakeholder Relationships spreadsheets

Document

Release Date: 2015-06-22 Document Date: 2008-01-01
This collection of 13 spreadsheets illustrates the relationship between GCHQ and various ministries within the UK government and that agency’s work is by no means restricted to matters of national security, but also extends to domestic issues: see the Intercept article Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research, 22 June […]
 Bank of England GCO Name(s) 3CHQ Top level Aim with Customer BANK MISSION Contribute to Bank decision-making on issues affecting UK economic stability. To support UK economic stability. ...
0.0

Second Party National Identity Rules, continued

Document

Release Date: 2015-03-08 Document Date: 2012-01-01
This extract from a 2012 NSA document detailing how different Five Eyes countries define their own nationals shows that the GCSB allowed itself the right to surveil the governments of the Cook Islands and Nuie “but not their citizens”: see the Sunday Star Times article Snowden files: Inside Waihopai’s domes, 8 March 2015.
SECRET//COMINT//REL TO USA, FVEY (U) Second Party National Identity Rules, Continued Section B.4. - (U) New Zealand: Government Communications Security Bureau (GCSB) B.4.1. (U) Governmen...
0.0

Laws on interception – Oversight – Implications for JCE

Document

Release Date: 2015-09-25
This undated GCHQ presentation includes, in its speakers notes, the statements that “We have a light oversight regime compared to [the] US” and “judicial oversight… [is] the main issue for us”: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
jce-uk-legality-context-p1-normal.gif: èâ Laws on interception Oversight Implications for JCE ^GCHQi This intormaton is exempt und« the Freedom ol ln(Ofina!iOf^^00^roiA^n^n3W> legis...
0.0

Third Party Partners

Document

Release Date: 2013-12-08
This short excerpt from an NSA document shows that nine European States – Belgium, Denmark, France, Germany, Italy, The Netherlands, Norway, Spain and Sweden – have a second-tier ‘third party’ relationship with the agency: see the SVT article NSA “asking for” specific exchanges from FRA – Secret treaty since 1954, 8 December 2013.
* (S//SI. REU) SSEU’R. members are the Five Eyes nations (Australia, Canada. New Zealand, United Kingdom and United States] and the following Tliird Party partners: Belgium, Denmark, France, Germ...
0.0

Palestinian Authority Security Forces (PASF)

Document

Release Date: 2014-08-04 Document Date: 2008-07-01
This extract from a July 2008 GCHQ reveals that the agency received information from the Palestine Authority Security Forces (PASF): see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
Since the Gaza Strip is the centre of the HAMAS organizations popularity and the site of frequent clashes between HAMAS and FATAH supporters, Israeli forces and Palestinian militants as well as...
0.0

Why TARMAC?

Document

Release Date: 2014-05-13
This slide from a GCHQ presentation to the 2010 Five Eyes conference outlines features of the agency’s interception of satellite traffic, based at Menwith Hill in the UK: see the book No Place To Hide, 13 May 2014.
Page 97 TOP SECRET//COMINT/REL TO USA, FVEY Why TARMAC? • MHS has a growing FORNSAT mission. - SHAREDVISION mission. - SigDev (“Difficult Signals collection”). I - ASPHALT (“Coll...
0.0

Access: The Vision

Document

Release Date: 2015-09-25 Document Date: 2010-07-01
This GCHQ document from July 2010 looks forward to agency goals for 2013, including the aspiration to build “the world’s biggest SIGINT engine”: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
access-the-vision-for-2013-p1-normal.gif: ACCESS: THE VISION SECRET In 2013, we will have access to, and make readily available, data of the highest value possible to facilitate cyber ope...
0.0

NSA Intelligence Relationship with New Zealand

Document

Release Date: 2015-03-10 Document Date: 2013-04-01
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
0.0

JSA Restrictions

Document

Release Date: 2013-06-18
This undated article from GCHQ’s internal GCWIki gives technical details about the US-German Joint Sigint Activity group: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
TOP SECRET STRAP 1 COMINT JSA Restrictions Access Central: Targeting Tar g e tin g and selector □ AC Logo Red. png management are services that Access Central offers. This in...
0.0

NSA Intelligence Relationship with Germany – Bundesnachrichtendienst (BND)

Document

Release Date: 2014-06-18 Document Date: 2013-01-17
This internal NSA briefing dated 17 January 2013 describes the current state of the US-German intelligence relationship and mentions that “The BND has been working to influence the German Government to relax interpretation of the privacy laws over the long term to provide greater opportunity for intelligence sharing”: see the Der Spiegel article New NSA […]
TOP SECRET//S1//NOFORN National Security Agency/Central Security Service Information Paper 17 January 2013 Subject: (StfREL TO USA, FVEY} NS A Intelligence Relationship with Germany - B...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh