DocumentRelease Date: 2016-02-02 Document Date: 2011-09-20
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT AUS/CAN/NZ/UK/US EYES ONLY Reference: OPC-M/TECH.A/455 (v1.0, r206) Date: 20 September 2011 Copy no: HIMR Data Mining Research Problem Book OPC-MCR, G...
DocumentRelease Date: 2015-09-25 Document Date: 2008-02-29
This set of GCHQ minutes from 29 February 2008 describes a set of tools that were under development at that point, including the metadata analysis tool KARMA POLICE: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
pull-through-steering-group-minutes-p1-normal.gif: TOP SECRET STRAP1 THQ/1202THQ/1900/0058 29 February 2008 PullThrough Steering Group Meeting #16 29 February 2008. Distribute to: In...
DocumentRelease Date: 2014-05-13 Document Date: 2009-09-01
This September 2009 NSA presentation outline some of the insights that analysts can gather from online social networks (OSNs) and show the XKeyScore interface for performing such searches: see the book No Place To Hide, 13 May 2014.
TOP SECRET//COMINT//REL TO USA, FVEY (S//SI//REL) Tracking Targets on Online Social Networks The overall classification of this briefing to TOP SECRET//COMINT//REL TO USA, FVEY Online...
DocumentRelease Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
Iran (IRN/IR), Iraq (IRQ/IQ), Kuwait (KWT/KW), Lebanon (LBN/LB), Pakistan (PAK/PK), Palestine (PSE/PS), Qatar (QAT/QA), Saudi Arabia (SAU/SA), Turkey (TUR/TR), United Kingdom (GBR/GB), United States (USA/US)
DocumentRelease Date: 2014-06-18
This page from GCHQ’s internal GCWiki provides a guide to the NSA’s XKeyScore tool: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
XKeyscoreTabs XKS Development Jump to: navigation. search N BWS Getting __ . I Using an ---- „ XKevscure Account Training XKS Development XKS Cuntacts Requirem...
DocumentRelease Date: 2015-07-01 Document Date: 2009-01-01
This 2009 NSA presentation describes some of the plug ins available and the way the tool relates to other NSA methods for searching internet metadata, with XKeyScore having the broadest capability: see the book No Place To Hide, 13 May 2014.
xks-as-a-sigdev-tool-p1-normal.gif: X-KEYSCORE as a SIGDEV tool 2009 ■EBTxks-as-a-sigdev-tool-p2-normal.gif: What is X-KEYSCORE?xks-as-a-sigdev-tool-p3-normal.gif: TOP SECRET//COMINT//ORC...
DocumentRelease Date: 2016-06-07 Document Date: 2007-05-08
This GCHQ document dated 8 May 2007 provides technical information about PRESTON, the British system for intercepting the communications of targets under warrant: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
SECRET STRAP 1 PRESTON Business Processes Sigmod/00003CPO/4502/SIG010900/23 8 May 2007 PRESTON Business Processes Version 1.0 Synopsis The purpose of this document is to present ...
DocumentRelease Date: 2016-06-07 Document Date: 2009-01-01
This extract from a 2009 GCHQ presentation includes a report on PRESTON, the agency’s programme for intercepting the communications of individuals or organisations who are subject to surveillance warrants. The report found that, in one six-month period, 97% of such communications had not been viewed by the authorities: see the Intercept article Facing Data Deluge, […]
TOP SECRET STRAP 1 DGO and DOC Special TOP SECRET STRAP 1 This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other...
DocumentRelease Date: 2015-03-06 Document Date: 2011-01-01
This extract from a 2011 GCHQ document indicates that the agency had access to satellite and full take data from South Pacific sources collected by New Zealand’s GCSB via XKeyScore: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March 2015.
I edit! GCSB access For GCSB access GCSB have given us access to their XKS deployments at IRONS AND ; a GCSB comsat site, which is rich in data for the South Pacific region. Specifically we can...
DocumentRelease Date: 2014-06-18
This 4-page excerpt from the 2013 Black Budget describes the two elements of NSA’s Foreign Partner Access operations – RAMPART-A and WINSTSTOP – together with their funding: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 18 June 2014.
TOP SECRET//SI/TK//NOFORN (U) SPECIAL SOURCE ACCESS (U) FOREIGN PARTNER ACCESS This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 201...
DocumentRelease Date: 2015-07-01 Document Date: 2009-08-27
This 60-page NSA presentation from 27 August 2009 explains the use of different kinds of metadata tags in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Application IDs and Fingerprints 27 August 2009 .... ‘s 01 Ol A l • DERIVED FROM: NSA/CSSM...
DocumentRelease Date: 2016-06-07 Document Date: 2012-05-01
This page from GCHQ’s internal GCWiki, last updated on 1 May 2012 documents progress in a variety of the agency’ projects: see Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam Support page Mob...
DocumentRelease Date: 2014-11-25 Document Date: 2009-07-27
These July 2009 documents provide a full list of the fibre-optic cables GCHQ had access to at that point, including details of location, bandwidth and corporate partners: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. […]
partner_cables.pdf: Partner Cable UK? REMEDY GERONTIC DACRON LITTLE PINNAGE STREET CAR VITREOUS Apolo UK IRU/LC DCO IRU/LC IRU/LC IRU/LC CANTAT 3 UK DCO IRU/LC Concerto UK D...
GEMINI, ARCANO, BROKER, CATEGORY, DACRON, DONNINGTON, ELAPSE, GERONTIC, GIB(B)US, GRASP, HIASCO, KIRKISTOWN, KNAPWEED, LATUS, LINNELL, LITTLE, MONDELLO, NIGELLA, NUMDAH, PFENNING ALPHA, PINNAGE, PRESCOTT, REMEDY, SCEPTRE, STELLABLUE, TEMPORA, VITREOUS
Australia (AUS/AU), Bahamas (BHS/BS), Belgium (BEL/BE), Bermuda (BMU/BM), Canada (CAN/CA), China (CHN/CN), Denmark (DNK/DK), Egypt (EGY/EG), Finland (FIN/FI), France (FRA/FR), Germany (DEU/DE), Guam (GUM/GU), Iceland (ISL/IS), India (IND/IN), Ireland (IRL/IE), Isle of Man (IMN/IM), Italy (ITA/IT), Jamaica (JAM/JM), Japan (JPN/JP), Korea (KOR/KR), Latvia (LVA/LV), Malta (MLT/MT), Netherlands (NLD/NL), Nigeria (NGA/NG), Philippines (PHL/PH), Poland (POL/PL), Portugal (PRT/PT), Russia (RUS/RU), Spain (ESP/ES), Sweden (SWE/SE), United Kingdom (GBR/GB)
DocumentRelease Date: 2016-06-07 Document Date: 2007-07-05
This GCHQ document dated 5 July 2007 provides technical information about PRESTON, the British system for intercepting the communications of targets under warrant: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
SECRET STRAP 1 UK EYES PRESTON Architecture Sigmod/00007CPO/4502/SIG011000/05 5 July 2007 PRESTON Architecture Version 3.0 Synopsis This document presents an architecture for PRES...
DocumentRelease Date: 2016-01-29 Document Date: 2008-01-01
This GCHQ manual from 2008 explains how analysts would unscramble the video signals from Israeli drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
SECRET ISUAV Video Descrambling Author: vereîon^ra Introduction Analogue video from Israeli UAVs has been intercepted in both clear (i.e. unencrypted) and scrambled (i.e. encrypted...
DocumentRelease Date: 2015-09-25 Document Date: 2009-11-06
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif: UK TOP SECRET//COMINT//REL FVEY Broadcast/lnternet Radio Exploitation and Analysis 6th November 2009 OPD-NAC Distribution (via email) (ST2) BS...
Afghanistan (AFG/AF), Algeria (DZA/DZ), Argentina (ARG/AR), China (CHN/CN), Czech Republic (CZE/CZ), Egypt (EGY/EG), France (FRA/FR), Germany (DEU/DE), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Italy (ITA/IT), Japan (JPN/JP), Kazakhstan (KAZ/KZ), Mauritania (MRT/MR), Mexico (MEX/MX), Netherlands (NLD/NL), Pakistan (PAK/PK), Romania (ROU/RO), Russia (RUS/RU), Singapore (SGP/SG), South Africa (ZAF/ZA), Spain (ESP/ES), Sudan (SDN/SD), Tanzania (TZA/TZ), Ukraine (UKR/UA), United Kingdom (GBR/GB), United States (USA/US), Zimbabwe (ZWE/ZW)
DocumentRelease Date: 2015-06-22
These undated slides from GCHQ’s National Defence Intelligence and Security Team claim that the agency collects “around 100,000,000 malware events per day”: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
GCHQ's developing Cyber Defence Mission Reduce vulnerability Reduce harm Enable prosperity TOP SECRET 5EYES The Cyber Defence Mission Support national situational awareness - Supp...
DocumentRelease Date: 2015-09-25 Document Date: 2009-01-01
This GCHQ presentation from 2010 describes the extent of the agency’s cable-tapping and plans for the future: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
200g-iris-access-p1-normal.gif: Supporting Internet Operations Supporting Internet Operations Special Source Access200g-iris-access-p2-normal.gif: StEPM—O MamiOpi«HM> 15 mins to cover:...
DocumentRelease Date: 2014-06-18 Document Date: 2012-09-19
This internal NSA post dated 19 September 2012, describes GCHQ’s operation Tempora which, make “more than 40 billion pieces of content a day” available to analysts from both agencies: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
(C//REL) TEMPORA -- "The World s Largest XKEYSCORE" - Is Now Available to Qualified NSA Users (U//FOUO) NSA Integree at GCIIQ Run Date: 09/19/2012 (U//FOUO) SIGINT analysts: We have all...