Filtered By
United Kingdom (GBR/GB) X
Countries Mentioned [filter]
Secret X
Classification [filter]
Results
29 Total
0.0

Global Collaboration Environment (GCE)

Document

Release Date: 2018-03-01 Document Date: 2013-04-10
This set of NSA talking points, dated 10 April 2013, outlines a plan for continuing the GCE intelligence-sharing arrangement beyond the Afghan war, which NSA and GCHQ would collaborate on closely: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.
SECRET//SI//REL TO USA, GBR (U) Topic: Global Collaboration Environment (GCE) (U//FOUO) Director's Talking Points: • (S//REL TO USA, GBR) Thank GCHQ for giving full support to GCE, and for...
0.0

Intrusion Analysis / JeAC

Document

Release Date: 2015-06-22 Document Date: 2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1 Intrusion Analysis/JeAC The IA team conducts all-source analysis both of emerging and current electronic attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...
0.0

ACNO Skill Levels: Malware Analysis & Reverse Engineering

Document

Release Date: 2015-06-22
This undated GCHQ training document details the requirements for analysts engaged in the reverse engineering of commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
SECRET ACNO Skill 12: Malware Analysis & Reverse Engineering Knowledge of: • Relevant Operating Systems. • Current trends in attack vectors & targeted applications / protocols / services...
0.0

OPA~TAS Covert Mobile Phones Policy

Document

Release Date: 2014-08-12 Document Date: 2010-06-28
These GCHQ guidelines from 23 June 2010 describe procedures for operating mobile phones overseas which are not intended to be associated with agency activity: see the Intercept article NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting, 12 August 2014.
SECRET Ref: DOT/1636/5040/102 28 June 2010 OPA~TAS Covert Mobile Phones Policy Author: Issue 1.0 Page 1 of 6 SECRET This information is exempt from disclosure under the Fr...
0.0

Conference Eyes Data Flow Among Second Parties

Document

Release Date: 2017-04-24 Document Date: 2004-11-16
The Five Eyes partners held a conference to discuss the standardization of data formats to ease the exchange of voice, text, fax, and digital network intelligence.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Conference Eyes Data Flow Among Second Parties<br>FROM: <br>Chief, Data Flow an...
0.0

Interview with... Charlie Meals, Signals Intelligence Deputy Director

Document

Release Date: 2017-04-24 Document Date: 2004-10-13
In an interview, the deputy director describes his early days in the NSA's "weather shop," decrypting Soviet weather reports.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Interview with... Charlie Meals, Signals Intelligence<br>Deputy Director<...
0.0

PRESTON Business Processes

Document

Release Date: 2016-06-07 Document Date: 2007-05-08
This GCHQ document dated 8 May 2007 provides technical information about PRESTON, the British system for intercepting the communications of targets under warrant: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
SECRET STRAP 1 PRESTON Business Processes Sigmod/00003CPO/4502/SIG010900/23 8 May 2007 PRESTON Business Processes Version 1.0 Synopsis The purpose of this document is to present ...
0.0

UN Peacekeeping in Sub-Saharan Africa: A Growth Industry

Document

Release Date: 2016-12-07 Document Date: 2004-03-16
An article describes the current state of U.N. peacekeeping operations in sub-Saharan Africa and predicts growth in missions and personnel. There is no mention of NSA or SID participation.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) UN Peacekeeping in Sub-Saharan Africa: A Growth Industry<br>FROM:<br>Deputy SIN...
0.0

PHANTOM PARROT

Document

Release Date: 2017-09-23 Document Date: 2009-05-27
This page from GCHQ’s internal GCWiki, dated 27 May 2009 describes a system for querying mobile phone information acquired during port stops: see the Intercept article Airport Police Demanded An Activist’s Passwords. He Refused. Now He Faces Prison In The UK, 23 September 2017.
UK SECRET The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam RUSSETT Support page PHANTOM PA...
0.0

Second Party National Identity Rules, continued

Document

Release Date: 2015-03-08 Document Date: 2012-01-01
This extract from a 2012 NSA document detailing how different Five Eyes countries define their own nationals shows that the GCSB allowed itself the right to surveil the governments of the Cook Islands and Nuie “but not their citizens”: see the Sunday Star Times article Snowden files: Inside Waihopai’s domes, 8 March 2015.
SECRET//COMINT//REL TO USA, FVEY (U) Second Party National Identity Rules, Continued Section B.4. - (U) New Zealand: Government Communications Security Bureau (GCSB) B.4.1. (U) Governmen...
0.0

Sensitive Metadata Analytic Collaboration (SMAC) Concept of Operations

Document

Release Date: 2018-03-01 Document Date: 2006-10-01
This NSA briefing from October 2006 underlines how the Alice Springs Resolution of 2004, designed to allow “unfettered” metadata sharing within the Five Eyes, was put into action in the aftermath of the 7/7 London bombings, with procedures for use of the resulting SMAC system: see the Intercept article How London’s 7/7 Bombings Led to […]
SECRET//REL TO USA, AUS, CAN, GBR, NZL//22012031 Sensitive Metadata Analytic Collaboration (SMAC) Concept of Operations October 2006 Background In June 2004 via the Alice Springs Resolut...
0.0

Contact Chaining

Document

Release Date: 2018-03-01
This undated GCHQ presentation, which includes speaking notes, outlines different techniques for contact chaining – moving from one contact to find all those associated with it: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
SECRET STRAP 1 Slide 15 © Crown Copyright. All rights reserved. This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under oth...
0.0

Crypt Ops Data Store User Guide

Document

Release Date: 2014-12-28
This undated GCHQ document provides guidance for analysts on how to handle encrypted data: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
SECRET Crypt Ops Data StoreUserGuide Crypt Ops Datastore DataStore Rota: -Data Store to be reviewed weekly at the DataStore management meeting The Tasking Process Submitting a Ta...
0.0

Third Party Partners

Document

Release Date: 2013-12-08
This short excerpt from an NSA document shows that nine European States – Belgium, Denmark, France, Germany, Italy, The Netherlands, Norway, Spain and Sweden – have a second-tier ‘third party’ relationship with the agency: see the SVT article NSA “asking for” specific exchanges from FRA – Secret treaty since 1954, 8 December 2013.
* (S//SI. REU) SSEU’R. members are the Five Eyes nations (Australia, Canada. New Zealand, United Kingdom and United States] and the following Tliird Party partners: Belgium, Denmark, France, Germ...
0.0

InSIDer's View of History: 'Soviet Rocket' Strikes Chicksands

Document

Release Date: 2016-12-07 Document Date: 2004-04-02
Author shares an anecdote about a fake Soviet rocket that lieutenants made as a prank in 1957 during the race between the U.S. and the Soviet Union to launch an ICBM.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) InSIDer's View of History : 'Soviet Rocket' Strikes Chicksands<br>FROM: Al Gray...
0.0

CRD Launches 'CRD Forward' Initiative with Roadshow to Germany and the UK

Document

Release Date: 2016-12-07 Document Date: 2004-03-23
The Customer Relationships Directorate leadership traveled to U.S. Europe Command in the United Kingdom and Germany.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) CRD Launches 'CRD Forward' Initiative with Roadshow to<br>Germany and the UK<br...
0.0

ConSIDer This: The ABC's of Second Party Liaison

Document

Release Date: 2016-05-16 Document Date: 2003-08-13
Special U.S. Liaison Offices are representatives to the second-party countries (the U.K., Canada, Australia, and New Zealand) for cryptologic collaboration. The Foreign Affairs Directorate has officers overseeing second-party matters at Fort Meade, and each second party maintains a senior liaison at NSA.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) ConSIDer This: The ABC's of Second Party Liaison<br>FROM: SIGINT Communica...
0.0

Support to UN Diplomatic Efforts on Iraq

Document

Release Date: 2016-05-16 Document Date: 2003-04-07
U.N. Ambassadors Negroponte (U.S.) and Greenstock (U.K.) congratulate NSA for the quality of SIGINT in the lead-up to the Iraq War.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) Support to UN Diplomatic Efforts on Iraq<br>FROM: Chris Inglis<br>Deputy Dir...
0.0

SIRDCC Speech Technology WG assessment of current STT technology

Document

Release Date: 2015-05-05 Document Date: 2009-12-07
This GCHQ document from 7 December 2009 provides an assessment of current progress in speech to text technology from the agency’s Speech Technology Working Group: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
UK SECRET STRAP1 B/7655BA/1400/00006/018/0 7 December 2009 SIRDCC Speech Technology WG assessment of current STT technology Security Service have asked the SIRDCC Speech Technology Worki...
0.0

PRESTON Architecture

Document

Release Date: 2016-06-07 Document Date: 2007-07-05
This GCHQ document dated 5 July 2007 provides technical information about PRESTON, the British system for intercepting the communications of targets under warrant: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
SECRET STRAP 1 UK EYES PRESTON Architecture Sigmod/00007CPO/4502/SIG011000/05 5 July 2007 PRESTON Architecture Version 3.0 Synopsis This document presents an architecture for PRES...
0.0

ISUAV Video Descrambling

Document

Release Date: 2016-01-29 Document Date: 2008-01-01
This GCHQ manual from 2008 explains how analysts would unscramble the video signals from Israeli drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
SECRET ISUAV Video Descrambling Author: vereîon^ra Introduction Analogue video from Israeli UAVs has been intercepted in both clear (i.e. unencrypted) and scrambled (i.e. encrypted...
0.0

Mobile Theme Briefing

Document

Release Date: 2014-01-27 Document Date: 2010-05-28
Six slides from a 28 May 2010 GCHQ presentation on intercepting mobile phone data, describing the agency’s many tools for compromising individual handsets and weaknesses within national networks and international roaming exchanges (GRXs). Note that these are the first versions of these documents to be released online: see the Guardian article NSA and GCHQ target […]
SECRET STRAP 1 MOBILE THEME BRIEFING MAY 28 2010 MORE - mobile technologies, networks, signals & locations FASTER - developments against new mobile internet applications BETTER - ...
0.0

AURORAGOLD Working Group

Document

Release Date: 2014-12-04 Document Date: 2012-06-06
This 26-page NSA document, originally presented at 2012’s Five Eyes SIGDEV conference, gives a detailed overview of the agency’s information gathering on world mobile phone networks. Some intercepted technical and contact details have been redacted: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//SI//REL TO FVEY (U//FOUO) AURORAGOLD Working Group (S//SI//REL) Shaping understanding of the global GSm/uMTS/LTE landscape SIGDEV Conference - 6 June 2012 This briefing is cl...
0.0

SIGINT Contributes to Massive Cocaine Seizure

Document

Release Date: 2017-04-24 Document Date: 2004-09-01
The author writes a brief SIGINT success story. "British cryptologists at GCHQ successfully broke encrypted faxes" from a narcotics smuggling vessel, then the vessel was geolocated using the SEADIVER and CANYONDUST systems. The resulting seizure included 5.4 tons of cocaine at a value of $689 million.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) SIGINT Contributes to Massive Cocaine Seizure<br>FROM: <br>CANYONDUST Progr...
0.0

Pacific SIGINT Development Conference

Document

Release Date: 2016-12-07 Document Date: 2004-05-13
Report from the April 2004 SIGDEV conference, held in Hawaii.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Pacific SIGINT Development Conference<br>FROM:<br>GCHQ Integree, SIGINT S...
0.0

GCHQ COMSAT Report

Document

Release Date: 2015-08-03 Document Date: 2010-07-02
This page taken from a longer 2 July 2010 GCHQ report on the state of its COMSAT capabilities (against communications satellites) confirms that “NSA has historically been a large source of funding” for this aspect of the agency’s activies: see the Intercept article GCHQ and Me: My Life Unmasking British Eavesdroppers, 3 August 2015. Download […]
SECRET MTI/00001CPO/4521/S03006/000/07 TCP-MP69-STG-001 2 July 2010 I. BACKGROUND 5. GCHQ currently owns three sites that are involved in COMSAT access: CARBOY, SOUNDER and SNICK. Thes...
0.0

The Digint Programme

Document

Release Date: 2016-06-07 Document Date: 2010-02-12
This draft report from 12 February 2010, prepared by officials from the UK intelligence services for review by the Cabinet Office and HM Treasury is frank about the challenges brought about by bulk collection: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
UK SECRET DRAFT The Digint Programme (DRAFT VERSION 0.11) The purpose of this document to provide background for HMT and the Cabinet Office on the Security Service's Digint Programme. [I...
0.0

Voice/Fax User Group Minutes of January 2008 meeting

Document

Release Date: 2018-01-19 Document Date: 2008-01-01
This extract from the January 2008 minutes of GCHQ’s Voice/Fax User Group (VFUG) discusses a November 2007 visit to NSA and being shown a version of Voice RT, which is described as a “one-stop shop” for voice-related insights: see the Intercept article Finding Your Voice, 19 January 2018.
SECRET STRAP1 a) Visit to R64, NSA and^^^^^^J from B14 visited our opposite numbers in R64 at NSA during the last week in November. The aim of the visit was threefold: i. to learn about t...
0.0

NSA Team Selected for Olympics Support

Document

Release Date: 2016-08-10 Document Date: 2003-12-15
SID had many openings for analytic support for the 2004 Summer Olympics in Greece, and the response was “overwhelming.” The article lists eight people selected out of 300 applicants.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) NSA Team Selected for Olympics Support<br>FROM: NSA Olympics Support Team<...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh