Filtered By
United Kingdom (GBR/GB) X
Countries Mentioned [filter]
Results
212 Total
0.0

Cable Master List

Document

Release Date: 2014-11-25 Document Date: 2009-07-27
These July 2009 documents provide a full list of the fibre-optic cables GCHQ had access to at that point, including details of location, bandwidth and corporate partners: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. […]
partner_cables.pdf:  Partner Cable UK? REMEDY GERONTIC DACRON LITTLE PINNAGE STREET CAR VITREOUS Apolo UK IRU/LC DCO IRU/LC IRU/LC IRU/LC CANTAT 3 UK DCO IRU/LC Concerto UK D...
0.0

Satellite Transport Knowledge

Document

Release Date: 2014-09-14
This undated GCHQ document reporting on the activities of its installation at Bude in Cornwall, describes the infiltration of three German satellite comnunications providers, Stellar, Cetel and IABG. The document includes server details, network graphs, customer login details and the personal details of network engineers: see the Intercept article New Zealand Launched Mass Surveillance Project […]
TOP SECRET STR A PI iijj Çjp ■ GCHQ Bude Sigint Development NAC BUDE Partnership SATELLITE TELEPORT KNOWLEDGE Contents UStellar Auton om ou s Sy ste m : 35207 IP Ranges: ...
0.0

Palestinian Authority Security Forces (PASF)

Document

Release Date: 2014-08-04 Document Date: 2008-07-01
This extract from a July 2008 GCHQ reveals that the agency received information from the Palestine Authority Security Forces (PASF): see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
Since the Gaza Strip is the centre of the HAMAS organizations popularity and the site of frequent clashes between HAMAS and FATAH supporters, Israeli forces and Palestinian militants as well as...
0.0

MHS Leverages XKS for Quantum Against Yahoo and Hotmail

Document

Release Date: 2014-03-12
This extract from an NSA document describes research into Quantum tools being performed at Menwith Hill in the UK: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
(U) MHS Leverages XKS for QUANTUM Against Yahoo and Hotmail TOP SECRET//SI//REL TO USA, FVEY (TS//SI//REL) MHS Leverages XKEYSCORE Deep-Dive Packet Analysis to Identify Feasibility of QUANTU...
0.0

TURMOIL

Document

Release Date: 2014-03-12
These slides from an NSA presentation show how the automated malware deployment tool Turbine depends on a network of passive collection sensors (Turmoil), installed at locations including Fort Meade in Maryland, Misawa in Japan and Menwith Hill in the UK: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Sensors: Passive Collection \ Internet * Cloud Internet 1 Cloud Internet <1 Cloud pUttMQJ.l I (S//SI//REÜ High-spe...
0.0

Knowing what we have – Guiding Light

Document

Release Date: 2014-05-13 Document Date: 2011-01-01
This extract from a 2011 GCHQ presentation illustrates the sheer scale (“massive access”) of the agency’s collection operations: see the book No Place To Hide, 13 May 2014.
Page 100 UK TOP SECRET STRAP 1 COMINT REL TO UK/US/AUS/CAN/NZ EYES ONLY Knowing what we have - Guiding Light ■ GCHQ has massive access to international internet communications ■ We re...
0.0

Why TARMAC?

Document

Release Date: 2014-05-13
This slide from a GCHQ presentation to the 2010 Five Eyes conference outlines features of the agency’s interception of satellite traffic, based at Menwith Hill in the UK: see the book No Place To Hide, 13 May 2014.
Page 97 TOP SECRET//COMINT/REL TO USA, FVEY Why TARMAC? • MHS has a growing FORNSAT mission. - SHAREDVISION mission. - SigDev (“Difficult Signals collection”). I - ASPHALT (“Coll...
0.0

Intelligence Need Released to Third Parties

Document

Release Date: 2017-09-13 Document Date: 2005-02-16
The NSA released its first-ever "intelligence need" ”” a request for assistance in collecting signals intelligence from Second and Third Party partners ”” in monitoring a specific information target relating to the Iraqi election. An Italian partner responded with an extensive report.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Intelligence Need Released to Third Parties FROM: formerly of FAD's SID Operations...
0.0

SID Leaders Head to the UK for Bi-lat

Document

Release Date: 2017-09-13 Document Date: 2005-01-10
Senior leadership of the Signals Intelligence Directorate travel to the U.K. for bilateral talks on governance issues with colleagues from GCHQ.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) SID Leaders Head to the UK for Bi-lat FROM: SIGINT Communications Unknown Run Date:...
0.0

CANSLOW Can't Slow Down!

Document

Release Date: 2017-04-24 Document Date: 2004-12-20
A description of CANSLOW, the NSA's Canadian Special Liaison Office within Canada's Communications Security Establishment intelligence agency.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI/ TK // REL TO USA AUS CAN GBR N2L (U) CANSLOW Can’t Slow Down! FROM: _ Deputy" laison cer - CANSLOW Run Date: 12/...
0.0

InSIDer's View of History: 'Soviet Rocket' Strikes Chicksands

Document

Release Date: 2016-12-07 Document Date: 2004-04-02
Author shares an anecdote about a fake Soviet rocket that lieutenants made as a prank in 1957 during the race between the U.S. and the Soviet Union to launch an ICBM.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) InSIDer's View of History : 'Soviet Rocket' Strikes Chicksands<br>FROM: Al Gray...
0.0

CRD Launches 'CRD Forward' Initiative with Roadshow to Germany and the UK

Document

Release Date: 2016-12-07 Document Date: 2004-03-23
The Customer Relationships Directorate leadership traveled to U.S. Europe Command in the United Kingdom and Germany.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) CRD Launches 'CRD Forward' Initiative with Roadshow to<br>Germany and the UK<br...
0.0

MG Q, Where Are You?

Document

Release Date: 2016-08-10 Document Date: 2003-09-10
The SID director and other leadership will attend an annual conference with Australia and New Zealand partners.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) MG Q, Where Are You?<br>FROM:<br>SIGINT Communications<br>Run Date: 09/10/2003<b...
0.0

ConSIDer This: The ABC's of Second Party Liaison

Document

Release Date: 2016-05-16 Document Date: 2003-08-13
Special U.S. Liaison Offices are representatives to the second-party countries (the U.K., Canada, Australia, and New Zealand) for cryptologic collaboration. The Foreign Affairs Directorate has officers overseeing second-party matters at Fort Meade, and each second party maintains a senior liaison at NSA.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) ConSIDer This: The ABC's of Second Party Liaison<br>FROM: SIGINT Communica...
0.0

Support to UN Diplomatic Efforts on Iraq

Document

Release Date: 2016-05-16 Document Date: 2003-04-07
U.N. Ambassadors Negroponte (U.S.) and Greenstock (U.K.) congratulate NSA for the quality of SIGINT in the lead-up to the Iraq War.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) Support to UN Diplomatic Efforts on Iraq<br>FROM: Chris Inglis<br>Deputy Dir...
0.0

Ob DOODY – Mullah Niaz Muhammed – IS3673

Document

This ISAF document from February 2011 provides a record of the helicopter strike on Mullah Niaz Muhammed, which resulted in two innocent civilians being killed: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
a pi ^ Headquarters Task Force HeimanfJ Dynamic Target Storyboard RC(SW) - TFH J3 Tgts - Op STEN TAKAY Obj DOODY - Mullah Niaz Muhammed - IS3673 Unit: TFH J3 Tgts Objective: DOODY B...
0.0

SSL/TLS Experiment Profile

Document

Release Date: 2014-12-28 Document Date: 2010-01-01
This GCHQ Experiment Profile from 2010 proposes a joint NSA/GCHQ trial of SSL decryption on a massive scale: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET STRAP1 Experiment Profile Experiment Name Cryptanalytic Services Experiment Reference Version Date Experiment Owner (GCHQ) Department NSA/S3/CES GCHQ/PTD Experiment Start...
0.0

Software reverse engineering

Document

Release Date: 2015-06-22 Document Date: 2008-07-15
This GCHQ document last updated on 15 June 2008 describes the purpose of the agency’s attempts to reverse engineer commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET Software Reverse Engineering Network Defence performs reverse engineering both of malicious and of non- malicious code - i.e,.code is translated from machine-readable to human-re...
0.0

SIRDCC Speech Technology WG assessment of current STT technology

Document

Release Date: 2015-05-05 Document Date: 2009-12-07
This GCHQ document from 7 December 2009 provides an assessment of current progress in speech to text technology from the agency’s Speech Technology Working Group: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
UK SECRET STRAP1 B/7655BA/1400/00006/018/0 7 December 2009 SIRDCC Speech Technology WG assessment of current STT technology Security Service have asked the SIRDCC Speech Technology Worki...
0.0

HTTP Activity vs. User Activity

Document

Release Date: 2015-07-01 Document Date: 2009-06-19
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL m V HTTP Activity vs User Activity 19 June 2009 Derived From: NSA/CSSM 1-52 Bated :l2007i MM TOP SEC...
0.0

OP HIGHLAND FLING – Event Log

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki shows some of the background to the agency’s attack on Dutch SIM manufacturer Gemalto, specifically the harvesting of facebook cookies associated with the firm’s staff: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
op-highland-fling-event-log-p1-normal.gif: TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCW...
0.0

Access: The Vision

Document

Release Date: 2015-09-25 Document Date: 2010-07-01
This GCHQ document from July 2010 looks forward to agency goals for 2013, including the aspiration to build “the world’s biggest SIGINT engine”: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
access-the-vision-for-2013-p1-normal.gif: ACCESS: THE VISION SECRET In 2013, we will have access to, and make readily available, data of the highest value possible to facilitate cyber ope...
0.0

Target Detection Identifiers

Document

Release Date: 2015-09-25 Document Date: 2009-03-01
This GCHQ presentation from March 2009 shows that the agency has targeted a number of popular websites in a concerted effort to harvest cookies (“target detection indentifiers”) on a massive scale: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
tdi-introduction-p1-normal.gif: Target Detection Identifiers c This rtcrmation is exempt under the Freedom of Irfbrmation Act 2000 (FOIA) and may be exempt under other UK information legislati...
0.0

PRESTON Architecture

Document

Release Date: 2016-06-07 Document Date: 2007-07-05
This GCHQ document dated 5 July 2007 provides technical information about PRESTON, the British system for intercepting the communications of targets under warrant: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
SECRET STRAP 1 UK EYES PRESTON Architecture Sigmod/00007CPO/4502/SIG011000/05 5 July 2007 PRESTON Architecture Version 3.0 Synopsis This document presents an architecture for PRES...
0.0

ISUAV Video Descrambling

Document

Release Date: 2016-01-29 Document Date: 2008-01-01
This GCHQ manual from 2008 explains how analysts would unscramble the video signals from Israeli drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
SECRET ISUAV Video Descrambling Author: vereîon^ra Introduction Analogue video from Israeli UAVs has been intercepted in both clear (i.e. unencrypted) and scrambled (i.e. encrypted...
0.0

Broadcast/Intenet Radio Exploitation and Analysis

Document

Release Date: 2015-09-25 Document Date: 2009-11-06
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif: UK TOP SECRET//COMINT//REL FVEY Broadcast/lnternet Radio Exploitation and Analysis 6th November 2009 OPD-NAC Distribution (via email) (ST2) BS...
0.0

Crypt Discovery Joint Collaboration Activity

Document

Release Date: 2015-09-25 Document Date: 2011-01-20
This joint NSA/GCHQ research paper dated 20 January 2011 cites encryption as a threat impacting on both agencies: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
crypt-discovery-activity-p1-normal.gif: TOP SECRET Crypt Discovery Joint Collaboration Activity 20 January 2011 Activity Owners I H/nsa Overview Our Internet Exploitation capabil...
0.0

The London Bombings — an Insider’s View

Document

Release Date: 2018-03-01 Document Date: 2005-08-24
This 2005 post from the NSA internal newsletter SIDToday gives a personal account of the 7/7 London bombings from the head of the agency’s delegation in London: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) The London Bombings -- an Insider's View FROM: Chief ofoperations, SUSLOL London...
0.0

NSA Intelligence Relationship with New Zealand

Document

Release Date: 2015-03-10 Document Date: 2013-04-01
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
0.0

Open Source for Cyber Defence/Progress

Document

Release Date: 2015-02-04
This page from GCHQ’s internal GCWIki, last modified on 25 June 2012, enumerates open-source data sets that are available in various agency databases: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click lo reporl inappropriale conlenl. For GCWiki help conlacl: webleam [REDACTED] Suppor p...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh