Filtered By
United Kingdom (GBR/GB) X
Countries Mentioned [filter]
Results
212 Total
0.0

INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers

Document

Release Date: 2015-02-04 Document Date: 2010-05-06
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET a/ SI / TK // REL TO USA AUS CAN GBR NZL SID Today archi“s reedback iBi ■ ■ ■ Welcome! Saturday, 10 Nov 2012 1 1 B ...
0.0

Selector types

Document

Release Date: 2014-03-12
This slide lists the range of selectors the Turmoil infrastructure at UK base Menwith Hill can use to identify targets, many of which show the ability of Five Eyes agencies to piggyback on commercial services: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, FVEY Selector Types Machine IDs - Cookies • Hotmail GUIDs • Google prefIDs • YahooBcookies • mallruMRCU • yandexUid • twitter Hash • r...
0.0

Psychology: a new kind of SIGDEV

Document

Release Date: 2014-01-27 Document Date: 2012-01-01
This GCHQ presentation from 2012 outlines the agency’s ability to monitor internet use major social media networks in real time, using tools called Squeaky Dolphin, Fire Ant and Anticrisis Girl: see the NBC News article Snowden docs reveal British spies snooped on YouTube and Facebook, 27 January 2014.
TOP SECRET//SI//REL TO USA, FVEY GCHQ Psychology A New Kind of SIGDEV Establishing the Human Science Operations Cell TOP SECRET//SI//REL TO USA, FVEY TOP SECRET//SI//REL TO USA, ...
0.0

Mobile Theme Briefing

Document

Release Date: 2014-01-27 Document Date: 2010-05-28
Six slides from a 28 May 2010 GCHQ presentation on intercepting mobile phone data, describing the agency’s many tools for compromising individual handsets and weaknesses within national networks and international roaming exchanges (GRXs). Note that these are the first versions of these documents to be released online: see the Guardian article NSA and GCHQ target […]
SECRET STRAP 1 MOBILE THEME BRIEFING MAY 28 2010 MORE - mobile technologies, networks, signals & locations FASTER - developments against new mobile internet applications BETTER - ...
0.0

Content Extraction Enhancements for Target Analytics

Document

Release Date: 2014-01-16 Document Date: 2011-06-09
This NSA presentation from 9 June 2011 shows the scale of the agency’s collection of SMS messages (codenamed Dishfire) and describes the operation of the Prefer analysis tool: see the Guardian article, NSA collects millions of text messages daily in ‘untargeted’ global sweep, 16 January 2014.
TOP SECRET//COMINT//REL TO USA, FVEY//20320108 Content Extraction Enhancements For Target Analytics: SMS Text Messages: A Goldmine to Exploit 9 June, 2011 Presenters: With Wor...
0.0

AURORAGOLD Working Group

Document

Release Date: 2014-12-04 Document Date: 2012-06-06
This 26-page NSA document, originally presented at 2012’s Five Eyes SIGDEV conference, gives a detailed overview of the agency’s information gathering on world mobile phone networks. Some intercepted technical and contact details have been redacted: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//SI//REL TO FVEY (U//FOUO) AURORAGOLD Working Group (S//SI//REL) Shaping understanding of the global GSm/uMTS/LTE landscape SIGDEV Conference - 6 June 2012 This briefing is cl...
0.0

National Initiative Protection Program – Sentry Eagle

Document

Release Date: 2014-10-10 Document Date: 2004-11-23
This document, produced by the NSA and the US military’s Joint Functional Component Command – Network Wardare, provides a briefing on, and classification guide to, the highly sensitive group of “core computer network operations secrets” codenamed SENTRY EAGLE: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN//20310524 DRAFT (S) National Security Agency/Central Security' Service (NSA/CSS) and U.S. Strategic Command Joint Functional Component Command - Net...
0.0

Turkey at the G20 Pre-Meeting in London, September 2-5, 2009

Document

Release Date: 2014-08-31 Document Date: 2009-01-01
This GCHQ document from 2009 sets out surveillance priorities from a meeting of the G20’s Finance Ministers, which include the personal surveillance of the then Turkish Finance Minister Mehmet Simsek, who also holds UK and Turkish dual citizenship: see the Intercept article How the NSA Helped Turkey Kill Kurdish Rebels, 31 August 2014.
TOP SECRET STRAP 1 COMINT Turkey at the G20 pre-meeting in London September 2-5 2009 Contents ■ 1 (520 pre-meeting in London <#G20_pre-meeting_in_London> ■ 2 Objective <#Objective> ...
0.0

JSA Restrictions

Document

Release Date: 2013-06-18
This undated article from GCHQ’s internal GCWIki gives technical details about the US-German Joint Sigint Activity group: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
TOP SECRET STRAP 1 COMINT JSA Restrictions Access Central: Targeting Tar g e tin g and selector □ AC Logo Red. png management are services that Access Central offers. This in...
0.0

NSA Intelligence Relationship with Germany – Bundesnachrichtendienst (BND)

Document

Release Date: 2014-06-18 Document Date: 2013-01-17
This internal NSA briefing dated 17 January 2013 describes the current state of the US-German intelligence relationship and mentions that “The BND has been working to influence the German Government to relax interpretation of the privacy laws over the long term to provide greater opportunity for intelligence sharing”: see the Der Spiegel article New NSA […]
TOP SECRET//S1//NOFORN National Security Agency/Central Security Service Information Paper 17 January 2013 Subject: (StfREL TO USA, FVEY} NS A Intelligence Relationship with Germany - B...
0.0

FY2013 Foreign Partner Review

Document

Release Date: 2014-05-13 Document Date: 2013-01-01
This slide, taken from the NSA’s annual review of its cooperation with foreign partners, shows an expansion in the agency’s international relationships: see the book No Place To Hide, 13 May 2014.
Page 123 TOP SECRET// COMINT //REL USA, AUS, CAN, GBR, NZL Approved SIGINT Partners ^ORTUtt^ Second Parties Third Parties Australia Algeria Israel Spain Canada Austria Italy Sweden...
0.0

GCHQ NAC Business Review – July to September 2011

Document

Release Date: 2014-12-13 Document Date: 2011-01-01
This extract from a 2011 GCHQ document details progress in the operation against Belgian telecommunications company Belgacom in the third quarter of 2011: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
CNE Access to BELGACOM GRX Operator: (GREEN) Following the successful NAC MyNOC OP SOCIALIST to provide CNE access to the BELGACOM GRX Operator (MERION ZETA), the NAC have continued to provide a...
0.0

Counterterrorism Coalition Conference Marks Several Firsts

Document

Release Date: 2017-09-13 Document Date: 2005-06-14
At a meeting of counterterrorism analysts from 12 participating nations, there was agreement on the exchange of telephony metadata and facilitating the exchange of call chaining diagrams.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) Counterterrorism Coalition Conference Marks Several Firsts FROM: FAD's Special Advisor t...
0.0

SIGINT Seniors Pacific - An Update

Document

Release Date: 2017-09-13 Document Date: 2005-06-09
The eight founding members of the Signals Intelligence Seniors Pacific Principals -- Australia, Canada, South Korea, New Zealand, Thailand, Singapore, the U.K., and the U.S. -- met to formalize and establish parameters for their mission of sharing SIGINT that could aid in counterterrorism efforts in the Asia-Pacific region.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI) SIGINT Seniors Pacific - An Update FROM: Chief of the Foreign Affairs Directorate's ...
0.0

MGQ! Where Are You?

Document

Release Date: 2017-04-24 Document Date: 2004-10-01
The SIGINT director will travel to the UK for an annual meeting of NSA and GCHQ leadership.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) MGQ! Where Are You?<br>FROM: SIGINT Communications<br>Unknown<br>Run Date: 10/0...
0.0

Brits at NSA: The United Kingdom of Great Britain and Northern Ireland Liaison Office, NSA (or UKLO for short)

Document

Release Date: 2017-04-24 Document Date: 2004-09-10
About 40 civilian and military GCHQ employees are based with the NSA through the U.K. Liaison Team. They coordinate visits from British government and intelligence officials and work to build and enhance collaborations between the two agencies.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SI TK REL TO USA AUS CAN GBR NZL<br><br>Brits at NSA: The United Kingdom of Great Britain and<br>Northern Ireland Liaison Office, NSA (or U...
0.0

SIGINT Contributes to Massive Cocaine Seizure

Document

Release Date: 2017-04-24 Document Date: 2004-09-01
The author writes a brief SIGINT success story. "British cryptologists at GCHQ successfully broke encrypted faxes" from a narcotics smuggling vessel, then the vessel was geolocated using the SEADIVER and CANYONDUST systems. The resulting seizure included 5.4 tons of cocaine at a value of $689 million.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) SIGINT Contributes to Massive Cocaine Seizure<br>FROM: <br>CANYONDUST Progr...
0.0

NSA and GCHQ Team Up to Tackle HF (repost)

Document

Release Date: 2017-04-24 Document Date: 2004-08-30
(Repost) After realizing that their technologies for collecting high frequency signals were obsolete, the NSA and GCHQ established the Joint Strategic Off-Air Programme, which jointly manages all HF/VHF/UHF collection as well as updates to legacy systems.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(C) NSA and GCHQ Team Up to Tackle HF (repost)<br>FROM: <br>Deputy Chief, RFO/Corpo...
0.0

The Saudi Assassination Plot -- How It Was Thwarted

Document

Release Date: 2018-03-01 Document Date: 2005-08-09
A plot by Libyan dictator Moammar Gadhafi to assassinate the Saudi Crown Prince was revealed by an alleged terrorist during interrogation and corroborated using signals intelligence. 
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) The Saudi Assassination Plot -- How It Was Thwarted FROM: Deputy Chief, Customer Account ...
0.0

Remember the Alamo!

Document

Release Date: 2017-09-13 Document Date: 2005-02-25
A staffer at the Medina Regional Security Operations Center in San Antonio highly recommends moving to the city, despite Texas's high car insurance premiums for teenagers.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Remember the Alamo! FROM: Chief, Communications and Support Services, NSA/CSS Texas (MRS...
0.0

Paradise Found

Document

Release Date: 2017-09-13 Document Date: 2005-01-28
An employee at the Kunia Regional Security Operations Center describes life on Oahu, where their only complaint is that "when it gets down to 70, I have to wear pants because it's too cold for shorts."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Paradise Found FROM: Chief J304, Analysis & Reporting Staff, Kunia RSOC Run Date: 01/28/...
0.0

Pacific SIGINT Development Conference

Document

Release Date: 2016-12-07 Document Date: 2004-05-13
Report from the April 2004 SIGDEV conference, held in Hawaii.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Pacific SIGINT Development Conference<br>FROM:<br>GCHQ Integree, SIGINT S...
0.0

SIGINT Directors Set Strategic Direction for 5-Eyes SIGINT Enterprise

Document

Release Date: 2016-08-10 Document Date: 2003-08-05
Describes a two-day planning session between SIGINT directors of Five Eyes spy agencies.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) SIGINT Directors Set Strategic Direction for 5-Eyes SIGINT<br>Enterprise<br>FROM...
0.0

5-Eyes Global Network Forum

Document

Release Date: 2017-04-24 Document Date: 2004-07-07
Canada's Communications Security Establishment hosted a meeting of representatives from the Five Eyes agencies to discuss how best to coordinate the collection of data from commercial services worldwide.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(C) 5-Eyes Global Network Forum<br>FROM: <br>GCHQ Integree, Link Access Planning an...
0.0

OSINT Fusion Project

Document

Release Date: 2015-07-01
This undated presentation from NSA’s UK-based Menwith Hill station describes the various uses of open source intelligence (OSINT) in computer network operations, including the monitoring of hacker forums and spotting opportunities for so-called “Fourth Party Collection”: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, FVEY OSINT FUSION PROJECT Lockheed Martin IS&GS Intelligence LOCKHEED MARTIN TOP SECRET//COMINT//REL TO USA, FVEY TOP SECRET//COMINT//REL TO USA,...
0.0

Full Log vs. HTTP

Document

Release Date: 2015-07-01 Document Date: 2009-06-11
This NSA presentation from 11 June 2009 explains the scope of metadata collection within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Log vs. HTTP 11 June 2009 * WHv:i DERIV TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//...
0.0

Operational Legalities

Document

Release Date: 2015-06-22
This 78-page GCHQ presentation, repeated with speaking notes, provides a full overview of the legal and oversight framework governing the agency’s activities: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015. operational-legalities-gchq-nov-28-2008
Operational Legalities Not for display • Beware: there are several hidden slides in this presentation. If you see this you will also see the other hidden ones. • To find which are hidde...
0.0

Legalities

Document

Release Date: 2015-09-25 Document Date: 2007-10-01
This GCHQ spreadsheet from October 2007 provides a guide to the permissibility of using named GCHQ and NSA databases and shows the absence of safeguards against exploiting the metadata of persons located in the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
As of Oct 2007 Legalities - GCHQ Databases eg Pilbeam. Salamanca, UDAQ etc in the event that both the nabo w/.<V and the location of the tar get is confirmed metadata content UK pers...
0.0

Next Generation Events (NGE) – BLACK HOLE ConOp

Document

Release Date: 2015-09-25 Document Date: 2009-08-18
This GCHQ document from 18 August 2009 describes BLACK HOLE, a massive data repository, and describes how this interacts with other systems developed by the agency: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
nge-black-hole-conop-p1-normal.gif: SECRET STRAP1 18th August 2009 Next Generation Events (NGE) - BLACK HOLE ConOp Author: l(TDB),| l(TSE), I |(TDB) Issue Date Author Amendm...
0.0

Sensitive Targeting Authorisation (STA) Reference COP5377

Document

Release Date: 2015-09-25
This internal GCHQ form, which is undated, shows the procedure UK analysts follow for surveilling, or searching through already-acquired data for information from a person or organisation in a “sensitive” location – including the British Isles: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
sensitive-targeting-authorisation-p1-normal.gif: Sensitive Targeting Authorisation (STA) Reference COP5377 STA: AUTHORITY TO TARGET AN INDIVIDUAL/ORGANISATION WITH A SENSITIVE NATIONALITY OR ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh