Filtered By
United Kingdom (GBR/GB) X
Countries Mentioned [filter]
Results
212 Total
0.0

GCHQ COMSAT Report

Document

Release Date: 2015-08-03 Document Date: 2010-07-02
This page taken from a longer 2 July 2010 GCHQ report on the state of its COMSAT capabilities (against communications satellites) confirms that “NSA has historically been a large source of funding” for this aspect of the agency’s activies: see the Intercept article GCHQ and Me: My Life Unmasking British Eavesdroppers, 3 August 2015. Download […]
SECRET MTI/00001CPO/4521/S03006/000/07 TCP-MP69-STG-001 2 July 2010 I. BACKGROUND 5. GCHQ currently owns three sites that are involved in COMSAT access: CARBOY, SOUNDER and SNICK. Thes...
0.0

TECA Product Centre

Document

Release Date: 2015-06-22 Document Date: 2011-04-28
This page from GCHQ’s internal GCWiki, last modified on 28 April 2011 provides a brief introduction to the work of the agency’s Technical Enabling Covert Access (TECA) Project Centre: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
TECA Product Centre - GCWiki TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help con...
0.0

GCHQ’s Developing Cyber Defence Mission

Document

Release Date: 2015-06-22
These undated slides from GCHQ’s National Defence Intelligence and Security Team claim that the agency collects “around 100,000,000 malware events per day”: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
GCHQ's developing Cyber Defence Mission Reduce vulnerability Reduce harm Enable prosperity TOP SECRET 5EYES The Cyber Defence Mission Support national situational awareness - Supp...
0.0

NAC 2Q 2011 Business Plan Review

Document

Release Date: 2015-04-02 Document Date: 2011-09-08
This short extract from a GCHQ Network Analysis Centre report covering the period July-September 2011 describes “offensive cyber operations” against Iran, Argentina and Libya: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET STRAP1 AUS/CAN/NZ/UK/US EYES ONLY \ 2Q NAC Business Plan Review July - September 2011 network >'N>n_,=*5i5 centre ,.A - . TOP SECRET STRAP1 AUS/CAN/NZ/UK/US EYES ONLY ...
0.0

What’s the worst that could happen?

Document

Release Date: 2016-02-02 Document Date: 2010-03-01
This GCHQ document from March 2010 presents a checklist of factors analysts should consider before going ahead with an operation to infiltrate a communications network, by physical or other means. Among the concerns raised is the risk that British actions may enable US authorities to conduct operations “which we would not consider permissible”: see the […]
TOP SECRET STRAP 1 What’s the worst that could happen? This document contains examples of specific risk which may affect operations and which may need to be considered when writing submissi...
0.0

NSA Team Selected for Olympics Support

Document

Release Date: 2015-09-29 Document Date: 2003-12-15
This 15 December 2003 post from the internal NSA newsletter SIDToday discusses plans for the agency’s operations at the Athens Olympics the following year: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
id-488-redacted-formatted-p1-normal.gif: DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) NSA Team Selected for Olympics Suppo...
0.0

Supporting Internet Operations

Document

Release Date: 2015-09-25 Document Date: 2009-01-01
This GCHQ presentation from 2010 describes the extent of the agency’s cable-tapping and plans for the future: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
200g-iris-access-p1-normal.gif: Supporting Internet Operations Supporting Internet Operations Special Source Access200g-iris-access-p2-normal.gif: StEPM—O MamiOpi«HM> 15 mins to cover:...
0.0

Report on Architectural Risk 2012 – Summary

Document

Release Date: 2015-09-25 Document Date: 2012-03-12
This GCHQ report summary from 12 March 2012 discusses the impact of the move to a “end-end big data strategy” on the agency’s infrastructure: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
architecture-risk-2012-p1-normal.gif: TOP SECRET STRAP 1 Report on Architectural Risk 2012 - Summary TOP SECRET STRAP 1architecture-risk-2012-p2-normal.gif: TOP SECRET STRAP1 Introduc...
0.0

ICTR Cloud Effects

Document

Release Date: 2015-09-25 Document Date: 2011-07-01
This GCHQ presentation from July 2011 discusses various technical aspects of “population-scale” datamining: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
cloud-developers-exchange-july-2011-p1-normal.gif: “ICTR Cloud Efforts” developing “canonical” SIGINT analytics, finding hard targets and exploratory data analysis at scale Data Mining Re...
0.0

Cyber Defence Operations Legal and Policy

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki shows that the agency’s usual retention periods for metadata and content can be extended for cyber defence purposes: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
cyber-defence-operations-legal-and-policy-p1-normal.gif: TOP SECRET STRAP 1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate cont...
0.0

In-Flight GSM

Document

Release Date: 2016-12-07 Document Date: 2009-01-01
This 2009 NSA presentation, based on an internal agency newsletter article from 20 March that year, describes the growth in airlines offering onboard mobile phone services, which the Agency had alreadyu been actively collecting for at least a year: see the Intercept article American and British Spy Agencies Targeted In-flight Mobile Phone Use, 7 December […]
TOP SECRET//COMINT//RELTO USA, FVEY \\ (U//FOUO) In-Flight GSM S32423/S3T1 The overall classification of this briefing is TOP SECRET//COMTNT//REI, TOP SECRET//COMINT//REL TO USA, FVE...
0.0

The Digint Programme

Document

Release Date: 2016-06-07 Document Date: 2010-02-12
This draft report from 12 February 2010, prepared by officials from the UK intelligence services for review by the Cabinet Office and HM Treasury is frank about the challenges brought about by bulk collection: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
UK SECRET DRAFT The Digint Programme (DRAFT VERSION 0.11) The purpose of this document to provide background for HMT and the Cabinet Office on the Security Service's Digint Programme. [I...
0.0

Innov8 VoiceAnalytics Experiment Profile

Document

Release Date: 2018-01-19 Document Date: 2010-03-29
This GCHQ experiment profile from March 2010 proposes a test of the effectiveness of GCHQ and NSA voice recognition systems: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET Experiment Profile Experiment Name Voice Analytics Experiment Reference Version 1.0 Date 29 March 2010 Experiment Owner Department T12 Experiment Start Date 5 July 2010 Exper...
0.0

Voice/Fax User Group Minutes of March 2009 meeting

Document

Release Date: 2018-01-19 Document Date: 2009-04-21
These GCHQ minutes from March 2009 discuss the deployment of BROADOAK voice recognition systems in the Middle East against Saudi, Pakistani, Georgian, and Iraqi leaders, among others: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET STRAP1 21 April 2009 VOICE/FAX USER GROUP Minutes of March 2009 meeting 1. B14/MCS update (courtesy of MCS work this month has been almost entirely updates to existing model...
0.0

Voice/Fax User Group Minutes of December 2010 meeting

Document

Release Date: 2018-01-19 Document Date: 2010-12-01
These GCHQ minutes from December 2010 describes NSA advances in using voice analytics – including identifying individual cell towers in Afghanistan where Arabic was being spoken: see the Intercept article Finding Your Voice, 19 January 2018.
<TOP SECRET STRAP 1> VOICE/FAX USER GROUP Minutes of December 2010 meeting b) Google Earth and the B3M VI The NSA speech research team (R66E) have a framework for the deployment of voice...
0.0

Voice/Fax User Group Minutes of January 2008 meeting

Document

Release Date: 2018-01-19 Document Date: 2008-01-01
This extract from the January 2008 minutes of GCHQ’s Voice/Fax User Group (VFUG) discusses a November 2007 visit to NSA and being shown a version of Voice RT, which is described as a “one-stop shop” for voice-related insights: see the Intercept article Finding Your Voice, 19 January 2018.
SECRET STRAP1 a) Visit to R64, NSA and^^^^^^J from B14 visited our opposite numbers in R64 at NSA during the last week in November. The aim of the visit was threefold: i. to learn about t...
0.0

The Saudi Assassination Plot — How It Was Thwarted

Document

Release Date: 2017-11-30 Document Date: 2005-08-09
In this 2005 article from the internal NSA newsletter SIDToday, an NSA employee credits the agency with securing the conviction of Abdurahman Alamoudi in the Eastern District of Virgina: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) The Saudi Assassination Plot -- How It Was Thwarted FROM :| DeputyChiefTCustomer...
0.0

Computer Network Exploitation

Document

Release Date: 2018-02-17
This undated GCHQ presentation gives an overview of the agency’s use of hacking techniques, including an explanation of what it perceived the legal position to be at the time: see the Intercept
TOP SECRET STRAP1 Contents • What is CNE? • Why do CNE? • CNE Teams • Partners • Challenges • Contacts PTD "We penetrate targets' defences." This information is exempt un...
0.0

Tor Hidden Services: How Hidden is ‘Hidden’?

Document

Release Date: 2014-12-28
This undated GCHQ presentation describes Tor Hidden Services and potential attacks against them: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
Tor Hidden Services How Hidden is ‘Hidden’? - ICTR Network Exploitation © This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK inf...
0.0

Supporting HMG’s Climate Change Ambitions (… or, “A GCO’s tales from Cancun”)

Document

Release Date: 2014-11-01 Document Date: 2011-02-01
This joint GCHQ/MI6 presentation from February 2011 documents the process of international climate change negotiations becoming a “serious intelligence priority” for the UK: see the Dagbladet Information article Snowden documents reveal British climate espionage – Copenhagen climate summit targeted, 1 November 2014.  
GCHQ SECRET INTELLIGENCE SERVICE Supporting HMG’s Climate Change Ambitions (...or, “A GCO’s tales from Cancún”) 27 November - 10 December 2010 GCHQ SECRET INTELLI...
0.0

TEMPORA — “The World’s Largest XKEYSCORE” — Is Now Available to Qualified NSA Users

Document

Release Date: 2014-06-18 Document Date: 2012-09-19
This internal NSA post dated 19 September 2012, describes GCHQ’s operation Tempora which, make “more than 40 billion pieces of content a day” available to analysts from both agencies: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
(C//REL) TEMPORA -- "The World s Largest XKEYSCORE" - Is Now Available to Qualified NSA Users (U//FOUO) NSA Integree at GCIIQ Run Date: 09/19/2012 (U//FOUO) SIGINT analysts: We have all...
0.0

United Kingdom – Collection Information

Document

Release Date: 2014-06-18
This undated Boundless Informant slide supplies collection data for a number of NSA projects: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
United Kingdom □ x United Kingdom - Collection Information E+ m Summary Project Name Validator ID 1 Day Count 3 Day Count 30 Day Count It IP ACRIDMINI 100035321 0 0 68 146.185.26.163...
0.0

JTRIG Tools and Techniques

Document

Release Date: 2014-07-14 Document Date: 2012-07-01
This page from GCHQ’s internal GCWiki describes tools developed by the Joint Threat Research Intelligence Group and their status. The page was last edited in July 2012 and was accessed nearly 20,000 times: see the Intercept article Hacking Online Polls and Other Ways British Spies Seek to Control the Internet, 14 July 2014. jtrigall
navigation ■ Main Page ■ Help Pages ■ Wikipedia Mirror ■ Ask Me About... ■ Random page ■ Recent changes ■ Report a Problem ■ Contacts ■ GCWeb search toolbox ■ W...
0.0

Exploiting Facebook traffic in the passive environment to obtain specific information

Document

Release Date: 2014-05-13
This 2011 presentation prepared by GCHQ’s Global Telecommunications Exploitation (GTE) division describes some of the techniques the agency uses to passively monitor facebook traffic: see the book No Place To Hide, 13 May 2014.
Page 161 TOP SECRET//SI//REL FVEY Exploiting Facebooktraffic in the passive environment to obtain specific information NAME REDACTED Capability Developer Global Telecommunications...
0.0

GCHQ NAC Business Review – October to December 2011

Document

Release Date: 2014-12-13 Document Date: 2011-01-01
This extract from a 2011 GCHQ document details progress in the operation against Belgian telecommunications company Belgacom in the final quarter of 2011: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
CNE Access to BELGACOM GRX Operator: (GREEN) This work has been very successful and has enabled not only CNE but also Crypt Ops by identifying a large number of VPN exploitation opportunities. T...
0.0

New CT Intelligence Exchange With Asia-Pacific Partners

Document

Release Date: 2017-09-13 Document Date: 2005-03-30
The NSA has begun signals intelligence-sharing partnerships with seven other countries' intelligence agencies about 12 specific terrorist groups active in the Asia-Pacific region.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) New CT Intelligence Exchange With Asia-Pacific Partners FROM: Charlie Meals Signals Intel...
0.0

Agencies Get Collective 'Boost' in Tackling Russian Missile Problem Together

Document

Release Date: 2017-09-13 Document Date: 2005-06-06
The NSA is collaborating with the Defense Intelligence Agency and GCHQ to solve the issue of intelligence on Russia's S-400/S-500 missile systems.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) Agencies Get Collective 'Boost' in Tackling Russian Missile Problem Together FROM: severa...
0.0

Recent Enhancements to the PLUS Database

Document

Release Date: 2017-09-13 Document Date: 2005-02-24
The "PLUS" system contains a database of information about signals intelligence reports and search tools. New categories of records have been added, including data from Canada and the U.K.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Recent Enhancements to the PLUS Database FROM: PLUS Team (S111) Run Date: 02/24/200...
0.0

A Very Southern City

Document

Release Date: 2017-09-13 Document Date: 2005-02-11
A civilian employee at a facility in Augusta, Georgia, describes the city and surrounding area, where "it is not unusual to see a rebel jack or an old Georgia state flag." The facility, a regional security operations center, has seen increased work since 9/11 due to targets in Iraq and Afghanistan.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) A Very Southern City FROM: GRSOC, J303 Run Date: 02/11/2005 A civilian who "got in on th...
0.0

MHS Lends a Hand in the Aftermath of the London Bombings

Document

Release Date: 2018-03-01 Document Date: 2005-08-24
The NSA’s base at Menwith Hill in the U.K. supported the GCHQ in tracking phone, GSM, SMS, and high-powered cordless phone signals in the wake of the London bombings on July 7, 2005. This included putting nine U.K. cities under mass surveillance by monitoring satellite phones via “VOICESAIL.” NSA analysts also found a certain area in Pakistan with a high density of calls to the U.K. and were able to use intercepted communications from a subsequent attempted bombing to add potential terrorism-related cover terms for attacks to their database.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (C) MHS Lends a Hand in the Aftermath of the London Bombings FROM: Menwith Hill Station Run ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh