GCHQ Files

Joint Threat Research Intelligence Group:

JTRIG Wikipedia GCHQ JTRIG Wikipedia

Behavioural Science GCHQ JTRIG Behavioural Science

Sigdev Conference 2012 GCHQ JTRIG Sigdev Conference 2012

Full-Spectrum Cyber Effects GCHQ JTRIG Full-Spectrum Cyber Effects

 

Tor Network Exploitation:

Tor Overview of Existing Techniques GCHQ Tor Overview of Existing Techniques

Tor Hidden Services: How Hidden is 'Hidden'? GCHQ Tor Hidden Services: How Hidden is 'Hidden'?

A Potential Technique to Deanonymise Users of the TOR Network GCHQ A Potential Technique to Deanonymise Users of the TOR Network

 

Network Analysis Centre:

Making Network Sense of the Encryption Problem Roundtable GCHQ NAC Making Network Sense of the Encryption Problem Roundtable

Automated NOC Detection GCHQ NAC Automated NOC Detection

Mobile Networks in My NOC World GCHQ NAC Mobile Networks in My NOC World

 

GCHQ Ideology:

Access the Vision Access the Vision - GCHQ Ideology

Psychology - A New Kind of SIGDEV Psychology A New Kind of SIGDEV - GCHQ Ideology

Report on Architectural Risk - 2012 Report on Architectural Risk 2012 - GCHQ Ideology

The Art of Deception The Art of Deception - GCHQ Ideology

 

GCHQ Surveillance Programs:

Black Hole:

Next Generation Events - Black Hole Next Generation Events Black Hole - GCHQ

QFDs and Black Hole QFDs and Black Hole - GCHQ Ideology

Black Hole Analytics Black Hole Analytics - GCHQ Ideology

 

Tempora GCHQ tempora1

Blazing Saddles Blazing Saddles - GCHQ Blazing Saddles - GCHQ

Social Anthropoid Social Anthropoid - GCHQ

GCHQ Airline Surveillance gchq airline surveillance1

SSL Exploitation GCHQ SSL Exploitation

GCHQ iPhone Exploitation GCHQ iPhone Exploitation

GCHQ Mobile Apps Exploitation GCHQ Mobile Apps Exploitation

SIM Card Exploitation GCHQ SIM card SMS 1 GCHQ SIM card SMS 2

Broadcast Internet Radio Exploitation Broadcast Internet Radio Exploitation - GCHQ

 

European Cryptological Center GCHQ European Cryptological Center1

Cloud Computing Analytic Cloud Challenges - GCHQ ICTR Cloud Efforts - GCHQ

Target Detection Identifiers Target Detection Identifiers - GCHQ

Overview of GCHQ Programs Overview of GCHQ Programs Overview of GCHQ Programs

Legality of GCHQ Programs Legality of GCHQ Programs

 

*Note: Some slides have been attached together for convenience.