Date Document
6/22/2015 NDIST - GCHQ's Developing Cyber Defence Mission
6/22/2015 TECA Product Centre GCHQ Wiki
6/22/2015 Software Reverse Engineering GCHQ
6/22/2015 Operational Legalities GCHQ PowerPoint Presentation
6/22/2015 GCHQ Ministry Stakeholder Relationships Spreadsheets
5/28/2015 SIGINT Mission Thread 3
5/28/2015 Is There a Sustainable Ops Tempo in S2? How Can Analysts Deal with the Flood of Collection?
5/28/2015 Data is Not Intelligence
5/28/2015 Leave Pebbles, Not Breadcrumbs, for Those Coming After You
5/28/2015 Fallacies Behind the Scenes
5/28/2015 In Praise of Not Knowing
5/28/2015 Overcome By Overload
5/28/2015 Do We Need A Bigger SIGINT Truck?
5/28/2015 Summit Fever
5/28/2015 Cognitive Overflow?
5/28/2015 Too Many Choices
6/12/2015 SIDtoday Interview with a SID Hacker
5/21/2015 Medical pattern of life
6/4/2015 Cyber Surveillance Documents
5/18/2015 SID Today Year in Review 2011
5/18/2015 SID Today What Does the Death of Usama Bin Laden Mean
5/18/2015 SID Today SIGINT Obtains Details
5/18/2015 SHAPE Weekly Report May/June 2011
5/18/2015 RC SW Intelligence Summaries
5/18/2015 NCTC Current Status of Major Terrorism Figures
5/18/2015 JTAC Attack Methodology
5/18/2015 FY13 Black Budget on Bin Laden Raid
5/8/2015 Skynet Courier Detection
5/8/2015 Skynet Cloud Based Behavior
5/5/2015 WG Advice to Security Service
5/5/2015 SID Today Tsunami of Intercept Final
5/5/2015 SID Today Non-linguists Final
5/5/2015 SID Today Is HLT Progressing
5/5/2015 SID Today Future Is Now FInal
5/5/2015 SID Today Future Is Now Conclusion
5/5/2015 SID Today Finding Nuggets
5/5/2015 RT10 Overview
5/5/2015 Human Language Technology
5/5/2015 Black Budget 360-364
5/5/2015 Black Budget 262
4/2/2015 GCHQ Operation QUITO to Shape Falklands Public Opinion (Collection)
3/10/2015 TCB Jamboree and Apple Vulnerability Targeting (Collection)
3/23/2015 CSE Cyberwarfare Toolbox (Collection)
3/16/2015 GCSB XKEYSCORE Search Query
3/5/2015 GCSB SIGINT Development Quarterly Report
3/11/2015 New Zealand GCSB Spying (Collection)
2/19/2015 SIM Card Encryption Key Theft and Mobile Network Access (Collection)
2/10/2015 Iran Current Topics - Interactions with GCHQ
2/4/2015 Lovely Horse
2/4/2015 Open Source For Cyber Defence Progress