OPTIC NERVE

Purpose: OPTIC NERVE is a GCHQ programme that collects still images of Yahoo webcam chats in bulk and saves them to agency databases, whether or not an individual is an intelligence target (GUA01). The programme uses automated facial recognition technology to match existing targets and to discover potential new targets….

Continue reading

QUANTUM THEORY

Purpose: QUANTUM THEORY is a programme that capitalises on vulnerabilities within applications and networks using a number of hacking techniques. It includes a variety of sub-programmes such as [ELE01, INT02]: QUANTUMBOT – IRC botnet hijacking QUANTUMBISQUIT – targets that are behind large proxies QUANTUMCOOKIE – forces cookies onto target browsers…

Continue reading

BULLRUN

Purpose: BULLRUN is an NSA programme aimed at decrypting encrypted network traffic [GUA01]. Decryption capabilities include inserting vulnerabilities into commercial encryption tools and IT systems, collaboration with other intelligence agencies, and “advanced mathematical techniques” [NYT01, GUA02]. The programme has the ability to decrypt data flowing through major communications provides and…

Continue reading

FASCIA

Purpose: FASCIA is the US National Security Agency’s (NSA) data storage and analyse programme focused on mobile phone location metadata. Approximately 5 billion records per day are collected [WAH01]. The programme exploits the SS7 (Signaling System No. 7) data exchange protocol, which links mobile network providers together. Two kinds of…

Continue reading

SKYNET

Purpose: SKYNET is a behaviour profiling programme that attempts to identify “interesting travel patterns”, including how often a person travels and to where [SKYNET-02, Slide13]. Specifically, the programme aims to identify “courier-like travel patterns” [SKYNET-02, Slide20]. It achieves this by analysing mobile phone metadata that reveals both location and communication…

Continue reading

Tor

Purpose: Tor is software that directs Internet traffic through a network of relay servers in order to conceal the source and destination of the traffic. It allows for the anonymous sharing of information over the Internet, and can be used to circumvent Internet censorship (TOR01). Tor also enables the creation…

Continue reading