• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Gchq squeaky-dolphin
 

Gchq squeaky-dolphin

on

  • 126 views

 

Statistics

Views

Total Views
126
Views on SlideShare
126
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Gchq squeaky-dolphin Gchq squeaky-dolphin Presentation Transcript

    • investigations.nbcnews.com GCHQ, the British signals intelligence agency, prepared the following PowerPoint slideshow presentation for a top-secret intelligence conference in 2012, revealing a pilot program called Squeaky Dolphin. Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated to their U.S. partners in 2012 the ability to monitor YouTube and Blogger in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, GCHQ was also able to spy on Facebook and Twitter. Called “Psychology A New Kind of SIGDEV," (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.” NBC News is publishing the documents with minimal redactions to protect individuals. NBC News has also withheld two slides for further review. The last five pages shown here are from an earlier GCHQ document in 2010. Read the article online at investigations.nbcnews.com.
    • 1 investigations.nbcnews.com
    • 2 investigations.nbcnews.com
    • 3 investigations.nbcnews.com
    • 4 investigations.nbcnews.com
    • 5 investigations.nbcnews.com
    • 6 investigations.nbcnews.com
    • 7 investigations.nbcnews.com
    • 8 investigations.nbcnews.com
    • 9 investigations.nbcnews.com
    • 10 investigations.nbcnews.com
    • 11 investigations.nbcnews.com
    • 12 investigations.nbcnews.com
    • 13 investigations.nbcnews.com
    • 14 investigations.nbcnews.com
    • 15 investigations.nbcnews.com
    • 16 investigations.nbcnews.com
    • 17 investigations.nbcnews.com
    • 18 investigations.nbcnews.com
    • 19 investigations.nbcnews.com
    • 20 investigations.nbcnews.com
    • 21 investigations.nbcnews.com
    • 22 investigations.nbcnews.com
    • 23 investigations.nbcnews.com
    • 24 investigations.nbcnews.com
    • 25 investigations.nbcnews.com
    • 26 GTE=Global Telecoms Exploitation, a GCHQ unit that collects data from fiberoptic cables Signals Development investigations.nbcnews.com
    • 27 Explain concept of SQUEAKY DOLPHIN – what we are monitoring ,not interested in individuals just broad trends! investigations.nbcnews.com
    • 28 Explain screen grab, and describe some interesting examples. investigations.nbcnews.com
    • 29 Explain screen grab, and describe some interesting examples. investigations.nbcnews.com
    • 30 Explain the importance of context, and how passive is only part of the story. Need context to do effective BDA – passive doesn’t always provide this. investigations.nbcnews.com
    • 31 investigations.nbcnews.com
    • 32 investigations.nbcnews.com
    • 36 investigations.nbcnews.com
    • 37 investigations.nbcnews.com
    • 38 investigations.nbcnews.com
    • 39 investigations.nbcnews.com
    • 40 investigations.nbcnews.com
    • 41 investigations.nbcnews.com
    • 42 investigations.nbcnews.com
    • 43 investigations.nbcnews.com
    • 44 Joint Threat Research Intelligence Group, a GCHQ unit focused on cyber forensics, investigations and covert operations investigations.nbcnews.com
    • 9 These last five pages are from an earlier GCHQ document, from 2010.
    • 10
    • 11
    • 12
    • 13