Browse Items (626 total)

This document is an extract from a presentation developed by the GCHQ's Bude station. It describes the "Mission Driver" behind GCHQ operations in Latin America. a key objective appears to be manipulating Latin American public opinion behind…

20140914-spiegel-satellite_teleport_knowledge.pdf
This document is a brief for a project which aims to develop "in depth knowledge of key Satellite IP service providers in Germany in support of .. developing German IP transit knowledge." The brief lists three target service providers and key…

20150402-Intercept-Behavioural Science Support for JTRIG.pdf
This document contains extracts of a report created by GCHQ's Joint Threat Research and Intelligence Group. It highlights GCHQ's HUMINT (Human Intelligence) operations against targets in Zimbabwe and Argentina. These operations are said to involve…

20140207-nbc-gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf
This document contains presentation slides prepared by GCHQ's Joint Threat Intelligence Research Group for the 2010 SIGDEV conference. They describe existing operations such as ROYAL CONCIERGE, an operation focused on exploiting hotel reservation…

20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf
This is a document prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG) for the 2012 SIGDEV conference. It describes the main objectives of JTRIG and some of the techniques and devices used to achieve them. It describes ways in which…

20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf
This document is an extract from a GCHQ presentation prepared for the 2012 SIGDEV conference. It describes operations undertaken by the Joint Threat Research Intelligence Group (JTRIG) division of GCHQ against hacktivists of Anonymous and Lulsec. It…

20150402-Intercept-JTRIG Wiki Highlights August 2009.pdf
This document is an extract from a newsletter created by GCHQ's JTRIG division. It describes the planning processes behind operation QUITO, an effort to manipulate Latin American public opinion regarding the country's claims to the Falkland Islands /…

20150518_intercept_jtac-attack-methodology-team.pdf
This document is from the GCwiki, an internal information resource of the GCHQ. This entry gives an overview of the JTB team in JTAC, which is the "thematic assessment team for Islamist Attack Methodogy. The JTB team provides "all-source intelligence…

NTAC-Overview.pdf
This document is a slide from a presentation. It details the mission of the National Threat Assessment Center.

PRESTON-Business-Processes.pdf
This document is a report detailing the business processes behind the operation of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2