This document is an extract from a GCHQ presentation prepared for the 2012 SIGDEV conference. It describes operations undertaken by the Joint Threat Research Intelligence Group (JTRIG) division of GCHQ against hacktivists of Anonymous and Lulsec. It…
This is a document prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG) for the 2012 SIGDEV conference. It describes the main objectives of JTRIG and some of the techniques and devices used to achieve them. It describes ways in which…
This document contains presentation slides prepared by GCHQ's Joint Threat Intelligence Research Group for the 2010 SIGDEV conference. They describe existing operations such as ROYAL CONCIERGE, an operation focused on exploiting hotel reservation…
This document contains extracts of a report created by GCHQ's Joint Threat Research and Intelligence Group. It highlights GCHQ's HUMINT (Human Intelligence) operations against targets in Zimbabwe and Argentina. These operations are said to involve…
This document is a brief for a project which aims to develop "in depth knowledge of key Satellite IP service providers in Germany in support of .. developing German IP transit knowledge." The brief lists three target service providers and key…
This document is an extract from a presentation developed by the GCHQ's Bude station. It describes the "Mission Driver" behind GCHQ operations in Latin America. a key objective appears to be manipulating Latin American public opinion behind…
This document is an extract from a presentation developed by the GCHQ's Bude station. It describes the "Mission Driver" behind GCHQ operations in Latin America. a key objective appears to be manipulating Latin American public opinion behind…
This document is a report prepared by GCHQ's Access Strategy Team. It provides an analysis of Juniper Networks Inc. A key producer of network products including routers, ethernet switches, and NetScreen and SRX-series security products. This report…
This document is a presentation that gives information on TOR (The Onion Router): its background, how it works to keep users anonymous, and suggestions/challenges for circumvention.
This document is a presentation from the GCHQ Applied Research Unit. It includes images and graphs illustrating bulk web data collection, and gives an brief overview of the programs which are used to query and analyse this data.