This document is an extract from a presentation developed by the GCHQ's Bude station. It describes the "Mission Driver" behind GCHQ operations in Latin America. a key objective appears to be manipulating Latin American public opinion behind…
This document is a brief for a project which aims to develop "in depth knowledge of key Satellite IP service providers in Germany in support of .. developing German IP transit knowledge." The brief lists three target service providers and key…
This document contains extracts of a report created by GCHQ's Joint Threat Research and Intelligence Group. It highlights GCHQ's HUMINT (Human Intelligence) operations against targets in Zimbabwe and Argentina. These operations are said to involve…
This document contains presentation slides prepared by GCHQ's Joint Threat Intelligence Research Group for the 2010 SIGDEV conference. They describe existing operations such as ROYAL CONCIERGE, an operation focused on exploiting hotel reservation…
This is a document prepared by GCHQ's Joint Threat Research Intelligence Group (JTRIG) for the 2012 SIGDEV conference. It describes the main objectives of JTRIG and some of the techniques and devices used to achieve them. It describes ways in which…
This document is an extract from a GCHQ presentation prepared for the 2012 SIGDEV conference. It describes operations undertaken by the Joint Threat Research Intelligence Group (JTRIG) division of GCHQ against hacktivists of Anonymous and Lulsec. It…
This document is an extract from a newsletter created by GCHQ's JTRIG division. It describes the planning processes behind operation QUITO, an effort to manipulate Latin American public opinion regarding the country's claims to the Falkland Islands /…
This document is from the GCwiki, an internal information resource of the GCHQ. This entry gives an overview of the JTB team in JTAC, which is the "thematic assessment team for Islamist Attack Methodogy. The JTB team provides "all-source intelligence…
This document is a report detailing the business processes behind the operation of PRESTON, a communication interception program which covertly intercepts phone calls, text messages, internet data.