Filtered By
Information Operations X
Document Topic [filter]
Results
12 Total
0.0

Full Spectrum Cyber Effects

Document

Release Date: 2014-04-04
This presentation, prepared by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) for the 2010 SIGDEV conference describes the agency’s “effects” operations – including the use of social media for propaganda purposes: see the Intercept article: The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket, 4 April 2014.
UK TOP SECRET STRAP 1 GCHQ Full-Spectrum Cyber Effects name redacted jTMii Head of JTRIG name redacted SD Effects Lead SIGINT Development as an enabler for GCHQ’s “Effects” m...
0.0

The Art of Deception: Training for a New Generation of Online Covert Operations

Document

Release Date: 2014-02-25
This training presentation from GCHQ’s Human Science Operations Cell (HSOC) and Joint Threat Research Intelligence Group (JTRIG) describes the elements of “online covert action”: see the Intercept article How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, 25 February 2014.
impress SI//REL TO USA, FVEY SECRET//SI//REL TO USA, FVEY SECRET//SI//RELTO USA, FVEY SECRET//SI//RELTO USA, FVEY JTRIG Online HUMINT Strategie Influence Disru ption and CNA ...
0.0

JTRIG Operational Highlights, August 2009

Document

Release Date: 2015-04-02 Document Date: 2009-08-08
This short extract from a August 2009 GCHQ document describes the planning phase for Operation Quito, a “long-running, large scale, pioneering effects operation”: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET STRAP 1 • Op QUITO (TSI): Following a couple OMGs and a significant amount of prep work, the planning phase of Op QUITO, an effects op to support FCO's goals relating to Argentina ...
0.0

Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations

Document

Release Date: 2015-04-02 Document Date: 2011-03-10
These extracts from a GCHQ paper dated 10 March 2011 provide an indication of the agency’s ongoing effects (misinformation) and “online HUMINT” operations: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.s
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations PhD Human Systems Group, Information Management ...
0.0

CSEC Cyber Threat Capabilities

Document

Release Date: 2015-03-23 Document Date: 2011-01-01
This CSE presentation from 2011 describes some of the cyber warfare tools at the agency’s disposal: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
■ ^ ■ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY Establishment Canada des télécommunications Canada CSEC Cyber Threat Capabilities SIGINT and ITS: an en...
0.0

Cyber Offensive Session: Pushing the Boundaries and Action Against Hactivism

Document

Release Date: 2014-02-25
This undated GCHQ presentation outlines some of the tactics employed in the agency’s Effects operations: see the Intercept article How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, 25 February 2014.
Cyber Offsensive Session: Pushing the Boundaries and Action Against Hacktivism | name redacted |- Serious Crime Effects, GCHQ I NAME REDACTED ~\ - JTRIG, GCHQ JTRIG TOP SECRET//COMIN...
0.0

Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations

Document

Release Date: 2015-06-22 Document Date: 2011-03-22
This 42-page report from 10 March 2011 provides an overview of GCHQ’s information operations unit and the behavioural science theories that underpin its activities: see the Intercept article Controversial GCHQ Unit is Deeply Engaged in Law Enforcement, 22 June 2015.
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations Mandeep K. Dhami, PhD Human Systems Group, Infor...
0.0

Welcome to the Mission Driven Access Workshop – GCHQ Bude

Document

Release Date: 2015-04-02 Document Date: 2011-11-01
This GCHQ slide from a November 2011 workshop presentation gives a Falklands-themed Latin American scenario for attendees to discuss: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
CONFIDENTIAL Welcome to the Mission Driven Access Workshop GCHQ Bude This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption ...
0.0

Psychology: a new kind of SIGDEV

Document

Release Date: 2014-01-27 Document Date: 2012-01-01
This GCHQ presentation from 2012 outlines the agency’s ability to monitor internet use major social media networks in real time, using tools called Squeaky Dolphin, Fire Ant and Anticrisis Girl: see the NBC News article Snowden docs reveal British spies snooped on YouTube and Facebook, 27 January 2014.
TOP SECRET//SI//REL TO USA, FVEY GCHQ Psychology A New Kind of SIGDEV Establishing the Human Science Operations Cell TOP SECRET//SI//REL TO USA, FVEY TOP SECRET//SI//REL TO USA, ...
0.0

Global Radicalizers Vulnerable in Terms of Authority

Document

Release Date: 2013-11-26 Document Date: 2012-10-03
Extracts from an NSA document dated 3 October 2012 show that the agency proposed using records of online activity to discredit six individuals. Also included is the document’s distribution list and the targeting rationale for the six individuals involved (all identifying information has been redacted): see the Huffington Post article Top-Secret Document Reveals NSA Spied […]
rad2.jpg: PREFACE (U) (TS SI REL TO USA, FVEYFISA) This SIGiNT assessment exammes access as one element in the process of Islamic radicakabon in order to identify vulnerabilities Using sit pr...
0.0

JTRIG Tools and Techniques

Document

Release Date: 2014-07-14 Document Date: 2012-07-01
This page from GCHQ’s internal GCWiki describes tools developed by the Joint Threat Research Intelligence Group and their status. The page was last edited in July 2012 and was accessed nearly 20,000 times: see the Intercept article Hacking Online Polls and Other Ways British Spies Seek to Control the Internet, 14 July 2014. jtrigall
navigation ■ Main Page ■ Help Pages ■ Wikipedia Mirror ■ Ask Me About... ■ Random page ■ Recent changes ■ Report a Problem ■ Contacts ■ GCWeb search toolbox ■ W...
0.0

Cyber Integration “The art of the possible”

Document

Release Date: 2014-02-07 Document Date: 2012-01-01
This GCHQ presentation, given to the 2012 SigDev Conference by a representatives of the Joint Threat Research and Intelligence Group (JTRIG) and Cyber Defence Operations (CDO) describes how JTRIG attempts to “deny, disrupt, degrade and deceive” its targets. Speaker notes are included: see the NBC News article Snowden Docs: British Spies Used Sex and ‘Dirty […]
A NBC NEWS INVESTIGATIONS investigations.nbcnews.com The Snowden Files: British Spies Used Sex and 'Dirty Tricks' Slideshow No. 1 GCHQ, the British signals intelligence agency, prepared ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh