Results
2 Total
0.0
JTRIG Tools and Techniques
Document
Release Date:
2014-07-14
Document Date:
2012-07-01
This page from GCHQ’s internal GCWiki describes tools developed by the Joint Threat Research Intelligence Group and their status. The page was last edited in July 2012 and was accessed nearly 20,000 times: see the Intercept article Hacking Online Polls and Other Ways British Spies Seek to Control the Internet, 14 July 2014. jtrigall
navigation
■ Main Page
■ Help Pages
■ Wikipedia Mirror
■ Ask Me About...
■ Random page
■ Recent changes
■ Report a Problem
■ Contacts
■ GCWeb
search
toolbox
■ W...
AIRWOLF, EAGLE, GAMBIT, MIDDLEMAN, RADIANT, SHADOWCAT, SKYSCRAPER, SWAMP, ANGRY PIRATE, BIRDSTRIKE, BOMB BAY, BUMPERCAR, BUMPERCAR+, BURLESQUE, CLEAN SWEEP, CONCRETE DONKEY, GATEWAY, GESTATOR, GLASSBACK, GLOBAL SURGE, HACIENDA, HUSK, INTERACTION, JEDI, MINIATURE HERO, MOUTH, PHOTON TORPEDO, ROLLING THUNDER (RT), SCRAPHEAP CHALLENGE, SPRING BISHOP, SUNBLOCK, SWAMP DONKEY, UNDERPASS, WARPATH, SLIPSTREAM
0.0
Exploiting Facebook traffic in the passive environment to obtain specific information
Document
Release Date:
2014-05-13
This 2011 presentation prepared by GCHQ’s Global Telecommunications Exploitation (GTE) division describes some of the techniques the agency uses to passively monitor facebook traffic: see the book No Place To Hide, 13 May 2014.
Page 161
TOP SECRET//SI//REL FVEY
Exploiting Facebooktraffic in the
passive environment to obtain
specific information
NAME REDACTED
Capability Developer
Global Telecommunications...