Results
11 Total
0.0
Full Spectrum Cyber Effects
Document
Release Date:
2014-04-04
This presentation, prepared by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) for the 2010 SIGDEV conference describes the agency’s “effects” operations – including the use of social media for propaganda purposes: see the Intercept article: The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket, 4 April 2014.
UK TOP SECRET STRAP 1
GCHQ
Full-Spectrum Cyber Effects
name redacted
jTMii Head of JTRIG
name redacted
SD Effects Lead
SIGINT Development as an enabler
for GCHQ’s “Effects” m...
0.0
The Art of Deception: Training for a New Generation of Online Covert Operations
Document
Release Date:
2014-02-25
This training presentation from GCHQ’s Human Science Operations Cell (HSOC) and Joint Threat Research Intelligence Group (JTRIG) describes the elements of “online covert action”: see the Intercept article How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, 25 February 2014.
impress
SI//REL TO USA, FVEY
SECRET//SI//REL TO USA, FVEY
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
JTRIG
Online HUMINT Strategie Influence
Disru ption and CNA
...
0.0
JTRIG Operational Highlights, August 2009
Document
Release Date:
2015-04-02
Document Date:
2009-08-08
This short extract from a August 2009 GCHQ document describes the planning phase for Operation Quito, a “long-running, large scale, pioneering effects operation”: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET STRAP 1
• Op QUITO (TSI): Following a couple OMGs and a significant amount of prep work,
the planning phase of Op QUITO, an effects op to support FCO's goals relating to
Argentina ...
0.0
Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations
Document
Release Date:
2015-04-02
Document Date:
2011-03-10
These extracts from a GCHQ paper dated 10 March 2011 provide an indication of the agency’s ongoing effects (misinformation) and “online HUMINT” operations: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.s
TOP SECRET
Behavioural Science Support for JTRIG’s (Joint Threat
Research and Intelligence Group’s) Effects and Online
HUMINT Operations
PhD
Human Systems Group, Information Management ...
0.0
CSEC Cyber Threat Capabilities
Document
Release Date:
2015-03-23
Document Date:
2011-01-01
This CSE presentation from 2011 describes some of the cyber warfare tools at the agency’s disposal: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
■ ^ ■ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY
Establishment Canada des télécommunications Canada
CSEC Cyber Threat Capabilities
SIGINT and ITS: an en...
0.0
Cyber Offensive Session: Pushing the Boundaries and Action Against Hactivism
Document
Release Date:
2014-02-25
This undated GCHQ presentation outlines some of the tactics employed in the agency’s Effects operations: see the Intercept article How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, 25 February 2014.
Cyber Offsensive Session:
Pushing the Boundaries and
Action Against Hacktivism
| name redacted |- Serious Crime Effects, GCHQ
I NAME REDACTED ~\ - JTRIG, GCHQ
JTRIG
TOP SECRET//COMIN...
0.0
Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations
Document
Release Date:
2015-06-22
Document Date:
2011-03-22
This 42-page report from 10 March 2011 provides an overview of GCHQ’s information operations unit and the behavioural science theories that underpin its activities: see the Intercept article Controversial GCHQ Unit is Deeply Engaged in Law Enforcement, 22 June 2015.
TOP SECRET
Behavioural Science Support for JTRIG’s (Joint Threat
Research and Intelligence Group’s) Effects and Online
HUMINT Operations
Mandeep K. Dhami, PhD
Human Systems Group, Infor...
0.0
Welcome to the Mission Driven Access Workshop – GCHQ Bude
Document
Release Date:
2015-04-02
Document Date:
2011-11-01
This GCHQ slide from a November 2011 workshop presentation gives a Falklands-themed Latin American scenario for attendees to discuss: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
CONFIDENTIAL
Welcome to the Mission
Driven Access Workshop
GCHQ Bude
This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption ...
0.0
Psychology: a new kind of SIGDEV
Document
Release Date:
2014-01-27
Document Date:
2012-01-01
This GCHQ presentation from 2012 outlines the agency’s ability to monitor internet use major social media networks in real time, using tools called Squeaky Dolphin, Fire Ant and Anticrisis Girl: see the NBC News article Snowden docs reveal British spies snooped on YouTube and Facebook, 27 January 2014.
TOP SECRET//SI//REL TO USA, FVEY
GCHQ
Psychology
A New Kind of SIGDEV
Establishing the Human Science Operations Cell
TOP SECRET//SI//REL TO USA, FVEY
TOP SECRET//SI//REL TO USA, ...
0.0
Cyber Integration “The art of the possible”
Document
Release Date:
2014-02-07
Document Date:
2012-01-01
This GCHQ presentation, given to the 2012 SigDev Conference by a representatives of the Joint Threat Research and Intelligence Group (JTRIG) and Cyber Defence Operations (CDO) describes how JTRIG attempts to “deny, disrupt, degrade and deceive” its targets. Speaker notes are included: see the NBC News article Snowden Docs: British Spies Used Sex and ‘Dirty […]
A NBC NEWS INVESTIGATIONS
investigations.nbcnews.com
The Snowden Files: British Spies Used Sex and 'Dirty Tricks'
Slideshow No. 1
GCHQ, the British signals intelligence agency, prepared ...
0.0
JTRIG Tools and Techniques
Document
Release Date:
2014-07-14
Document Date:
2012-07-01
This page from GCHQ’s internal GCWiki describes tools developed by the Joint Threat Research Intelligence Group and their status. The page was last edited in July 2012 and was accessed nearly 20,000 times: see the Intercept article Hacking Online Polls and Other Ways British Spies Seek to Control the Internet, 14 July 2014. jtrigall
navigation
■ Main Page
■ Help Pages
■ Wikipedia Mirror
■ Ask Me About...
■ Random page
■ Recent changes
■ Report a Problem
■ Contacts
■ GCWeb
search
toolbox
■ W...
AIRWOLF, EAGLE, GAMBIT, MIDDLEMAN, RADIANT, SHADOWCAT, SKYSCRAPER, SWAMP, ANGRY PIRATE, BIRDSTRIKE, BOMB BAY, BUMPERCAR, BUMPERCAR+, BURLESQUE, CLEAN SWEEP, CONCRETE DONKEY, GATEWAY, GESTATOR, GLASSBACK, GLOBAL SURGE, HACIENDA, HUSK, INTERACTION, JEDI, MINIATURE HERO, MOUTH, PHOTON TORPEDO, ROLLING THUNDER (RT), SCRAPHEAP CHALLENGE, SPRING BISHOP, SUNBLOCK, SWAMP DONKEY, UNDERPASS, WARPATH, SLIPSTREAM