jtrig tools and techniques ocr

8
navigation  I.  U n I  Mi)  Hrpp^n |  wifcipedis Mirror i AS*  Me About...  Random pags • Recent  change  Report • rrobtam  I Mil II  I-  GCWSb search GO Starch toolbox  What links here  Reused chanws • Upload file  Special pagan • Printable  venion  |Viri|i|,"ril III.. I  |IM--IV;.I Thlt pagt w n lati momma an  &  July 2012. «l 13:06.  This page ha* been acceaned 10,679 times All m4d«rnd l> UK 1 | | my talk my preferences my  watchMt m page  discueilon edit | i hlilory | delete | move  weich |  additional statistics TOP SECRET STRAPi COMINT The maximum classification allowed on  GCWIki Is  TOP  SECRET STRAPI  COMINT Click to report Inappropriate content  GCW Iki  hel|  (Bnt.M  | ippoH p-g* JTRIG tools and techniques (Redirected trom JTRIG  CITD • Covert Internot Technical Development i Overview JTRIG capabilities JTRIG tools Conienn 1  JTRIG tools l L understanding mis page 1.2 Current Priorities 12.1 e ngineering 12 2 Coiiaction 1,2.3 Effects Capability 12.4 Work Flow Management 12.5 Analysis Tools 1,2,8 DltafaUM 1 2 7 Forensic Exploitation 1,2.1 Ttchnlqun 12.9 Shaping and Honeypots Wa dont update  this page anymore, it became somewhat  ol a Chinese menu  lor effects operations Information  is now available for JTRIG sta I • i >  |  Understanding this page Tools and techniques are developed by various  teams within JTRIG. We  like to let people know when we have something that  we can think w but we also dont want to oversell our capability. Fo r this reason, each tool Indicates Its current status. We may  pu t up experimental tools or ones that are  still In development so you know w working on, and  can approach JTRIG  with any new ideas.  B ut  experimental tools by their nature  will be unreliable,  il  y ou  raise expectations  o external commitme nts before speaking to  us you  will probably end up looking stupid. Most of our tools are fully operational, tested and  reliable We will Indicate  when this is the case, however there can be  reasons why our tool for  some operational requirements (eg if it exploits  a piovider specific vulnerability). There  m ay  also be  legal  restrictions. So please come and speak to JTRIG operational staff early  in your operational planning process. [edit] urrent  Priorities Capability Development Priorities can be land by following the  link below  CapDev Priorities  (Discover) A

Upload: sara-toga

Post on 13-Oct-2015

171 views

Category:

Documents


0 download

DESCRIPTION

A document from an internal GCHQ wiki lists tools and techniques developed by the Joint Threat Research Intelligence Group (JTRIG) and available to British intelligence officials.The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users.

TRANSCRIPT

  • navigation I. Un I Mi)" Hrpp^n | wifcipedis Mirror i AS* Me About... Random pags Recent change Report rrobtam I Mill II I- GCWSb

    search

    GO Starch

    toolbox What links here Reused chanws Upload file Special pagan Printable venion |Viri|i|,"ril III..

    I! | I M - - I V ; . I Thlt pagt w n lati

    momma an & July 2012. l 13:06. This page ha*

    been acceaned 10,679 times

    All m4drnd l> UK

    1 | | my talk my preferences my watchMt my eontrflutii page discueilon edit | i hlilory | delete | move weich | additional statistics

    TOP SECRET STRAPi COMINT The maximum classification allowed on GCWIki Is TOP SECRET STRAPI COMINT Click to report Inappropriate content

    Fo GCWIki hel| (Bnt.M | ' ippoH p-g*

    JTRIG tools and techniques (Redirected trom JTRIG CITD Covert Internot Technical Development i

    Ove rv i ew JTRIG capab i l i t i es

    JTRIG tools

    Conienn

    1 JTRIG tools l L understanding mis page 1.2 Current Priorities

    12.1 engineering 12 2 Coiiaction 1,2.3 Effects Capability 12.4 Work Flow Management 12.5 Analysis Tools 1,2,8 DltafaUM 12 7 Forensic Exploitation 1,2.1 Ttchnlqun 12.9 Shaping and Honeypots

    Wa dont update this page anymore, it became somewhat ol a Chinese menu lor effects operations Information is now available for JTRIG staff at [(I j J )

    I i>i | Understanding this page Tools and techniques are developed by various teams within JTRIG. We like to let people know when we have something that we can think we can use. but we also dont want to oversell our capability.

    For this reason, each tool Indicates Its current status. We may put up experimental tools or ones that are still In development so you know what we are working on, and can approach JTRIG with any new ideas. But experimental tools by their nature will be unreliable, il you raise expectations or make external commitments before speaking to us you will probably end up looking stupid. Most of our tools are fully operational, tested and reliable We will Indicate when this is the case, however there can be reasons why our tools wont woik for some operational requirements (eg if it exploits a piovider specific vulnerability). There may also be legal restrictions. So please come and speak to JTRIG operational staff early in your operational planning process.

    [edit] Current Priorities Capability Development Priorities can be land by following the link below

    CapDev Priorities (Discover) A

  • [edit] Eng inee r ing

    Cerberus Statistics Collection

    ToolJSystem Description Collects on-going usage information about how many users utilise JTRiG's UlA capability, what sites are the most frequently visited etc. This is in order to provide JTRIG intrastucture and ITServices management information statistics.

    JTRIG RADIANT SPLENDOUR ALLIUM ARCH JTRIG UlA via the ror network. ASTRAL

    Status Contacts

    19 a 'Data Diode1 connecting the CEPBEPUS network with GCNET

    PROJECTION TWILIGHT ARROW

    Remote GSM secure covert internet proxy using TOR hidden services.

    Remote GSM secure covert internet proxy using VPN services.

    JTRIG's new Infrastructure. FOREST WARRIOR. FRUIT BOWL. JAZZ SPICE ISLAND FUSION and other JTRIG systems will form part of the 5PICE ISLAND

    infrastructure POISON ARROW

    Safe Malware download capability.

    CERBERUS UlA Replacement and new tools infrastructure - Primary FRUIT BOWL Domain for Generic User/Tools Access and TOR split into 3 sub-

    systems. JTRIG Tor web browser Sandbox IE replacement and FRUIT BOWL

    NUT ALLERGY sub-system

    A sub-system of FRUIT BOWL

    A sub-system of FRUIT BOWL

    BERRY TWISTER BFRRY TWISTER* BRANDY SNAP JTRIG UlA contingency at Scarborough.

    WIND FARM R&D olfsite facility. JTRIG's lega< , UlA dllttopj 1 11 1 " ' i 1 ' " Id Witt! I ORI ! fl

    CERBERUS W A R R | 0 R

    BOMBAYROLL JTRIG's legacy UlA standalone capability. BOM8AY ROLL Replacement which will also incorporate new collectors - Primary Domain for Dedicated Connections split into 3 subsystems.

    COUNTRY FILE A sub-system of JAZZ FUSION TECHNO

    A subsystem of JAZZ FUSION

    JAZZ I usiot i A sub-system of JAZZ FUSION BUMBLEBEE JTRIG Operational VM/TOR architecture DANCE AIR BAG JTRIG Laptop capability for field operations. EXPOW GCHQ's UlA capability provided by JTRIG. A X I p GREASE the cover banking link for CPG POD RACE JTRIG'S MS update farm WATCHTOWER GCNET > CERBERUS Export Gateway Interface System REAPER CERBERUS -> GCNET import Gateway interface System DIALd External Internet Redial and Monitor Daemon

    Desktop replacement for CERBERUS WARRIOR DOG HANDLER JTRIG's development network

    OPERATIONAL JTRIG Software Developers (U

    OPERATIONAL JTRIG Software Developers kJ

    OPERATIONAL JTRIG infrastructure Team m

    OPERATIONAL JTRIG Infrastructure Team (sJ

    OPERATIONAL JTRIG Infrastructure Team E3

    DEV JTRIG Infrastructure Team LJ

    DESIGN JTRIG Infrastructure Team E J

    DESIGN JTRIG Infrastructure Team E3

    JTRIG Infrastructure TeamU

    PILOT JTRIG Infrastructure Team fil

    JTRIG infrastructure Team Urn]

    IMPLEMENTATION JTRIG infrastructure TeamU DESIGN JTRIG infrastructure Team 11

    OPERATIONAL JTRIG Infrastructure Team U

    OPERATIONAL JTRIG Infrastructure Team LJ

    IMPLEMENTATION JTRIG infrastructure Team L_J

    OPERATIONAL JTRIG Infrastructure Team U

    DESIGN JTRIG Infrastructure Team U

    DESIGN JTRIG Infrastructure Team LJ

    OPERATIONAL JTRIG Infrastructure Team U

    OPERATIONAL JTRIG infrastructure Team U OPERATIONAL JTRIG Infrastructure Team a OPERATIONAL JTRIG infrastructure Team LJ DESIGN JTRIG Infrastructure Team E3 OPERATIONAL JTRIG Software Developers E3 OPERATIONAL JTRlG Software Developers EJ OPERATIONAL JTRIG Software Developers E3

    DESIGN JTRIG Infrastructure Team H3

    DIRTY DEVIL JTRIG'S research network

    DESIGN

    DESIGN

    JTRIG Infrastructure Team EJ JTRIG Infrastructure Team EJ

  • [edit] Collection Tool Description

    AIKWOLF YouTube profile, comment and video collection.

    ANCESTRY Tool tor discovering the creation date ot yahoo selectors

    BEARTRAP Bulk retrieval ot public BEBO profiles from member or group ID.

    BIRDSONG Automated posting ot Twitter updates

    BIRDSTRIKE Twitter monitoring and profile collection Click here tor the User Guide

    BUCSY Google* collection (circles, profiles etc.)

    DANCING BEAR

    DEVILS HANDSHAKE

    DRAGON'S SNOUT

    obtains the locations of WiFi access points.

    ECl Data Technique

    Paltalk group cnat collection.

    FXCAI IBUR acquires a Paltalk UID and/or email address from a Screen Name

    FAT YAK

    FUSEWIRE

    GLASSBACK

    Public data collection trom Linkedln

    Provides 24/7 monitoring of VbulKen forums tor target postings/online activity. Also allows staggered postings to be made. Technique of getting a targets IP address try pretending to be a spammer and ringing them. Target does not need to answer.

    GODrATllLR Public data collection from FaceDook.

    GOODFELLA Generic framework for public data collection trom Online Social Networks.

    Contacts

    JTRIG Software Developer: 51 JTRIG Software Developers J

    JTRIG Software Developers - J

    JTRIG Software Developers -^ Tech |

    [Tech Lead [Expert

    user:

    Status Beta release.

    Fully Operational. Fully Operational.

    Decomissioned. Replaced by SYLVESTER. Fully Operational. | In early | development.

    Fully Operational.

    (Tech Lead fl Expert Fully

    operational.

    Beta release

    Fully JTRIG Software operational Developers - J (against current

    Paltalk version) (Tech Lead;

    in development

    JTRIG Software Developers 3 JTRIG Software Fully Developer? _J operational

    [Tech Lead: Fully operational

    [Tech Lead: in Development (Supports RenRen and Xing),

    HACIENDA

    ICE

    LANDING PARTY

    is a port scanning tool designed to scan an entire country or city, it uses GEOFUSION to identify IP locations. Banners and content are pulled back on certain ports. Content is put into NAC HACIENDA Fully the E A R T H L I N G database, and all other scanned data is sent to GNE and is available through Taskers (3 operational. GLOBAL SURGE and Flexlmart

    JTRIG Software Developers 3 JTRIG Software Fully Developers E3 operational.

    Fully JTRIG Software operational. Developers EJ

    is an advanced IP harvesting technique

    INSPECTOR Tool for monitoring domain information and site availability

    Tool for auditing dissemination of VIKING PILLAGE data.

  • Fully operational, but

    MINIATURE Active skype capability, Provision ot real time call records (Skypeout and SkypetoSkype) and JTRIG software n0 |a usage

    HFRO bidirectional instant messaging Also contact lists Developers J J restrictions,

    MOUTH Tool (01 collection lot downloading a user's files from Aichive.org

    MUSTANO provides covert access to the locations of GSM cell towers.

    PHOTON i a n n u o A technique to actively grab the IP address of an MSN messenger user.

    1H 'I- ...llv. ii. I ully Developers -J Operational. [Tech Lead |

    Expert Fully

    Operational, but | u s a 3"

    restrictions.

    RESERVOIR Facebook application allowing collection of venous information

    SEBACliiM

    SIIVIR si-i 1:11 K

    SOUAWA1I It

    An ICTR developed system to Identify P2P file sharing activity ol Intelligence value. Logs are accessible via DIRTY RAT,

    Allows batch Nmap scanning over TOR

    A tool lor regularly downloading gmall messages and forwarding them onlo CERBERUS mailboxes

    Find private photographs or targets on Facebook.

    SYLVESTER Framework lor automated Interaction / alias management on online social networks.

    Fully JTRIG Software operational, but Developers -J note operational

    restrictions |h'< ii i -.HI

    In Development Developers -J JTRIG Software Fully Developers -J Operational, Tech Lead:

    n Development

    Replaced by TANNER A , e c n n i c a l P'g famme allowing operators to log on to a JTRIG website to grab IP addresses ol ^ HAVOK.

    Internet Gale's.

    TRACER An Office Document that grabs the targets Machine Into, (lies, logs, etc and posts it back to FIRE GCHQ.

    n Development.

    VII wi it

    [Tech Lead | A programme that (hopelully) provides advance tip off ol the kidnappers IP address for HMG (Export personnel. '

    'Operational, but awaiting field tfifll

    VIKING Distributed network tor the automatic collection of encrypted/compressed data from remotely PILLAGE hosted JTRIG projects.

    r 01* HA I A version ol the MUSTANG and DANCING BEAR techniques that allows us to pull back Cel Tower and WIFI locations targeted against particular areas.

    PILLAGE JTRIG Software Operational Developers -J Tech L e a a ^ ^ ^

    In development

  • edit] Effects capability JTRIG develop the ma)owy of effects capability In GCHQ. A lot or this capability is developed on demand lor specific operations and tnen lurther developed to provide weaponised capability.

    Dont treat this like a catalogue. H you dont see It here. It doesnt mean we cant build It. II you Involve the JTRIG operational teams at the start ol your operation, you have more ol a chance that we will build something lor you

    For each ol our tools we have indicated the state of the too'. We only advertise tools here that are either ready to lire or very close to being ready (operational requirements would re-prioritise our development), once again, involve the JTRIG operational teams early. Tool

    ANGRY PIRATE

    ARSON SAM

    Description

    is a tool that will permanently disable a target's account on their computer.

    Status

    Ready to lire (but see target restrictions)

    Contacts [Tech Lead.

    Ready to lire (Not is a tool to test the effect of certain types of POU SMS messages on phones / network. It against live also includes PDU SMS Dumb Fuzz testing iff. targets, this is a

    R&D Tool). is an automated system developed by JTRIG CITD to support JTRIG BUMPERCAR

    [Tech Lead

    Expert User]

    , operations. BUMPERCAR operations are used to disrupt and deny Internet-based terror JTRIG Software UUMHLRCAR+ r r r Ready to fire.

    videos or other material. The technique employs the services provided ay upload providers Developers t u

    to report offensive materials

    BOMB BAY is the capability to increase website hits/rankings. In Development. |Teeh Lead:

    BADGER mass delivery of email messaging to support an Information Operations campaign B U R L E S Q U E is the capability to send spoofed SMS text messages. CANNONBALL is the capability to send repeated text messages to a single target.

    CLEAN SWEEP Masquerade Facebook wal l Posts for indrviduals or entire countries

    Ready to fire. JTRIG OSO J Ready to fire. JTRIG OSO t=a Ready to fire. JTRIG OSO EJ

    [Tech Lead Ready to fire (SIGlNT sources Expert user; required)

    CI Ml.',- . ,

    111 I Kl I I'l If

    CHINESE FIRECRACKER CONCRETE DONKEY

    DEER STALKER

    CAT E WAY

    GAMBIT

    GESTATOR

    Some work In progress to investigate IRC effects.

    Overt brute login attempts against online torums

    Is the capability to scatter an audio message to a large number ot telephones, or repeatedly bomb a target number with the same message.

    NOT READY TO EIRE.

    Ready to lire.

    In development.

    Tech Lead

    User

    FIRECRACK

    Ability to aid-geolocation of Sat Phones / GSM Phones via a silent calling to the phone. Ready to fire

    Ability to artificially increase traffic to a website

    Deployable pocket-sized proxy server

    amplification of a given message, normally video, on popular multimedia websites (Youtube).

    G L I I IEHBALL Online Gaming Capabilities tor Sensitive Operations. Currently Second Life.

    IMPERIAL BARGE

    PITBULL

    POISONED DAGGER

    For connecting two target phone together in a call.

    Capability, under development, enabling large scale delivery of a tailored message to users of Instant Messaging services

    Effects against Gigalribe Built by ICTR. deployed by JTRIG

    Ready to fire. JTRIGOSO^J ^development JTRIG OSO LJ

    [Tech Lead: 7,

    Expert User;

    in development.

    Tested.

    In development.

    Tech Lead.

  • PREDATORS FACE

    ROLLING IHUNDER SCARLET EMPEROR SCRAPHFAP CHALLENGE

    SERPENTS TONGUE

    Targeted Denial Of Service against Web Servers

    Distributed denial 01 service using P2P. Built by ICTR, deployed Dy JTRIG.

    Targeted denial oi service against targets phones via call bombing.

    Perlect spoofing of emails Irom Blackberry targets.

    lor lax message broadcasting to multiple numbers.

    Ready to lire.

    Tech Lead

    JTRIG Software

    Targeted denial of service against SSH services. MOVIE

    SILVERBLADE Reporting of extremist material on DAILYMOTION.

    SILVERFOX List provided to industry of live extremist material files hosted on FFUs.

    Disruption of video-based websites hosting extremist content through concerted target

    Developers ^ J Ready to fire, but| see constraints.

    [Tech Lead1

    In redevelopmenr | Expert

    Ready :o lire.

    Ready to fire.

    Ready to fire.

    S1LVLRLORD

    SKYSCRAPER

    discovery and content removal.

    Production and dissemination of multimedia via the web in the course of information

    Ready to fire. [Tech Lead.

    lExpert User:

    operations.

    SLIPSTREAM Ability to inflate page views on websites

    STEALTH is a tool that will Disrupt target's Windows machine. Logs of how long and when the effect MOOSF is active.

    SUNBLOCK Ability to deny functionality to send/receive email or view material online.

    Swamp Is a tool that will silently locate all predefined types ol file and encrypt them on a targets donkey machine.

    TORNADO is a delivery method (Excel Spreadsheet) that can silently extract and run an executable ALLEY on a target's machine.

    UNDERPASS Change outcome of online polls (previously known as MUBILO)

    [Tech Lead: Section Ready to fire. X; Expert Users:

    Language Team] Ready to fire. JTRIG OSO EJ Ready to fire (but [Tech Lead:

    restrictions). Expert User: ] Tested, but [Tech Lead: Section operational X: Expert Userj limitations. _ (Tech Lead: Ready to fire (but L see target restrictions).

    Ready to lire (but see target restrictions).

    [Tech Lead: Section In development. X; Expert . I

    VIPERS TONGUE

    Ready to fire (but is a tool that will silently Denial of Service calls on a Satelite Phone or a GSM Phone see target

    restrictions).

    WARPATH Mass delivery of SMS messages to support an Information Operations campaign Ready to fire.

    [edit] Work Flow Management Description Tool

    HOME PORTAI A central hub for all JTRIG Cerberus tools

    Contacts JTRIG Software Developers S I

    CYBER COMMAND A centralised suite of tools, statistics and viewers for tracking current operations across the Cyber JTRIG Software community. Developers ^

    JTRIG Software A web service and admin console for the translation of usernames between netwoiks. For use with Developers (O gateways and other such technologies.

    CONSOLE

    NAMEJACKER

  • [td-t] Analysis Tools Tool

    BABYLON

    CRYOSTAT

    I I A l l

    MRIMAIE

    JIIM

    Deici lpl lon

    Is a tool that bulk queries wob mall addresses and verifies whether they can bo signed up lor. A groon tick Indicates that the address Is curiently In use Verification can currently be done tor Hotmail and Yahoo.

    Is a JTRIG tool that runs against data held In IIEWPIN It then displays this data In a chait to show links between targets, Is a suite ol tools for monitoring target use of the UK auction site eBay (www ebay co.uk). These tools are hosted on an Internet server, and results are retreived by encrypted email, Is a JTRIG tool that alms to provides the capability to Identity trends in seized computer media data and metadata, JTRIG will shortly be rolling out a JEDI pod to every desk ot every member ot an Intelligence Production Team The challenge Is to scale up to over 1,200 users whilst remaining agile, efllcent and responsive to customer needs,

    COIll.K I'. JTRIG Software Developers U

    JTRIG Software Davtiopei'- - J

    JTRIG Software Developers u

    i n . - . . Developers - J [Tech Lead ^ | ^ |

    Expert User;

    Is a JTRIG bespoke web browser.

    Is a distributed realtime event aggregation, tlp-ofl and tasking platform utilised by JTRIG as a middleware layer.

    JILES

    MIDI)) I MAN

    O U T W A R D is a collection of DNS lookup, W H O I S Lookup and other network tools,

    T A N C L F F O O T , s a b u , k s e a r c n tool which queries a sot of online resources. This allows analysts to quickly check the online presence of a taiget

    [Tech Lead: ( E x p e r t User)

    JTRIG Software Developers U JTRIG Software Developers U JTRIG Software I i.-vi- . i i i i ' r . J

    Is a data Index and repository that provides analysts with the ability to query data collected from the oftwnn s i AMMER Internet from various JTRIG sources, such as EARTHLING, HACIENDA, web pages saved by analysts Developer

    etc.

    , [ed.t] Databases Tool Description BYSTANDER IS a categorisation database accessed via web service.

    i;i)|JlMili

    rn w r i i i

    is a database of C2C identifiers for intelligence Community assets acting online, either under alias or in real name.

    is a database of C2C identifiers obtained from avarlety of unique sources, and a suite ol tools for exploring this data.

    " i mil v is an enterpnse level suite of tools for the exploitation of seized media

    Co nlacls JTRIG Software Developers a

    JTRIG Software Developers U

    JTRIG Software Developers UJ

    [Tech Load I HExpert Users;

    Kit] Forensic Exploitation Tool

    BEARSCRAPE

    Description can extract WIFI connection history (MAC and timing) when supplied with a copy of the registry structure or run on the box.

    si I The Sigint Porensics Laboratory was developed within MSA It has been adapted by JTRIG as Its email extraction and first-pass analysis of seized media solution

    Contacts [Tech Lead User:] [Tech Lead

    Snoopy Is a tool to extract mobile phone data from a copy of the phone's memory (usually supplied as an image file extractod through I il-ls a tool to extract data from field forenslcs' reports created by Celldek, Cellebrlte, XRY,

    Mobiimioovoi Snoopy and USIM detective These reports are transposed into a Newpm XML format to upload to Newpln. Is a tool developed by NTAC to search disk images for signs of possible Encryption products. CMA have further developed this tool to look for signs of Steganography

    N.-vi-.

    Expert

  • |.-.!') Techniques Tool Description

    CHANGFl ING Ability to spool any email address and send email under that identity

    HAVOK Real time website cloning technique allowing onthe lly alterations

    MIRAGE

    SHADOWCAT End-toEnd encrypted access to a VPS over SSH using the TOR network

    SPACE ROCKET

    RANA

    is a programme covering insertion ol media into target networks. CRINKLE CUT is a tool developed by ICTR CISA to enable JTRIG track Images as part ot SPACE ROCKET

    is a system developed by ICTRCISA providing CAPTCHA-SOlving via a web service on CERBERUS. This is intended lor use by BUMPERCAR+ and possibly in luture by SHORTFALL but anyone is welcome lo use it.

    Contacts

    JTRIG OSO L J

    JTRIG O S O ^

    JTRIG OSO EJ

    JTRIG OSO G3

    ' ^H t_ !""

    User: TeCh Lead H

    ^ExpeiL Ust

    LUMP

    GURKHAS SWORD

    A system that linds the avatar name Irom a SecondLile AgentID

    Beaconed Microsoft OITIce Documents to ellclte a targets IP address.

    JTRIG Software Developers _J JTRIG Software Developers - J

    [editi Shaping and Honeypots Tool Description

    DEADPOOL URL shortening service HUSK Secure one-to-one web based dead-drop messaging platform

    LONGSHOT File-upload and sharing website

    MOLTEN-MAGMA CGI HTTP Proxy with ability to log all traffic and perform HTTPS Man in the Middle. NIGHTCRAWLER Public online group against dodgy websites

    PISTRIX Image hosting and shanng website

    Contacts

    JTRIG OSO ^ 3

    JTRIG OSO J

    JTRIG OSO t J

    JTRIG Software Developers J

    JTRIG OSO 3

    JTRIG OSO 3

    WURLITZER Distribute a tile to multiple me hosting websites.

    Category; JTRIG

    Crown Copyright) 9 2008 or la held under licence trom third parties This information Is exempt under the Freedom ol Information Act and may be exempt vndf other UK information legislation Pefer any FOIA. queries to GCHQ O t H

    Privacy policy About GCWIki Disclaimers

    TOr SECRET STRATI COMINT Tht mmlmum tlMilrlcMlon allvwfd ortQCWrtl li TOP SECRET tTRAPl COMINT Clickw iport IrtApimpilMt ce-Mtnt