Advertisement
Guest User

JTRIG Catalog

a guest
Jul 14th, 2014
189
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.30 KB | None | 0 0
  1. Engineering,,,
  2. ,,,
  3. Tool/System,Description,Status,Contacts
  4. Cerberus Statistics Collection,"Collects on-going usage information about how many users utilise JTRIG's UIA capability, what sites are most frequently visited etc. This is in order to provide JTRIG infrastructure and ITServices management information statistics",OPERATIONAL,JTRIG Software Developers
  5. JTRIG RADIANT SPLENDOUR,is a “Data Diode” connecting the CERBERUS network with GCNET,OPERATIONAL,JTRIG Software Developers
  6. ALLIUM ARCH,JTRIG UIA via the Tor network,OPERATIONAL,JTRIG Infrastructure Team
  7. ASTRAL PROJECTION,Remote GSM secure covert internet proxy using TOR hidden services.,OPERATIONAL,JTRIG Infrastructure Team
  8. TWILIGHT ARROW,Remote GSM secure covert internet proxty using VPN services.,OPERATIONAL,JTRIG Infrastructure Team
  9. SPICE ISLAND,"JTRIG's new infrastructure. FOREST WARRIOR, FRUIT BOWL, JAZZ FUSION and other JTRIG systems will form part of the SPICE ISLAND infrastructure",DEV,JTRIG Infrastructure Team
  10. POISON ARROW,Safe Malware download capability,DESIGN,JTRIG Infrastructure Team
  11. FRUIT BOWL,CERBERUS UIA Replacement and new tools infrastructure – Primary Domain for Generic User/Tools Access and TOR split into 3 sub-systems.,DESIGN,JTRIG Infrastructure Team
  12. NUT ALLERGY,JTRIG Tor web browser – Sandbox IE replacement and FRUIT BOWL sub-system,PILOT,JTRIG Infrastructure Team
  13. BERRY TWISTER,A sub-system of FRUIT BOWL,PILOT,JTRIG Infrastructure Team
  14. BERRY TWISTER+,A sub-system of FRUIT BOWL,PILOT,JTRIG Infrastructure Team
  15. BRANDY SNAP,JTRIG UIA contingency at Scarborough.,IMPLEMENTATION,JTRIG Infrastructure Team
  16. WIND FARM,R & D offsite facility,DESIGN,JTRIG Infrastructure Team
  17. CERBERUS,"JTRIG's legacy UIA desktop, soon to be replaced with FOREST WARRIOR",OPERATIONAL,JTRIG Infrastructure Team
  18. BOMBAYROLL,JTRIG's legacy UIA standalone capability,OPERATIONAL,JTRIG Infrastructure Team
  19. JAZZ FUSION,BOMBAY ROLL Replacement which will also incorporate new collectors – Primary Domain for Dedicated Connections split into 3 sub-systems.,IMPLEMENTATION,JTRIG Infrastructure Team
  20. COUNTRY FILE,A sub-system of JAZZ FUSION,OPERATIONAL,JTRIG Infrastructure Team
  21. TECHNO VIKING,A sub-system of JAZZ FUSION,DESIGN,JTRIG Infrastructure Team
  22. JAZZ FUSION+,A sub-system of JAZZ FUSION,DESIGN,JTRIG Infrastructure Team
  23. BUMBLEBEE,JTRIG Operational VM/TOR architecture,OPERATIONAL,JTRIG Infrastructure Team
  24. AIR BAG,JTRIG laptop capability for field operations,OPERATIONAL,JTRIG Infrastructure Team
  25. EXPOW,GCHQ's UIA capability provided by JTRIG,OPERATIONAL,JTRIG Infrastructure Team
  26. AXLE GREASE,The covert banking link for CPG,OPERATIONAL,JTRIG Infrastructure Team
  27. POD RACE,JTRIG'S MS update farm,DESIGN,JTRIG Infrastructure Team
  28. WATCHTOVER,GCNET → CERBERUS Export Gatway Interface System,OPERATIONAL,JTRIG Software Developers
  29. REAPER,CERBERUS → GCNET Import Gateway Interface System,OPERATIONAL,JTRIG Software Developers
  30. DIALd,External Internet Redial and Monitor Daemon,OPERATIONAL,JTRIG Software Developers
  31. FOREST WARRIOR,Desktop replacement for CERBERUS,DESIGN,JTRIG Infrastructure Team
  32. DOG HANDLER,JTRIG's development network,DESIGN,JTRIG Infrastructure Team
  33. DIRTY DEVIL,JTRIG'S research network,DESIGN,JTRIG Infrastructure Team
  34. ,,,
  35. PAGE 2,,,
  36. ,,"Note, flipped > ","< Note, flipped"
  37. ,,,
  38. Tool,Description,Status,Contacts
  39. AIRWOLF,"YouTube profile, comment and video collection.",Beta release.,redacted
  40. ANCESTRY,Tool for discovering the creation date of yahoo selectors.,Fully Operational.,JTRIG Software Developers
  41. BEARTRAP,Bulk retrival of public BEBO profiles from member or group ID,Fully Operational.,JTRIG Software Developers
  42. BIRDSONG,Automated posting of Twitter updates.,Decomissioned. Replaced by Sylvester,JTRIG Software Developers
  43. BIRDSTRIKE,Twitter monitoring and profile collection. Click Here for the User Guide,Fully Operational.,JTRIG Software Developers
  44. BUGSY,"Google+ collection (circles, profiles etc.)",In early development,Tech leads <redacted>
  45. DANCING BEAR,obtains the locations of WiFi access points.,Fully Operational.,Tech Lead: <redacted> Expert User: <redacted>
  46. DEVILS HANDSHAKE,ECI Data Technique.,Fully Operational.,Tech Lead: <redacted> Expert User: <redacted>
  47. DRAGON'S SNOUT,Palktalk group chat collection,Beta release.,Tech leads <redacted>
  48. EXCALIBUR,acquires a Palktalk UID and/or email address from a Screen Name,Fully Operational (against current Paltalk version),JTRIG Software Developers
  49. FATYAK,Public data collection from LinkedIn.,In development,Tech Lead: <redacted>
  50. FUSEWIRE,Provides 24/7 monitoring of Vbulliten forums for target postings/online activity. Also allows staggered postings to be made.,,JTRIG Software Developers
  51. GLASSBACK,Technique of getting a targets IP address by pretending to be a spammer and ringing them. Target does not need to answer.,Fully Operational.,JTRIG Software Developers
  52. GODFATHER,Public data collection from Facebook.,Fully Operational.,Tech Lead: <redacted>
  53. GOODFELLA,Generic framework for public data collection from Online Social Networks.,In development (Supports RenRen and Xing),Tech Lead: <redacted>
  54. HACIENDA,"is a port scanning tool designed to scan an entire country or city. It used GEOFUSION to identify IP locations. Banners and content are pulled back on certain ports. Content is put int othe EARTHLING database, and all other scanned data is sent to GNE and is available through GLOBAL SURGE and Fleximart.",Fully Operational.,NAC HACIENDA Taskers
  55. ICE,is an advanced IP harvesting technique.,,JTRIG Software Developers
  56. INSPECTOR,Tool for monitoring domain information and site availability.,Fully Operational.,JTRIG Software Developers
  57. LANDING PARTY,Tool for auditing dissemination of VIKING PILLAGE data.,Fully Operational.,JTRIG Software Developers
  58. ,,,
  59. Page 3,,,
  60. ,,,
  61. MINIATURE HERO,Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.,"Fully operational, but note usage restrictions.",JTRIG Software Developers
  62. MOUTH,Tool for collection for downloading a user's files from Archive.org.,Fully Operational.,JTRIG Software Developers
  63. MUSTANG,provides covert access to the locations of GSM cell towers.,Fully Operational.,Tech Lead: <redacted> Expert User: <redacted>
  64. PHOTON TORPEDO,A technique to actively grap the IP address of an MSN messenger user.,"Operational, but usage restrictions",Tech Lead: <redacted>
  65. RESERVOIR,Facebook application allowing collection of various information.,"Fully operational, but note operational restrictions.",JTRIG Software Developers
  66. SEBACIUM,An ICTR developed system to identify P2P file sharing activity of intelligence value. Logs are accessible via DIRTY RAT.,,Tech Lead: <redacted> Expert User: <redacted>
  67. SILVER SPECTER,Allows batch Nmap scanning over TOR,In development,JTRIG Software Developers
  68. SODAWATER,A tool for regularrly downloading gmail messages and forwarding them onto CERBERUS mailboxes,Fully Operational.,JTRIG Software Developers
  69. SPRING BISHOP,Find private photographs of targets on Facebook.,,Tech Lead: <redacted>
  70. SYLVESTER,Framework for automated interaction / alias management on online social networks.,In development,Tech Lead: <redacted>
  71. TANNER,A technical programme allowing operators to log on to a JTRIG website to grab IP addresses of Internet Cafe's.,Replaced by HAVOK,JTRIG OSO
  72. TRACER FIRE,"An Office Document that grabs the targets Machine into, files, logs, etc and posts it back to GCHQ.",In Development,TRACER FIRE JTRIG
  73. VIEWER,A programme that (hopefully) provides advance tip off of the kidnappers IP address for HMG personnel.,Tech Lead: <redacted> Expert User: <redacted>,"Operational, but awaiting field trial."
  74. VIKING PILLAGE,Distributed network for the automatic collection of encrypted/compressed data from remotely hosted JTRIG projects.,Operational,PILLAGE JTRIG Software Developers
  75. TOP HAT,A version of the MUSTAN and DANCING BEAR techniques that allows us to pull back Cell Tower and WiFi locations targeted against particular areas.,In development,Tech Lead: <redacted>
  76. ,,,
  77. Effects Capability,,,
  78. "JTRIG develop the majority of effects capability in GCHQ. A lot of this capability is developed on demand for specific operations and then further developed to provide weaponised capability. Don't treat this like a catalogue. If you don't see it here, it doesn't mean we can't build it. If you involve the JTRIG operational teams at the start of your operation, you have more of a chance that we will build something for you. For each of our tools we have indicated the state of the tool. We only advertise tools here that are either ready to fire or very close to being ready (operational requirements would re-priotise our development). Once again, involve the JTRIG operational teams early.",,,
  79. ,,,
  80. Tool,Description,Status,Contacts
  81. ANGRY PIRATE,is a tool that will permanently disable a target's account on their computer.,Ready to fire (but see target restrictions).,Tech Lead: <redacted> Expert User: <redacted>
  82. ARSON SAM,is a tool to test the effect of certain types of PDU SMS messages on phones / network. It also includes PDU SMS Dumb Fuzz testing.,"READY to fire (Not against live targets, this is a R&D Tool).",Tech Lead: <redacted> Expert User:
  83. BUMPERCAR+,is an automated system developed by JTRIG CITD to support JTRIG BUMPERCAR operations. BUMPERCAR operations are used to disrupt and deny internet-based terror videos or other material. The technique employs the services provided by upload providers to report offensive materials.,Ready to fire.,JTRIG Software Developers
  84. BOMB BAY,is the capability to increase website hits/rankings.,In Development.,Tech Lead: <redacted>
  85. BADGER,mass delivery of email messaging to support an Information Operations campaign,Ready to fire.,JTRIG OSO
  86. BURLESQUE,is the capability to send spoofed SMS text messages.,Ready to fire.,JTRIG OSO
  87. CANNONBALL ,is the capability to send repeated text messages to a single target.,Ready to fire.,JTRIG OSO
  88. CLEAN SWEEP,Masquerade Facebook Wall Posts for individuals or entire countries,Ready to fire (SIGINT sources required),Tech Lead: <redacted> Expert User:
  89. CLUMSY BEEKEEPER,Some work in progress to investigate IRC effects.,NOT READY TO FIRE.,Tech Lead: <redacted> Expert User: <redacted>
  90. CHINESE FIRECRACKER,Overt brute login attempts against online forums,Ready to fire.,FIRECRACKER
  91. CONCRETE DONKEY,"is the capability to scatter an audio message to a large number of telephones, or repeatedly bomb a target number with the same message.",In development,<redacted>
  92. DEER STALKER,Ability to aid-geolocation of Sat Phones / GSM Phones via a silent calling to the phone.,Ready to fire.,Tech Lead: <redacted> Expert User: <redacted>
  93. GATEWAY,Ability to artificially increase traffic to a website,Ready to fire.,JTRIG OSO
  94. GAMBIT,Deployable pocket-sized proxy server,In development,JTRIG OSO
  95. GESTATOR,"amplification of a given message, normally video, on popular multimedia websited (Youtube).",,Tech Lead ? Expert user <redacted>
  96. GLITTERBALL,Online Gaming Capabilities for Sensitive Operations. Currently Second Life.,In development,
  97. IMPERIAL BARGE,For connecting two target phone together in a call.,Tested.,Tech Lead: <redacted> Expert User: <redacted>
  98. PITBULL,"Capability, under development, enabling large scale delivery of a tailored message to users of Instant Messaging services.",In development.,
  99. POISONED DAGGER,"Effects against Gigatribe. Built by ICTR, deployed by JTRIG.",,Tech Lead: <redacted>
  100. ,,,
  101. Page 6,,,
  102. ,,,
  103. PREDATORS FACE,Targeted Denial of Service against Web Servers,,Tech Lead: <redacted>
  104. ROLLING THUNDER,"Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG.",,Tech Lead: <redacted>
  105. SCARLET EMPEROR,Targeted denial of service against targets phones via call bombing.,Ready to fire.,JTRIG Software Developers
  106. SCRAPHEAP CHALLENGE,Perfect spoofing of emails from Blackberry targets.,"Ready to fire, but see constraints.",<redacted>
  107. SERPENTS TONGUE,for fax message broadcasting to multiple numbers.,In redevelopment ,<redacted> Expert User: <redacted>
  108. SILENT MOVIE,Targeted denial of service against SSH services.,Ready to fire.,Tech Lead: <redacted> Expert User: <redacted>
  109. SILVERBLADE,Reporting of extremist material on DAILYMOTION.,Ready to fire.,Tech Lead: <redacted> Expert User: <redacted>
  110. SILVERFOX,List provided to industry of live extremist material files hosted on FFUs.,Ready to fire.,Tech Lead: <redacted> Expert User: <redacted>
  111. SILVERLORD,Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.,Ready to fire.,Tech Lead: <redacted> Expert User: <redacted>
  112. SKYSCRAPER,Production and dissemination of multimedia via the web in the course of information operations.,Ready to fire.,Tech Lead: Section X; Expert Users: Language Team
  113. SLIPSTREAM,Ability to inflate page views on websites,Ready to fire.,JTRIG Infrastructure Team
  114. STEALTH MOOSE,is a tool that will Disrupt target's Windows machine. Logs of how long and when the effect is active.,Ready to fire (but see target restrictions).,Teach Lead: <redacted> Expert User
  115. SUNBLOCK,Ability to deny functionality to send/receive email or view material online.,"Tested, but operational limitations.",Tech Lead: Section X; Expert User: <redacted>
  116. Swamp donkey,is a tool that will silently locate all predefined types of file and encrypt them on a targets machine.,Ready to fire (but see target restrictions).,Tech Lead: <redacted> Expert User: <redacted>
  117. TORNADO ALLEY,is a delivery method (Excel Spreadsheet) that can silently exctract and run an executable on a target's machine.,Ready to fire (but see target restrictions).,Tech Lead: <redacted> Expert User: <redacted>
  118. UNDERPASS,Change the outcome of online polls (previously known as NUBILO),In development.,Tech Lead: Section X; Expert User: <redacted>
  119. VIPERS TONGUE,is a tool that will silently Denial of Service calls on a Satellite Phone or a GSM Phone.,Ready to fire (but see target restrictions).,Tech Lead: <redacted> Expert User: <redacted>
  120. WARPATH,Mass delivery of SMS messages to support an information Operations campaign,Ready to fire.,JTRIG OSO
  121. ,,,
  122. Work Flow Management,,,
  123. ,,,
  124. Tool,Descriptioni,Contacts,
  125. HOME PORTAL,A central hub for all JTRIG Cerberus tools,JTRIG Software Developers,
  126. CYBER COMMAND CONSOLE,"A centralised suite of tools, satistics and viewers for tracking current operations across the Cyber community.",JTRIG Software Developers,
  127. NAMEJACKER,A web service and admin console for the translation of usernames between networks. For use with gateways and other such technologies.,JTRIG Software Developers,
  128. ,,,
  129. Analysis Tools,,,
  130. ,,,
  131. Tools,Description,Contacts,
  132. BABYLON,is a tool that bulk queries web mail addresses and verifies whether they can be signed up for. A green tick indicates that the address is currently in use. Verification can currently be done for Hotmail and Yahoo. ,JTRIG Software Developers,
  133. CRYOSTAT,si a JTRIG tool that runs against data held in NEWPIN. It then displays this data in a chart to show links between targets.,JTRIG Software Developers,
  134. ELATE,"is a suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk). These tools are hosted on an Internet server, and results are retreived by encrypted email.",JTRIG Software Developers,
  135. PRIMATE,is a JTRIG tool that aims to provides the capability to indentify trends in seized computer media data and metadata.,JTRIG Software Developers,
  136. JEDI,"JTRIG will shortly be rolling out a JEDI pod to every desk of every member of an Interlligence Production Team. The challenge is to scale up to over 1,200 users whilst remaining agile, efficent and responsive to customer needs.",Tech Lead: <redacted> Expert User: <redacted>,
  137. JILES ,is a JTRIG bespoke web browser,Tech Lead: <redacted> Expert User: ,
  138. MIDDLEMAN,"is a distributed real-time event aggregation, tip-off and tasking platform utilised by JTRIG as a middleware layer.",JTRIG Software Developers,
  139. OUTWARD ,"is a collection of DNS lookup, WHOIS Lookup and other network tools.",JTRIG Software Developers,
  140. TANGLEFOOT,is a bulk search tool which queries a set of online resources. This allows analysts to quickly check the online precence of a target.,JTRIG Software Developers,
  141. SCREAMING EAGLE,is a tool that processes kismet data into geolocation information,,
  142. SLAMMER,"is a data index and repository that provides analysts with the ability to query data collected from the Internet from various JTRIG sources, suc has EARTHLING, HACIENDA, web pages saved by analysts etc.",JTRIG Software Developers,
  143. ,,,
  144. Databases,,,
  145. BYSTANDER,is a categorisation database accessed via web service.,JTRIG Software Developers,
  146. CONDUIT,"is a database of C2C identifiers for Intelligence Community assets acting online, either under alias or in real name.",JTRIG Software Developers,
  147. NEWPIN,"is a database of C2C identifiers obtained from a variety of unique sources, and a suite of tools for exploring this data.",JTRIG Software Developers,
  148. QUINCY,is a enterprise level suite of tools for the exploitation of seized media.,Tech Lead: <redacted> Expert User: <redacted>,
  149. ,,,
  150. Forensic Exploitation,,,
  151. BEARSCAPE,can extract WiFi connection history (MAC and timing) when supplied with a copy of the registry structure or run on the box.,Tech Lead: <redacted> Expert User: ,
  152. SFL,The Sigint Forensics Laboratory was developed within NSA. It has been adapted by JTRIG as its email extraction and first-pass analysis of seized media solution.,Tech Lead: <redacted> Expert User: <redacted>,
  153. Snoopy,is a tool to extract mobile phone data from a copy of the phone's memory (usually supplied as an image file extracted through FTK.,Tech Lead: <redacted>,
  154. MobileHoover,"is a tool to extract data from field forensics' reports created by Celldek, Cellebrite, XRY, Snoopy and USIM detective. These reports are transposed into a Newpin XML format to upload to Newpin.",Tech Lead: <redacted>,
  155. Nevis,is a tool developed by NTAC to search disk images for signs of possible Encryption products. CMA have further developed this tool to look for signs of Steganography.,Tech Lead: <redacted>,
  156. ,,,
  157. Techniques,,,
  158. ,,,
  159. Tool,Description,Contacts,
  160. CHANGELING,Ability to spoof any email address and send email under that identity,JTRIG OSO,
  161. HAVOK,Real-time website cloning technique allowing on-the-fly alterations,JTRIG OSO,
  162. MIRAGE,,JTRIG OSO,
  163. SHADOWCAT,End-toEnd encrypted access to a VPS over SSH using the TOR network,JTRIG OSO,
  164. SPACE ROCKET,is a programme covering insertion of media into target networks. CRINKLE CUT is a tool developed by ICTR-CISA to enable JTRIG track images as part of SPACE ROCKET.,Tech Lead: <redacted> Expert User: ,
  165. RANA,is a system developed by ICTR-CISA providing CAPTCHA-solving via a web service on CERBERUS. This is intended for use by BUMPERCAR+ and possibly in future by SHORTFALL but anyone is welcome to use it.,Tech Lead: <redacted> Expert User: ,
  166. LUMP,A system that finds the avatar name from a SecondLife AgentID,JTRIG Software Developers,
  167. GURKHAS SWORD,Beaconed Microsoft Office Documents to elicite a targets IP address.,JTRIG Software Developers,
  168. ,,,
  169. Shaping and Honeypots,,,
  170. DEADPOOL,URL shortening service,JTRIG OSO,
  171. HUSK,Secure one-to-one web based dead-drop messaging platform,JTRIG OSO,
  172. LONGSHOT,File-upload and sharing website,JTRIG OSO,
  173. MOLTEN-MAGMA,CGI HTTP Proxy with ability to log all tragffic and perform HTTPS Man in the Middle.,JTRIG Software Developers.,
  174. NIGHTCRAWLER,Public online group against dodgy websites,JTRIG OSO,
  175. PISTRIX,Image hosting and sharing website,JTRIG OSO,
  176. WURLITZER,Distribute a file to multiple file hosting websites.,<redacted>,
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement