SlideShare a Scribd company logo
1 of 3
Download to read offline
TOP SECRET STRAP1 COMINT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to
report inappropriate content.
For GCWiki help contact: webteam RUSSETT . Support page
JTAC Attack Methodology Team
From GCWiki
Jump to: navigation, search
Contents
• 1 Who we are and what we do
• 1.1 Points of Contact:
• 1.2 Current Work Priorities:
• 1.3 Recent End Product Reports of note:
[edit] Who we are and what we do
The JTB team in JTAC is the thematic assessment team for Islamist Attack Methodology. Like all of
JTAC, it is staffed by secondees from various government/military departments. We have unparallelled
access to all-source intelligence from the 5-eyes community and can be consulted by GCHQ staff on
any CT issues related to weaponry, tactics and training.
We can also put you in contact with other relevant JTAC Thematic teams with expertise in
CBRN, Critical National Infrastructure, Aviation, Finance and Facilitation, Propaganda and
Ideology, etc.
We provide formal comment for Sigint EPR, or informal answers to questions requiring specialist
knowledge e.g. construction of IEDs, use of coded language, kidnapping methodology.
JTAC is based in .
[edit] Points of Contact:
Name Russett BSS Designator Specialism
Post gapped tbc JTB-1 tbc
(Royal Navy) JTB-2 Explosives / Weapons Systems
(SO15) JTB-3 Firearms / Hostile Reconaissance
(Forensic Explosives
Lab)
JTB-7 Bomb Chemist
Post gapped JTB-8
Operational Security / Cyber
Threats
[edit] Current Work Priorities:
• Analysis of Norway VBEID and Firearms attack methodology
• Exploitation of UBL compound intelligence
• Lone terrorist IED capabilities
[edit] Recent End Product Reports of note:
• JTR/762/11: Norway Attacks: What Could Islamist Extremists Learn?
• JTR/661/11: Cyber Terrorism: AQ Statement of Intent
• JTR/676/11/B: Surgical Implementation of IEDs
• JTR/560/11: AQ-M's Comsec Evolution
• JTR/057/11: UK: What An Attack On Heathrow Airport And London Underground Might Look
Like
• JTR/007/11/A: GIMF Publishes New Explosives Manual
Retrieved from "https://wiki.gchq/ /JTAC_Attack_Methodology_Team"
Views
• Page
• Discussion
• Edit
• History
• Delete
• Move
• Watch
• Additional Statistics
Personal tools
• Ejsnowd@nsa
• My talk
• My preferences
• My watchlist
• My contributions
Navigation
• Main Page
• Help Pages
• Wikipedia Mirror
• Ask Me About...
• Random page
• Recent changes
• Report a Problem
• Contacts
• GCWeb
Search
Toolbox
• What links here
• Related changes
• Upload file
• Special pages
• Printable version
• Permanent link
• This page was last modified on 8 September 2011, at 15:30.
• This page has been accessed 2,211 times.
• All material is UK [http://
Crown Copyright] © 2008 or is held under licence from third parties. This information is
exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK
information legislation. Refer any FOIA queries to GCHQ on 01242 x or
@gchq.gsi.gov.uk
• Privacy policy
• About GCWiki
• Disclaimers
TOP SECRET STRAP1 COMINT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to
report inappropriate content.
Go Search

More Related Content

Viewers also liked

Info sec privacy board 3 day cybersec meet
Info sec privacy board 3 day cybersec meetInfo sec privacy board 3 day cybersec meet
Info sec privacy board 3 day cybersec meetAnonDownload
 
Illuminati sex slaves paint horrifying picture
Illuminati sex slaves paint horrifying pictureIlluminati sex slaves paint horrifying picture
Illuminati sex slaves paint horrifying pictureAnonDownload
 
Guccifer bush dynasty family tree
Guccifer  bush dynasty family treeGuccifer  bush dynasty family tree
Guccifer bush dynasty family treeAnonDownload
 
Nativos digitales vs inmigrantes digitales
Nativos digitales vs inmigrantes digitalesNativos digitales vs inmigrantes digitales
Nativos digitales vs inmigrantes digitalesulisesivp
 
Foia snowden media contacts with us government
Foia  snowden media contacts with us governmentFoia  snowden media contacts with us government
Foia snowden media contacts with us governmentAnonDownload
 
PLBR employee survey 2012
PLBR employee survey 2012PLBR employee survey 2012
PLBR employee survey 2012stibbs010
 
Icwatch transparency toolkit uses free software and open data to analyze surv...
Icwatch transparency toolkit uses free software and open data to analyze surv...Icwatch transparency toolkit uses free software and open data to analyze surv...
Icwatch transparency toolkit uses free software and open data to analyze surv...AnonDownload
 

Viewers also liked (8)

Info sec privacy board 3 day cybersec meet
Info sec privacy board 3 day cybersec meetInfo sec privacy board 3 day cybersec meet
Info sec privacy board 3 day cybersec meet
 
Illuminati sex slaves paint horrifying picture
Illuminati sex slaves paint horrifying pictureIlluminati sex slaves paint horrifying picture
Illuminati sex slaves paint horrifying picture
 
Guccifer bush dynasty family tree
Guccifer  bush dynasty family treeGuccifer  bush dynasty family tree
Guccifer bush dynasty family tree
 
Nativos digitales vs inmigrantes digitales
Nativos digitales vs inmigrantes digitalesNativos digitales vs inmigrantes digitales
Nativos digitales vs inmigrantes digitales
 
Foia snowden media contacts with us government
Foia  snowden media contacts with us governmentFoia  snowden media contacts with us government
Foia snowden media contacts with us government
 
PLBR employee survey 2012
PLBR employee survey 2012PLBR employee survey 2012
PLBR employee survey 2012
 
Интернетбезопасности
ИнтернетбезопасностиИнтернетбезопасности
Интернетбезопасности
 
Icwatch transparency toolkit uses free software and open data to analyze surv...
Icwatch transparency toolkit uses free software and open data to analyze surv...Icwatch transparency toolkit uses free software and open data to analyze surv...
Icwatch transparency toolkit uses free software and open data to analyze surv...
 

Similar to Jtac attack methodology

Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarStanford University
 
Understanding Technology Stakeholders: Their Progress and Challenges
Understanding Technology Stakeholders: Their Progress and ChallengesUnderstanding Technology Stakeholders: Their Progress and Challenges
Understanding Technology Stakeholders: Their Progress and ChallengesJohn Gilligan
 
AVTokyo 2013.5 - China is a victim, too :-) (English version)
AVTokyo 2013.5 - China is a victim, too :-) (English version)AVTokyo 2013.5 - China is a victim, too :-) (English version)
AVTokyo 2013.5 - China is a victim, too :-) (English version)Anthony Lai
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLexume1
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLexume1
 
Cryptocurrency Market.pdf
Cryptocurrency Market.pdfCryptocurrency Market.pdf
Cryptocurrency Market.pdfRushiDalve
 
Cryptocurrency Market.pdf
Cryptocurrency Market.pdfCryptocurrency Market.pdf
Cryptocurrency Market.pdfSimaJadhav1
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Sharmin Ahammad
 
Blockchain’s implications for the financial industry
Blockchain’s implications for the financial industryBlockchain’s implications for the financial industry
Blockchain’s implications for the financial industryInitio
 
Understanding Technology Stakeholders
Understanding Technology StakeholdersUnderstanding Technology Stakeholders
Understanding Technology StakeholdersJohn Gilligan
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingDavid Opderbeck
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Using Chaos to Disentangle an ISIS-Related Twitter Network
Using Chaos to Disentangle an ISIS-Related Twitter NetworkUsing Chaos to Disentangle an ISIS-Related Twitter Network
Using Chaos to Disentangle an ISIS-Related Twitter NetworkSteve Kramer
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxDemystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxnull - The Open Security Community
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Andreas Sfakianakis
 

Similar to Jtac attack methodology (20)

Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern War
 
S fahey
S faheyS fahey
S fahey
 
Is the us engaged in a cyber war
Is the us engaged in a cyber warIs the us engaged in a cyber war
Is the us engaged in a cyber war
 
Understanding Technology Stakeholders: Their Progress and Challenges
Understanding Technology Stakeholders: Their Progress and ChallengesUnderstanding Technology Stakeholders: Their Progress and Challenges
Understanding Technology Stakeholders: Their Progress and Challenges
 
AVTokyo 2013.5 - China is a victim, too :-) (English version)
AVTokyo 2013.5 - China is a victim, too :-) (English version)AVTokyo 2013.5 - China is a victim, too :-) (English version)
AVTokyo 2013.5 - China is a victim, too :-) (English version)
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
Cryptocurrency Market.pdf
Cryptocurrency Market.pdfCryptocurrency Market.pdf
Cryptocurrency Market.pdf
 
Cryptocurrency Market.pdf
Cryptocurrency Market.pdfCryptocurrency Market.pdf
Cryptocurrency Market.pdf
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011
 
Blockchain’s implications for the financial industry
Blockchain’s implications for the financial industryBlockchain’s implications for the financial industry
Blockchain’s implications for the financial industry
 
Understanding Technology Stakeholders
Understanding Technology StakeholdersUnderstanding Technology Stakeholders
Understanding Technology Stakeholders
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Using Chaos to Disentangle an ISIS-Related Twitter Network
Using Chaos to Disentangle an ISIS-Related Twitter NetworkUsing Chaos to Disentangle an ISIS-Related Twitter Network
Using Chaos to Disentangle an ISIS-Related Twitter Network
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxDemystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
 

Jtac attack methodology

  • 1. TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam RUSSETT . Support page JTAC Attack Methodology Team From GCWiki Jump to: navigation, search Contents • 1 Who we are and what we do • 1.1 Points of Contact: • 1.2 Current Work Priorities: • 1.3 Recent End Product Reports of note: [edit] Who we are and what we do The JTB team in JTAC is the thematic assessment team for Islamist Attack Methodology. Like all of JTAC, it is staffed by secondees from various government/military departments. We have unparallelled access to all-source intelligence from the 5-eyes community and can be consulted by GCHQ staff on any CT issues related to weaponry, tactics and training. We can also put you in contact with other relevant JTAC Thematic teams with expertise in CBRN, Critical National Infrastructure, Aviation, Finance and Facilitation, Propaganda and Ideology, etc. We provide formal comment for Sigint EPR, or informal answers to questions requiring specialist knowledge e.g. construction of IEDs, use of coded language, kidnapping methodology. JTAC is based in . [edit] Points of Contact: Name Russett BSS Designator Specialism
  • 2. Post gapped tbc JTB-1 tbc (Royal Navy) JTB-2 Explosives / Weapons Systems (SO15) JTB-3 Firearms / Hostile Reconaissance (Forensic Explosives Lab) JTB-7 Bomb Chemist Post gapped JTB-8 Operational Security / Cyber Threats [edit] Current Work Priorities: • Analysis of Norway VBEID and Firearms attack methodology • Exploitation of UBL compound intelligence • Lone terrorist IED capabilities [edit] Recent End Product Reports of note: • JTR/762/11: Norway Attacks: What Could Islamist Extremists Learn? • JTR/661/11: Cyber Terrorism: AQ Statement of Intent • JTR/676/11/B: Surgical Implementation of IEDs • JTR/560/11: AQ-M's Comsec Evolution • JTR/057/11: UK: What An Attack On Heathrow Airport And London Underground Might Look Like • JTR/007/11/A: GIMF Publishes New Explosives Manual Retrieved from "https://wiki.gchq/ /JTAC_Attack_Methodology_Team" Views • Page • Discussion • Edit • History • Delete • Move • Watch • Additional Statistics Personal tools • Ejsnowd@nsa • My talk • My preferences • My watchlist
  • 3. • My contributions Navigation • Main Page • Help Pages • Wikipedia Mirror • Ask Me About... • Random page • Recent changes • Report a Problem • Contacts • GCWeb Search Toolbox • What links here • Related changes • Upload file • Special pages • Printable version • Permanent link • This page was last modified on 8 September 2011, at 15:30. • This page has been accessed 2,211 times. • All material is UK [http:// Crown Copyright] © 2008 or is held under licence from third parties. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to GCHQ on 01242 x or @gchq.gsi.gov.uk • Privacy policy • About GCWiki • Disclaimers TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. Go Search