JTRIG Tools and Techniques (Redirected from JTRIG CITD - Covert Internet Technical Development) Navigation

Total Page:16

File Type:pdf, Size:1020Kb

JTRIG Tools and Techniques (Redirected from JTRIG CITD - Covert Internet Technical Development) Navigation my talk my preferences my watchlist my contributions | page | | discussion | | edit | | history | | delete | | move | | watch | ^additional statistics | TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help page JTRIG tools and techniques (Redirected from JTRIG CITD - Covert Internet Technical Development) navigation Main Page Help Pages Wikipedia Mirror JTRIG Capabilities Ask Me About... Random page Recent changes Report a Problem Contacts GCWeb [edit] search JTRIG tools Go Search toolbox What links here Contents Related changes Upload file 1 JTRIG tools Special pages 1.1 Understanding this page Printable version 1.2 Current Priorities Permanent link 1.2.1 Engineering 1.2.2 Collection Ii« MedioWiki 1.2.3 Effects Capability 1.2.4 Work Flow Management This page was last 1.2.5 Analysis Tools modified on 5 July 2012, at 13:05. This page has 1.2.6 Databases been accessed 19,579 1.2.7 Forensic Exploitation times. 1.2.8 Techniques All material is UK 1.2.9 Shaping and Honeypots We dont update this page anymore, it became somewhat of a Chinese menu for effects operations. Information is now available for JTRIG staff at [[1]^] [edit] Understanding this page Tools and techniques are developed by various teams within JTRIG. We like to let people know when we have something that we can think we can use, but we also dont want to oversell our capability. For this reason, each tool indicates its current status. We may put up experimental tools or ones that are still in development so you know what we are working on, and can approach JTRIG with any new ideas. But experimental tools by their nature will be unreliable, if you raise expectations or make external commitments before speaking to us you will probably end up looking stupid. Most of our tools are fully operational, tested and reliable. We will indicate when this is the case; however there can be reasons why our tools wont work for some operational requirements (eg if it exploits a provider specific vulnerability). There may also be legal restrictions. So please come and speak to JTRIG operational staff early in your operational planning process. [edit] Current Priorities Capability Development Priorities can be fond by following the link below • CapDev Priorities (Discover) [edit] Engineering Tool/System Description Status Contacts Collects on-going usage information about how many users utilise Cerberus JTRIG's UIA capability, what sites are the most frequently visited etc. Statistics OPERATIONAL JTRIG Software Developers H3 This is in order to provide JTRIG infrastucture and ITServices Collection management information statistics. JTRIG RADIANT is a 'Data Diode' connecting the CERBERUS network with GCNET OPERATIONAL JTRIG Software Developers H3 SPLENDOUR ALLIUM ARCH JTRIG UIA via the Tor network. OPERATIONAL JTRIGI nf rastru ctu re Te am H3 ASTRAL OPERATIONAL JTRIGI nf rastru ctu re Te am H3 PROJECTION Remote GSM secure covert internet proxy using TOR hidden sen/ices. TWILIGHT OPERATIONAL JTRIGI nf rastru ctu re Te am H3 ARROW Remote GSM secure covert internet proxy using VPN services. JTRIG's new Infrastructure. FOREST WARRIOR, FRUIT BOWL, JAZZ SPICE ISLAND FUSION and other JTRIG systems will form part of the SPICE ISLAND DEV JTRIG Infrastructure Team 113 infrastructure POISON Safe Malware download capability. DESIGN JTRIG Infrastructure Team 113 ARROW CERBERUS UIA Replacement and new tools infrastructure - Primary FRUIT BOWL Domain for Generic User/Tools Access and TOR split into 3 sub- DESIGN JTRIG Infrastructure Teami3 systems. JTRIG Tor web browser - Sandbox IE replacement and FRUIT BOWL NUT ALLERGY PILOT JTRIG Infrastructure Teami3 sub-system BERRY A sub-system of FRUIT BOWL PILOT JTRIG Infrastructure Teami3 TWISTER BERRY A sub-system of FRUIT BOWL PILOT JTRIG Infrastructure Team E3m] TWISTER+ BRANDY SNAP JTRIG UIA contingency at Scarborough. IMPLEMENTATION JTRIG Infrastructure Team H3 WIND FARM R&D offsite facility. DESIGN JTRIG Infrastructure Team i3 JTRIG's legacy UIA desktop, soon to be replaced with FOREST CERBERUS OPERATIONAL JTRIG Infrastructure Team i3 WARRIOR. BOMBAYROLL JTRIG's legacy UIA standalone capability. OPERATIONAL JTRIG Infrastructure Team i3 BOMBAY ROLL Replacement which will also incorporate new collectors JAZZ FUSION IMPLEMENTATION JTRIG Infrastructure Team i3 - Primary Domain for Dedicated Connections split into 3 sub-systems. COUNTRY FILE A sub-system of JAZZ FUSION OPERATIONAL JTRIG Infrastructure Team H3 TECHNO A sub-system of JAZZ FUSION DESIGN JTRIG Infrastructure Team i3 VIKING JAZZ FUSION+ A sub-system of JAZZ FUSION DESIGN JTRIG Infrastructure Team i3 BUMBLEBEE JTRIG Operational VM/TOR architecture OPERATIONAL JTRIG Infrastructure Team i3 DANCE AIR BAG JTRIG Laptop capability for field operations. OPERATIONAL JTRIG Infrastructure Team i3 EXPOW GCHQ's UIA capability provided by JTRIG. OPERATIONAL JTRIG Infrastructure Team i3 AXLE GREASE The covert banking link for CPG OPERATIONAL JTRIG Infrastructure Team i3 POD RACE JTRIG'S MS update farm DESIGN JTRIG Infrastructure Team i3 WATCHTOWER GCNET -> CERBERUS Export Gateway Interface System OPERATIONAL JTRIG Software Developers H3 REAPER CERBERUS -> GCNET Import Gateway Interface System OPERATIONAL JTRIG Software Developers H3 DIALd External Internet Redial and Monitor Daemon OPERATIONAL JTRIG Software Developers H3 FOREST Desktop replacement for CERBERUS DESIGN JTRIG Infrastructure TeamH3 WARRIOR DOG HANDLER JTRIG's development network DESIGN JTRIG Infrastructure TeamH3 JTRIG Infrastructure TeamS DIRTY DEVIL JTRIG'S research network DESIGN [edit] Collection Tool Description Contacts Status AIRWOLF YouTube profile, comment and video collection. Beta release. JTRIG Software Fully ANCESTRY Tool for discovering the creation date of yahoo selectors. Developers ü3 Operational. JTRIG Software Fully BEARTRAP Bulk retrieval of public BEBO profiles from member or group ID. Developers H3 Operational. Decomissioned JTRIG Software BIRDSONG Automated posting of Twitter updates. Replaced by Developers H3 SYLVESTER. JTRIG Software Fully BIRDSTRIKE Twitter monitoring and profile collection. Click here for the User Guide. Developers H3 Operational. Tech Leads |In early BUGSY Google+ collection (circles, profiles etc.) ¡development. [Tech Lead:J DANCING HExpert Fully obtains the locations of WiFi access points. BEAR User: J I Operational. (Tech Lead:^__| DEVILS Expert Fully ECI Data Technique. HANDSHAKE User: Operational. DRAGON'S Paltalk group chat collection. Beta release. SNOUT Fully JTRIG Software operational EXCALIBUR acquires a Paltalk UID and/or email address from a Screen Name. Developers IO (against current Paltalk version) [Tech Lead: FATYAK Public data collection from Linkedln. In development Provides 24/7 monitoring of Vbulliten forums for target postings/online activity. Also allows JTRIG Software FUSEWIRE staggered postings to be made. Developers Is3 Technique of getting a targets IP address by pretending to be a spammer and ringing them. JTRIG Software Fully GLASSBACK Target does not need to answer. Developers IO operational. [Tech Lead: _ „ Fully GODFATHER Public data collection from Facebook. operational. In Development [Tech Lead: (Supports GOODFELLA Generic framework for public data collection from Online Social Networks. RenRen and Xing). is a port scanning tool designed to scan an entire country or city. It uses GEOFUSION to identify IP locations. Banners and content are pulled back on certain ports. Content is put into NAC HACIENDA Fully HACIENDA the EARTHLING database, and all other scanned data is sent to GNE and is available through TaskersS operational. GLOBAL SURGE and Fleximart. JTRIG Software ICE is an advanced IP harvesting technique. Developers H3 JTRIG Software Fully INSPECTOR Tool for monitoring domain information and site availability Developers H3 Operational. Fully LANDING JTRIG Software Tool for auditing dissemination of VIKING PILLAGE data. Operational. PARTY Developers H3 Fully operational, but MINIATURE Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and JTRIG Software note usage HERO bidirectional instant messaging. Also contact lists. Developers O restrictions. JTRIG Software Fully MOUTH Tool for collection for downloading a user's files from Archive.org. Developers H3 Operational. (Tech Lead:J^| ¡Expert Fully MUSTANG provides covert access to the locations of GSM cell towers. Us ^^^^^^^ Operational. Operational, but usage PHOTON A technique to actively grab the IP address of an MSN messenger user. restrictions. TORPEDO Fully JTRIG Software operational, but RESERVOIR Facebook application allowing collection of various information. Developers IO note operational restrictions. [Tech Lead:H An ICTR developed system to identify P2P file sharing activity of intelligence value. Logs are B Expert SEBACIUM accessible via DIRTY RAT. User: SILVER JTRIG Software Allows batch Nmap scanning over TOR In Development SPECTER Developers E3 A tool for regularly downloading gmail messages and forwarding them onto CERBERUS JTRIG Software Fully SODAWATER mailboxes Developers E3 Operational. Tech Lead: SPRING Find private photographs of targets on Facebook. BISHOP Tech Lead: SYLVESTER Framework for automated interaction / alias management on online social networks. In Development. Replaced by A technical programme allowing operators to log on to a JTRIG website to grab IP addresses of HAVOK. TANNER JTRIG osona Internet Cafe's. In Development. TRACER An
Recommended publications
  • Hemingway Society Newsletter
    Q: Hemingway fans who’ve seen you present on his depiction in comics in Oak Park and Key West know you’ve been collecting his cameos in the form for a while. How did the book itself come about? A: Sometimes you choose the project, sometimes the project chooses you. Hemingway in Comics was the latter. It all started when I was doing articles in support of my book Hidden Hemingway, co-authored with Mark Cirino and Aaron Vetch. While I was on tour for that book, I spotted an odd comic book page framed on the wall of Hemingway’s home in Key West. It featured Donald Duck with a Disney-fied Hemingway outside Sloppy With the publication of Hemingway in Joe’s Bar. The panels appeared to be in Comics, pop-culture scholar Robert K. German, but none of the docents knew its Elder (above) captures the surprising legacy title. of Ernest Hemingway in a form where Thus began this strange journey to readers might not expect him. find out the origin of this comic book, and I started cataloging other Hemingway appearances in comics. That evolved into a Not surprisingly, Hemingway the warrior series of articles for the Comics Journal and is one of the most popular images of the Papa In-panelled: the Hemingway Review blog, which turned author in comics. With Hemingway in Comics, into a presentation at the International Hemingway Society conference in Oak career, comics started to become a Robert K. Elder and a Park, Illinois. mainstream cultural force, so I found John Sutton saw that talk and asked Stellar Supporting Cast of myself writing about them for the New me to come out to Sheridan College in York Times, the Chicago Tribune, Wizard Wyoming and expand on it.
    [Show full text]
  • Remaster Edition Features
    Deceived by the forces of evil into prematurely bringing about the end of the world, War – the first Horseman of the Apocalypse – stands accused of breaking the sacred law by inciting a war between Heaven and Hell. In the slaughter that ensued, the demonic forces defeated the heavenly hosts and laid claim to the Earth. Brought before the sacred Charred Council, War is indicted for his crimes and stripped of his powers. Dishonored and facing his own death, War is given the opportunity to return to Earth to search for the truth and punish those responsible. Hunted by a vengeful group of Angels, War must take on the forces of Hell, forge uneasy alliances with the very demons he hunts, and journey across the ravaged remains of the Earth on his quest for vengeance and vindication. Remaster Edition Features • PS4, Xbox One and Wii U versions of Darksiders (Wrath of War) • Native 1080p rendering resolution • Doubled all the texture resolutions • Rendering improvements and rework • Better shadow rendering quality • Post processing effects Apocalyptic Power – Unleash the wrath of War, combining brutal attacks and supernatural abilities to decimate all who stand in your way • 60 FPS in moment to moment gameplay (PS4, Xbox One, PC, 30 for WiiU) Extreme Arsenal – Wield a devastating arsenal of angelic, demonic and Earthly weapons; and blaze a trail of destruction atop Ruin, War’s fiery phantom steed Epic Quest – Battle across the wastelands and demon-infested dungeons of the decimated Earth in your quest for vengeance and redemption Character Progression – Uncover powerful ancient relics, upgrade your weapons, unlock new abilities, and customize your gameplay style Battle Heaven and Hell – Battle against all who stand in your way - from war-weary angelic forces to Hell’s hideous demon hordes © 2016 by Nordic Games Licensing AB, Sweden.
    [Show full text]
  • New Mutants Epic Collection: Curse of the Valkyries Pdf, Epub, Ebook
    NEW MUTANTS EPIC COLLECTION: CURSE OF THE VALKYRIES PDF, EPUB, EBOOK Louise Simonson | 496 pages | 13 Mar 2018 | Marvel Comics | 9781302910174 | English | New York, United States New Mutants Epic Collection: Curse Of The Valkyries PDF Book Immediately she and Brightwind were consumed in flame and began to attack the others with their new fiery powers Luckily, X-Factor's former wards, the X-Terminators, Community Reviews. Buy what you want today, pay for it over time. Cancel Update. Want to Read Currently Reading Read. Unfortunately just as Illyana ran into her mother's arms, Mirage screamed and collapsed. John Byrne Illustrations ,. Sort order. Swing through the checkout with Afterpay. This will not affect the original upload Small Medium How do you want the image positioned around text? Get weekly updates on new arrivals, reviews and recommended reads, links to cool places we find on the net and much more by signing up for our newsletter! And the Avengers never looked mightier than when Rictor began to quarrel with her, and teased her that he time-bomb didn't even work. JavaScript seems to be disabled in your browser. After that, Magneto turns bad, which is really stupid. Luckily, X-Factor's former wards, the X-Terminators, are on the scene! They aren't the X-Men-in-training anymore! Community Discussion. All prices are inclusive of VAT. Reset it. Right now, Vols. Derrick Ranostaj rated it really liked it Sep 12, It's the culmination of all the super-smart seeds DnA have planted throughout the series in a shocking story that - yeah, we're saying it - will change the New Mutants as you know them! Nobody has reviewed this product yet.
    [Show full text]
  • Información Sobre La Garantía
    INFORMACIÓN SOBRE LA GARANTÍA GARANTÍA LIMITADA Bethesda Softworks LLC, empresa perteneciente a ZeniMax Media (“Bethesda Softworks”) le garantiza a usted, el comprador original de este disco y del videojuego en él incluido (“Juego”) que, en circunstancias de utilización normal del Juego, este funcionará fundamentalmente como se describe en el manual que lo acompaña durante un periodo de 90 días desde la fecha de compra (“Periodo de garantía”). Esta Garantía limitada: (a) no se aplica si el Juego se utiliza con fines empresariales o comerciales; y (b) queda anulada si el Juego falla debido a un accidente, a maltrato, al ataque de un virus o a un uso inadecuado. RECURSO EXCLUSIVO Y LIMITACIÓN DE RESPONSABILIDAD Toda reclamación relacionada con la garantía debe dirigirse al vendedor al que usted compró el Juego. Debe devolver el Juego al vendedor dentro del periodo de garantía junto con una copia del recibo de compra original y una descripción del problema que afecta al Juego. El vendedor, a su discreción, podrá reparar o reemplazar el Juego por otro. Todo Juego reemplazado estará sujeto a garantía durante el tiempo restante del Periodo de garantía original o durante 30 días; de los dos, el periodo de mayor duración. El recurso exclusivo del comprador y toda la responsabilidad de Bethesda Softworks, sus licenciantes y distribuidores consistirán, a discreción del vendedor, en la reparación o reemplazo del Juego que no cumpla con lo especificado en esta Garantía limitada y sea debidamente devuelto al vendedor. Fuera de Estados Unidos, no se aplicará ninguno de estos recursos ni ningún servicio de asistencia relacionado con el producto si no es con un comprobante de compra efectuada en una entidad internacional autorizada.
    [Show full text]
  • Aaronion 616 S
    TheAaronion 616 S. Mississippi River Blvd, St. Paul, MN 55116-1099 • (651) 698-8874 • www.TempleofAaron.org Vol. 95 • No. 4 December 1, 2019 3 Kislev 5780 USCJ Conference Wrestl1ng for a Better World In Genesis 32 our Patriarch Jacob wrestles with what we call an angel. He fights with him until daybreak. Eventually, this leads to Jacob getting a new name, Israel. This iconic biblical scene is often one of the most precarious ones. Who was the angel and why was he wrestling with Jacob? When Temple of Aaron brought wrestling into the Rabbi Fine attended USCJ Community synagogue, people had similar questions: Who was and Covenant Conference on wrestling and why wrestling? Even the skeptics who Interfaith Families. Pictured with poked their heads in saw a tremendous evening Rabbi Rachel Blart and ToA friend filled with Jewish wrestlers, Jewish content, and a Kalman Pila. packed synagogue singing Shabbat Shalom to end Rabbi Jeremy Fine 651-252-6412 the event. Jewish children were having the time of Email: their lives in the synagogue social hall — certainly an [email protected] evening they will never forget. Twitter: @RabbiJeremyFine But why wrestling? There are many reasons this idea came to fruition. It began to take shape a few years ago at the young family Kallah with Ashi Gavzy, Eli Temkin, Jake Glickstein, Mark Divine, and myself (sorry if I missed someone) all brainstorming the idea. After going through many contacts and iterations we were able to partner with F1rst Wrestling, Minnesota’s top wrestling company. Then we were off and running and several goals were met.
    [Show full text]
  • In the Digital Games Medium
    Georgia State University ScholarWorks @ Georgia State University Communication Theses Department of Communication 7-15-2009 L337 Soccer Moms: Conceptions of "Hardcore" and "Casual" in the Digital Games Medium Steven Andrew Boyer Follow this and additional works at: https://scholarworks.gsu.edu/communication_theses Recommended Citation Boyer, Steven Andrew, "L337 Soccer Moms: Conceptions of "Hardcore" and "Casual" in the Digital Games Medium." Thesis, Georgia State University, 2009. https://scholarworks.gsu.edu/communication_theses/53 This Thesis is brought to you for free and open access by the Department of Communication at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Communication Theses by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. L337 SOCCER MOMS CONCEPTIONS OF “HARDCORE” AND “CASUAL” IN THE DIGITAL GAMES MEDIUM by STEVEN BOYER Under the Direction of Ted Friedman ABSTRACT As digital games have become increasingly significant in the entertainment media landscape, the terms “casual” and “hardcore” have become the primary ways to describe gaming audiences, genres, and gameplay. However, these terms are saturated with outdated stereotypes involving gender, age, and class. Focusing on industrial discourse, this thesis examines this dichotomy, emphasizing areas of discontinuity and overlap to question why these terms have become so ubiquitous in gaming discourse and what functions they fulfill for a variety of groups including the industry, advertisers, and audience members. Ultimately, I suggest that these terms need to be replaced in order to move beyond restrictive stereotypes, proposing a new framework for digital games that takes into consideration user motivation, personal investment, and historical specificity.
    [Show full text]
  • Kinect™ Sports** Caution: Gaming Experience May Soccer, Bowling, Boxing, Beach Volleyball, Change Online Table Tennis, and Track and Field
    General KEY GESTURES Your body is the controller! When you’re not using voice control to glide through Kinect Sports: Season Two’s selection GAME MODES screens, make use of these two key navigational gestures. Select a Sport lets you single out a specific sport to play, either alone or HOLD TO SELECT SWIPE with friends (in the same room or over Xbox LIVE). Separate activities To make a selection, stretch To move through multiple based on the sports can also be found here. your arm out and direct pages of a selection screen the on-screen pointer with (when arrows appear to the Quick Play gets you straight into your hand, hovering over a right or left), swipe your arm the competitive sporting action. labelled area of the screen across your body. Split into two teams and nominate until it fills up. players for head-to-head battles while the game tracks your victories. Take on computer GAME MENUS opponents if you’re playing alone. To bring up the Pause menu, hold your left arm out diagonally at around 45° from your body until the Kinect Warranty For Your Copy of Xbox Game Software (“Game”) Acquired in Australia or Guide icon appears. Be sure to face the sensor straight New Zealand on with your legs together and your right arm at your IF YOU ACQUIRED YOUR GAME IN AUSTRALIA OR NEW ZEALAND, THE FOLLOWING side. From this menu you can quit, restart, or access WARRANTY APPLIES TO YOU IN ADDITION the Kinect Tuner if you experience any problems with TO ANY STATUTORY WARRANTIES: Consumer Rights the sensor (or press on an Xbox 360 controller if You may have the benefi t of certain rights or remedies against Microsoft Corpor necessary).
    [Show full text]
  • It Was Showering Rainbows
    IT WAS SHOWERING IT WAS SHOWERING RAINBOWS • RAINBOWS Stories of fancy and adventure from third, fourth, and fifth graders at Buena Vista Horace Mann K-8 School Spring 2020 826 VALENCIA SPRING 2020 Dedication We dedicate this book to our school community—our classmates, our teachers, our tutors, and our families. IT WAS SHOWERING RAINBOWS Stories of fancy and adventure from third, fourth, and fifth graders at Buena Vista Horace Mann K-8 School Mission Center Tenderloin Center Mission Bay Center 826 Valencia Street 180 Golden Gate Avenue 1310 4th Street San Francisco, CA 94110 San Francisco, CA 94102 San Francisco, CA 94158 826valencia.org Published May 2020 by 826 Valencia Copyright © 2020 by 826 Valencia The views expressed in this book are the authors’ and do not necessarily reflect those of 826 Valencia. We support student publishing and are thrilled that you picked up this book. Project Directors Ashley Smith and Melissa Anguiano Supporting School Staff Claudia DeLarios Moran Interns, Tutors, and Editors Debra Asher Juan Ibarra Niki Ragone Julia Beck Hannah Johnson Opal Jane Ratchye Camila Ceja Kavitha Lotun Nicole Read Lila Cutter Natalie Louie Ginnie Redmond Jim Emerman Sayantika Mandal Zora Rosenburg Tommy Emick Natalia Marsh Richard Schwarzenberger Zach Estudillo Emilie Mayer Maya Swain Sally Evans Cathleen McCarthy Ben Tripp Juan Fajardo Vera Peter O’Meara Megan Whitney Matt Flaherty Nick Parker Diego Hernandez Andrew Pascua Design Director Brad Amorosino Publications Project Manager Meghan Ryan Illustrator Alex Campbell 826 Valencia and its free programs are fueled by generous contributions from companies, organizations, government agencies, and individuals who provide more than ninety-five percent of our budget.
    [Show full text]
  • James Mickens's “The Slow Winter”
    The Slow Winter JAMES MICKENS James Mickens is a researcher ccording to my dad, flying in airplanes used to be fun. You could in the Distributed Systems smoke on the plane, and smoking was actually good for you. Every- group at Microsoft’s Redmond body was attractive, and there were no fees for anything, and there lab. His current research A focuses on web applications, was so much legroom that you could orient your body parts in arbitrary and with an emphasis on the design of JavaScript profane directions without bothering anyone, and you could eat caviar and frameworks that allow developers to manatee steak as you were showered with piles of money that were person- diagnose and fix bugs in widely deployed ally distributed by JFK and The Beach Boys. Times were good, assuming that web applications. James also works on fast, you were a white man in the advertising business, WHICH MY FATHER scalable storage systems for datacenters. WAS NOT SO PERHAPS I SHOULD ASK HIM SOME FOLLOW-UP James received his PhD in computer science from the University of Michigan, and a QUESTIONS BUT I DIGRESS. The point is that flying in airplanes used bachelor’s degree in computer science from to be fun, but now it resembles a dystopian bin-packing problem in which Georgia Tech. [email protected] humans, carry-on luggage, and five dollar peanut bags compete for real estate while crying children materialize from the ether and make obscure demands in unintelligible, Wookie-like languages while you fantasize about who you won’t be helping when the oxygen masks descend.
    [Show full text]
  • Uncanny Xmen Box
    Official Advanced Game Adventure CAMPAIGN BOOK TABLE OF CONTENTS What Are Mutants? ....... .................... ...2 Creating Mutant Groups . ..... ................ ..46 Why Are Mutants? .............................2 The Crime-Fighting Group . ... ............. .. .46 Where Are Mutants? . ........ ........ .........3 The Tr aining Group . ..........................47 Mutant Histories . ................... ... ... ..... .4 The Government Group ............. ....... .48 The X-Men ..... ... ... ............ .... ... 4 Evil Mutants ........................... ......50 X-Factor . .......... ........ .............. 8 The Legendary Group ... ........... ..... ... 50 The New Mutants ..... ........... ... .........10 The Protective Group .......... ................51 Fallen Angels ................ ......... ... ..12 Non-Mutant Groups ... ... ... ............. ..51 X-Terminators . ... .... ............ .........12 Undercover Groups . .... ............... .......51 Excalibur ...... ..............................12 The False Oppressors ........... .......... 51 Morlocks ............... ...... ......... .....12 The Competition . ............... .............51 Original Brotherhood of Evil Mutants ..... .........13 Freedom Fighters & Te rrorists . ......... .......52 The Savage Land Mutates ........ ............ ..13 The Mutant Campaign ... ........ .... ... .........53 Mutant Force & The Resistants ... ......... ......14 The Mutant Index ...... .... ....... .... 53 The Second Brotherhood of Evil Mutants & Freedom Bring on the Bad Guys ... .......
    [Show full text]
  • Mergers in the Digital Economy
    2020/01 DP Axel Gautier and Joe Lamesch Mergers in the digital economy CORE Voie du Roman Pays 34, L1.03.01 B-1348 Louvain-la-Neuve Tel (32 10) 47 43 04 Email: [email protected] https://uclouvain.be/en/research-institutes/ lidam/core/discussion-papers.html Mergers in the Digital Economy∗ Axel Gautier y& Joe Lamesch z January 13, 2020 Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five's strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company's most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves. For these tech giants, therefore, acquisition appears to be a substitute for in-house R&D. Finally, from our check for possible "killer acquisitions", it appears that just a single one in our sample could potentially be qualified as such. Keywords: Mergers, GAFAM, platform, digital markets, competition policy, killer acquisition JEL Codes: D43, K21, L40, L86, G34 ∗The authors would like to thank M.
    [Show full text]
  • Microsoft Surface User Experience Guidelines
    Microsoft Surface™ User Experience Guidelines Designing for Successful Touch Experiences Version 1.0 June 30, 2008 1 Copyright This document is provided for informational purposes only, and Microsoft makes no warranties, either express or implied, in this document. Information in this document, including URL and other Internet Web site references, is subject to change without notice. The entire risk of the use or the results from the use of this document remains with the user. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, financial and other data, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, places, financial or other data, or events is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2008 Microsoft Corporation. All rights reserved. Microsoft, Excel, Microsoft Surface, the Microsoft Surface logo, Segoe, Silverlight, Windows, Windows Media, Windows Vista, Virtual Earth, Xbox LIVE, XNA, and Zune are either registered trademarks or trademarks of the Microsoft group of companies.
    [Show full text]