This document is an internal GCHQ document about Juniper Networks, a provider of networking and Internet security. The document focuses on how to exploit Juniper's firewalls in order to gather signals intelligence data. It provides information on the history of the company, why Juniper is a "target," and how GCHQ is planning to "exploit" Juniper.