How NSA GCHQ Infiltrate the Internet to Manipulate, Deceive and Destroy Reputations
Tony Gosling
tony at cultureshop.org.uk
Wed Feb 26 00:12:37 GMT 2014
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://firstlook.org/theintercept/dispatches/>DISPATCHES
- to peruse brilliant comments section - click firstlook link
How Covert Agents Infiltrate the Internet to
Manipulate, Deceive, and Destroy Reputations
https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
By
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://firstlook.org/theintercept/staff/glenn-greenwald/>Glenn
Greenwald24 Feb 2014, 6:25 PM
EST<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/#comments>673
http://www.911forum.org.uk/board/viewtopic.php?p=166745#166745
[]
A page from a GCHQ top secret document prepared by its secretive JTRIG unit
One of the many pressing stories that remains to
be told from the Snowden archive is how western
intelligence agencies are attempting to
manipulate and control online discourse with
extreme tactics of deception and
reputation-destruction. Its time to tell a chunk
of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC
News to publish a
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook?lite>series
of
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361>articles
about
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091>dirty
trick tactics used by GCHQs previously secret
unit, JTRIG (Joint Threat Research Intelligence
Group). These were based on
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://msnbcmedia.msn.com/i/msnbc/Sections/NEWS/snowden_youtube_nbc_document.pdf>four
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf>classified
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive2_nbc_document.pdf>GCHQ
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive1_nbc_document.pdf>documents
presented to the NSA and the other three partners
in the English-speaking
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://www.theatlantic.com/politics/archive/2013/06/is-the-five-eyes-alliance-conspiring-to-spy-on-you/277190/>Five
Eyes alliance. Today, we at the Intercept are
publishing
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/>another
new JTRIG document, in full, entitled The Art of
Deception: Training for Online Covert Operations.
By publishing these stories one by one, our NBC
reporting highlighted some of the key, discrete
revelations: the monitoring of YouTube and
Blogger, the targeting of Anonymous with the very
same DDoS attacks they accuse hacktivists of
using, the use of honey traps (luring people
into compromising situations using sex) and
destructive viruses. But, here, I want to focus
and elaborate on the overarching point revealed
by all of these documents: namely, that these
agencies are attempting to control, infiltrate,
manipulate, and warp online discourse, and in
doing so, are compromising the integrity of the internet itself.
Among the core self-identified purposes of JTRIG
are two tactics: (1) to inject all sorts of false
material onto the internet in order to destroy
the reputation of its targets; and (2) to use
social sciences and other techniques to
manipulate online discourse and activism to
generate outcomes it considers desirable. To see
how extremist these programs are, just consider
the tactics they boast of using to achieve those
ends: false flag operations (posting material
to the internet and falsely attributing it to
someone else), fake victim blog posts (pretending
to be a victim of the individual whose reputation
they want to destroy), and posting negative
information on various forums. Here is one
illustrative list of tactics from the latest GCHQ
document were publishing today:
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn03.cdn.firstlook.org/wp-uploads/2014/02/deception_p47.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn03.cdn.firstlook.org/wp-uploads/2014/02/deception_p47.png>
[]
Other tactics aimed at individuals are listed
here, under the revealing title discredit a target:
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/02/Screenshot3.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/02/Screenshot3.png>
[]
Then there are the tactics used to destroy companies the agency targets:
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn00.cdn.firstlook.org/wp-uploads/2014/02/screenshot4.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn00.cdn.firstlook.org/wp-uploads/2014/02/screenshot4.png>
[]
GCHQ describes the purpose of JTRIG in starkly
clear terms: using online techniques to make
something happen in the real or cyber world,
including information ops (influence or disruption).
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/02/Screenshot2.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/02/Screenshot2.png>
[]
Critically, the targets for this deceit and
reputation-destruction extend far beyond the
customary roster of normal spycraft: hostile
nations and their leaders, military agencies, and
intelligence services. In fact, the discussion of
many of these techniques occurs in the context of
using them in lieu of traditional law
enforcement against people suspected (but not
charged or convicted) of ordinary crimes or, more
broadly still, hacktivism, meaning those who
use online protest activity for political ends.
The title page of one of these documents reflects
the agencys own awareness that it is pushing
the boundaries by using cyber offensive
techniques against people who have nothing to do
with terrorism or national security threats, and
indeed, centrally involves law enforcement agents
who investigate ordinary crimes:
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn00.cdn.firstlook.org/wp-uploads/2014/02/deception_hacktivism.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn00.cdn.firstlook.org/wp-uploads/2014/02/deception_hacktivism.png>
[]
No matter your views on Anonymous, hacktivists
or garden-variety criminals, it is not difficult
to see how dangerous it is to have secret
government agencies being able to target any
individuals they want who have never been
charged with, let alone convicted of, any crimes
with these sorts of online, deception-based
tactics of reputation destruction and disruption.
There is a strong argument to make, as
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://www.theguardian.com/commentisfree/2013/jan/22/paypal-wikileaks-protesters-ddos-free-speech>Jay
Leiderman demonstrated in the
Guardian<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://www.theguardian.com/commentisfree/2013/jan/22/paypal-wikileaks-protesters-ddos-free-speech>in
the context of the Paypal 14 hacktivist
persecution, that the denial of service tactics
used by hacktivists result in (at most) trivial
damage (far less than the cyber-warfare tactics
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://www.theguardian.com/commentisfree/2012/nov/23/anonymous-trial-wikileaks-internet-freedom>favored
by the US and UK) and are far more akin to the
type of political protest protected by the First Amendment.
The broader point is that, far beyond
hacktivists, these surveillance agencies have
vested themselves with the power to deliberately
ruin peoples reputations and disrupt their
online political activity even though theyve
been charged with no crimes, and even though
their actions have no conceivable connection to
terrorism or even national security threats. As
Anonymous expert Gabriella Coleman of McGill
University told me, targeting Anonymous and
hacktivists amounts to targeting citizens for
expressing their political beliefs, resulting in
the stifling of legitimate dissent. Pointing to
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://www.cigionline.org/publications/2013/9/anonymous-context-politics-and-power-behind-mask>this
study she published, Professor Coleman vehemently
contested the assertion that there is anything
terrorist/violent in their actions.
Government plans to monitor and influence
internet communications, and covertly infiltrate
online communities in order to sow dissension and
disseminate false information, have long been the
source of speculation. Harvard Law Professor Cass
Sunstein, a close Obama adviser and the White
Houses former head of the Office of Information
and Regulatory Affairs,
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://www.salon.com/2010/01/15/sunstein_2/>wrote
a controversial paper in 2008 proposing that the
US government employ teams of covert agents and
pseudo-independent advocates to cognitively
infiltrate online groups and websites, as well as other activist groups.
Sunstein also proposed sending covert agents into
chat rooms, online social networks, or even
real-space groups which spread what he views as
false and damaging conspiracy theories about
the government. Ironically, the very same
Sunstein was recently named by Obama to serve as
a member of the NSA review panel created by the
White House, one that while disputing key NSA
claims proceeded to propose
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://www.theguardian.com/world/2013/dec/13/nsa-review-to-leave-spying-programs-largely-unchanged-reports-say>many
cosmetic reforms to the agencys powers (most of
which were ignored by the President who appointed them).
But these GCHQ documents are the first to prove
that a major western government is using some of
the most controversial techniques to disseminate
deception online and harm the reputations of
targets. Under the tactics they use, the state is
deliberately spreading lies on the internet about
whichever individuals it targets, including the
use of what GCHQ itself calls false flag
operations and emails to peoples families and
friends. Who would possibly trust a government to
exercise these powers at all, let alone do so in
secret, with virtually no oversight, and outside
of any cognizable legal framework?
Then there is the use of psychology and other
social sciences to not only understand, but shape
and control, how online activism and discourse
unfolds. Todays newly published document touts
the work of GCHQs Human Science Operations
Cell, devoted to online human intelligence and
strategic influence and disruption:
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn00.cdn.firstlook.org/wp-uploads/2014/02/screenshot6.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn00.cdn.firstlook.org/wp-uploads/2014/02/screenshot6.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/02/deception_p07.png>
[]
[]
Under the title Online Covert Action, the
document details a variety of means to engage in
influence and info ops as well as disruption
and computer net attack, while dissecting how
human beings can be manipulated using leaders,
trust, obedience and compliance:
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/02/screenshot13.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/02/screenshot13.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn00.cdn.firstlook.org/wp-uploads/2014/02/deception_p11.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn00.cdn.firstlook.org/wp-uploads/2014/02/deception_p12.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/02/screenshot14.png>
The documents lay out theories of how humans
interact with one another, particularly online,
and then attempt to identify ways to influence the outcomes or game it:
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/02/deception_p24.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/02/deception_p48.png>
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/https://prod01-cdn03.cdn.firstlook.org/wp-uploads/2014/02/deception_p42.png>
We submitted numerous questions to GCHQ,
including: (1) Does GCHQ in fact engage in false
flag operations where material is posted to the
Internet and falsely attributed to someone else?;
(2) Does GCHQ engage in efforts to influence or
manipulate political discourse online?; and (3)
Does GCHQs mandate include targeting common
criminals (such as boiler room operators), or only foreign threats?
As usual, they ignored those questions and opted
instead to send their vague and nonresponsive
boilerplate: It is a longstanding policy that we
do not comment on intelligence matters.
Furthermore, all of GCHQs work is carried out in
accordance with a strict legal and policy
framework which ensures that our activities are
authorised, necessary and proportionate, and that
there is rigorous oversight, including from the
Secretary of State, the Interception and
Intelligence Services Commissioners and the
Parliamentary Intelligence and Security
Committee. All our operational processes rigorously support this position.
These agencies refusal to comment on
intelligence matters meaning: talk at all
about anything and everything they do is
precisely why whistleblowing is so urgent, the
journalism that supports it so clearly in the
public interest, and the increasingly unhinged
attacks by these agencies
<https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/http://www.theguardian.com/uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret-snowden>so
easy to understand. Claims that government
agencies are infiltrating online communities and
engaging in false flag operations to discredit
targets are often dismissed as conspiracy
theories, but these documents leave no doubt they are doing precisely that.
Whatever else is true, no government should be
able to engage in these tactics: what
justification is there for having government
agencies target people who have been charged
with no crime for reputation-destruction,
infiltrate online political communities, and
develop techniques for manipulating online
discourse? But to allow those actions with no
public knowledge or accountability is particularly unjustifiable.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.gn.apc.org/mailman/private/diggers350/attachments/20140226/081cd3c5/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/x-ygp-stripped
Size: 198 bytes
Desc: not available
URL: <https://mailman.gn.apc.org/mailman/private/diggers350/attachments/20140226/081cd3c5/attachment.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/x-ygp-stripped
Size: 198 bytes
Desc: not available
URL: <https://mailman.gn.apc.org/mailman/private/diggers350/attachments/20140226/081cd3c5/attachment-0001.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/x-ygp-stripped
Size: 198 bytes
Desc: not available
URL: <https://mailman.gn.apc.org/mailman/private/diggers350/attachments/20140226/081cd3c5/attachment-0002.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/x-ygp-stripped
Size: 198 bytes
Desc: not available
URL: <https://mailman.gn.apc.org/mailman/private/diggers350/attachments/20140226/081cd3c5/attachment-0003.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/x-ygp-stripped
Size: 198 bytes
Desc: not available
URL: <https://mailman.gn.apc.org/mailman/private/diggers350/attachments/20140226/081cd3c5/attachment-0004.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/x-ygp-stripped
Size: 198 bytes
Desc: not available
URL: <https://mailman.gn.apc.org/mailman/private/diggers350/attachments/20140226/081cd3c5/attachment-0005.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/x-ygp-stripped
Size: 198 bytes
Desc: not available
URL: <https://mailman.gn.apc.org/mailman/private/diggers350/attachments/20140226/081cd3c5/attachment-0006.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/x-ygp-stripped
Size: 198 bytes
Desc: not available
URL: <https://mailman.gn.apc.org/mailman/private/diggers350/attachments/20140226/081cd3c5/attachment-0007.bin>
More information about the Diggers350
mailing list