Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
First Look ^ | 2/2014 | Greenwald

Posted on 08/06/2014 7:39:33 AM PDT by mgist

A page from a GCHQ top secret document prepared by its secretive JTRIG unit

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:


Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:



Then there are the tactics used to destroy companies the agency targets:



GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”



Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

..........snip


TOPICS: Foreign Affairs; Government
KEYWORDS: internetshills
Navigation: use the links below to view more comments.
first previous 1-2021-23 last
To: Peter Libra

Due to my GT score, I was offered ANY MOS (military occupational specialty) the Army offered but was “encouraged” to go into Military Intelligence by the MI counselor at the AFEES, who wouldn’t take no for an answer. First he wanted me to be a Russian “diddly-bop” (Morse Code Interceptor) but having grown up in the Marine Corps where my late father was a Commo Chief Gunnery Sergeant, I knew better than to pick that one. I settled on Order-of-Battle/Intel. Analyst after perusing the catalogue.


21 posted on 08/07/2014 12:29:49 PM PDT by 2ndDivisionVet (The most dangerous man to any government is the man who is able to think things out for himself.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: 2ndDivisionVet
Highly interesting to me.

I was amused at the description "diddly bop" for an intercept operator. If you avoided the mostly shift work of intercept, then it was good for your health. Of course being a Marine could also be very hazardous, that I will concede.

Cordially.

22 posted on 08/07/2014 1:05:23 PM PDT by Peter Libra
[ Post Reply | Private Reply | To 21 | View Replies]

To: Peter Libra

I was a soldier, my late father was the Marine. I’d seen all of the Marine Corps that I cared to see with him being a career man. And I did plenty of shift work in my two tours in Korea. LOL


23 posted on 08/07/2014 1:20:10 PM PDT by 2ndDivisionVet (The most dangerous man to any government is the man who is able to think things out for himself.)
[ Post Reply | Private Reply | To 22 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-23 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson