Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
#1
This article belongs in multiple forums, maybe every forum.[URL="https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/"]

https://firstlook.org/theintercept/2014/...ipulation/[/URL]

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

By Glenn Greenwald24 Feb 2014, 6:25 PM EST130

[Image: main2.png]A page from a GCHQ top secret document prepared by its secretive JTRIG unit
One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It's time to tell a chunk of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News to publish a series of articles about "dirty trick" tactics used by GCHQ's previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking "Five Eyes" alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled "The Art of Deception: Training for Online Covert Operations".
By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse "hacktivists" of using, the use of "honey traps" (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: "false flag operations" (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting "negative information" on various forums. Here is one illustrative list of tactics from the latest GCHQ document we're publishing today:
[Image: deception_p47.png]
Other tactics aimed at individuals are listed here, under the revealing title "discredit a target":
[Image: Screenshot3.png]
Then there are the tactics used to destroy companies the agency targets:
[Image: screenshot4.png]
GCHQ describes the purpose of JTRIG in starkly clear terms: "using online techniques to make something happen in the real or cyber world", including "information ops (influence or disruption)".
[Image: Screenshot2.png]
Critically, the "targets" for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of "traditional law enforcement" against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, "hacktivism", meaning those who use online protest activity for political ends.
The title page of one of these documents reflects the agency's own awareness that it is "pushing the boundaries" by using "cyber offensive" techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
[Image: deception_hacktivism.png]
No matter your views on Anonymous, "hacktivists" or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want who have never been charged with, let alone convicted of, any crimes with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the "denial of service" tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.
The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people's reputations and disrupt their online political activity even though they've been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, "targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent." Pointing to this study she published, Professor Coleman vehemently contested the assertion that "there is anything terrorist/violent in their actions."
Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House's former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-"independent" advocates to "cognitively infiltrate" online groups and websites, as well as other activist groups.
Sunstein also proposed sending covert agents into "chat rooms, online social networks, or even real-space groups" which spread what he views as false and damaging "conspiracy theories" about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that while disputing key NSA claims proceeded to propose many cosmetic reforms to the agency's powers (most of which were ignored by the President who appointed them).
But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls "false flag operations" and emails to people's families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?
Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today's newly published document touts the work of GCHQ's "Human Science Operations Cell", devoted to "online human intelligence" and "strategic influence and disruption":
[Image: screenshot6.png]
[Image: deception_p07.png]
Under the title "Online Covert Action", the document details a variety of means to engage in "influence and info ops" as well as "disruption and computer net attack", while dissecting how human beings can be manipulated using "leaders", "trust, "obedience" and "compliance":
[Image: screenshot13.png]
[Image: deception_p11.png]
[Image: deception_p12.png]
[Image: screenshot14.png]

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes or "game" it:[Image: deception_p24.png]
[Image: deception_p48.png]
[Image: deception_p42.png]
We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in "false flag operations" where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ's mandate include targeting common criminals (such as boiler room operators), or only foreign threats?
As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: "It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ's work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position."
These agencies' refusal to "comment on intelligence matters" meaning: talk at all about anything and everything they do is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in "false flag operations" to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.
Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people who have been charged with no crime for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
Reply
#2
Marlene,

Wow. Just, Wow.

Do you know what the slide above means with regards to "Magic"?

EDIT: My question is answer here.
"We'll know our disinformation campaign is complete when everything the American public believes is false." --William J. Casey, D.C.I

"We will lead every revolution against us." --Theodore Herzl
Reply
#3
I think I've been a victim of this since I can't post on You-Tube anymore.
Reply
#4
What a wonderful world we now live in.....::face.palm::....being able to see a 'powerpoint presentation' on some trolls I've known on the internet. Only thing missing were their names.....but, of course, the 'names' we saw were not real names or were not real people. There is also software already made public that allows one person or a small group to handle the 'identities' and postings of many avatars either on one site or many sites simultaneously. Marlene, post that on the other political forums out there.....make the creeps involved squirm. Electro- and Internet-fascism...nothing less! ::fury::
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#5
The tools to stifle any sort of dissent to the ruling political/business elite.

It means the effective death of the law imho. It is already at a very fragile stage anyway, as it now is only in effect for the wealthy and governments. The poor can't afford to defend themselves or protect their legally sanctioned rights as it is.
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply
#6
Peter Lemkin Wrote:What a wonderful world we now live in.....::face.palm::....being able to see a 'powerpoint presentation' on some trolls I've known on the internet. Only thing missing were their names.....but, of course, the 'names' we saw were not real names or were not real people. There is also software already made public that allows one person or a small group to handle the 'identities' and postings of many avatars either on one site or many sites simultaneously. Marlene, post that on the other political forums out there.....make the creeps involved squirm. Electro- and Internet-fascism...nothing less! ::fury::

I've tweeted it and posted on Facebook - emailed it to friends - we are so screwed.
Reply
#7
Lauren Johnson Wrote:Marlene,

Wow. Just, Wow.

Do you know what the slide above means with regards to "Magic"?

EDIT: My question is answer here.

Good work, Lauren.
Reply
#8
David Guyatt Wrote:The tools to stifle any sort of dissent to the ruling political/business elite.

It means the effective death of the law imho. It is already at a very fragile stage anyway, as it now is only in effect for the wealthy and governments. The poor can't afford to defend themselves or protect their legally sanctioned rights as it is.
Make me wonder about the Turkish PM. But then he may just be a corrupt bastard....

Quote:

Turkish PM's office says Erdogan recordings are faked

ANKARA Mon Feb 24, 2014 6:55pm EST


Turkey's Prime Minister Tayyip Erdogan addresses members of parliament from his ruling AK Party (AKP) during a meeting at the Turkish parliament in Ankara February 18, 2014.
Credit: Reuters/Umit Bektas












(Reuters) - Turkish Prime Minister Tayyip Erdogan's office said voice recordings on YouTube purportedly of Erdogan telling his son to dispose of large sums of money on the day news broke of a graft inquiry into his government were fake and "completely untrue".
Reuters could not verify the authenticity of the audio recordings, which were posted on the video sharing site late on Monday.
In the recordings, the voice supposedly of Erdogan can be heard asking his son to remove the money from his home.
At one point, the voice at the other end of the line says some 30 million euros ($40 million) remain to be disposed of.
The recordings, which appeared two days after Erdogan's AK Party officially began campaigning for local elections at the end of March, may be the latest purported revelation in a graft scandal Erdogan has cast as orchestrated to unseat him.

http://www.reuters.com/article/2014/02/2...=worldNews
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply
#9
http://www.theverge.com/2014/2/25/543138...-is-fucked
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  US Intell planned to destroy Wikileaks Peter Presland 468 298,766 22-07-2018, 07:46 AM
Last Post: Magda Hassan
  UK is "enemy of the internet" say Reporters Without Borders David Guyatt 0 2,040 17-03-2014, 12:23 PM
Last Post: David Guyatt
  Vaccination Program’ in Pakistan Was a CIA Covert Operation Ed Jewett 12 9,230 20-12-2012, 09:18 PM
Last Post: Peter Lemkin
  'Secrets'--Five Agents Blow the Whistle in Powerful Documentary Adele Edisen 2 4,328 31-10-2012, 07:49 PM
Last Post: Keith Millea
  DOD Officials Discuss Eliminating Islam Religion By Using Virus And Vaccine To Manipulate DNA Ed Jewett 6 15,323 28-07-2011, 03:27 PM
Last Post: Dawn Meredith
  Back from the Dead: The Internet “Kill Switch” Ed Jewett 0 2,494 01-06-2011, 03:11 AM
Last Post: Ed Jewett
  Crypto Wars! Obama Wants New Law to Wiretap the Internet Ed Jewett 0 2,648 04-10-2010, 02:40 AM
Last Post: Ed Jewett
  JSOP Hiring for Covert Programs Ed Jewett 1 3,149 26-08-2010, 10:11 PM
Last Post: Austin Kelley
  Cointelpro, Provacateurs, Disinfo Agents Ed Jewett 1 3,059 09-07-2010, 08:59 AM
Last Post: Ed Jewett
  Israeli agents operating at international airports Magda Hassan 0 3,052 29-11-2009, 05:36 AM
Last Post: Magda Hassan

Forum Jump:


Users browsing this thread: 1 Guest(s)