Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
How Covert Agents Infiltrate the Internet - Greenwald

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It's time to tell a chunk of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News to publish a series of articles about "dirty trick" tactics used by GCHQ's previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking "Five Eyes" alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled "The Art of Deception: Training for Online Covert Operations."

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse "hacktivists" of using, the use of "honey traps" (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: "false flag operations" (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting "negative information" on various forums. Here is one illustrative list of tactics from the latest GCHQ document we're publishing today:

Possibly Related Threads…
Thread Author Replies Views Last Post
  Internet Neutrality Faces Big Test Tomorrow! Peter Lemkin 0 8,643 10-12-2018, 04:02 AM
Last Post: Peter Lemkin
  When the Entire Internet Seems to Break At Once John Knoble 0 9,430 21-10-2016, 06:39 PM
Last Post: John Knoble
  U.S. Secret State and the Internet Peter Lemkin 0 5,798 17-09-2015, 05:20 PM
Last Post: Peter Lemkin
  NSA Wins A Round Against Greenwald et al. - What Role Omidyar?! Peter Lemkin 5 5,959 05-07-2014, 01:02 PM
Last Post: Peter Lemkin
  Furture of open internet Magda Hassan 1 4,763 27-01-2014, 01:40 AM
Last Post: Magda Hassan

Forum Jump:

Users browsing this thread: 1 Guest(s)