[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Iran Receives Emergency Airlift of Chinese Air Defence Systems as Israel Considers New Attacks

Russia reportedly used its new, inexpensive Chernika kamikaze drone in the Ukraine

Iran's President Says the US Pledged Israel Wouldn't Attack During Previous Nuclear Negotiations

Will Japan's Rice Price Shock Lead To Government Collapse And Spark A Global Bond Crisis

Beware The 'Omniwar': Catherine Austin Fitts Fears 'Weaponization Of Everything'

Roger Stone: AG Pam Bondi Must Answer For 14 Terabytes Claim Of Child Torture Videos!

'Hit Us, Please' - America's Left Issues A 'Broken Arrow' Signal To Europe

Cash Jordan Trump Deports ‘Thousands of Migrants’ to Africa… on Purpose

Gunman Ambushes Border Patrol Agents In Texas Amid Anti-ICE Rhetoric From Democrats

Texas Flood

Why America Built A Forest From Canada To Texas

Tucker Carlson Interviews President of Iran Mosoud Pezeshkian

PROOF Netanyahu Wants US To Fight His Wars

RAPID CRUSTAL MOVEMENT DETECTED- Are the Unusual Earthquakes TRIGGER for MORE (in Japan and Italy) ?

Google Bets Big On Nuclear Fusion

Iran sets a world record by deporting 300,000 illegal refugees in 14 days

Brazilian Women Soccer Players (in Bikinis) Incredible Skills

Watch: Mexico City Protest Against American Ex-Pat 'Invasion' Turns Viole

Kazakhstan Just BETRAYED Russia - Takes gunpowder out of Putin’s Hands

Why CNN & Fareed Zakaria are Wrong About Iran and Trump

Something Is Going Deeply WRONG In Russia

329 Rivers in China Exceed Flood Warnings, With 75,000 Dams in Critical Condition

Command Of Russian Army 'Undermined' After 16 Of Putin's Generals Killed At War, UK Says

Rickards: Superintelligence Will Never Arrive

Which Countries Invest In The US The Most?

The History of Barbecue

‘Pathetic’: Joe Biden tells another ‘tall tale’ during rare public appearance

Lawsuit Reveals CDC Has ZERO Evidence Proving Vaccines Don't Cause Autism

Trumps DOJ Reportedly Quietly Looking Into Criminal Charges Against Election Officials

Volcanic Risk and Phreatic (Groundwater) eruptions at Campi Flegrei in Italy


Science/Tech
See other Science/Tech Articles

Title: How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
Source: [None]
URL Source: https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
Published: Feb 25, 2014
Author: Glenn Greenwald
Post Date: 2014-02-25 06:01:31 by Ada
Keywords: None
Views: 47

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation- destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations”.

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Click for Full Text!

Post Comment   Private Reply   Ignore Thread  



[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]