Greenwald: Leaked Docs Reveal Agency's (GCHQ) Digital Propaganda ToolkitLatest files provided by Edward Snowden show GCHQ's ability to 'manipulate' the Internet using 'hackers buffet for wreaking online havoc'
by Jon Queally, staff writer
Common Dreams, July 15, 2014
The latest documents released from a trove leaked to journalist Glenn Greenwald by Edward Snowden reveal that GCHQ has created a virtual toolbox of online hacker tactics that allow British intelligence agents to "manipulate" online communities by seeding the Internet "with false information" and conducting the kind of malicious attacks on networks that send civilian hackers to prison.
According to the most recent reporting from Greenwald at The Intercept:
The tools were created by GCHQs Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIGs use of fake victim blog posts, false flag operations, honey traps and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users.
But as the U.K. Parliament [this week] debates a fast-tracked bill to provide the government with greater surveillance powers, one which Prime Minister David Cameron has justified as an emergency to help keep us safe, a newly released top-secret GCHQ document called JTRIG Tools and Techniques provides a comprehensive, birds-eye view of just how underhanded and invasive this units operations are. The documentavailable in full hereis designed to notify other GCHQ units of JTRIGs weaponised capability when it comes to the dark internet arts, and serves as a sort of hackers buffet for wreaking online havoc.
As the Guardian observes, the internal document "details a range of programs designed to collect and store public postings from Facebook, Twitter, LinkedIn and Google+, and to make automated postings on several of the social networks." In addition, the file shows the agency possesses the ability to "boost views of YouTube videos, or to boost the circulation of particular messages" it wants to promote.
Greenwald provided a sample list of the JTRIG programs detailed in the databasewhich he described as a "a massive Wikipedia-style archive" and included their "boastful code names" which appear in parentheses:
Change outcome of online polls (UNDERPASS)
Mass delivery of email messaging to support an Information Operations campaign (BADGER) and mass delivery of SMS messages to support an Information Operations campaign (WARPARTH)
Disruption of video-based websites hosting extremist content through concerted target discovery and content removal. (SILVERLORD)
Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists. (MINIATURE HERO)
Find private photographs of targets on Facebook (SPRING BISHOP)
A tool that will permanently disable a targets account on their computer (ANGRY PIRATE)
Ability to artificially increase traffic to a website (GATEWAY) and ability to inflate page views on websites (SLIPSTREAM)
Amplification of a given message, normally video, on popular multimedia websites (Youtube) (GESTATOR)
Targeted Denial Of Service against Web Servers (PREDATORS FACE) and Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG (ROLLING THUNDER)
A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk) (ELATE)
Ability to spoof any email address and send email under that identity (CHANGELING)
For connecting two target phone together in a call (IMPERIAL BARGE)
According to Greenwald, this database was last updated in 2012, but had been accessed by GCHQ agents more than 20,000 times.
Now that's in the UK, trusted Five Eyes partner. So, do you think NSA doesn't apply similar guidelines for, ah, helping discussions along?
The moment we didn't have to highlight the difference between us and the Soviets we happily embraced their methods and worldview.
"...It is now clear that we are facding an implacable enemy whose avowed objective is world domination by whatever means and at whatever cost. There are no rules in such a game. Hitherto acceptable norms ofhuman conduct do not apply. If the United States is to survive, long-standing American concepts of 'fair play' must be reconsidered. We must develop effective espionage and counterespionage services and must learn to subvert, sabotage and destroy our enemies by more clever, more sophisticated and more effective methods than those used against us. It may become necessary that the American people be made acquainted with, understand and support this fundamentally repugnant philosophy..."
Report on the Covert Activities of the Central Intelligence Agency (1954). Committee members: J.H. Doolittle (chairman), William B. Franke, Morris Hadley, and William D. Pawley
all as obvious as the nose on your face, but the sheep continue to sleep.
CHANGELING: Ability to spoof any email address and send email under that identity. Fake an email from a privacy advocate to make it look like hes proposing terrorism.
SCRAPHEAP CHALLENGE: Perfect spoofing of emails from Blackberry targets. Fake an email from an opponent of bank bailouts to make it look like shes proposing bombing a bank.
BURLESQUE: The capacity to send spoofed SMS messages. Fake a message from an an anti-war pacifist to make it look like hes advocating sabotage of a military base.
Clothing for the virtual wolf.
more traffic so I'll kick yours.
Now DU this poll!!!!!!
but now with super strength GCHQs Joint Threat Research Intelligence Group that has 24 million terajoule of power
I searched for a dupe, using "digital," thinking that would turn up any duplicates.
Yours is an excellent read, too:
We'll have to employ more resources to get the important things on top, like Snowden really hasn't revealed anything we didn't already know about cats.
Sorry I didn't see your thread, but your contributions are no less valued.
before the trolls wake up.....LOL... so they usually get overlooked by late light cat threads.....LOL
What's important is that the news gets out
not who does it.
Wait a second.
NSA chief knew of Snowden file destruction by Guardian in UK
Revelation contrasts markedly with White House efforts to distance itself from UK government pressure to destroy disks
theguardian.com, Friday 11 July 2014
General Keith Alexander, the then director of the NSA, was briefed that the Guardian was prepared to make a largely symbolic act of destroying documents from Edward Snowden last July, new documents reveal.
The revelation that Alexander and Obama's director of national intelligence, James Clapper, were advised on the Guardian's destruction of several hard disks and laptops contrasts markedly with public White House statements that distanced the US from the decision.
White House and NSA emails obtained by Associated Press under freedom of information legislation demonstrate how pleased Alexander and his colleagues were with the developments. At times the correspondence takes a celebratory tone, with one official describing the anticipated destruction as "good news".
On 20 July 2013, three Guardian editors destroyed all copies of the its Snowden material held in London (video), under the supervision of two GCHQ staff following a period of intense political pressure in the UK.
An email to Alexander from Rick Ledgett, now deputy director of the NSA, has the subject line "Guardian data being destroyed", and is dated 19 July, a day before the destruction of the files. Most is heavily redacted, but Ledgett remarks: "Good news, at least on this front."
A day later, hours after the material was destroyed, Alexander follows up with Ledgett, asking: "Can you confirm this actually occurred?"
Later that day, Clapper emails Alexander under the same subject line, saying: "Thanks Keith appreciate the conversation today".
Do you think that's good news? For democracy?
I think the apologists are so sure of their cleverness they honestly believe that the rest of us can't read past a cover story.
your link is appreciated. Knowledge is power, which is why THEY want so much of it and why want to keep so much of it from us.
Time-Tested Weapons for U.S. Global Power
By Alfred McCoy
Tomgram, Jan. 19, 2014
For more than six months, Edward Snowdens revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germanys Der Spiegel, and Brazils O Globo, among other places. Yet no one has pointed out the combination of factors that made the NSAs expanding programs to monitor the world seem like such a slam-dunk development in Washington. The answer is remarkably simple. For an imperial power losing its economic grip on the planet and heading into more austere times, the NSAs latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century. Even when disaster turned out to be attached to them, the NSAs surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
For well over a century, from the pacification of the Philippines in 1898 to trade negotiations with the European Union today, surveillance and its kissing cousins, scandal and scurrilous information, have been key weapons in Washingtons search for global dominion. Not surprisingly, in a post-9/11 bipartisan exercise of executive power, George W. Bush and Barack Obama have presided over building the NSA step by secret step into a digital panopticon designed to monitor the communications of every American and foreign leaders worldwide.
What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planets last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors Americas closest allies.
[font color="green"]Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSAs global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.[/font color]
A Cost-Savings Bonanza With a Downside
Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Armys shoe-leather surveillance during World War I or the FBIs break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internets fiber optic cables.
This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began. Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale.
Frank Church was a patriot, a hero and a statesman, truly a great American.
The guy also led the last real investigation of CIA, NSA and FBI. When it came to NSA Tech circa 1975, he definitely knew what he was talking about:
I dont want to see this country ever go across the bridge. I know the capability that is there to make tyranny total in America, and we must see it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.
-- Sen. Frank Church (D-Idaho) FDR New Deal, Liberal, Progressive, World War II combat veteran. A brave man, the NSA was turned on him. Coincidentally, of course, he narrowly lost re-election a few years later.
And what happened to Church, for his trouble to preserve Democracy:
From GWU's National Security Archives:
"Disreputable if Not Outright Illegal": The National Security Agency versus Martin Luther King, Muhammad Ali, Art Buchwald, Frank Church, et al.
Newly Declassified History Divulges Names of Prominent Americans Targeted by NSA during Vietnam Era
Declassification Decision by Interagency Panel Releases New Information on the Berlin Crisis, the Cuban Missile Crisis, and the Panama Canal Negotiations
National Security Archive Electronic Briefing Book No. 441
Posted September 25, 2013
Originally Posted - November 14, 2008
Edited by Matthew M. Aid and William Burr
Washington, D.C., September 25, 2013 During the height of the Vietnam War protest movements in the late 1960s and early 1970s, the National Security Agency tapped the overseas communications of selected prominent Americans, most of whom were critics of the war, according to a recently declassified NSA history. For years those names on the NSA's watch list were secret, but thanks to the decision of an interagency panel, in response to an appeal by the National Security Archive, the NSA has released them for the first time. The names of the NSA's targets are eye-popping. Civil rights leaders Dr. Martin Luther King and Whitney Young were on the watch list, as were the boxer Muhammad Ali, New York Times journalist Tom Wicker, and veteran Washington Post humor columnist Art Buchwald. Also startling is that the NSA was tasked with monitoring the overseas telephone calls and cable traffic of two prominent members of Congress, Senators Frank Church (D-Idaho) and Howard Baker (R-Tennessee).
Another NSA target was Senator Frank Church, who started out as a moderate Vietnam War critic. A member of the Senate Foreign Relations Committee even before the Tonkin Gulf incident, Church worried about U.S. intervention in a "political war" that was militarily unwinnable. While Church voted for the Tonkin Gulf resolution, he later saw his vote as a grave error. In 1965, as Lyndon Johnson made decisions to escalate the war, Church argued that the United States was doing "too much," criticisms that one White House official said were "irresponsible." Church had been one of Johnson's Senate allies but the President was angry with Church and other Senate critics and later suggested that they were under Moscow's influence because of their meetings with Soviet diplomats. In the fall of 1967, Johnson declared that "the major threat we have is from the doves" and ordered FBI security checks on "individuals who wrote letters and telegrams critical of a speech he had recently delivered." In that political climate, it is not surprising that some government officials eventually nominated Church for the watch list.
I wonder if Sen. Richard Schweiker (R-CT) also got the treatment from NSA?
I think that the report, to those who have studied it closely, has collapsed like a house of cards, and I think the people who read it in the long run future will see that. I frankly believe that we have shown that the [investigation of the] John F. Kennedy assassination was snuffed out before it even began, and that the fatal mistake the Warren Commission made was not to use its own investigators, but instead to rely on the CIA and FBI personnel, which played directly into the hands of senior intelligence officials who directed the cover-up. Senator Richard Schweiker on Face the Nation in 1976.
Lost to History NOT
We really do have to watch what we say. Takes a lot of money to fill a tool kit like that. And a large amount of immoral disdain for The Constitution and Human Rights.
Of course, it could be why wingers miss so often. They may be believing their own BS.
I don't think I've ever seen or heard of someone so desperately trying to stay relevant. Wish he'd join either of his buddies, Snowden or Assange. What a narcissist! Although Assange may arguably be the biggest narcissist of them all.
Go and knock on doors in your neighborhood and see how many people know who the three musketeers are.
Your post would have been funny if you added the sarcasm tag, but since you appear to be serious, I'll simply say that each of your "points" has been discredited as logical fallacies offered to distract from the issue of unconstitutional actions by our government.
You have a bunch of old farts talking about the good old days that never were, some supposed Christian slim lady that uses a tonnage scale every day to clock it, and some dude that beats off to the bible to combat his meth addiction.
It probably gets pretty boring over there when they aren't plotting how they will "take over the world".
you left out the fundraising appeals.
now, for the record, I only went there once in the last five years, and that was probably yesterday.
hoping they had a picture of me posted. not the case.
I'm thinking times up for those that defend this horse shit.
You check your watch, I'll check mine.
Just as the NSA is notorious for what it's doing.
have transcended "annoying" and are now "offensive."
Posters that put up such garbage are not deserving of any respect.
Last edited Tue Jul 15, 2014, 08:54 PM - Edit history (1)
Character assassination is a known tool used by propagandists. They did it with Assange & Snowden too.
Seeing so many liberals buying into these character assassination tactics is sad!
did it during the Bush era and we were outraged airc. The outrage from the Left, mostly, was because we believed that the people have a right to know what their government is up to. Has that changed, and if so, why?
Thank you Edward Snowden.
Thank you Glenn Greenwald.
Thank you WikiLeaks.
Thank you Julian Assange.
Thank you to all the brave and patriotic whistleblowers.
And massive shame and disgrace for those who trade conscience and human decency to shill for totalitarians and fascists.
While techniques above are specific tools used online in modern times, the general principals would seem applicable to all times.
FRIDAY, JULY 12, 2013
Coupled with Snowdens disclosures, those of former NSA officer Russell Tice (first reported here and here), revealed that the agencyfar in excess of the dirt collected by FBI spymaster J. Edgar Hoover in his secret and confidential black fileshas compiled dossiers on their alleged controllers, for political leverage and probably for blackmail purposes to boot.
While Tices allegations certainly raised eyebrows and posed fundamental questions about who is really in charge of American policyelected officials or unaccountable securocrats with deep ties to private security corporationsdespite being deep-sixed by US media, they confirm previous reporting about the agency.
When investigative journalist Duncan Campbell first blew the lid off NSAs ECHELON program, his 1988 piece for New Statesman revealed that a whistleblower, Margaret Newsham, a software designer employed by Lockheed at the giant agency listening post at Menwith Hill in North Yorkshire, England, stepped forward and told the House Permanent Select Committee on Intelligence in closed session, that NSA was using its formidable intercept capabilities to locate the telephone or other messages of target individuals.
Campbells reporting was followed in 1996 by New Zealand investigative journalist Nicky Hagers groundbreaking book, Secret Power, the first detailed account of NSAs global surveillance system. A summary of Hagers findings can be found in the 1997 piece that appeared in CovertAction Quarterly.
As Campbell was preparing that 1988 article, a report in the Cleveland Plain Dealer alleged that arch-conservative US Senator Strom Thurman was one target of agency phone intercepts, raising fears in political circles that NSA has restored domestic, electronic, surveillance programmes, said to have been dialed-back in the wake of the Watergate scandal.
IBM had a lot of experience in the field.
Last edited Tue Jul 15, 2014, 03:04 PM - Edit history (1)
This is what our supposedly democratic, representative governments have become. We are spied upon, lied to, and subjected to elaborate and incessant campaigns of manipulation, disinformation and smear, using our own tax dollars.
Our nation is in crisis as a result of these criminals. The relationship between the American people and our government has been irrevocably changed.
It. Must. End.
and all the other patriots who are fighting so hard to expose all this despicable deception and attacks on the civil liberties of the people.
This SHOULD be completely illegal with dire consequences for those who are perpetrating these attacks on the people. Maybe some day. And it won't happen if people remain uninformed which underscores the importance of Whistle Blowers and exposes the desperation of those with so much to hide when they attack the messengers.
Now it's conspiracy fact.
we were repeatedly subjected to were not just coming from those repeating them and voicing those suspicions. Instantly they were called 'CTs'. Then we found out that that was a tool to be used to try to silence those with the intelligence to wonder aloud about their suspicions, call them 'CTs'.
I guess it was all bound to be exposed sooner or later and thankfully it is.
Someone thought it belonged more in the September 11 forum than in General Discussion.
SECRET Government Is a One-Way Mirror
Gee, what we've learned since then could fill a book. Thank you for knowing, pa28.
and hippies who'll kill us all
once the warmongering/tobacco-cancer link/reactor danger/Lyme disease is quietly admitted they then purr that "we were just waiting for the proof to come in"
they're like some bad boyfriend, who's always right ESPECIALLY when he reverses himself ...
See: Weiner, Anthony.
Added to the long list of things being treated as legal that sound like they couldn't possibly be...
Stepped out of bounds there, Anthony.
"Carlos Danger" was salt rubbed in the wound.
And that I'm obsessed with OK Go's Rube Goldberg machine.
Additionally, if some industries plop their stooges into web forums to steer, ridicule and marginalize opponents I'm certain the NSA has their own puppets doing the ground work. I am noticing a Non-GMO is Woo trend forming here by some posters for example.
Does it never occur to them that not one mind is changed in a forum like this?
I cross posted the news elsewhere.
I feel it is too important not to.
Thanks for this eye opener.
Thank you for the image of Mr. Eric A. Blair and the money quote from his amazing work.
By Washington's Blog
Global Research, July 16, 2014
Washington's Blog 15 July 2014
SPACE ROCKET: A programme covering insertion of media into target networks. Insert a fake video calling for jihad on a the website of a moderate American Muslim lawyer.
CLEAN SWEEP: Masquerade Facebook Wall Posts for individuals or entire countries. Put up a bunch of fake wall posts praising the Islamic State on the Facebook page of a reporter giving first-hand reports of whats really happening in a country that the U.S. has targeted for regime change.
HAVOK: Real-time website cloning technique allowing on-the-fly alterations. Hack the website of a state politician critical of those who ignore the Constitution and post fake calls for terrorism against Washington, D.C.
Thank you, woo me with science!
The latest in fashion for the virtual wolf.
OP's & threads like these make me love this place.
. . . and we can't get bridge-and-highway maintenance funding passed, but we've just authorized more spending for surveillance: https://www.accessnow.org/page/m/3717cecb/13a464e1/7041ed4e/1de22de8/4170775915/VEsDBQ/ .