SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
A detail from one of the slides leaked by Edward Snowden in which the GCHQ articulates
Focused on a secret branch within the GCHQ called the Joint Threat Research and Intelligence Group (JTRIG), the documents obtained by NBC News show that the operations of the group included "releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into 'honey traps'" in order to "go on offense and attack adversaries."
The new reporting follows on one NBC published earlier this week highlighting other Snowden documents that revealed the existence of the JTRIG for the very first time. Journalist Glenn Greenwald is listed as 'special contributor' for both stories.
As the latest story hit the wire, Greenwald sent out a series of tweets remarking on the significance of the latest revelations and pointing to specific documents explored in the report:
As NBC reports:
According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency's goal was to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications.
Both PowerPoint presentations describe "Effects" campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda camp aigns use deception, mass messaging and "pushing stories" via Twitter, Flickr, Facebook and YouTube. JTRIG also uses "false flag" operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain's adversaries.
Targeting Journalists
In one striking revelation contained in the documents, the JTRIG seems have developed a plan to embroil journalists in their intelligence operations.
The 2010 presentation also describes another potential operation that would utilize a technique called "credential harvesting" to select journalists who could be used to spread information. According to intelligence sources, spies considered using electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign. Apparently, the journalist's job would provide access to the targeted individual, perhaps for an interview. The documents do not specify whether the journalists would be aware or unaware that they were being used to funnel information.
The executive director of the Committee to Protect Journalists, Joel Simon, said that the revelation about "credential harvesting" should serve as a "wake up call" to journalists that intelligence agencies can monitor their communications. Simon also said that governments put all journalists at risk when they use even one for an intelligence operation.
"All journalists generally are then vulnerable to the charge that they work at the behest of an intelligence agency," said Simon.
The journalist operation was never put into action, according to sources, but other techniques described in the documents [...] have definitely been used to attack adversaries.
_____________________________________
Donald Trump’s attacks on democracy, justice, and a free press are escalating — putting everything we stand for at risk. We believe a better world is possible, but we can’t get there without your commitment. Common Dreams stands apart. We answer only to you — our readers, activists, and changemakers — not to billionaires or corporations. Our independence allows us to cover the vital stories that others won’t, spotlighting movements for peace, equality, and human rights. Right now, our work faces unprecedented challenges. Misinformation is spreading, journalists are under attack, and financial pressures are mounting. As a reader-supported, nonprofit newsroom, your support is crucial to keep this journalism alive. While every gift matters and makes a powerful difference, it gives us the stability to invest confidently in in-depth, fearless reporting — the kind of journalism that holds power accountable and fuels real change. Whatever you can give — $10, $25, or $100 — your steady support helps us stay strong and responsive when the world needs us most. Together, we’ll continue to build the independent, courageous journalism our movement relies on. Thank you for being part of this community. |
Focused on a secret branch within the GCHQ called the Joint Threat Research and Intelligence Group (JTRIG), the documents obtained by NBC News show that the operations of the group included "releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into 'honey traps'" in order to "go on offense and attack adversaries."
The new reporting follows on one NBC published earlier this week highlighting other Snowden documents that revealed the existence of the JTRIG for the very first time. Journalist Glenn Greenwald is listed as 'special contributor' for both stories.
As the latest story hit the wire, Greenwald sent out a series of tweets remarking on the significance of the latest revelations and pointing to specific documents explored in the report:
As NBC reports:
According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency's goal was to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications.
Both PowerPoint presentations describe "Effects" campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda camp aigns use deception, mass messaging and "pushing stories" via Twitter, Flickr, Facebook and YouTube. JTRIG also uses "false flag" operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain's adversaries.
Targeting Journalists
In one striking revelation contained in the documents, the JTRIG seems have developed a plan to embroil journalists in their intelligence operations.
The 2010 presentation also describes another potential operation that would utilize a technique called "credential harvesting" to select journalists who could be used to spread information. According to intelligence sources, spies considered using electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign. Apparently, the journalist's job would provide access to the targeted individual, perhaps for an interview. The documents do not specify whether the journalists would be aware or unaware that they were being used to funnel information.
The executive director of the Committee to Protect Journalists, Joel Simon, said that the revelation about "credential harvesting" should serve as a "wake up call" to journalists that intelligence agencies can monitor their communications. Simon also said that governments put all journalists at risk when they use even one for an intelligence operation.
"All journalists generally are then vulnerable to the charge that they work at the behest of an intelligence agency," said Simon.
The journalist operation was never put into action, according to sources, but other techniques described in the documents [...] have definitely been used to attack adversaries.
_____________________________________
Focused on a secret branch within the GCHQ called the Joint Threat Research and Intelligence Group (JTRIG), the documents obtained by NBC News show that the operations of the group included "releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into 'honey traps'" in order to "go on offense and attack adversaries."
The new reporting follows on one NBC published earlier this week highlighting other Snowden documents that revealed the existence of the JTRIG for the very first time. Journalist Glenn Greenwald is listed as 'special contributor' for both stories.
As the latest story hit the wire, Greenwald sent out a series of tweets remarking on the significance of the latest revelations and pointing to specific documents explored in the report:
As NBC reports:
According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency's goal was to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications.
Both PowerPoint presentations describe "Effects" campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda camp aigns use deception, mass messaging and "pushing stories" via Twitter, Flickr, Facebook and YouTube. JTRIG also uses "false flag" operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain's adversaries.
Targeting Journalists
In one striking revelation contained in the documents, the JTRIG seems have developed a plan to embroil journalists in their intelligence operations.
The 2010 presentation also describes another potential operation that would utilize a technique called "credential harvesting" to select journalists who could be used to spread information. According to intelligence sources, spies considered using electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign. Apparently, the journalist's job would provide access to the targeted individual, perhaps for an interview. The documents do not specify whether the journalists would be aware or unaware that they were being used to funnel information.
The executive director of the Committee to Protect Journalists, Joel Simon, said that the revelation about "credential harvesting" should serve as a "wake up call" to journalists that intelligence agencies can monitor their communications. Simon also said that governments put all journalists at risk when they use even one for an intelligence operation.
"All journalists generally are then vulnerable to the charge that they work at the behest of an intelligence agency," said Simon.
The journalist operation was never put into action, according to sources, but other techniques described in the documents [...] have definitely been used to attack adversaries.
_____________________________________