EMAIL SIGN UP!
Most Popular This Week
- Krugman: Worried About Oligarchy? You Ain't Seen Nothing Yet
- The Change Within: The Obstacles We Face Are Not Just External
- Does Climate Apathy Hinge on 'Pervasive' American Stupidity?
- 'Fuck Earth Day': Let This Year's Be The Last
- 'Straight from the Horse's Mouth': Former Oil Exec Says Fracking Not Safe
Today's Top News
GCHQ's "Dirty Tricks" Revealed: False Flags, Virus Attacks, and Honey Traps
Latest Snowden documents show spy agency operations included 'releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets'
The latest news contained in leaked documents from whistleblower Edward Snowden show that the British intelligence agency GCHQ has developed and deployed a complex series of "dirty tricks," "propoganda," and "false flag" operations that it used to spy on its selected targets which included not only "suspected terrorists" and "criminals" but also diplomats, journalists, activists.
Focused on a secret branch within the GCHQ called the Joint Threat Research and Intelligence Group (JTRIG), the documents obtained by NBC News show that the operations of the group included "releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into 'honey traps'" in order to "go on offense and attack adversaries."
The new reporting follows on one NBC published earlier this week highlighting other Snowden documents that revealed the existence of the JTRIG for the very first time. Journalist Glenn Greenwald is listed as 'special contributor' for both stories.
As the latest story hit the wire, Greenwald sent out a series of tweets remarking on the significance of the latest revelations and pointing to specific documents explored in the report:
These new GCHQ docs boast explicitly of using "false flag operations" - destructive hacking GCHQ does but attributes to its targets— Glenn Greenwald (@ggreenwald) February 7, 2014
Here's the original GCHQ document boasting of honey traps, false flag operations, fake victim posts & nasty viruses http://t.co/Cy9h4ulGX7— Glenn Greenwald (@ggreenwald) February 7, 2014
As NBC reports:
According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.
Both PowerPoint presentations describe “Effects” campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda camp aigns use deception, mass messaging and “pushing stories” via Twitter, Flickr, Facebook and YouTube. JTRIG also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.
In one striking revelation contained in the documents, the JTRIG seems have developed a plan to embroil journalists in their intelligence operations.
The 2010 presentation also describes another potential operation that would utilize a technique called “credential harvesting” to select journalists who could be used to spread information. According to intelligence sources, spies considered using electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign. Apparently, the journalist’s job would provide access to the targeted individual, perhaps for an interview. The documents do not specify whether the journalists would be aware or unaware that they were being used to funnel information.
The executive director of the Committee to Protect Journalists, Joel Simon, said that the revelation about “credential harvesting” should serve as a “wake up call” to journalists that intelligence agencies can monitor their communications. Simon also said that governments put all journalists at risk when they use even one for an intelligence operation.
“All journalists generally are then vulnerable to the charge that they work at the behest of an intelligence agency,” said Simon.
The journalist operation was never put into action, according to sources, but other techniques described in the documents [...] have definitely been used to attack adversaries.