Quantcast
Channel: Dialogues
Viewing all articles
Browse latest Browse all 54062

USA Africa Dialogue Series - How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

$
0
0

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/


--

Yona Fares Maro

Institut d'études de sécurité - SA


--
You received this message because you are subscribed to the "USA-Africa Dialogue Series" moderated by Toyin Falola, University of Texas at Austin.
For current archives, visit http://groups.google.com/group/USAAfricaDialogue
For previous archives, visit http://www.utexas.edu/conferences/africa/ads/index.html
To post to this group, send an email to USAAfricaDialogue@googlegroups.com
To unsubscribe from this group, send an email to USAAfricaDialogue-
unsubscribe@googlegroups.com
---
You received this message because you are subscribed to the Google Groups "USA Africa Dialogue Series" group.
To unsubscribe from this group and stop receiving emails from it, send an email to usaafricadialogue+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.

Viewing all articles
Browse latest Browse all 54062

Trending Articles