{"id":18791,"date":"2015-07-26T22:07:54","date_gmt":"2015-07-26T22:07:54","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=18791"},"modified":"2015-07-26T22:08:22","modified_gmt":"2015-07-26T22:08:22","slug":"truth-movement-under-constant-assault-reputations-assailed-by-covert-agents","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=18791","title":{"rendered":"TRUTH MOVEMENT Under Constant Assault: Reputations Assailed By Covert Agents"},"content":{"rendered":"<p><a href=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-06-at-5.29.55-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13796\" src=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2015\/06\/Screen-Shot-2015-06-06-at-5.29.55-PM.png\" alt=\"Screen Shot 2015-06-06 at 5.29.55 PM\" width=\"820\" height=\"400\" \/><\/a><\/p>\n<h1 class=\"title\">HOW COVERT AGENTS INFILTRATE THE INTERNET TO MANIPULATE, DECEIVE, AND DESTROY REPUTATIONS<\/h1>\n<p>Glen Greenwald<br \/>\nTHE\/\/INTERCEPT<\/p>\n<p>One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It\u2019s time to tell a chunk of that story, complete with the relevant documents.<!--more--><\/p>\n<p>Over the last several weeks, I worked with <em>NBC News<\/em> to publish a <a href=\"http:\/\/investigations.nbcnews.com\/_news\/2014\/01\/27\/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook?lite\">series<\/a> of<a href=\"http:\/\/www.nbcnews.com\/news\/investigations\/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361\">articles<\/a> about <a href=\"http:\/\/www.nbcnews.com\/news\/investigations\/snowden-docs-british-spies-used-sex-dirty-tricks-n23091\">\u201cdirty trick\u201d tactics<\/a> used by GCHQ\u2019s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on<a href=\"http:\/\/msnbcmedia.msn.com\/i\/msnbc\/Sections\/NEWS\/snowden_youtube_nbc_document.pdf\">four<\/a>\u00a0<a href=\"http:\/\/msnbcmedia.msn.com\/i\/msnbc\/sections\/news\/snowden_anonymous_nbc_document.pdf\">classified<\/a>\u00a0<a href=\"http:\/\/msnbcmedia.msn.com\/i\/msnbc\/sections\/news\/snowden_cyber_offensive2_nbc_document.pdf\">GCHQ<\/a>\u00a0<a href=\"http:\/\/msnbcmedia.msn.com\/i\/msnbc\/sections\/news\/snowden_cyber_offensive1_nbc_document.pdf\">documents<\/a>\u00a0presented to the NSA and the other three partners in the English-speaking\u00a0<a href=\"http:\/\/www.theatlantic.com\/politics\/archive\/2013\/06\/is-the-five-eyes-alliance-conspiring-to-spy-on-you\/277190\/\">\u201cFive Eyes\u201d alliance<\/a>.\u00a0Today, we at <em>the Intercept<\/em> are publishing <a href=\"http:\/\/firstlook.org\/theintercept\/document\/2014\/02\/24\/art-deception-training-new-generation-online-covert-operations\/\">another new JTRIG document<\/a>, in full, entitled \u201cThe Art of Deception: Training for Online Covert Operations.\u201d<\/p>\n<p>By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse \u201chacktivists\u201d of using, the use of \u201choney traps\u201d (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.<\/p>\n<p>Among the core self-identified purposes of JTRIG are two tactics: <strong>(1)<\/strong> to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and <strong>(2)<\/strong> to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: \u201cfalse flag operations\u201d (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting \u201cnegative information\u201d on various forums.\u00a0Here is one illustrative list of tactics from the latest GCHQ document we\u2019re publishing today:<\/p>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn01.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p47.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn01.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p47.png\" alt=\"\" \/><\/a><\/div>\n<p>Other tactics aimed at individuals are listed here, under the revealing title \u201cdiscredit a target\u201d:<\/p>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn01.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/Screenshot3.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn01.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/Screenshot3.png\" alt=\"\" \/><\/a><\/div>\n<p>Then there are the tactics used to destroy companies the agency targets:<\/p>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/screenshot4.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/screenshot4.png\" alt=\"\" \/><\/a><\/div>\n<p>GCHQ describes the purpose of JTRIG in starkly clear terms: \u201cusing online techniques to make something happen in the real or cyber world,\u201d including \u201cinformation ops (influence or disruption).\u201d<\/p>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn01.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/Screenshot2.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn01.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/Screenshot2.png\" alt=\"\" \/><\/a><\/div>\n<p>Critically, the \u201ctargets\u201d for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of \u201ctraditional law enforcement\u201d against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, \u201chacktivism\u201d, meaning those who use online protest activity for political ends.<\/p>\n<p>The title page of one of these documents reflects the agency\u2019s own awareness that it is \u201cpushing the boundaries\u201d by using \u201ccyber offensive\u201d techniques against people who have <em>nothing to do with terrorism or national security threats<\/em>, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:<\/p>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn02.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_hacktivism.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn02.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_hacktivism.png\" alt=\"\" \/><\/a><\/div>\n<p>No matter your views on Anonymous, \u201chacktivists\u201d or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want \u2013 <strong>who have never been charged with, let alone convicted of,\u00a0any crimes<\/strong> \u2013 with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as <a href=\"http:\/\/www.theguardian.com\/commentisfree\/2013\/jan\/22\/paypal-wikileaks-protesters-ddos-free-speech\">Jay Leiderman demonstrated in <em>the Guardian <\/em>in the context of the Paypal 14 hacktivist persecution<\/a>, that the \u201cdenial of service\u201d tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics <a href=\"http:\/\/www.theguardian.com\/commentisfree\/2012\/nov\/23\/anonymous-trial-wikileaks-internet-freedom\">favored by the US and UK<\/a>) and are far more akin to the type of political protest protected by the First Amendment.<\/p>\n<p>The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people\u2019s reputations and disrupt their online political activity even though they\u2019ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, \u201ctargeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.\u201d Pointing to\u00a0<a href=\"http:\/\/www.cigionline.org\/publications\/2013\/9\/anonymous-context-politics-and-power-behind-mask\">this study<\/a>\u00a0she published, Professor Coleman vehemently contested the assertion that \u201cthere is\u00a0<em>anything<\/em>\u00a0terrorist\/violent in their actions.\u201d<\/p>\n<p>Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation.\u00a0Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House\u2019s former head of the Office of Information and Regulatory Affairs, <a href=\"http:\/\/www.salon.com\/2010\/01\/15\/sunstein_2\/\">wrote a controversial paper in 2008<\/a> proposing that the\u00a0US government employ teams of covert agents and pseudo-\u201dindependent\u201d\u00a0advocates to \u201ccognitively infiltrate\u201d online groups and websites, as well as other activist groups.<\/p>\n<p>Sunstein also proposed sending covert agents into \u201cchat rooms, online social networks, or even real-space groups\u201d which spread what he views as false and damaging \u201cconspiracy theories\u201d about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that \u2013 while disputing key NSA claims \u2013 proceeded to propose <a href=\"http:\/\/www.theguardian.com\/world\/2013\/dec\/13\/nsa-review-to-leave-spying-programs-largely-unchanged-reports-say\">many cosmetic reforms<\/a> to the agency\u2019s powers (most of which were ignored by the President who appointed them).<\/p>\n<p>But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls \u201cfalse flag operations\u201d and emails to people\u2019s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?<\/p>\n<p>Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today\u2019s newly published document touts the work of GCHQ\u2019s \u201cHuman Science Operations Cell,\u201d devoted to \u201conline human intelligence\u201d and \u201cstrategic influence and disruption\u201d:<\/p>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/screenshot6.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/screenshot6.png\" alt=\"\" \/><\/a><\/div>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p07.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p07.png\" alt=\"\" \/><\/a><\/div>\n<p>Under the title \u201cOnline Covert Action\u201d, the document details a variety of means to engage in \u201cinfluence and info ops\u201d as well as \u201cdisruption and computer net attack,\u201d while dissecting how human beings can be manipulated using \u201cleaders,\u201d \u201ctrust,\u201d \u201cobedience\u201d and \u201ccompliance\u201d:<\/p>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/screenshot13.png\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/screenshot13.png\" alt=\"\" \/><\/a><\/div>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn02.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p11.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn02.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p11.png\" alt=\"\" \/><\/a><\/div>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn02.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p12.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn02.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p12.png\" alt=\"\" \/><\/a><\/div>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/screenshot14.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/screenshot14.png\" alt=\"\" \/><\/a><\/div>\n<p>The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes \u2013 or \u201cgame\u201d it:<\/p>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn00.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p24.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn00.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p24.png\" alt=\"\" \/><\/a><\/div>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn00.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p48.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn00.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p48.png\" alt=\"\" \/><\/a><\/div>\n<div class=\"image-pad image-border default  image-shadow\"><a href=\"http:\/\/prod01-cdn01.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p42.png\" target=\"_blank\"><img decoding=\"async\" title=\"\" src=\"http:\/\/prod01-cdn01.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/02\/deception_p42.png\" alt=\"\" \/><\/a><\/div>\n<p>We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in \u201cfalse flag operations\u201d where material is posted to the Internet and falsely attributed to someone else?;\u00a0(2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and\u00a0(3) Does GCHQ\u2019s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?<\/p>\n<p>As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: \u201cIt is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ\u2019s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.\u201d<\/p>\n<p>These agencies\u2019 refusal to \u201ccomment on intelligence matters\u201d \u2013 meaning: talk at all about anything and everything they do \u2013 is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies <a href=\"http:\/\/www.theguardian.com\/uk-news\/2013\/oct\/25\/leaked-memos-gchq-mass-surveillance-secret-snowden\">so easy to understand<\/a>. Claims that government agencies are infiltrating online communities and engaging in \u201cfalse flag operations\u201d to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.<\/p>\n<p>Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people \u2013 who have been charged with no crime \u2013 for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>HOW COVERT AGENTS INFILTRATE THE INTERNET TO MANIPULATE, DECEIVE, AND DESTROY REPUTATIONS Glen Greenwald THE\/\/INTERCEPT One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and &hellip; <a href=\"https:\/\/stateofthenation2012.com\/?p=18791\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-18791","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/18791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18791"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/18791\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=18791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=18791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}