{"id":6310,"date":"2014-07-16T16:26:37","date_gmt":"2014-07-16T16:26:37","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=6310"},"modified":"2014-07-16T16:27:18","modified_gmt":"2014-07-16T16:27:18","slug":"englands-dark-secret-gchq-internet-platform-practices-dark-arts","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=6310","title":{"rendered":"England&#8217;s Dark Secret: GCHQ Internet Platform Practices Dark Arts"},"content":{"rendered":"<p><a href=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2014\/07\/screen-shot-2014-07-14-at-08-11-51-615x312.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-744\" alt=\"screen-shot-2014-07-14-at-08-11-51-615x312\" src=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2014\/07\/screen-shot-2014-07-14-at-08-11-51-615x312.png\" width=\"615\" height=\"312\" \/><\/a><\/p>\n<p><strong>GCHQ&#8217;s dark arts: Leaked documents reveal online manipulation, Facebook, YouTube snooping<\/strong><\/p>\n<p>By Charlie Osborne<\/p>\n<p style=\"color: #252525;\">GCHQ has developed a toolkit of software programs used to manipulate online traffic, infiltrate users&#8217; computers and spread select messages across social media sites including Facebook and YouTube.<\/p>\n<div class=\"relatedContent alignRight\" style=\"color: #252525;\">\n<div style=\"font-weight: inherit; font-style: inherit;\">The UK spy agency&#8217;s dark arts were revealed in documents first\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #005399;\" href=\"http:\/\/firstlook.org\/theintercept\/2014\/07\/14\/manipulating-online-polls-ways-british-spies-seek-control-internet\/\">published by The Intercept<\/a>, and each piece of software is described in a wiki document written up by GCHQ&#8217;s Joint Threat Research Intelligence Group (JTRIG). The document, which reads like a software inventory, calls the tools part of the agency&#8217;s &#8220;weaponised capability.&#8221;<\/div>\n<\/div>\n<p style=\"color: #252525;\">Some of the most interesting capabilities\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #005399;\" href=\"http:\/\/firstlook.org\/theintercept\/document\/2014\/07\/14\/jtrig-tools-techniques\/\">of the tools on the list<\/a>include the ability to seed the web with false information \u2014 such as tweaking the results of online polls \u2014 inflating pageview counts, censoring video content deemed &#8220;extremist&#8221; and the use of psychological manipulation on targets \u2014 something similar to a research project\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #005399;\" href=\"http:\/\/www.zdnet.com\/federal-hot-water-for-facebook-over-emotional-manipulation-experiment-7000031513\/\">conducted with Facebook&#8217;s approval<\/a>, which resulted in heavy criticism and outrage levied at the social media site.<\/p>\n<p style=\"color: #252525;\">A number of interesting tools and their short descriptions are below:<\/p>\n<ul style=\"color: #252525;\">\n<li style=\"font-weight: inherit; font-style: inherit;\">ASTRAL PROJECTION: Remote GSM secure covert Internet proxy using TOR hidden service<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">POISON ARROW: Safe malware download capability<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">AIRWOLF: YouTube profile, comment and video collection<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">BIRDSTRIKE: Twitter monitoring and profile collection<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">GLASSBACK: Technique of getting a target&#8217;s IP address by pretending to be a spammer and ringing them. Target does not need to answer.<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">MINIATURE HERO: Active skype capability. Provision of realtime call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">PHOTON TORPEDO: A technique to actively grab the IP address of MSN messenger user<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">SPRING-BISHOP: Finding private photos of targets on Facebook<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">BOMB BAY: The capacity to increase website hits, rankings<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">BURLESQUE: The capacity to send spoofed SMS messages<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">GESTATOR: Amplification of a given message, normally video, on popular multimedia websites (YouTube)<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">SCRAPHEAP CHALLENGE: Perfect spoofing of emails from Blackberry targets<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">SUNBLOCK: Ability to deny functionality to send\/receive email or view material online<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">SWAMP DONKEY: A tool that will silently locate all predefined types of file and encrypt them on a targets machine<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">UNDERPASS: Change outcome of online polls (previously known as NUBILO).<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">WARPATH: Mass delivery of SMS messages to support an Information Operations campaign.<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">HUSK: Secure one-on-one web based dead-drop messaging platform.<\/li>\n<\/ul>\n<p style=\"color: #252525;\">The list, dated from 2012, says that most of the tools are &#8220;fully operational, tested and reliable,\u201d and adds: &#8220;Don&#8217;t treat this like a catalogue. If you don&#8217;t see it here, it doesn&#8217;t mean we can&#8217;t build it.&#8221;<\/p>\n<p style=\"color: #252525;\">&#8220;We only advertise tools here that are either ready to fire or very close to being ready,&#8221; the document notes.<\/p>\n<p style=\"color: #252525;\">The release of these documents comes in the\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #005399;\" href=\"http:\/\/www.zdnet.com\/uk-spy-agency-gchq-tribunal-on-surveillance-claims-begins-7000031546\/\">same week<\/a>\u00a0that the UK intelligence agency&#8217;s spying activities are being investigated by surveillance watchdog the Investigatory Powers Tribunal (IPT). Civil liberty groups set a legal challenge against the GCHQ in order to question the legal standing of schemes such as Tempora \u2014 a project revealed in the NSA scandal that showed the agency placed data interceptors on fiber-optic cables that carry Internet traffic to and from the UK.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>GCHQ&#8217;s dark arts: Leaked documents reveal online manipulation, Facebook, YouTube snooping By Charlie Osborne GCHQ has developed a toolkit of software programs used to manipulate online traffic, infiltrate users&#8217; computers and spread select messages across social media sites including Facebook &hellip; <a href=\"https:\/\/stateofthenation2012.com\/?p=6310\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6310","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/6310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6310"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/6310\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}