Online: | |
Visits: | |
Stories: |
Having personally experienced this metholology several times since the mid 1980′s, we have decided to provide this report to our readers for the following reasons:
- Our nation is at war within
- Patriot, conservative, religious, philanthropic and defense organizations are just some of the many being infiltrated by our common enemy. Their goals are to divide and conquer by creating confusion, breakdowns in communication, division, and strife and thus nullifying the effectiveness of the organizations objectives.
The following is a copy of one of our enemy’s metholologies to accomplish that goal. Though directed at the internet alternative media and organizations, we believe it is wise to learn the ways of our common enemy in America and, when and where possible, put that knowledge to good use to construct defenses against their strategies within our organizations, even to the point of turning their strategies back on them.
Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”
By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations:
- the monitoring of YouTube and Blogger
- the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using
- the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses.
But here I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
Among the core self-identified purposes of JTRIG are two tactics:
(1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and
(2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable.
To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends:
- “false flag operations” (posting material to the internet and falsely attributing it to someone else),
- fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and
- posting “negative information” on various forums.
Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:
Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:
Then there are the tactics used to destroy companies the agency targets:
GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”
Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.
The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:
We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?
As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”
These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.
Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
Documents referenced in this article:
NESARA- Restore America – Galactic News