Red Ice News

The Future is the Past

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
New to Red Ice? Start Here!

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Source: firstlook.org

A page from a GCHQ top secret document prepared by its secretive JTRIG unit

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:



Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:



Then there are the tactics used to destroy companies the agency targets:


GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

[...]

Read the full article at: firstlook.org



These repugnant ops are very much a continuation of intelligence agency behavior since their inception :

---
Obama staffer wants ‘cognitive infiltration’ of 9/11 conspiracy groups
By Daniel Tencer | Information Clearing House

January 15, 2010 "Raw Story" -- In a 2008 academic paper, President Barack Obama’s appointee to head the Office of Information and Regulatory Affairs advocated "cognitive infiltration" of groups that advocate "conspiracy theories" like the ones surrounding 9/11.

Cass Sunstein, a Harvard law professor, co-wrote an academic article entitled "Conspiracy Theories: Causes and Cures," in which he argued that the government should stealthily infiltrate groups that pose alternative theories on historical events via "chat rooms, online social networks, or even real-space groups and attempt to undermine" those groups.

As head of the Office of Information and Regulatory Affairs, Sunstein is in charge of "overseeing policies relating to privacy, information quality, and statistical programs," according to the White House Web site.

Sunstein’s article, published in the Journal of Political Philosphy in 2008 and recently uncovered by blogger Marc Estrin, states that "our primary claim is that conspiracy theories typically stem not from irrationality or mental illness of any kind but from a ’crippled epistemology,’ in the form of a sharply limited number of (relevant) informational sources."

By "crippled epistemology" Sunstein means that people who believe in conspiracy theories have a limited number of sources of information that they trust. Therefore, Sunstein argued in the article, it would not work to simply refute the conspiracy theories in public -- the very sources that conspiracy theorists believe would have to be infiltrated..

Sunstein, whose article focuses largely on the 9/11 conspiracy theories, suggests that the government "enlist nongovernmental officials in the effort to rebut the theories. It might ensure that credible independent experts offer the rebuttal, rather than government officials themselves. There is a tradeoff between credibility and control, however. The price of credibility is that government cannot be seen to control the independent experts."

Download a PDF of the article here.

Sunstein argued that "government might undertake (legal) tactics for breaking up the tight cognitive clusters of extremist theories." He suggested that "government agents (and their allies) might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action."

"We expect such tactics from undercover cops, or FBI," Estrin writes at the Rag Blog, expressing surprise that "a high-level presidential advisor" would support such a strategy.

[...]

Read the full article at: informationclearinghouse.info



READ: Cognitive Infiltration: An Obama Appointee’s Plan to Undermine the 9/11 Conspiracy Theory

Comments

We're Hiring

We are looking for a professional video editor, animator and graphics expert that can join us full time to work on our video productions.

Apply

Help Out

Sign up for a membership to support Red Ice. If you want to help advance our efforts further, please:

Donate

Tips

Send us a news tip or a
Guest suggestion

Send Tip

Related News

How Google Destroyed the Internet
How Google Destroyed the Internet
Internet Control: Obama Blames Internet for ‘Domestic Terrorism’
Internet Control: Obama Blames Internet for ‘Domestic Terrorism’

Archives Pick

Red Ice T-Shirts

Red Ice Radio

3Fourteen

Con Inc., J6 Political Prisoners & The Pedophile Problem
Kim Coulter - Con Inc., J6 Political Prisoners & The Pedophile Problem
Why European Culture, Art and Beauty Matter
Gifts - Why European Culture, Art and Beauty Matter

TV

No-Go Zone: Police Shut Down Palestine Protests Over Israel & Nazi Attack In Sweden?
No-Go Zone: Police Shut Down Palestine Protests Over Israel & Nazi Attack In Sweden?
What Is White Culture?
What Is White Culture?

RSSYoutubeGoogle+iTunesSoundCloudStitcherTuneIn

Design by Henrik Palmgren © Red Ice Privacy Policy