The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, āamplif[y]ā sanctioned messages on YouTube, and censor video content judged to be āextremist.ā The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.
The tools were created by GCHQās Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIGās use of āfake victim blog posts,ā āfalse flag operations,ā āhoney trapsā and psychological manipulationĀ to target online activists, monitorĀ visitors to WikiLeaks, andĀ spy on YouTube and Facebook users.
But as the U.K. Parliament today debates aĀ fast-tracked bill to provide the government with greater surveillance powers, one which Prime Minister David Cameron hasĀ justified as an āemergencyāĀ to āhelp keep us safe,āĀ a newly released top-secret GCHQ document called āJTRIG Tools and Techniquesā provides a comprehensive, birds-eye view of just how underhanded and invasive this unitās operations are. The documentāavailable in full hereāis designed to notify other GCHQ units of JTRIGās āweaponised capabilityā when it comes to the dark internet arts, and serves as a sort of hackerās buffet for wreaking online havoc.
The ātoolsā have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including ādistributed denial of serviceā attacks and ācall bombing.ā But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-timeāraising further questions aboutthe extent of Microsoftās cooperation with spy agenciesĀ or potential vulnerabilities in its Skypeās encryption. Hereās a list of how JTRIG describes its capabilities:
⢠āChange outcome of online pollsā (UNDERPASS)
⢠āMass delivery of email messaging to support an Information Operations campaignā (BADGER) and āmass delivery of SMS messages to support an Information Operations campaignā (WARPARTH)
⢠āDisruption of video-based websites hosting extremist content through concerted target discovery and content removal.ā (SILVERLORD)
⢠āActive skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.ā (MINIATURE HERO)
⢠āFind private photographs of targets on Facebookā (SPRING BISHOP)
⢠āA tool that will permanently disable a targetās account on their computerā (ANGRY PIRATE)
⢠āAbility to artificially increase traffic to a websiteā (GATEWAY) and āability to inflate page views on websitesā (SLIPSTREAM)
⢠āAmplification of a given message, normally video, on popular multimedia websites (Youtube)ā (GESTATOR)
⢠āTargeted Denial Of Service against Web Serversā (PREDATORS FACE) and āDistributed denial of service using P2P. Built by ICTR, deployed by JTRIGā (ROLLING THUNDER)
⢠āA suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)ā (ELATE)
⢠āAbility to spoof any email address and send email under that identityā (CHANGELING)
⢠āFor connecting two target phone together in a callā (IMPERIAL BARGE)
While some of the tactics are described as āin development,ā JTRIG touts āmostā of them as āfully operational, tested and reliable.ā It adds: āWe only advertise tools here that are either ready to fire or very close to being ready.ā
And JTRIG urges its GCHQ colleagues to think big when it comes to internet deception: āDonāt treat this like a catalogue. If you donāt see it here, it doesnāt mean we canāt build it.ā
The document appears in a massive Wikipedia-style archive used by GCHQ to internally discuss its surveillance and online deception activities. The page indicates that it was last modified in July 2012, and had been accessed almost 20,000 times.
GCHQ refused to provide any comment on the record beyond its standard boilerplate, in which it claims that it acts āin accordance with a strict legal and policy frameworkā and is subject to ārigorous oversight.ā But both claims are questionable.
British watchdog Privacy International has filedĀ pending legal action against GCHQĀ over the agencyās use of malware to spy on internet and mobile phone users. Several GCHQ memospublished last fall byĀ The GuardianĀ revealed that the agency was eager to keep its activities secret not to protect national security, but because āour main concern is that references to agency practices (ie, the scale of interception and deletion) could lead to damaging public debate which might lead to legal challenges against the current regime.ā And an EU parliamentary inquiry earlier this yearĀ concluded that GCHQ activities were likely illegal.
As for oversight, serious questions have been raised about whether top national security officials even know what GCHQ is doing. Chris Huhne, a former cabinet minister and member of the national security council until 2012,Ā insisted that ministers were in āutter ignoranceāĀ about even the largest GCHQ spying program, known as Temporaānot to mention ātheir extraordinary capability to hoover up and store personal emails, voice contact, social networking activity and even internet searches.ā InĀ an OctoberĀ GuardianĀ op-ed, Huhne wrote that āwhen it comes to the secret world of GCHQ and the [NSA], the depth of my āprivileged informationā has been dwarfed by the information provided by Edward Snowden toĀ The Guardian.ā
ZNetwork is funded solely through the generosity of its readers.
Donate

