SUBSCRIBE TO OUR FREE NEWSLETTER

SUBSCRIBE TO OUR FREE NEWSLETTER

Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.

* indicates required
5
#000000
#FFFFFF
GCHQ's "Dirty Tricks" Revealed: False Flags, Virus Attacks, and Honey Traps

A detail from one of the slides leaked by Edward Snowden in which the GCHQ articulates

GCHQ's "Dirty Tricks" Revealed: False Flags, Virus Attacks, and Honey Traps

Latest Snowden documents show spy agency operations included 'releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets'

The latest news contained in leaked documents from whistleblower Edward Snowden show that the British intelligence agency GCHQ has developed and deployed a complex series of "dirty tricks," "propoganda," and "false flag" operations that it used to spy on its selected targets which included not only "suspected terrorists" and "criminals" but also diplomats, journalists, activists.

Focused on a secret branch within the GCHQ called the Joint Threat Research and Intelligence Group (JTRIG), the documents obtained by NBC News show that the operations of the group included "releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into 'honey traps'" in order to "go on offense and attack adversaries."

The new reporting follows on one NBC published earlier this week highlighting other Snowden documents that revealed the existence of the JTRIG for the very first time. Journalist Glenn Greenwald is listed as 'special contributor' for both stories.

As the latest story hit the wire, Greenwald sent out a series of tweets remarking on the significance of the latest revelations and pointing to specific documents explored in the report:

As NBC reports:

According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency's goal was to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications.

Both PowerPoint presentations describe "Effects" campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda camp aigns use deception, mass messaging and "pushing stories" via Twitter, Flickr, Facebook and YouTube. JTRIG also uses "false flag" operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain's adversaries.

Targeting Journalists

In one striking revelation contained in the documents, the JTRIG seems have developed a plan to embroil journalists in their intelligence operations.

The 2010 presentation also describes another potential operation that would utilize a technique called "credential harvesting" to select journalists who could be used to spread information. According to intelligence sources, spies considered using electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign. Apparently, the journalist's job would provide access to the targeted individual, perhaps for an interview. The documents do not specify whether the journalists would be aware or unaware that they were being used to funnel information.

The executive director of the Committee to Protect Journalists, Joel Simon, said that the revelation about "credential harvesting" should serve as a "wake up call" to journalists that intelligence agencies can monitor their communications. Simon also said that governments put all journalists at risk when they use even one for an intelligence operation.

"All journalists generally are then vulnerable to the charge that they work at the behest of an intelligence agency," said Simon.

The journalist operation was never put into action, according to sources, but other techniques described in the documents [...] have definitely been used to attack adversaries.

_____________________________________

Our work is licensed under Creative Commons (CC BY-NC-ND 3.0). Feel free to republish and share widely.