Forums before death by AOL, social media and spammers... "We can't have nice things"
|    sci.med.psychobiology    |    Dialog and news in psychiatry and psycho    |    4,734 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 2,734 of 4,734    |
|    Dr. AR Wingnutte to All    |
|    How Covert Agents Infiltrate the Interne    |
|    24 Feb 14 18:10:02    |
      From: drarwingnutte@gmail.com              How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy       Reputations        By Glenn Greenwald24 Feb 2014, 6:25 PM EST 104        COPY URL        Facebook        Google        Twitter        LinkedIn        Email        Featured photo - How Covert Agents Infiltrate the Internet to Manipulate,       Deceive, and Destroy Reputations A page from a GCHQ top secret document       prepared by its secretive JTRIG unit        One of the many pressing stories that remains to be told from the Snowden       archive is how western intelligence agencies are attempting to manipulate and       control online discourse with extreme tactics of deception and r       putation-destruction. It's time to        tell a chunk of that story, complete with the relevant documents.               Over the last several weeks, I worked with NBC News to publish a series of       articles about "dirty trick" tactics used by GCHQ's previously secret unit,       JTRIG (Joint Threat Research Intelligence Group). These were based on four       classified GCHQ documents        presented to the NSA and the other three partners in the English-speaking       "Five Eyes" alliance. Today, we at the Intercept are publishing another new       JTRIG document, in full, entitled "The Art of Deception: Training for Online       Covert Operations".               By publishing these stories one by one, our NBC reporting highlighted some of       the key, discrete revelations: the monitoring of YouTube and Blogger, the       targeting of Anonymous with the very same DDoS attacks they accuse       "hacktivists" of using, the use of "       honey traps" (luring people into compromising situations using sex) and       destructive viruses. But, here, I want to focus and elaborate on the       overarching point revealed by all of these documents: namely, that these       agencies are attempting to control,        infiltrate, manipulate, and warp online discourse, and in doing so, are       compromising the integrity of the internet itself.               Among the core self-identified purposes of JTRIG are two tactics: (1) to       inject all sorts of false material onto the internet in order to destroy the       reputation of its targets; and (2) to use social sciences and other techniques       to manipulate online        discourse and activism to generate outcomes it considers desirable. To see how       extremist these programs are, just consider the tactics they boast of using to       achieve those ends: "false flag operations" (posting material to the internet       and falsely        attributing it to someone else), fake victim blog posts (pretending to be a       victim of the individual whose reputation they want to destroy), and posting       "negative information" on various forums. Here is one illustrative list of       tactics from the latest        GCHQ document we're publishing today:                             Other tactics aimed at individuals are listed here, under the revealing title       "discredit a target":                             Then there are the tactics used to destroy companies the agency targets:                             GCHQ describes the purpose of JTRIG in starkly clear terms: "using online       techniques to make something happen in the real or cyber world", including       "information ops (influence or disruption)".                             Critically, the "targets" for this deceit and reputation-destruction extend       far beyond the customary roster of normal spycraft: hostile nations and their       leaders, military agencies, and intelligence services. In fact, the discussion       of many of these        techniques occurs in the context of using them in lieu of "traditional law       enforcement" against people suspected (but not charged or convicted) of       ordinary crimes or, more broadly still, "hacktivism", meaning those who use       online protest activity for        political ends.               The title page of one of these documents reflects the agency's own awareness       that it is "pushing the boundaries" by using "cyber offensive" techniques       against people who have nothing to do with terrorism or national security       threats, and indeed,        centrally involves law enforcement agents who investigate ordinary crimes:                             No matter your views on Anonymous, "hacktivists" or garden-variety criminals,       it is not difficult to see how dangerous it is to have secret government       agencies being able to target any individuals they want - who have never been       charged with, let alone        convicted of, any crimes - with these sorts of online, deception-based tactics       of reputation destruction and disruption. There is a strong argument to make,       as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14       hacktivist        persecution, that the "denial of service" tactics used by hacktivists result       in (at most) trivial damage (far less than the cyber-warfare tactics favored       by the US and UK) and are far more akin to the type of political protest       protected by the First        Amendment.               The broader point is that, far beyond hacktivists, these surveillance agencies       have vested themselves with the power to deliberately ruin people's       reputations and disrupt their online political activity even though they've       been charged with no crimes,        and even though their actions have no conceivable connection to terrorism or       even national security threats. As Anonymous expert Gabriella Coleman of       McGill University told me, "targeting Anonymous and hacktivists amounts to       targeting citizens for        expressing their political beliefs, resulting in the stifling of legitimate       dissent." Pointing to this study she published, Professor Coleman vehemently       contested the assertion that "there is anything terrorist/violent in their       actions."               Government plans to monitor and influence internet communications, and       covertly infiltrate online communities in order to sow dissension and       disseminate false information, have long been the source of speculation.       Harvard Law Professor Cass Sunstein, a        close Obama adviser and the White House's former head of the Office of       Information and Regulatory Affairs, wrote a controversial paper in 2008       proposing that the US government employ teams of covert agents and       pseudo-"independent" advocates to "       cognitively infiltrate" online groups and websites, as well as other activist       groups.                      [continued in next message]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca