How Covert Agents use the Internet to Manipulate, Deceive, and Destroy Reputations

Search form

How Covert Agents use the Internet to Manipulate, Deceive, and Destroy Reputations

How Covert Agents use the Internet to Manipulate, Deceive, and Destroy Reputations
Fri, 2/28/2014 - by Glenn Greenwald
This article originally appeared on The Intercept

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the U.S. and U.K.) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

Originally published by The Intercept

Article Tabs

whistleblowers, Jeffrey Sterling, James Risen, Operation Merlin, CIA whistleblower,

The mass media have suddenly discovered Sterling — after his conviction Monday afternoon as a CIA whistleblower.

Fast Track is far from a "done deal" in the United States, and foreign negotiators ought to be cautious before accepting provisions that will harm their population.

DEA spying, car license plate database, license plate readers

The ACLU warns that the scanning of license plates by the U.S. Drug Enforcement Agency is building a repository of all drivers’ movements.

liberation of Kobane, Kobane fighters, ISIS, Kurdish freedom fighters

This week, finally, Kobane has liberated itself from the grips of an ISIS siege with a fierce resolve, a commitment to revolution and a firm belief in the human values of freedom and equality.

The IMF – "It's Mostly Fiscal" – has been able to represent a globally united front for the interests of commercial banks, which have systematically seized control of local economies everywhere.

Powell Memo, U.S. Chamber of Commerce, total boycott, economic alternatives, worker-owned businesses, student debt, student loans, banking alternatives, move your money, Strike Debt, Rolling Jubilee

This is a strategic memorandum to all movement organizers, social justice organizations, and free citizens disgusted with a corporate state that has systematically extracted our wealth and resources while giving back nothing in return.

Posted 6 days 14 hours ago

The left-populist party headed by Alexis Tsipras is positioned to win Greece’s elections Sunday on a progressive platform to reverse austerity cuts imposed on the country over the past half decade.

Posted 5 days 14 hours ago

The pay ratio between the highest- and lowest-paid worker-owners in cooperatives is between 3:1 and 5:1, compared with a ratio of roughly 600:1 in traditional corporations.

Posted 6 days 14 hours ago
warrantless spying, NSA, illegal spying, Fourth Amendment Protection Act, OffNow coalition, Patriot Act, metadata collection, William Binney

Efforts to stop warrantless NSA spying are off to a fast start in the 2015 legislative session, as lawmakers in four states have already introduced bills banning material support or resources to any federal agency engaged in illegal spying.

Posted 6 days 14 hours ago

Five "unelected, unaccountable kings in black robes" are systematically stripping Constitutional rights from real, live human beings and giving those rights to corporations and a very small group of plutocrats.

Posted 5 days 15 hours ago
Powell Memo, U.S. Chamber of Commerce, total boycott, economic alternatives, worker-owned businesses, student debt, student loans, banking alternatives, move your money, Strike Debt, Rolling Jubilee

This is a strategic memorandum to all movement organizers, social justice organizations, and free citizens disgusted with a corporate state that has systematically extracted our wealth and resources while giving back nothing in return.

stagnant wages, rising wages, outsourcing jobs

A majority of Americans have no savings to draw upon if they lose their job, and two-thirds of all workers are living paycheck to paycheck – which is why they won’t risk losing a job by asking for higher pay.

Barrett Brown, relevant conduct, hacking, hacktivists, Stratfor hacking, Jeremy Hammond

Barrett Brown was sentenced to 63 months in federal prison for hacking Stratfor. But he's not a hacker - he's a journalist.

Bitcoin, blockchain, alternative currencies, digital currencies, cryptocurrencies, decentralized economies

The emerging blockchain movement can build systems that incentivize carbon reductions, make renewable energy, increase microfinance, decrease costs in remittances and education, and lower barriers to entries across industries.

Portland residents are up in arms about what they believe is a cronyism-driven plan to kill the elegant, gravity-fed, open water reservoir system that has reliably served their city safe, clean drinking water for more than 100 years.

Sign Up