Latest Snowden Revelations Suggest GCHQ Is Just Like 4Chan Trolls, But With More Firepower
from the 4chan-gone-professional dept
So you misspent your teenage years as a 4chan troll and are trying to figure out what to do for a career? Given the latest revelations from the Snowden Files by Glenn Greenwald over at The Intercept, you might want to consider taking a job for the UK's equivalent to the NSA, better known as GCHQ. As Greenwald details (and the embedded document below reveals), among GCHQ's capabilities in its Joint Threat Research Intelligence Group (JTRIG) are a bunch of things that sound quite a bit like traditional internet trolling efforts. These include juicing internet polls to vote for GCHQ's favorite candidate (remember when moot was voted Time's Person of the Year in an online poll?) as well as flooding email inboxes or websites and even connecting two people on the phone and listening to the conversation.- “Change outcome of online polls” (UNDERPASS)
- “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH)
- “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
- “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO)
- “Find private photographs of targets on Facebook” (SPRING BISHOP)
- “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE)
- “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM)
- “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR)
- “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
- “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE)
- “Ability to spoof any email address and send email under that identity” (CHANGELING)
- “For connecting two target phone together in a call” (IMPERIAL BARGE)
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: ed snowden, gchq, glenn greenwald, jtrig, surveillance, trolling, uk
Reader Comments
Subscribe: RSS
View by: Time | Thread
Yeah we know
The enemy is us.
[ link to this | view in chronology ]
Re: Yeah we know
after all, WE 'used to' (*cough*stilldo*cough*) engage in ALL KINDS of so-called 'dirty tricks' to fuck up dissenters and other true patriots; what makes you think we have stopped ? ? ?
further, we have some 'proof', in that -as i recall- the military has actually bought -what amounts to- sockpuppet software, which allows one person to setup and use HUNDREDS of 'different' accounts/pseudonyms to astroturf for/against issues online, spread FUD and propaganda, etc...
two other factoids i like to repeat, since the lamestream media will not:
1. it *used to* be that the USG was FORBIDDEN BY LAW to propagandize us lowly serfs...
2. we are STILL in a formal 'state of emergency' renewed every 6-12 months since 9/11...
[ link to this | view in chronology ]
oh dear
Oh and some pesky laws too.
[ link to this | view in chronology ]
Re: oh dear
I think UK has more holes in their law controlling secret service than US. The problems I see are not vote-rigging, DDOS-type attacks or spam. The problem I see are the Spring Bishop and Miniature Hero (Circumvention of procedures? They should be able to give a warrent to the companies and get the information anyway...).
[ link to this | view in chronology ]
Thank god for the right to be forgotten law....
[ link to this | view in chronology ]
But 4chan & /b/ use their powers "responsibly"
It's just that while most of the trolling 4chan does is just make somebody's life hell in the name of 'teh lulz' (or as the tumblr crowd are currently learning the hard way, teaching idiots that starting a fight with the biggest hornet's nest on the internet is the worst idea in the history of bad ideas.), GCHQ's use of those same tactics can have decidedly more nefarious goals.
Want a heavily pro-GCHQ/NSA/surveillance state candidate to look like he's winning in the polls in a lame attempt to demoralize "your enemies"[everyone against the illegal actions of the NSA/GCHQ/Five Eyes]? Juice the polls in your candidate's favor with UNDERPASS!
Want to DDOS an anti-surveillance activist website servers? Use PREDATORS FACE!
I'm actually kinda surprised that government use of LOIC programs (or as the Ministry of Silly Codenames call it, PREDATORS FACE) didn't come up in earlier Snowden Revelations.
[ link to this | view in chronology ]
Swamp donkey: is a tool that will silenty locate all predefined types of file and encrypt them on a targets machine.
Is this followed by jailing the person under the RIPA act for failing to decrypt the files?
Or maybe we now know who's responsible for creating Cryptolocker.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Full list, by the way.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
I think they mean ransomware.
"Ability to artificially increase traffic to a website"
Seems like some Denial of Service attack to me.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Follow The Money
At least they don't waste our/your taxes on this.
[ link to this | view in chronology ]
Well, I guess GCHQ has a bigger budget. So that probably makes them a bigger cyber thug.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Gang stalking
These methods can go as far as artificially creating ups and downs in the psychological structure of their target - to time the ability to make reasonable statements or otherwise get an advantage. Use the wrong wording, tone or method and it could be a button that is being pushed - to the detriment of the victim. Similar to what internet trolls do (that know what they are doing), but not limited to the internet. These "tools" only complete a sector that has not been covered before.
The very existence does not proof it´s actual use, but that answer is open to the amount of transparency the public is allowed to receive. But as we know, the public is considered an enemy.
My key questions to these revelations are:
Does surveillance spark a totalitarian system?
Must a totalitarian philosophy employ surveillance as a tool?
How much influence is such an enclosed system within a democracy allowed to possess?
The more of these methods are uncovered, the more of this puzzle is exposed.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
-----------All your data are belong to us!--------------
[ link to this | view in chronology ]
Charles Stross - The Laundry Files
[ link to this | view in chronology ]
Edward Snowden
[ link to this | view in chronology ]
That part of the sentence is missing the word "then" right?
As in:
"One day (if not here, THEN in Heaven) Snowden will be..."
You were NOT referring to "here" as being "heaven" amirite.
[ link to this | view in chronology ]