More Evidence of Web Manipulation - Snowden Docs: British Spies Seed the Internet with False Information

New Snowden Docs: British Spies Seed the Internet with False Information, Including the Ability to Manipulate the Results of Online Polls, Artificially Inflate Pageview Counts On Web Sites, “Amplif[y]” Sanctioned Messages On Youtube, and Censor Video Content Judged To Be “Extremist”

We’ve noted for years that the Pentagon and spy agencies manipulate the Internet – including social media – in order to prom....

We’ve also discussed some of the methods used to game popularity on social media sites.

new report from the Intercept adds to our understanding of these tactics:

The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.

The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, andspy on YouTube and Facebook users.

***

The “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agenciesor potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities:

• “Change outcome of online polls” (UNDERPASS)

• “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH)

• “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)

• “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO)

• “Find private photographs of targets on Facebook” (SPRING BISHOP)

• “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE)

• “Ability to artificially increase traffic to a website” (GATEWAY) and “ability toinflate page views on websites” (SLIPSTREAM)

• “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR)

• “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)

• “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE)

• “Ability to spoof any email address and send email under that identity” (CHANGELING)

• “For connecting two target phone together in a call” (IMPERIAL BARGE)

NSA engages in the same types of dirty tricks.

We’re not very confident that the spies are only going after actual bad guys and promoting the messages of the good guys, given that:

  • Any criticism of government policies is considered “extremist” and potential terrorism

Postscript: Two readers point out chilling potential implications of such manipulation for framing or blackmailing people. One reader worries:

The SCARY one is CHANGELING.

They can send email using your address.  Or insert it on your computer.

Like kiddie porn, if they really want you dead.

Another reader argues:

“For connecting two target phone together in a call” (IMPERIAL BARGE)

In other words, producing phony phone logs which can then be used in a “court of law” against the target(s).  So, why WERE you talking to those Jihadis?

Views: 80

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

tjdavis posted a video

J.R. Nyquist On World War 3 (6 of 7) - Overture

http://www.jrnyquist.com/Jeff Nyquist explains the terrorist overture before World War Three as explained in defector Victor Suvorov's book, Spetsnaz: The St...
3 minutes ago
Doc Vega posted a blog post

Regrets That Cling to Me

Talking with my shadow in the nightI know it sounds contriteA vacuum without the lightThe silence…See More
yesterday
tjdavis posted a photo
Monday
Doc Vega posted a blog post

Reality Is now Becoming Unhinged

 Let’s take a trip down the modern-day rabbit hole we call everyday news and events, but on a more…See More
Sunday
cheeki kea commented on Sandy's video
Thumbnail

Ghislaine Maxwell & The Secret "Shadow" 9/11 Commission? | John Kiriakou

"You tuber Sabby Sabs sums up and joins dots. Don't miss this one."
Sunday
Doc Vega posted a blog post
Thursday
Burbia commented on TommyD's group The Chuckle Hut
"The Warriors is one of my favorite movies. I couldn't help but laugh at this spoof."
Mar 4
Doc Vega posted a photo
Mar 4
Doc Vega commented on Doc Vega's blog post Are the End Times Drawing Near?
"cheeki kea, You might want to see predictions made by Robert Welch in 1957 and 1974 stating that…"
Mar 4
Doc Vega commented on Doc Vega's blog post Are the End Times Drawing Near?
"cheeki kea, good points. We have a world full of twisted allied agendas that seem contradictory,…"
Mar 4
Sandy posted a video

Ghislaine Maxwell & The Secret "Shadow" 9/11 Commission? | John Kiriakou

In this gripping excerpt from the Julien Dorey podcast, former CIA officer and whistleblower John Kiriakou reacts to a leaked email from 2003. The document r...
Mar 3
cheeki kea left a comment for Holyroller
"Greetings to you Holyroller very awesome you've joined up with us all. I know you'll find…"
Mar 3
cheeki kea commented on Doc Vega's blog post Are the End Times Drawing Near?
"Yes it's a sad and sorry situation we see evolving here. On one front and it's a large…"
Mar 3
Doc Vega commented on tjdavis's video
Thumbnail

When the Communists Take Over America!...Famous 1957 Anti-Communist Movie

"I remember this when I was a little seeing it on TV years after it was filmed and it scared me even…"
Mar 3
tjdavis posted a video

When the Communists Take Over America!...Famous 1957 Anti-Communist Movie

Starring Jack Webb and Robert Conrad, this 1957 movie by the United States Armed Forces Information Agency is perhaps the best known anti-communist movie eve...
Mar 2
Doc Vega posted a blog post

Are the End Times Drawing Near?

Are we seeing the gradual fulfillment of the Battle of Armageddon? Think of it. The US and Israel…See More
Mar 2
Holyroller is now a member of 12160 Social Network
Mar 2
tjdavis posted a blog post
Mar 1
Sandy posted photos
Mar 1
Burbia posted a video

Catherine Fitts: Epstein, CIA Black Budget, the Control Grid, and the Banks’ Role in War

Programmable digital currency is the final piece of the global control grid that’s finally snapping into place. Catherine Austin Fitts on how to defeat it. C...
Feb 27

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted