How Internet Spies Manipuluate, Lie, and Destroy Your Reputation

I’ve pointed out this kind of thing a few times in the past — all intelligence agencies both gather information and exert influence. (It’s almost as it it was a Schrödinger situation.)

Now Glenn Greenwald has opened up with both barrels and pointed out what he’s been slowly been building up to — that the spies are actively out there in ur internets, shaping ur opinions and discrediting and character-assassinating people they don’t like.

Possibly the most hilarious reference in the article is to Cass Sunstein’s plan to infiltrate conspiracy theorists’ groups, which in his view are damaging to the governent…

Also worth touching on are the thick-on-the-ground references to magicians, from Robert-Houdin to Maskelyne and Mullholland. If you think by analogies and no longer view a “magic trick” as needing to involve a hat and a rabbit — instead seeing how the underlying principles can apply to covering up events or manufacturing others — this is a very fruitful field to follow.

A while back there was a prima facie lurid but none too useful book published called “The CIA Manual of Trickery and Deception,” essentially a book Mullholland had written for that agency on various dastardly deeds. Flipping through it and thinking of how the principles could be applied outside the realm of making small objects vanish (or poisoning others’ drinks) is interesting.

PDF:
https://s3.amazonaws.com/s3.documentcloud.org/documents/1021430/the-art-of-deception-training-for-a-new.pdf

https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/

” want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forum.[…]

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes.[…]

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”[…]

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework? […]

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance.”

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it.”

Advertisements
%d bloggers like this: