Spy Agency’s Secret Plans to Foster Online “Conformity” and “Obedience” Exposed

Internal memo from secretive British spy unit exposes how GCHQ and NSA used human psychological research to create sophisticated online propaganda tools

With never-before-seen documents accompanied by new reporting on Monday, The Intercept‘s Glenn Greenwald and Andrew Fishman are offering a more in-depth look than ever into how a secretive unit of the UK’s GCHQ surveillance agency used a host of psychological methods and online subterfuge in order to manipulate the behavior of individuals and groups through the internet and other digital forms of communication.

According to the reporting, the latest documents, which were leaked to journalists by NSA whistleblower Edward Snowden,

demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers “extremist,” Islamist activity in schools, the drug trade, online fraud, and financial scams.

Though its existence was secret until last year, JTRIG quickly developed a distinctive profile in the public understanding, after documents from NSA whistleblower Edward Snowden revealed that the unit had engaged in “dirty tricks” like deploying sexual “honey traps” designed to discredit targets, launching denial-of-service attacks to shut down internet chat rooms, pushing veiled propaganda onto social networks, and generally warping discourse online.

Among the most troubling revelations is a 42-page internal JTRIG memo that describes in detail how the elite unit developed, maintained, and apparently sought to expand its “scientific and psychological research into how human thinking and behavior can be influenced” in order to increase its ability to “manipulate public opinion” via online tools like email, social media, video, discussion forums, and other platforms.

Read the rest here

The Citigroup Plutonomy Memos: Two bombshell documents that Citigroup’s lawyers try to suppress, describing in detail the rule of the first 1%

“Are they real?” That’s the question people usually ask when they hear for the first time of the “Citigroup Plutonomy Memos.” The sad truth is: Yes, they are real, and instead of being discussed on mainstream media outlets all over America and beyond, Citigroup was surprisingly successful so far in suppressing these memos, using their lawyers to issue takedown-notices whenever these memos were being made available for download on the internet.
So what are we talking about? In 2005 and 2006, several analysts at Citigroup took a very, very close look at the economic inequalities within the USA and other countries and wrote two memos which were addressed to their very wealthy customers. If there is one group of people who need to know the truth about what is really going on within the society and the economy, minus the propaganda, then it’s businesspeople who have a lot of money to invest, and who want to invest wisely.
So Citigroup did their duty and published two explosive memos, which should have become mainstream news, but eventually did not. The first memo is dated October 16, 2005 (35 pages) and is titled:“Plutonomy: Buying Luxury, Explaining Global Imbalances.”

NSA pranksters plant ‘listening’ devices in New York and take snooping abroad

Next time you gossip or brag about cheating on your partner, check under the table. Group’s stunt highlights extent of the real NSA as the debate continues

Next time you’re at a bar in the East Village, say, congratulating yourself on having tricked your roommate, bitching about your friend’s accent or sharing your partner’s sex secrets, check under the table for listening devices. Wags claiming to work for the NSA as one of “many third-party contractors, albeit pro-bono and unofficial” are collecting your conversations.

A group calling themselves We Are Always Listening says it has placed recording devices across New York and – just like their real NSA counterparts – they have plans to start snooping on people in Germany too.

The stunt aims to highlight the extent of the NSA’s domestic surveillance program as the debate over whether or not to renew the Patriot Act rages on. In a conversation with the Guardian the “agents” said they have been careful not to release “anybody’s first and last names”, although there were two names in one of the tracks on the site Friday afternoon.

http://www.theguardian.com/world/2015/may/22/fake-nsa-program-we-are-always-listening

China rates its own citizens – including online behaviour

The Chinese government is currently implementing a nationwide electronic system, called the Social Credit System, attributing toeach of its 1,3 billion citizens a score for his or her behavior. The system will be based on various criteria, ranging from financial credibility and criminal record to social media behavior. From 2020 onwards each adult citizen should, besides his identity card, have such a credit code.

Read more: http://www.volkskrant.nl/buitenland/china-rates-its-own-citizens-including-online-behaviour~a3979668

How friendship became a tool of the powerful

Corporations and governments have co-opted the idea of the ‘social’ for their own ends. Is there anything we can do about it?

Imagine walking into a coffee shop, ordering a cappuccino, and then, to your surprise, being informed that it has already been paid for. Where did this unexpected gift come from? It transpires that it was left by the previous customer. The only snag, if indeed it is a snag, is that you now have to do the same for the next customer who walks in.

This is known as a “pay-it-forward” pricing scheme. It is something that has been practised by a number of small businesses in California, such as the Karma Kitchen in Berkeley and, in some cases, customers have introduced it spontaneously. On the face of it, it would seem to defy the logic of free-market economics. Markets, surely, are places where we are allowed, even expected, to behave selfishly. With its hippy idealism, pay-it-forward would appear to go against the core tenets of economic calculation.

But there is more to it than this. Researchers from the decision science research group at the University of California, Berkeley have looked closely at pay-it-forward pricing and discovered something with profound implications for how markets and businesses work. It transpires that people will generally pay more under the pay-it-forward model than under a conventional pricing system. As the study’s lead author, Minah Jung, puts it: “People don’t want to look cheap. They want to be fair, but they also want to fit in with the social norms.” Contrary to what economists have long assumed, altruism can often exert a far stronger influence over our decision-making than calculation.

Such findings are typical of the field of behavioural economics, which emerged in the late 1970s. Like regular economists, behavioural economists assume that individuals are usually motivated to maximise their own benefit – but not always. In certain circumstances, they are social and moral animals, even when this appears to undermine their economic interests. They follow the herd and act according to certain rules of thumb. They have some principles that they will not sacrifice for money at all.

It seems that this undermines the cynical, individualist theory of human psychology, which lies at the heart of orthodox economics. Could it be that we are decent, social creatures after all? A great deal of neuroscientific research into the roots of sympathy and reciprocity supports this. Optimists might view this as the basis for a new political hope, of a society in which sharing and gift-giving offer a serious challenge to the power of monetary accumulation and privatisation.

But there is also a more disturbing possibility: that the critique of individualism and monetary calculation is now being incorporated into the armoury of utilitarian policy and management. One of the key insights of behavioural economics is that, if one wants to control other human beings, it is often far more effective to appeal to their sense of morality and social identity than to their self-interest.

This is symptomatic of a more general shift in policy and business practices today. Across various fields of expertise, from healthcare to marketing, from military training to finance, there is rising hope that strategic goals can be achieved through harnessing the power of the “social”. But what exactly does this mean? As the era of social democracy recedes further into the past, the meaning of the term is undergoing a profound transformation. Where once the term implied something concerning society or the common good, increasingly it refers to a technique of psychological intervention on the individual. Informal social connections and friendships are being rendered more visible and measurable. In the process, they are being turned into possible instruments of power.

READ MOREhttp://www.theguardian.com/media/2015/may/07/how-friendship-became-tool-of-powerful?CMP=share_btn_tw

Internet Trolls May be Trained Government Agents According to Leaked Document

Click to enlarge

 

Glenn Greenwald, a journalist, constitutional lawyer, commentator, and author of three New York Times best-selling books on politics and law, has been working with NBC News in publishing a series of articles on how covert government agents infiltrate the Internet to “manipulate, deceive, and destroy reputations.”

The information is based on documents leaked by National Security Agency (NSA) whistleblower Edward Snowden. Greenwald’s article, How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, is based on four classified documents produced by the British spy agency GCHQ, and presented to the NSA and three other English speaking agencies reportedly part of “The Five Eyes Alliance.”

In this shocking piece, Greenwald publishes a copy of a spy training manual used entitled: “The Art of Deception: Training for Online Covert Operations.” Greenwald writes that agencies like the NSA are “attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.” Greenwald writes:

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

While this kind of counter-intelligence activity may not sound surprising given the objectives of spy agencies going after terrorists, what disturbs Greenwald (and many others) is that the discussion regarding these techniques have been greatly expanded to include the general public:

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes.

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.

And while these leaked documents concern the British spy agency, Greenwald is quick to point out that the Obama administration has actually been open and forward about using such techniques in the U.S.:

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

(Full article here.)

The anti-surveillance state: Clothes and gadgets block face recognition technology and make you digitally invisible

Last spring, designer Adam Harvey hosted a session on hair and makeup techniques for attendees of the 2015 FutureEverything Festival in Manchester, England. Rather than sharing innovative ways to bring out the audience’s eyes, Harvey’s CV Dazzle Anon introduced a series of styling methods designed with almost the exact opposite aim of traditional beauty tricks: to turn your face into an anti-face—one that cameras, particularly those of the surveillance variety, will not only fail to love, but fail to recognize.

Read more: http://www.rawstory.com/2015/04/the-anti-surveillance-state-clothes-and-gadgets-block-face-recognition-technology-and-make-you-digitally-invisible/

Snitch Nation

InfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.

Inside the Kremlin’s hall of mirrors

 
 
Late last year, I came across a Russian manual called Information-Psychological War Operations: A Short Encyclopedia and Reference Guide (The 2011 edition, credited to Veprintsev et al, and published in Moscow by Hotline-Telecom, can be purchased online at the sale price of 348 roubles). The book is designed for “students, political technologists, state security services and civil servants” – a kind of user’s manual for junior information warriors. The deployment of information weapons, it suggests, “acts like an invisible radiation” upon its targets: “The population doesn’t even feel it is being acted upon. So the state doesn’t switch on its self-defence mechanisms.” If regular war is about actual guns and missiles, the encyclopedia continues, “information war is supple, you can never predict the angle or instruments of an attack”.
The 495-page encyclopedia contained an introduction to information-psychological war, a glossary of key terms and detailed flowcharts describing the methods and strategies of defensive and offensive operations, including “operational deception” (maskirovka), “programmatical-mathematical influence”, “disinformation”, “imitation”, and “TV and radio broadcasting”. In “normal war” the encyclopedia explains, “victory is a case of yes or no; in information war it can be partial. Several rivals can fight over certain themes within a person’s consciousness.”
I had always imagined the phrase “information war” to refer to some sort of geopolitical debate, with Russian propagandists on one side and western propagandists on the other, both trying to convince everyone in the middle that their side was right. But the encyclopedia suggested something more expansive: information war was less about methods of persuasion and more about “influencing social relations” and “control over the sources of strategic reserves”. Invisible weapons acting like radiation to override biological responses and seize strategic reserves? The text seemed more like garbled science fiction than a guide for students and civil servants.

Confronting the surveillance state

By Memorial Day weekend, Congress will likely have decided whether the federal government’s mass surveillance programs — exposed first by The New York Times in December 2005 and more broadly by National Security Agency contractor-turned-whistleblower Edward Snowden in 2013 — will be partially reined in or will instead become a dominant, permanent feature of American life.

The creation of what many refer to as the “American Surveillance State” began in secret, just days after the Sept. 11 attacks. As the wreckage of the Twin Towers smoldered, President Bush and his top national security and intelligence advisers were making decisions that would trigger a constitutional crisis over surveillance programs that the public was told was essential to combating terrorism. The first act in this post-Sept.11 drama began on Capitol Hill.

 

Read more: http://www.washingtonexaminer.com/confronting-the-surveillance-state/article/2562696