Governments can use social media to target activists – UK and the Iran protests
Could GCHQ influence Iran protests? They’ve done it before, claims
researcher https://www.rt.com/uk/414831-gchq-influence-hack-protest/#.WkwCv_uo99Q.facebook
He says through its social media manipulation operations, spy agency Government Communications Headquarters (GCHQ) tried to influence online activists during the 2009 Iranian presidential election protests, and the 2011 uprisings widely known as the Arab Spring.
Al-Bassam told the Chaos Communication Congress in Germany last week that the Joint Threat Research Intelligence Group (JTRIG) – a unit in GCHQ – uses “dirty tricks” to target activists.
He says JTRIG has been tasked by the British government to “[use] online techniques to make something happen in the real or cyber world.” To fulfil this aim, a wide but basic array of technological tools and software are used, including ‘DEADPOOL,’ which is described as a “URL shortening service,” and ‘HUSK,’ a “secure one-to-one web based dead-drop messaging platform.”
He told the conference: “It’s basically a fancy name for sitting on Twitter and Facebook all day and trolling online. What they do, is they conduct what they call ‘human intelligence’ – which is like the act of interacting with humans online to try and make something happen in the real world.
“In their own words one of the things they do is to use ‘dirty tricks’ to ‘destroy, deny, degrade [and] disrupt’ enemies by ‘discrediting’ them.”
JTRIG has been involved in infiltrating hacktivist groups Anonymous and LulzSec, and protesters in Iran, Syria and Bahrain, he says.
As a “honey pot” to attract activists, GCHQ set up free URL shortening service lurl.me, which was used on Twitter and other social media platforms to spread revolutionary messages in the Middle East. These messages would attract people protesting against the government there, and British intelligence would collect information on them.
Al-Bassam said he discovered this information among the documents leaked by NSA whistleblower Edward Snowden. “In 2011, I was unknowingly messaged… by a covert agent from [GCHQ], who was investigating the hacktivist groups of Anonymous and Lulzsec. Later that year, I was arrested and banned from the internet for my involvement in Lulzsec.
Then, in 2014, I discovered through a new Snowden leak that GCHQ had targeted Anonymous and Lulzsec, and that the person that messaged me was a covert employee, pretending to be a hacktivist.”
He added: “Because I was myself targeted in the past, I was aware of a key detail – a honeypot URL shortening service set up by GCHQ, that was actually redacted in the Snowden documents published in 2014. This URL shortening service enabled GCHQ to deanonymize another hacktivist and discover his real name and Facebook account, according to the leaked document.
“Using this key detail, I was able to discover a network of sockpuppet Twitter accounts and websites set up by GCHQ, pretending to be activists during the Arab spring of 2011,” he said.
No comments yet.
-
Archives
- June 2023 (34)
- May 2023 (344)
- April 2023 (348)
- March 2023 (308)
- February 2023 (379)
- January 2023 (388)
- December 2022 (277)
- November 2022 (335)
- October 2022 (363)
- September 2022 (259)
- August 2022 (367)
- July 2022 (368)
-
Categories
- 1
- 1 NUCLEAR ISSUES
- business and costs
- climate change
- culture and arts
- ENERGY
- environment
- health
- history
- indigenous issues
- Legal
- marketing of nuclear
- media
- opposition to nuclear
- PERSONAL STORIES
- politics
- politics international
- Religion and ethics
- safety
- secrets,lies and civil liberties
- spinbuster
- technology
- Uranium
- wastes
- weapons and war
- Women
- 2 WORLD
- ACTION
- AFRICA
- AUSTRALIA
- Christina's notes
- Christina's themes
- culture and arts
- Fuk 2022
- Fuk 2023
- Fukushima 2017
- Fukushima 2018
- fukushima 2019
- Fukushima 2020
- Fukushima 2021
- general
- global warming
- Humour (God we need it)
- Nuclear
- RARE EARTHS
- Reference
- resources – print
- Resources -audiovicual
- World
- World Nuclear
- YouTube
-
RSS
Entries RSS
Comments RSS
Leave a Reply