A secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the National Security Agency by Edward Snowden.
The Joint Threat Research Intelligence Group (JTRIG), a unit in one of Britain’s intelligence agencies, is tasked with creating sockpuppet accounts and fake content on social media, in order to use "dirty tricks" to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them. In this talk, we reveal some of that content, in relation to infiltrating activists groups around the world, including during the Arab spring and Iranian revolution.
In 2011, I was unknowingly messaged on an IRC channel by a covert agent from the UK’s Government Communications Headquarters (GCHQ), who was investigating the hacktivist groups of Anonymous and LulzSec. Later that year, I was arrested (and banned from the Internet) for my involvement in LulzSec.
Then, in 2014, I discovered through a new Snowden leak  that GCHQ had targeted Anonymous and LulzSec, and the person that messaged me was a covert GCHQ employee, pretending to be a hacktivist.
Because I was myself targeted in the past, I was aware of a key detail, a honeypot URL shortening service setup by GCHQ, that was actually redacted in the Snowden documents published in 2014. This URL shortening service enabled GCHQ to deanonymize another hacktivist and discover his real name and Facebook account, according to the leaked document.
Using this key detail, I was able to discover a network of sockpuppet Twitter accounts and websites setup by GCHQ, pretending to be activists during the Arab spring of 2011 and Iranian revolution of 2009, and we published an article about it last summer in Motherboard as a piece of investigative journalism.
The people responsible, the Joint Threat Research Intelligence Group (JTRIG), is a group within GCHQ that has the aim of "using online techniques to make something happen in the real or cyber world".
To fulfill this aim, a wide but basic array of technological tools and software are used at JTRIG’s disposal, as detailed in the published document titled "JTRIG tools and techniques" . These tools include "DEADPOOL", described as a "URL shortening service", and "HUSK", a "secure one-to-one web based dead-drop messaging platform".
How can seemingly innocent web services be used as honeypots to conduct signal intelligence, being part of something more sinister?
More info - media.ccc.de
Thursday 28 December 2017 > français
January 21, 2019. The latest report from cybersecurity company Symantec shows that extortion scams are on the rise. The company blocked almost 300 million emails of this type in the first five months of 2019. The time-tested scams are making a comeback (...)
Information has recently surfaced about a NordVPN breach caused by vulnerabilities in a third-party datacenter. Here are the key facts about the NordVPN breach situation: One server was affected in March 2018 in Finland. The rest of our service was not (...)
This email is the first of several in Riseup’s fall fundraising drive, where every donation carries other Riseup users with you. We wouldn’t exist without you, so please donate if you can. It could be a recurrin donation of $10, one dollar, or tens of (...)
Donate to fight surveillance and censorship Tails is available for free because we believe that nobody should have to pay to be protected from surveillance and censorship. Tails is free software because if our source code was closed, there would be no (...)