FIVE EYES assault on social media

(WMR)—The latest release of documents from the Ed Snowden cache reveal that the British Government Communications Headquarters (GCHQ), the National Security Agency’s British counterpart, has spearheaded the development of tools to manipulate, disrupt, and collect personal information from social media, including Facebook, PalTalk, and YouTube.

The Internet surveillance and disruption tools were developed by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) and are identified on page views from GCWiki, a classified Wikipedia clone developed by GCHQ for internal use by GCHQ and other FIVE EYES signals intelligence alliance partner agencies, including NSA. GCWiki bears the classification TOP SECRET STRAP 1 COMINT.

The similarity of GCWiki to Wikipedia is so striking the question arises as to what assistance Wikipedia “volunteer” personnel provided to GCHQ in the development of GCWiki. As has been previously reported by WMR, Wikipedia has been used by intelligence agencies, including the CIA, to engage in psychological warfare operations directed against countries, institutions, and individuals. The CIA has been caught red-handed directing its personnel to become Wikipedia volunteer editors.

As an example of some of the disruptive tactics used by FIVE EYES, the POISON ARROW too, which was under development on July 5, 2012, but believed to be operational now, permits the signals intelligence agencies to download disruptive and destructive malware—safe to NSA and its partners’ computers and networks—to targeted computers and networks. WMR has been affected by malware that cannot be removed by commercial programs. Therefore, we have gone to a “sneaker net” environment in which our production computer is off-line and physically separated from our Internet-accessible computer. However, other Snowden documents have revealed that NSA has managed to get around such “air gaps” with different surveillance and disruption technology.

Other NSA/GCHQ tools include DANCING BEAR, which collects WiFi access points used by targeted individuals. HACIENDA uses GEOFUSION to pinpoint targets using IP locations. MINIATURE HERO collects Skype-to-Skype and Skype-to-external call records, instant messaging content, and contact lists. The vulnerability of cloud databases is exemplified by MOUTH, which collects user files from Archives.org. RESERVOIR collects a wealth of information from Facebook, however SPRING BISHOP targets and collects private photographs on Facebook. SODAWATER collects Gmail messages.

Perhaps the most destructive tool used by NSA and GCHQ is ANGRY PIRATE, which permanently disables accounts stored in a target’s computer. BUMPERCAR automatically reports on offensive materials on YouTube, with the intention that such videos will be taken down. SKYSCRAPER permits NSA and its partners to widely distribute videos and other multimedia content on the web. SPACE ROCKET is used to insert media into targeted networks. BOMB BAY is used to increase the rankings and hits of selected websites. SLIPSTREAM permits the inflation of page views on web sites. BADGER allows for the mass mailing of e-mail to support information operations campaigns, in effect, spamming. BURLESQUE permits SMS messages to be spoofed.

Another spamming tool is CANNONBALL, which permits repeated text messages to be sent to a target. GATEWAY permits the artificial increase of traffic to a website. SERPENTS TONGUE broadcasts fax messages to multiple target numbers.

CLEAN SWEEP permits Facebook Wall postings to be counterfeited for individuals or entire countries. CHINESE FIRECRACKER permits brute force logins of on-line forums. CONCRETE DONKEY allows repeated recorded messages to bombard a target’s phone or the same message can be sent to a large number of phones.

DEER STALKER permits the geo-location of satellite and GSM phones by the silent calling of the targeted phone’s number. VIPERS TONGUE targets GSM and satellite phones with denial of service attacks. WARPATH permits SMS messages to be sent to a large number of phones. LUMP is used to discover the names that are associated with avatars.

Intrusion into on-line gaming systems was accomplished by SECOND LIFE in 2012 but GLITTERBALL was due to replace the program. ELATE is used to monitor the United Kingdom’s E-Bay auction website.

IMPERIAL BARGE is used for connecting two target phone numbers. SCARLET EMPEROR denies service by call bombing targeted phones. SCRAPHEAP CHALLENGE spoofs messages from Blackberry devices. TANGLEFOOT determines whether a target is online. CHANGELING spoofs email addresses and permits phony messages to be sent from the addresses.

PREDATORS FACE is used to disrupt servers through denial of service attacks. STEALTH MOOSE disrupts Windows-based computers. SUNBLOCK denies a target the ability to send and receive email and to view content on the Internet. SWAMP DONKEY encrypts files on targeted computer systems making them inaccessible to the user. TORNADO ALLEY permits Excel spreadsheet documents to contain executable files that can be run on a target’s computer.

The ability to change the outcome of on-line polls was conducted by NUBILO in 2012 but UNDERPASS was on tap to replace it.

QUINCY is used to exploit seized media. The JTRIG document does notr explain what constitutes “seized media” but laptops, smart phones, and other devices are routinely seized not only as part of criminal investigations but by customs and immigration officials at U.S., British, Canadian, and other FIVE EYES border control points.

Programs listed under “Shaping and Honeypots” use various programs that appear designed to entrap targets with downloaded files and images. Images are hosted by PISTRIX. DEADPOOL is an NSA/GCHQ-provided URL shortening service. WURLITZER is used to distribute files to multiple websites.

Big Brother, which is not one of the JTRIG code-named programs, but should be, is alive and doing well in Cheltenham, England, and Fort Meade, Maryland.

Previously published in the Wayne Madsen Report.

Copyright © 2014 WayneMadenReport.com

Wayne Madsen is a Washington, DC-based investigative journalist and nationally-distributed columnist. He is the editor and publisher of the Wayne Madsen Report (subscription required).

One Response to FIVE EYES assault on social media

  1. Judy Stevens

    The oligarchy are the bankers who want this…and the government who are fearful of the people.