There was a new NSA scoop yesterday. It was very, very big. And it’s not getting nearly enough attention.
Strangely, the story which focuses on how NSA’s U.K. partner, the highly aggressive GCHQ surveillance agency, manipulate online sentiment and–when necessary–simply delete or DDoS attack Internet content they don’t want the rest of us to see (including Facebook posts), was weirdly disappeared from Reddit’s homepage and subsequent top ranking pages. And also a bit strange, the educational short video I made explaining these new NSA/GCHQ claims is now in its 8th hour of upload purgatory–despite doing a speed test and seeing full up/down broadband speeds and repeated attempts to upload it as a separate instance. Adversity being opportunity and all that, I figured it would be a good idea to get this information out as a post while the video is stuck.
The revelations, published by Glenn Greenwald in The Intercept and then summarized in The Guardian, include the disclosure of the following top secret programs:
• “Change outcome of online polls” (UNDERPASS)
• “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH)
• “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
• “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO)
• “Find private photographs of targets on Facebook” (SPRING BISHOP)
• “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE)
• “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM)
• “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR)
• “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
• “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE)
• “Ability to spoof any email address and send email under that identity” (CHANGELING)
• “For connecting two target phone together in a call” (IMPERIAL BARGE)
While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”