New July 14 Edward Snowden NSA Leaks GCHQ Attacks and Censors Internet

The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.

The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users.

But as the U.K. Parliament today debates a fast-tracked bill to provide the government with greater surveillance powers, one which Prime Minister David Cameron has justified as an “emergency” to “help keep us safe,” a newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc.

New July 14 Edward Snowden NSA Leaks GCHQ Attacks and Censors InternetThe “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities:

• “Change outcome of online polls” (UNDERPASS)

• “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH)

• “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)

• “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO)

• “Find private photographs of targets on Facebook” (SPRING BISHOP)

• “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE)

• “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM)

• “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR)

• “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)

• “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE)

• “Ability to spoof any email address and send email under that identity” (CHANGELING)

• “For connecting two target phone together in a call” (IMPERIAL BARGE)

While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”

And JTRIG urges its GCHQ colleagues to think big when it comes to internet deception: “Don’t treat this like a catalogue. If you don’t see it here, it doesn’t mean we can’t build it.”

The document appears in a massive Wikipedia-style archive used by GCHQ to internally discuss its surveillance and online deception activities. The page indicates that it was last modified in July 2012, and had been accessed almost 20,000 times.

GCHQ refused to provide any comment on the record beyond its standard boilerplate, in which it claims that it acts “in accordance with a strict legal and policy framework” and is subject to “rigorous oversight.” But both claims are questionable.

British watchdog Privacy International has filed pending legal action against GCHQ over the agency’s use of malware to spy on internet and mobile phone users. Several GCHQ memos published last fall by The Guardian revealed that the agency was eager to keep its activities secret not to protect national security, but because “our main concern is that references to agency practices (ie, the scale of interception and deletion) could lead to damaging public debate which might lead to legal challenges against the current regime.” And an EU parliamentary inquiry earlier this year concluded that GCHQ activities were likely illegal.

As for oversight, serious questions have been raised about whether top national security officials even know what GCHQ is doing. Chris Huhne, a former cabinet minister and member of the national security council until 2012, insisted that ministers were in “utter ignorance” about even the largest GCHQ spying program, known as Tempora—not to mention “their extraordinary capability to hoover up and store personal emails, voice contact, social networking activity and even internet searches.” In an October Guardian op-ed, Huhne wrote that “when it comes to the secret world of GCHQ and the [NSA], the depth of my ‘privileged information’ has been dwarfed by the information provided by Edward Snowden to The Guardian.”


New July 14 Edward Snowden NSA Leaks USNEWSGHOSTThe NSA Attacks, influences, and censors the Internet trying to control perception.

“At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”

The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.

Binney, who featured in a 2012 short film by Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government intrusion unlimited.

“The ultimate goal of the NSA is total population control” Whistleblower William Binne said to a confrence On July 5th


Engineering

Tool/System Description Status Contacts
Cerberus Statistics Collection Collects on-going usage information about how many users utilise JTRIG’s UIA capability, what sites are the most frequently visited etc. This is in order to provide JTRIG infrastucture and ITServices management information statistics. OPERATIONAL JTRIG Software Developers
JTRIG RADIANT SPLENDOUR is a ‘Data Diode’ connecting the CERBERUS network with GCNET OPERATIONAL JTRIG Software Developers
ALLIUM ARCH JTRIG UIA via the Tor network. OPERATIONAL JTRIG Infrastructure Team
ASTRAL PROJECTION Remote GSM secure covert internet proxy using TOR hidden services. OPERATIONAL JTRIG Infrastructure Team
TWILIGHT ARROW Remote GSM secure covert internet proxy using VPN services. OPERATIONAL JTRIG Infrastructure Team
SPICE ISLAND JTRIG’s new Infrastructure. FOREST WARRIOR, FRUIT BOWL, JAZZ FUSION and other JTRIG systems will form part of the SPICE ISLAND infrastructure DEV JTRIG Infrastructure Team
POISON ARROW Safe Malware download capability. DESIGN JTRIG Infrastructure Team
FRUIT BOWL CERBERUS UIA Replacement and new tools infrastructure – Primary Domain for Generic User/Tools Access and TOR split into 3 sub-systems. DESIGN JTRIG Infrastructure Team
NUT ALLERGY JTRIG Tor web browser – Sandbox IE replacement and FRUIT BOWL sub-system PILOT JTRIG Infrastructure Team
BERRY TWISTER A sub-system of FRUIT BOWL PILOT JTRIG Infrastructure Team
BERRY TWISTER+ A sub-system of FRUIT BOWL PILOT JTRIG Infrastructure Team
BRANDY SNAP JTRIG UIA contingency at Scarborough. IMPLEMENTATION JTRIG Infrastructure Team
WIND FARM R&D offsite facility. DESIGN JTRIG Infrastructure Team
CERBERUS JTRIG’s legacy UIA desktop, soon to be replaced with FOREST WARRIOR. OPERATIONAL JTRIG Infrastructure Team
BOMBAYROLL JTRIG’s legacy UIA standalone capability. OPERATIONAL JTRIG Infrastructure Team
JAZZ FUSION BOMBAY ROLL Replacement which will also incorporate new collectors – Primary Domain for Dedicated Connections split into 3 sub-systems. IMPLEMENTATION JTRIG Infrastructure Team
COUNTRY FILE A sub-system of JAZZ FUSION OPERATIONAL JTRIG Infrastructure Team
TECHNO VIKING A sub-system of JAZZ FUSION DESIGN JTRIG Infrastructure Team
JAZZ FUSION+ A sub-system of JAZZ FUSION DESIGN JTRIG Infrastructure Team
BUMBLEBEE DANCE JTRIG Operational VM/TOR architecture OPERATIONAL JTRIG Infrastructure Team
AIR BAG JTRIG Laptop capability for field operations. OPERATIONAL JTRIG Infrastructure Team
EXPOW GCHQ’s UIA capability provided by JTRIG. OPERATIONAL JTRIG Infrastructure Team
AXLE GREASE The covert banking link for CPG OPERATIONAL JTRIG Infrastructure Team
POD RACE JTRIG’S MS update farm DESIGN JTRIG Infrastructure Team
WATCHTOWER GCNET -> CERBERUS Export Gateway Interface System OPERATIONAL JTRIG Software Developers
REAPER CERBERUS -> GCNET Import Gateway Interface System OPERATIONAL JTRIG Software Developers
DIALd External Internet Redial and Monitor Daemon OPERATIONAL JTRIG Software Developers
FOREST WARRIOR Desktop replacement for CERBERUS DESIGN JTRIG Infrastructure Team
DOG HANDLER JTRIG’s development network DESIGN JTRIG Infrastructure Team
DIRTY DEVIL JTRIG’S research network DESIGN JTRIG Infrastructure Team

Collection

Tool Description Contacts Status
AIRWOLF YouTube profile, comment and video collection. ████████ Beta release.
ANCESTRY Tool for discovering the creation date of yahoo selectors. JTRIG Software Developers Fully Operational.
BEARTRAP Bulk retrieval of public BEBO profiles from member or group ID. JTRIG Software Developers Fully Operational.
BIRDSONG Automated posting of Twitter updates. JTRIG Software Developers Decommissioned. Replaced by SYLVESTER.
BIRDSTRIKE Twitter monitoring and profile collection. Click here for the User Guide. JTRIG Software Developers Fully Operational.
BUGSY Google+ collection (circles, profiles etc.) Tech Leads: █████████████ In early development.
DANCING BEAR obtains the locations of WiFi access points. [Tech Lead: ███████ Expert User: █████████████ Fully Operational.
DEVIL’S HANDSHAKE ECI Data Technique. [Tech Lead: ███████ Expert User: █████████████ Fully Operational.
DRAGON’S SNOUT Paltalk group chat collection. Tech Leads: ████████████████████████████████ Beta release.
EXCALIBUR acquires a Paltalk UID and/or email address from a Screen Name. JTRIG Software Developers Fully Operational (against current Paltalk version)
FATYAK Public data collection from Linkedln. [Tech Lead: ████████████████ In Development.
FUSEWIRE Provides 24/7 monitoring of Vbulliten forums for target postings/online activity. Also allows staggered postings to be made. JTRIG Software Developers
GLASSBACK Technique of getting a targets IP address by pretending to be a spammer and ringing them. Target does not need to answer. JTRIG Software Developers Fully Operational.
GODFATHER Public data collection from Facebook. [Tech Lead: ████████████████ Fully Operational.
GOODFELLA Generic framework for public data collection from Online Social Networks. [Tech Lead: ████████████████ In Development (Supports RenRen and Xing).
HACIENDA is a port scanning tool designed to scan an entire country or city. It uses GEOFUSION to identify IP locations. Banners and content are pulled back on certain ports. Content is put into the EARTHLING database, and all other scanned data is sent to GNE and is available through GLOBAL SURGE and Fleximart. NAC HACIENDA Taskers Fully Operational.
ICE is an advanced IP harvesting technique. JTRIG Software Developers
INSPECTOR Tool for monitoring domain information and site availability JTRIG Software Developers Fully Operational.
LANDING PARTY Tool for auditing dissemination of VIKING PILLAGE data. JTRIG Software Developers Fully Operational.
MINIATURE HERO Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists. JTRIG Software Developers Fully operational, but note usage restrictions.
MOUTH Tool for collection for downloading a user’s files from Archive.org. JTRIG Software Developers Fully Operational.
MUSTANG provides covert access to the locations of GSM cell towers. [Tech Lead: ███████ Expert User: █████████████ Fully Operational.
PHOTON TORPEDO A technique to actively grab the IP address of MSN messenger user. Tech Lead: █████████████ Operational, but usage restrictions.
RESERVOIR Facebook application allowing collection of various information. JTRIG Software Developers Fully operational, but note operational restrictions.
SEBACIUM An ICTR developed system to identify P2P file sharing activity of intelligence value. Logs are accessible via DIRTY RAT. [Tech Lead: ███████ Expert User: █████████████
SILVER SPECTER Allows batch Nmap scanning over Tor. JTRIG Software Developers In Development.
SODAWATER A tool for regularly downloading gmail messages and forwarding them onto CERBERUS mailboxes JTRIG Software Developers Fully Operational.
SPRING BISHOP Find private photographs of targets on Facebook. Tech Lead: ████████████████████████
SYLVESTER Framework for automated interaction / alias management on online social networks. Tech Lead: ████████████████████████ In Development.
TANNER A technical programme allowing operators to log on to a JTRIG website to grab IP addresses of Internet Cafe’s. JTRIG OSO Replaced by HAVOK.
TRACER FIRE An Office Document that grabs the targets Machine info, files, logs, etc and posts it back to GCHQ. █████████████ TRACER FIRE JTRIG In Development.
VIEWER A programme that (hopefully) provides advance tip off of the kidnappers IP address for HMG personnel. Operational, but awaiting field trial.
VIKING PILLAGE Distributed network for the automatic collection of encrypted/compressed data from remotely hosted JTRIG projects. PILLAGE JTRIG Software Developers Operational.
TOP HAT A version of the MUSTANG and DANCING BEAR techniques that allows us to pull back Cell Tower and WiFi locations targeted against particular areas. [Tech Lead: ████████████████████████ In Development.

Effects Capability

JTRIG develop the majority of effects capability in GCHQ. A lot of this capability is developed on demand for specific operations and then further developed to provide weaponised capability.

Don’t treat this like a catalogue. If you don’t see it here, it doesn’t mean we can’t build it. If you involve the JTRIG operational teams at the start of your operation, you have more of a chance that we will build something for you.

For each of our tools we have indicated the state of the tool. We only advertise tools here that are either ready to fire or very close to being ready (operational requirements would re-prioritise our development). Once again, involve the JTRIG operational teams early.

Tool Description Status Contacts
ANGRY PIRATE is a tool that will permanently disable a target’s account on their computer. Ready to fire (but see target restrictions). [Tech Lead: █████████████ Expert User: ████████
ARSON SAM is a tool to test the effect of certain types of PDU SMS messages on phones / network. It also includes PDU SMS Dumb Fuzz testing Ready to fire (Not against live targets, this is a R&D Tool). [Tech Lead: █████████████ Expert User:]
BUMPERCAR+ is an automated system developed by JTRIG CITD to support JTRIG BUMPERCAR operations. BUMPERCAR operations are used to disrupt and deny Internet-based terror videos or other materials. The technique employs the services provided by upload providers to report offensive materials. Ready to fire. JTRIG Software Developers
BOMB BAY is the capability to increase website hits/rankings. In Development. [Tech Lead: █████████████
BADGER mass delivery of email messaging to support an Information Operations campaign Ready to fire. JTRIG OSO
BURLESQUE is the capabiltiy to send spoofed SMS text messages. Ready to fire. JTRIG OSO
CANNONBALL is the capability to send repeated text messages to a single target. Ready to fire. JTRIG OSO
CLEAN SWEEP Masquerade Facebook Wall Posts for individuals or entire countries. Ready to fire (SIGINT sources required) [Tech Lead: █████████████ Expert User:
CLUMSY BEEKEPER Some work in progress to investigate IRC effects. NOT READY TO FIRE. [Tech Lead: █████████████ Expert User: ████████
CHINESE FIRECRACKER Overt brute login attempts against online forums Ready to fire. FIRECRACKER
CONCRETE DONKEY is the capability to scatter an audio message to a large number of telephones, or repeatedly bomb a target number with the same message. In development. ████████████
DEER STALKER Ability to aid-geolocation of Sat Phones / GSM Phones via a silent calling to the phone. Ready to fire. [Tech Lead: █████████████ Expert User: ████████████████
GATEWAY Ability to artificially increase traffic to a website. Ready to fire. JTRIG OSO
GAMBIT Deployable pocket-sized proxy server In-development JTRIG OSO
GESTATOR amplification of a given message, normally video, on popular multimedia websites (Youtube). [Tech Lead: ?, Expert User: ████████████████
GLITTERBALL Online Gaming Capabilities for Sensitive Operations. Currently Second Life. In development.
IMPERIAL BARGE For connecting two target phone together in a call. Tested. [Tech Lead: ████████████ Expert User: █████████
PITBULL Capability, under development, enabling large scale delivery of a tailored message to users of Instant Messaging services. In development.
POISONED DAGGER Effects against Gigatribe. Built by ICTR, deployed by JTRIG. Tech Lead: ████████████████
PREDATORS FACE Targeted Denial Of Service against Web Servers. Tech Lead: ████████████████
ROLLING THUNDER Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG. Tech Lead: ████████████████
SCARLET EMPEROR Targeted denial of service against targets phones via call bombing. Ready to fire. JTRIG Software Developers
SCRAPHEAP CHALLENGE Perfect spoofing of emails from Blackberry targets. Ready to fire, but see constraints. ██████████████████████████
SERPENTS TONGUE for fax message broadcasting to multiple numbers. In redevelopment. [Tech Lead: ████████████ Expert User: █████████
SILENT MOVIE Targeted denial of service against SSH services. Ready to fire. Tech Lead: ███████████████████
SILVERBLADE Reporting of extremist material on DAILYMOTION. Ready to fire. [Tech Lead: ██████████ Expert User: █████████████
SILVERFOX List provided to industry of live extremist material files hosted on FFUs. Ready to fire. [Tech Lead: ██████████ Expert User: █████████████
SILVERLORD Disruption of video-based websites hosting extremist content through concerted target discovery and content removal. Ready to fire. [Tech Lead: ██████████ Expert User: █████████████
SKYSCRAPER Production and dissemination of multimedia via the web in the course of information operations. Ready to fire. [Tech Lead: Section X; Expert Users: Language Team]
SLIPSTREAM Ability to inflate page views on websites Ready to fire. JTRIG OSO
STEALTH MOOSE is a tool that will Disrupt target’s Window’s machine. Logs of how long and when the effect is active. Ready to fire (but see target restrictions). [Tech Lead: ██████████ Expert User: ]
SUNBLOCK Ability to deny functionality to send/receive email or view material online. Tested, but operational limitations. [Tech Lead: Section X; Expert User ████████████████
Swamp donkey is a tool that will silently locate all predefined types of file and encrypt them on a targets machine. Ready to fire (but see target restrictions). [Tech Lead: █████████████ Expert User: █████████████████
TORNADO ALLEY is a delivery method (Excel Spreadsheet) that can silently extract and run an executable on a target’s machine. Ready to fire (but see target restrictions). [Tech Lead: █████████████ Expert User: █████████████████
UNDERPASS Change outcome of online polls (previously known as NUBILO) In development. [Tech Lead: Section X; Expert User ████████████████
VIPERS TONGUE is a tool that will silently Denial of Service calls on a Satellite Phone or a GSM Phone. Ready to fire (but see target restrictions). [Tech Lead: Section X; Expert User ████████████████
WARPATH Mass delivery of SMS messages to support an Information Operations campaign Ready to fire. JTRIG OSO

Work Flow Management

Tool Description Contacts
HOME PORTAL A central hub for all JTRIG Cerberus Tools JTRIG Software Developers
CYBER COMMAND CONSOLE A centralised suite of tools, statistics and viewers for tracking current operations across the Cyber community. JTRIG Software Developers
NAMEJACKER A web service and admin console for the translation of usernames between networks. For use with gateways and other such technologies. JTRIG Software Developers

Analysis Tools

Tool Description Contacts
BABYLON is a tool that bulk queries web mail addresses and verifies whether they can be signed up for. A green tick indicates that the address is currently in use. Verification can currently be done for Hotmail and Yahoo. JTRIG Software Developers
CRYOSTAT is a JTRIG tool that runs against data held in NEWPIN. It then displays this data in a chart to show links between targets. JTRIG Software Developers
ELATE is a suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk). These tools are hosted on an Internet server, and results are retreived by encrypted email. JTRIG Software Developers
PRIMATE is a JTRIG tool that aims to provides the capability to identify trends in seized computer media data and metadata. JTRIG Software Developers
JEDI JTRIG will shortly be rolling out a JEDI pod to every desk of every member of an Intelligence Production Team. The challenge is to scale up to over 1,200 users whilst remaining agile, efficent and responsive to customer needs. [Tech Lead: ██████████ Expert User: █████████████
JILES is a JTRIG bespoke web browser. [Tech Lead: ██████████ Expert User: ]
MIDDLEMAN is a distributed real-time event aggregation, tip-off and tasking platform utilised by JTRIG as a middleware layer. JTRIG Software Developers
OUTWARD is a collection of DNS lookup, WHOIS Lookup and other network tools. JTRIG Software Developers
TANGLEFOOT is a bulk search tool which queries a set of online resources. This allows analysts to quickly check the online presence of a target. JTRIG Software Developers
SCREAMING EAGLE is a tool that processes kismet data into geolocation information
SLAMMER is a data index and repository that provides analysts with the ability to query data collected from the Internet from various JTRIG sources, such as EARTHLING, HACIENDA, web pages saved by analysts etc. JTRIG Software Developers

Databases

Tool Description Contacts
BYSTANDER is a categorisation database accessed via web service. JTRIG Software Developers
CONDUIT is a database of C2C identifiers for Intelligence Community assets acting online, either under alias or in real name. JTRIG Software Developers
NEWPIN is a database of C2C identifiers obtained from a variety of unique sources, and a suite of tools for exploring this data. JTRIG Software Developers
QUINCY is an enterprise level suite of tools for the exploitation of seized media. [Tech Lead: ███████ Expert User: ████████████████████

Forensic Exploitation

Tool Description Contacts
BEARSCRAPE can extract WiFi connection history (MAC and timing) when supplied with a copy of the registry structure or run on the box. [Tech Lead: ████████ Expert User: ]
SFL The Sigint Forensics Laboratory was developed within NSA. It has been adapted by JTRIG as its email extraction and first-pass analysis of seized media solution. [Tech Lead: ███████████████████████ Expert User: █████████████
Snoopy is a tool to extract mobile phone data from a copy of the phone’s memory (usually supplied as an image file extracted through FTK. [Tech Lead: ████████████
MobileHoover is a tool to extract data from field forensics’ reports created by Celldek, Cellebrite, XRY, Snoopy and USIM detective. These reports are transposed into a Newpin XML format to upload to Newpin. [Tech Lead: ███████████████████████
Nevis is a tool developed by NTAC to search disk images for signs of possible Encryption products. CMA have further developed this tool to look for signs of Steganography. [Tech Lead: ███████████████████████

Techniques

Tool Description Contacts
CHANGELING Ability to spoof any email address and send email under that identify JTRIG OSO
HAVOK Real-time website cloning techniques allowing on-the-fly alterations. JTRIG OSO
MIRAGE JTRIG OSO
SHADOWCAT End-toEnd encrypted access to a VPS over SSH using the TOR network JTRIG OSO
SPACE ROCKET is a programme covering insertion of media into target networks. CRINKLE CUT is a tool developed by ICTR-CISA to enable JTRIG track images as part of SPACE ROCKET. Tech Lead: ███████████████████████ Expert User:
RANA is a system developed by ICTR-CISA providing CAPTCHA-solving via a web service on CERBERUS. This is intended for use by BUMPERCAR+ and possibly in future by SHORTFALL but anyone is welcome to use it. Tech Lead: ███████████████████████ Expert User:
LUMP A system that finds the avatar name from a SecondLife AgentID JTRIG Software Developers
GURKHAS SWORD Beaconed Microsoft Office Documents to elicite a targets IP address. JTRIG Software Developers

Shaping and Honeypots

Tool Description Contacts
DEADPOOL URL shortening service JTRIG OSO
HUSK Secure one-on-one web based dead-drop messaging platform JTRIG OSO
LONGSHOT File-upload and sharing website JTRIG OSO
MOLTEN-MAGMA CGI HTTP Proxy with ability to log all traffic and perform HTTPS Man in the Middle. JTRIG OSO
NIGHTCRAWLER Public online group against dodgy websites JTRIG OSO
PISTRIX Image hosting and sharing website JTRIG OSO
WURLITZER Distribute a file to multiple file hosting websites. █████████████████

More Edward Snowden NSA LEAKS USNEWSGHOST

Sources: https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ , http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the-nsa-is-total-population-control , https://www.schneier.com/gchq-catalog.html

UNDERPASS, BADGER, WARPARTH, SILVERLORD, SkypeOut, SkypetoSkype, MINIATURE HERO, SPRING BISHOP, ANGRY PIRATE, GATEWAY, SLIPSTREAM, GESTATOR, PREDATORS FACE, ROLLING THUNDER, ELATE, CHANGELING, IMPERIAL BARGE

 

Advertisements

6 thoughts on “New July 14 Edward Snowden NSA Leaks GCHQ Attacks and Censors Internet

  1. Pingback: Edward Snowden NSA Leaks News | PicNews

  2. Pingback: FW: Dangers of using the Internet when discussing politics – Rex C. – Do you feel manipulated – YET ? |

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s