What Exactly Are the Spy Agencies Actually DOING with their Bag of Dirty Tricks?

Note: Update below …


Newly-released documents from Edward Snowden show that the British spy agency GCHQ has developed numerous offensive digital tools.

But what exactly are they doing with these dirty tricks?

We think it’s important to think through the specific possibilities, in order to gain an understanding of how pernicious these manipulations can be.

We quote verbatim (in black) the names and descriptions of some of these tools – some of which Glenn Greenwald didn’t highlight in his report.  We then provide descriptions in blue of potential misuses of such tools.

Then we discuss how likely such misuses really are.


Here are the actual dirty tricks in the British spy agencies toolkit, with hypothetical examples of potential misuses …

CHANGELING: Ability to spoof any email address and send email under that identity. Fake an email from a privacy advocate to make it look like he’s proposing terrorism.

SCRAPHEAP CHALLENGE: Perfect spoofing of emails from Blackberry targets. Fake an email from an opponent of  bailouts to the giant banks to make it look like she’s planning to bomb a bank.

BURLESQUE: The capacity to send spoofed SMS messages. Fake a message from an an anti-war writer to make it look like he’s planning to sabotage a military base.

IMPERIAL BARGE : For connecting two target phone together in a call. Fake a telephone connection to make it look like a critic of the president’s policies spoke with a leader of Al Qaeda.

BADGER : Mass delivery of email messaging to support an Information Operations campaign. Send out a fake, mass email pretending to be from a prominent whistleblower “admitting” that he’s mentally unstable, disgruntled, dishonest, vindictive and a Russian spy.

WARPATH: Mass delivery of SMS messages to support an Information Operations campaign.  Send out a fake, mass message from a targeted group calling for the murder of all Christians and Jews.

SPACE ROCKET: A programme covering insertion of media into target networks. Insert a video of underage girls on a whistleblower website. 

CLEAN SWEEP Masquerade Facebook Wall Posts for individuals or entire countries. Put up a bunch of fake wall posts calling for jihad on the Facebook page of a reporter giving first-hand reports of what’s really happening in a country that the U.S. has targeted for regime change.

HAVOK Real-time website cloning technique allowing on-the-fly alterations. Hack the website of a state politician who insists the government must respect the Constitution,  and post fake demands for a violent march on Washington, D.C.

SILVERLORD: Disruption of video-based websites hosting extremist content through concerted target discovery and content removal. Disrupt websites hosting videos espousing libertarian views.

SUNBLOCK: Ability to deny functionality to send/receive email or view material online. Block emails to reporters and the web functionality of a government insider who is about to go public on wrongdoing.

ANGRY PIRATE: A tool that will permanently disable a target’s account on their computer. Disable the accounts of a leading opponent of genetically modified foods.

PREDATORS FACE: Targeted Denial Of Service against Web Servers. Take down a website which is disclosing hard-hitting information on illegal government actions.

UNDERPASS: Change outcome of online polls. Change the results of an online poll from one showing that the American people overwhelmingly oppose a new war which is unnecessary for the defense of America’s national security to showing support for it.

GATEWAY: Ability to artificially increase traffic to a website. Make a website calling for more surveillance against the American people appear hugely popular.

BOMB BAY: The capacity to increase website hits, rankings. Make it look like a site praising praising Al Qaeda is popular among a targeted local population, when the locals actually despise violent Islamic fundamentalists.

SLIPSTREAM: Ability to inflate page views on websites. Make it appear that an article saying that the Constitution is “outdated” and “unrealistic in the post-9/11 world” is widely popular.

GESTATOR: Amplification of a given message, normally video, on popular multimedia websites (Youtube). Make a propaganda video – saying that Dear Leader will always help and protect us – go viral.


We don’t know which of the above hypothetically forms of misuse are actually occurring. However, as we wrote in February:

We’ve warned since 2009 (and see this) that the government could be launching cyber “false flag attacks” in order to justify a crackdown on the Internet and discredit web activists.

A new report from NBC News – based on documents leaked by Edward Snowden – appear to confirm our fears, documenting that Britain’s GCHQ spy agency has carried out cyber false flag attacks:

In another document taken from the NSA by Snowden and obtained by NBC News, a JTRIG official said the unit’s mission included computer network attacks, disruption, “Active Covert Internet Operations,” and “Covert Technical Operations.” Among the methods listed in the document were jamming phones, computers and email accounts and masquerading as an enemy in a “false flag” operation. The same document said GCHQ was increasing its emphasis on using cyber tools to attack adversaries.

Later that month, we noted:

A new report from NBC News shows that the British spy agency used “false flag attacks” and other dirty tricks:

British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”


The agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.

Sound familiar? It should:

Between 1956 and 1971, the FBI operated a program known as COINTELPRO, for Counter Intelligence Program. Its purpose was to interfere with the activities of the organizations and individuals who were its targets or, in the words of long-time FBI Director J. Edgar Hoover, to “expose, disrupt, misdirect, discredit or otherwise neutralize” them.

NBC continues:

[The agency] also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.


JTRIG used negative information to attack private companies, sour business relationships and ruin deals.


Changing photos on social media sites and emailing and texting colleagues and neighbors unsavory information.

And reporter Glenn Greenwald noted that Snowden documents showed:

Western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction.


These agencies are attempting to control, infiltrate, manipulate, and warp online discourse …. Among the core self-identified purposes … are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.


The discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes…. no conceivable connection to terrorism or even national security threats.


Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell”, devoted to “online human intelligence” and “strategic influence and disruption”….***

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack”, while dissecting how human beings can be manipulated using “leaders”, “trust, “obedience” and “compliance”:

The U.S. government is also spending millions to figure out how to manipulate social media to promote propaganda and stifle dissenting opinions. And see this and this.

And any criticism of government policies is now considered “extremist” and potential terrorism. According to Department of Defense training manuals, all protest is now considered “low-level terrorism”. And see this, this and thisQuestioning war is considered extremism. The government also considers anyone who tries to protect himself from government oppression and to claim his Constitutional rights a “extremist”. This is not entirely new … the CIA director in 1972. Indeed – for 5,000 years straight – mass surveillance of one’s own people has always been used to crush dissent.

The NSA is now also collecting and retaining the most intimate personal details of Americans, including nude and suggestive pictures and medical and financial records … even though they admittedly have no conceivable security value.

You may think you have “nothing to hide”, but you’re breaking the law numerous times every day … without even knowing it (update).

Indeed, top NSA whistleblowers say that the NSA is blackmailing and harassing opponents with information that it has gathered – potentially even high-level politicians – just like FBI head J. Edgar Hoover blackmailed presidents and Congressmen.

Moreover, if the NSA takes a dislike to someone, it can frame them. This has been CONFIRMED by top NSA whistleblowers.

And the following facts make it likely that British and U.S. spy agencies are misusing their powers:

Update: NSA whistleblower Russel Tice – a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping, and who used to work in “black ops” – tells Washington’s Blog after reading this post:

My biggest fear has been that Black World programs that I specialized in would be turned against the American people. I do not confirm or deny want I see in your piece, but you are now starting to think like a Black World operations officer. I do not know of any case where such capabilities have definitively been used directly against U.S. Citizens, but I have not been privy to their targeting for over ten years now.

But I have to congratulate you on thinking out of the strict technology box and thinking “for what purpose.”

Postscript:  We don’t know whether or not the spy agencies are misusing their bag of tricks in the specific ways discussed above (in blue).  The whole point is that they have been caught lying time and again about what they’re doing, they’re running amok with no oversight, and the fact that they could be targeting government critics in exactly these ways shows how bad things have become.

This entry was posted in Politics / World News, Science / Technology. Bookmark the permalink.
  • This is my second comment at here at washingtonsblog, I’m new here, but this article relates to my first comment of two hours ago so strongly it deserves an echo from me. I fequently comment at Jim Kunstler’s Blog which is heavily infested with sock puppets. A year and a half ago I learned by watching a ‘Status Counter’ which showed traffic to Kunstler’s site. I have one just like it on my own blog (http://chasingthesquirrel.com/). It is very useful. I saw the Department of Defence Network dominating his site using sock puppets and using the dirty tricks described above.

    I published a time stamp which documented the DoD interference on Kunstler’s blog which coincided with the most annoying puppet there. I did this as a comment on Kunstler’s blog.

    For finding out our government is secretly disrupting web discussion I became a target and have been severely harassed.

    The sock puppets are still at the blog if you want to see them at work.

  • I augment my previous comment with Jim Kunstler’s blog address. (http://kunstler.com/)

  • colinjames71

    And it’s not like they are going to develop these technologies and strategies and NOT use them. As far as the sock puppets go, generally they’re pretty easy to spot, but what really gets to me is that it sows so much distrust among people, you always have to be on your guard, and you have to wonder if the person you’ve talking to is an actual person. I hope to see a study on this someone soon, concerning self-censorship, levels of mistrust and suspicion, changes in people’s online habits with comments and engaging in discussion with unfamiliar people on doors they regularly visit, things like that. But then again, how can you trust the results of the poll if it’s online? See what I mean?

  • Yes colinjames71. It totally destroys trust and with trust gone you begin feeling down because the world has become a cold impersonal place. You feel powerless before the totalitarian domination and cruel power. Sock puppetry is a poison that must be stopped. It is ruining the ability of our country to respond to events and make much needed changes to survive into the future. It insidiously destroys democracy and rots away rule by consensus of any kind of as it advances tyranny.

    I sense you are also someone who has also seen it working first-hand.

  • Lou Hodges

    My former husband has been at the NSA for 40 plus years. He was recruited by the KGB in 1976 at UC DAvis Russian Department. The KGB from Georgia was pissed at Moscow, and advised the NSA on their spying. The Muslim Brotherhood was also on the Davis campus with them. They gave him total immunity from criminal prosecution as part of the deal. I got a divorce. He lied on his clearance checks and applications, put a wiretap on my mother’s phone, cut deals with the courts that allowed him to get out of child support payments, destroyed my public records, lied about me to investigators, and put my name on a Federal database telling his friends to arrest me – AND NOT ONE NEWS AGENCY IS WILLING TO RUN THE STORY BECAUSE THEY’RE ALL ON THE NSA PAYROLL, AND THAT INCLUDES WND, ALEX JONES, BREITBART, AND THE BLAZE. The big question, is WHO ARE YOU?

    • not authorized

      Eh? If this is true, go sue him then. Ask for a Grand Jury via Title 18 3332. Basically violations of Title 18 USC 241,242. Title 42 USC 1983, 1985-1986.

      • If you try and report what is happening to the FBI they will laugh their asses off because they already know what is going on; they are involved. But you won’t know about any of that yet. What you will know is that in their response to you they will tell you they are too busy solving other crimes to help you out.

        That’s how their official response went for me.

        • not authorized

          Eh? Get an attorney and request it gets seen by a grand jury. Title 18 USC 3332. Learn your history.

          • Remember to wave at them and smile for the camera as you walk to your attorneys office. If your attorney is down-town there will be plenty of surveillance on you. Don’t worry about where the cameras are, they will be there. And if you are in Seattle there are many floors in the same building where the American Civil Liberties Union is located where elevators won’t stop without a key. And the ACLU won’t have the budget or time to help you out.

            Good luck finding an attorney to help you out. What are you going to do? Find one on the internet? Do they have a special category for attorneys that will fight the government for you? Are they in the yellow pages? Do you even have the yellow pages any more?

            Everything you are reading here has already been read by government agents working for homeland security and if you want to know if you are being watched have a bookmark ready and suddenly jump to my website or one like it with a tracking globe. You may be lucky (or unlucky) enough to see a few website visitors suddenly ‘disappear’ from the tracking globe you show up on. Website visitors from the District of Columbia or simply marked as ‘UNITED STATES’ with no ISP or location identifications. They will stand out from the pack of normal visitors with ISPs and defined locations. They did for me yesterday. They popped up on my tracking globe and were gone within three seconds. Two of them.

            When you make ‘the list’ your web surfing is watched and tracked. If ‘they’ want to modify your behaviour they may or may not make you aware of what is happening to you. It depends on what ‘they’ are trying to do to you; but the idea that all they do is watch is brain dead stupid.

            And expect your taxes for last year to be reviewed and any ‘problems’ found brought to your attention so you can ‘fix’ them or pay what you owe with penalties of course. Isn’t that nice. Me, I got a $12,000 bill for taxes I didn’t owe. All it took was some letters to the IRS to straighten things out but it was a big inconvenient hassle. Just like getting new credit cards to replace the ones cancelled “for your protection” is a inconvenient hassle.

            The more hassles they give you the better for them. It could be enough to drive you crazy, and that is no coincidence. At the very least it will distract and derail your actions, and if they can get you drooling under a highway overpass muttering about a gov-mint conspiracy to control and dominate the internet so everyone walks around you ignoring your crazy unkempt ass it will be called:

            ‘Mission Accomplished’

          • And what I mentioned about the tracking globe my traces from yesterday are still there. I’ll cut and paste them here.

            Yesterday turned out to be the day before yesterday, forgive my confusion.

            14 Jul 08:15:24 IE 9.0 Win7 1024×819
            Washington, District of Columbia, United States Sprint (

            14 Jul 08:14:37 IE 9.0 Win7 1024×819
            Washington, District of Columbia,
            United States Sprint (

            14 Jul 08:12:35 Safari 5.1 MacOSX 1440×900
            United States Viasat Communications (

            14 Jul 08:10:25 Opera 22.0 Win7 1280×1024
            Wenatchee, Washington, United States Localtel Communications (

            14 Jul 08:08:20 Safari 5.1 MacOSX 1440×900
            United States Viasat Communications (

            I know who the Wenatchee record belongs to; we email each other. The others are best understood in context to the rest of the traffic shown on the page where I got the traffic documented here. This you can easily do.

            Does the above ‘prove’ anything? Not to you really, at least it shouldn’t. But circumstantial evidence over time makes a case for by repetition and time the probability of circumstantial evidence being an accident goes to zero. And in my life I’ve experienced enough repetition and time for the probability to be zero.

            The times for the 14th don’t quite describe the common scenario I described previously. On the 14th I had made a link to a blog post I had recently written in a comment I made elsewhere. I then quickly opened my website to see who showed up.

            Right away my fans from DC and the UNITED STATES showed up.

            Relating my other scenario prompted me to document what happend to me the day before yesterday here.

          • not authorized

            Ever wonder if this is happening to get your attention? I have, quite a bit recently.

            Obama did fundamentally change America. He is making us reflect who we are, and where we are going.

            Where are were going?

    • I tried conventional news agencies but they have been trained not to have anything to do with you unless you have an ’email’ history with them. But by the time you are ready to inform news agencies ‘funny’ things have been happening with your email and you already know that your means of communication are compromised. Some emails have been scrambled and you know better than to describe what the government is doing to you in an email.

      But as you won’t incriminate yourself in an email you must be crazy. I can well imagine the ‘training’ conventional news agencies must have received to help identify ‘terrorists’ so to do their part to advance homeland security and the safety of the motherland.

  • not authorized

    We need to make it a requirement, as part of the United Nations, to have a fully written constitution protecting equal rights and human dignity.

    • Inconsistencies

      Words on paper will never “protect equal rights and human dignity”.

      • not authorized

        Bullshit. I have higher hopes for humanity than you do.

    • Here is the best requirement it is useful for you and big advantage Get
      Home Online Services

    • Thomas

      Very true. Protection should be safeguard right from UN and it will be easy to run
      Seat covers

  • If you experience gang stalking it may be helpful for you to know that they are using your phone to track your location. That is how they put people in black pants and bright white shirts where you want to go before you get there. They have your history, habits and location.

    But stop carrying your smart-phone and their ability to know where you are going ahead of time is severely compromised and ‘gang stalking’ stops.

  • therealamericro

    Thanks to American hero Edward Snowden, it is an established fact that the NSA sucks up just about everything outside the US and most of things inside the US.

    When it can’t do it in the US, it outsources to GCHQ and JTRIG.

    The use of online false flags has already taken place namely, the Stratfor hack, its purpose, the demise of General Petreus: http://whowhatwhy.com/2014/06/25/classicwho-why-petraeus-takedown-may-have-been-an-inside-job/.

    Also dumping corrupted files to Wikileaks (which the Syria government hack did as that was also a Sabu-led online false flag: http://www.ibtimes.co.uk/fbi-informant-sabu-organises-cyber-attacks-government-websites-iran-syria-brazil-1445885), to justify Western intervention on behalf of Al Qaida and Islamic extremists who want to exterminate the entire Alawite, Christian and Shia minorities.

    Also, as the Snowden leaks revealed, Wikileaks was and is under constant electronic surveillance

    Considering Sabu was directing the online media campaign against Stratfor (which was almost certainly under FBI and various US and UK intelligence agency direction, in direct violation of the Smith Mundt Act which was before its 2012 “reform,” which restricted domestic propaganda), regurgitating what the FBI and other US / UK intelligence agencies told him to say and disseminate to LulzSec and AntiSec, it is certain that the LulzSec/AntiSec online media campaign before, during
    and after the hack, was also a FBI and US / UK agency agitprop campaign to drive visitors to Wikileaks for monitoring (see slides 4 and 13 in the GCHQ slide show on online false flags:

    The Stratfor online false flag and FBI, and other US / UK intelligence agency strategic information dump had many other aspects – it entrapped the online activist Jeremy Hammond whose hacks under Sabu (read: FBI, see here: http://www.dailydot.com/politics/hammond-sabu-fbi-stratfor-hack/, here:
    http://www.activistpost.com/2012/03/anonymous-hackedwikileaks-released.html, here:
    http://www.crikey.com.au/2012/03/08/federal-bureau-of-facilitation-what-was-the-fbi-doing-with-stratfor-and-wikileaks/, and here: http://nigelparry.com/news/sacrificing-stratfor.shtml).

    The hack also nabbed the anti-Orwellian treasonous pansy police state journalist Barrett Brown for pasting a link that the FBI monitored and materially assisted (they provided the server that the emails sat on for nearly three weeks) hack made available, which it would not have been were it not for the FBI and likely multiple other US and UK intelligence agencies’ hack of Stratfor in the first place, and for thought crimes after threatening (empty threats) the agents who threatened him and his mother on youtube (which led to his indefinite detention for over two years as well as a gag order). The hack also created a divide in Anonymous (http://readwrite.com/2011/12/26/malicious_hackers_play_robin_hood_anonymous_disavo), it nabbed UK anonymous members (seen here: http://news.sky.com/story/1457/lulzsecs-top-hacker-is-fbi-double-agent), further supporting the role of UK intelligence agencies as well as multiple US intelligence agencies, as the FBI target list of over 2,000 targets were all outside of the FBI’s jurisdiction and almost certainly
    handed to them by other agencies, see the Daily Dot article above.

    The entire Stratfor hack is literally timelined and explained, play by play, in the Feb. 24, 2014 Intercept article linked by Washingtonsblog (here: https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/).

    Relevant links supporting all of this:































    The bigger the lie (or Haversack Ruse, see slide 13 in the Feb. 24, 2014 Intercept article), the more likely people will believe it.

  • therealamericro

    I would like to draw Washington’s Blog and its readers attention to the latest trampling of rights, in Australia: http://www.theguardian.com/world/2014/jul/17/tony-abbott-media-not-endanger-security.

    Here we have another Five Eyes Orwellian democracy threatening journalists for – doing their job – under the guise of protecting “national security” (sound familiar?).

    As we all know, whistleblowing on government waste is considered “treason” by the Jawol Mein Fuhrer and Da Druzhe Stalin men and women of the Orwellian pansy police state the US and its Five Eyes allies created post-9/11, as well as by their Operation Mockingbird media shills (http://carlbernstein.com/magazine_cia_and_media.php).

    Glenn Greenwald, Jeremy Scahill, Laura Poitras – “traitors” to the police state and its compromised, and or half-witted defenders. If not “traitors,” then at a minimum, Al Qaida sympathizers and or “terrorist helpers” (the irony in that ad hominem of course is that Western intelligence created Al Qaida in the first place, and it has armed and funded it in Syria and Libya, and the haystack the pansy police state obsessively makes bigger with bulk surveillance directly aids and abets terrorism as the Boston Bombing shows – NSA bulk surveillance did nothing to prevent that despite forewarning from Russia’s FSB and the brothers allegedly sending pro-Jihadi emails and making pro-Jihadi FB posts).

    To the MSM’s credit, it does give some of them air time within the US on occassion.

    William Binney, Thomas Drake, John Kiriakou, Jessyln Raydack – “traitors.” They get no MSM coverage save foreign MSM organizations because their knowledge and facts are – “dangerous.”

    Nearly no MSM coverage or interviews within the US – the fallacy of suppressed evidence in bulk and at writ to keep US citizens safe – from the truth.

    The expose’s in Glenn Greenwald’s pieces, including this last one on the dirty tricks, which Washington’s Blog has done a fine job of expounding on, demonstrates that for years, much of what we have seen happen on the web and in the news has been online false flags, a la Cass Sustein’s cognitive infiltration method, and manipulation of events and facts to generate perceptions.

    Take Wikileaks, for instance, and the if not demise, then major weakening of the Anonymous movement in 2012.

    Wikileaks was branded more or less as a “terrorist organization” and threat to “national security” as soon as it went online.

    The entire sexual assault saga involving Assange was nothing more than a discrediting operation – at the expense of not just Julian Assange, but of US and UK taxpayers as it has run into the millions for both.

    Not to mention the endless surveillance of Wikileaks itself
    (https://firstlook.org/theintercept/article/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/) by the US / UK / Five Eyes online Ministry of Truth, another monstrous waste of tax dollars to monitor a group and the search terms, and IP addresses of those who visit it. This is helping fight terrorism how again?

    The US and UK governments knew that both allegedly raped parties had sent texts to him afterwards – texts that entirely exonerated Assange. They had those texts – as they had him under a microscope for years, ASIO almost certainly from his youthful hacking days on – and chose to ignore them and continue wasting tax dollars on a personality and by default, organizational discrediting campaign.

    The reason: they wanted to keep up the whole “threat” Wikileaks posed to clamp down on the internet, and of course tie it to alleged sexual deviancy so as to frame all Wikileaks volunteers, supporters, donors and visitors as such, or at least supporters of a “rapist.”

    Typical guilt by association discrediting by out of control governments.

    Now, considering that:

    a) Chelsea Manning joined the Army and became an intelligence analyst after XKeyscore was not just invented but placed on every single computer in the civilian and military intelligence community;
    b) The government obviously monitored every keystroke of Manning and watched everything take place real time as his computer almost certainly had XKeyscore, and he was flagged due to his political views, sexuality issues, and of course because he allegedly assaulted his commanding officer;
    c) The government’s evidence against Manning at the Stalinist show trial was heavily, uber-redacted to cover up this prior and in terms of the information wipe and transfer to Wikileaks, real-time (thanks to XKeyscore) knowledge, and of course protect itself from having its own crimes (being an accessory before the fact, to the fact, and after the fact) exposed;
    d) Sabu was turned on June 7, 2011, and his apartment was wired with video and audio surveillance and every keystroke of his was monitored, real-time, as was every text message and phone and or mobile phone conversation of his;
    e) Sabu was directing all LulzSec and AntiSec activities after June 7, 2011, with the full knowledge of the FBI and almost certainly other US and UK agencies (http://www.dailydot.com/politics/hammond-sabu-fbi-stratfor-hack/) as i) The target list of 2,000 domains were domains mostly outside of the FBI’s jurisdiction, and all of some interest to the alphabet agencies and or its Orwellian partners in the UK ii) The US / UK agency initiated, controlled and in the case of Stratfor, materially assisted (providing the server where the emails laid for three weeks until they were transferred, with no interruption or retrieval attempt – which means that Wikileaks was also almost certainly fed exploits and corrupt files) LulzSec and AntiSec online false flag ops netted UK-based hackers;
    f) The LulzSec and AntiSec hacks included the Syria government hacks, which were transferred to Wikileaks (almost certainly with exploits and corrupted files) under the watchful eye of the FBI and other US / UK agencies as they directed Sabu to hack the Syrian government in the first place (http://www.ibtimes.co.uk/fbi-informant-sabu-organises-cyber-attacks-government-websites-iran-syria-brazil-1445885) to generate support for the US / UK governments’ wish to intervene in Syria on behalf of the various Al Qaida groups there, to destabilize the wider region, as well as the Stratfor hack which conveniently brought down General Petreus (http://whowhatwhy.com/2014/06/25/classicwho-why-petraeus-takedown-may-have-been-an-inside-job/; it goes without saying that if the NSA or another US agency was not monitoring Stratfor 24/7 just for its sources and to see what it knew or didn’t know, GCHQ or JTRIG was as the Snowden leaks prove beyond a shadow of a doubt that the US outsources invasive surveillance to UK and other Five Eyes agencies when it can’t get away with it or fears it might not get away with it within the US), and were part of a wider counterintelligence operation (http://www.activistpost.com/2012/03/anonymous-hackedwikileaks-released.html);
    g) The LulzSec and AntiSec entrapment operation caused a divide and weakening of Anonymous, locked up the entrapped Jeremy Hammond – who became the “most dangerous hacker in the world” by listening to the FBI mole Sabu, who was listening to and taking direct orders from the FBI. Hammond’s sentence should be handed to every US agent involved in the US / UK agency ten month cyber-hacking spree that they controlled via Sabu, using LulzSec and AntiSec as their proxies.

    Finally, the hack of course provided the opportunity to bring down and personally destroy the journalist Barrett Brown – because the government didn’t like him – and because he pasted a link that were it not for the FBI and other US / UK agencies initiating, coordinating and materially assisting the Stratfor hack, would have never been available online in the first place. But the government decided to, in typical totalitarian fashion, to indefinitely detain him for two years under a gag order until he “confessed” to thought crimes, for “threats” posted on youtube that no one can take seriously.

    It is as clear as day that the US / UK agencies that comprise the 24/7, 365 day a year online Ministry of Truth have been quite busy wasting tax dollars in online false flag ops for years.

    That is why they labelled Wikileaks – to whom they either watched (Diplomacy Files), or in the case of Syria Files and GIF, literally handed emails and or documents documents to – a “terrorist” organization.

    All to crack down on the internet and free, open discourse, and of course, criticism of self-defeating, illegal, wasteful, and unconstitutional US and other Five Eyes policies.

    This Orwellian attack on news reporting in Australia, following the model of the once democratic – now totalitarian (http://www.washingtonsblog.com/2013/12/former-top-nsa-official-now-police-state.html) – United States of America and the once democratic United Kingdom, in their war on thought.

  • innovationjw

    this is very good to see that…I sense you are also someone who has also seen it working first-hand.

  • Andrean Tantiono

    Best blog ever really helpful for me

  • sunshowsignsXlinx Altera

    Since 911 this crap has been happening due to local 100 year feud with naacpers that kicked it up to NSA level but 911ed them by accident now the feds and nacpers are each other throats thanks to fergason. ha ha ha

  • Charles devon

    Agree with your article custom writing service

  • I love this post regarding the spy agencies. They live a very secret life and are involved in a lot of life threatening missions. I personally think that they are one of the reasons a country can stay safe. I was searching for Dissertation Writing Help UK and came across this post.

  • The spy agencies have been always under the radar of the governments. They have a lot of hidden identities and fake mission which can be a major cause of threat to a countries security. I was looking for Assignment Help and came across this post.

  • Filipe Mark

    The spy offices have been constantly under the radar of the legislatures. They have a ton of shrouded characters and fake mission which can be a noteworthy reason for risk to a nations security. Online Assignment Help

  • I discovered your site ideal for my needs. It contains grand and supportive posts. Keep doing awesome! Online dissertation help

  • anny

    Hope this information will provide help to the students who are recently graduated. UK Dissertation Writing

  • Newton Moses

    The 21st century has witnessed advancement in technology and this goes hand in hand with increase of sophisticated crimes. Such crimes include cyber crimes and we can only hope that the governments are doing everything possible to protect citizens from this. However it has been noted that the government maybe overstepping its mandate and we can only hope that spy agencies are not misusing their bag of tricks when it comes to fighting cyber crimes. Essay
    Editing Help

  • miriamsteve

    This can be really demeaning, and also going against the rights of humanity. It is very wrong when someone manipulates technology to do unimaginable things that at the end of the day will appear to be a trick to the innocent. Thank you for raising such an issue for people to be quite aware and on the look out. The most quality secondary data thesis writing help among other services is what clients obtain from us, you can have the confidence that the most excellent assistance comes from us.

    adding footnotes in a thesis

  • Liam Sanders

    I am a target of gang stalking in the UK, with involvement of the intelligence agencies. Over the past four years I’ve been mobbed out of work, blacklisted from employment, lost all my friends, and been homeless for a short time. Technology now means there’s no escape for victims of gang stalking – moving area does not help. Please take a moment to visit my blog, where I am documenting my experience:



  • Danny Crane

    I don’t know whether to be happy that the government is doing everything possible to counter and stop cyber attacks or whether I should be worried that the spy agencies have the capacity to stage manage crimes and have their way. Our hope is that the spy agencies will use the technology and resources at their disposal to fulfill their mandate of keeping us safe from cyber criminals and other criminals.Genius Homework Writing Help is the site to visit whenever you are in need of reliable homework writing and editing help.

  • Mitesh Kasliwal

    To send an email by fake email id is the best option for spying. Apart from this information students can simply hire Statistics Assignment Help by experts writer of Students assignment help. So you will get 100% unique content.

  • Mitesh Kasliwal

    I am impressed by the information that you have on this blog. One more website is for students is studentsassignmenthelp for online assignment help. It shows how well you understand this subject and many spying company are working anonymously. Some are working for specific or long mission.

  • happywheelsgame

    I would like to thank you for the efforts you have made in. The game is best known for its dark sense of humor and its graphic violence . I am hoping the same best work from you in the future as well. I really appreciate your work. Thanks for you agree for me.
    geometry dash
    happy wheels

  • Mitesh Kasliwal

    You are American University of college students. And you want to give good performance than your friends so; you should take best global assignment help support from Students Assignment Help.

  • izraulhidashi

    This is supposed to be shocking? America is a country built on murder, lies and theft, where propaganda is called news and false flags are used to invade other countries. We murder people in their own homes just to steal resources, like opium, which is then used to cause an opiate crisis so rich white people can get richer, all under the notion of defending freedom. Big Pharma CEO’s are making 400,000 a day, take home, off killing Americans, and no one in America even cares. lol. Hell, our law enforcement helps them to cover up their crimes. If that hasn’t moved Americans, nothing will.

  • izraulhidashi

    Hell, George Bush helped Israel commit 9/11 and he can still show his face in public. And Americans even clap for that terrorist. Treason and domestic terrorism are everyday business in America. No one gives a flying fu(k about the spy agencies except other spy agencies. Americans care more about black men kneeling at football games than they do about a white man shooting 600 people. LOL.We sped more time and money on useless garbage than we do trying to fix and make things better. Corporations have turned Americans into drooling zombies, it’s no wonder our country is full of nothing but ignorant hypocrites If I was from another planet I certainly wouldn’t want a damn thing to do with earth, or humans.

  • Stuart Clark

    Thanks for sharing this awesome post.Strategy and Planning Assignment Help

  • Kind of Conspiracy… should be reveal…

    Broadband in Mumbai

  • Administrators can give users the option to auto approve relationships on a per-relationship type basis.
    mengenal walatra gamat emas kapsul beserta khasiatnya
    Administrators are able create relationship types (friend, coworker, etc). Relationship types can be setup to be one-way or mutual. If a relationship type is one-way (subscriber) only the requester is shown as relating to the requestee. Relationship types can also be set as needing or not needing approval.