*** Welcome to piglix ***

Joint Threat Research Intelligence Group


The Joint Threat Research Intelligence Group (JTRIG) is a unit of the Government Communications Headquarters (GCHQ), the British intelligence agency. The existence of JTRIG was revealed as part of the global surveillance disclosures in documents leaked by the former National Security Agency contractor Edward Snowden.

The scope of the JTRIG's mission includes using "dirty tricks" to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications. Known as "Effects" operations, the work of JTRIG had become a "major part" of GCHQ's operations by 2010. The slides also disclose the deployment of "honey traps" of a sexual nature by British intelligence agents.

In 2011, the JTRIG conducted a denial-of-service attack (DoS) on the activist network Anonymous. Other JTRIG targets have included the government of Iran and the Taliban in Afghanistan.

Campaigns operated by JTRIG have broadly fallen into two categories; cyber attacks and propaganda efforts. The propaganda efforts (named "Online Covert Action") utilize "mass messaging" and the “pushing [of] stories” via the medium of Twitter, Flickr, Facebook and YouTube. Online “false flag” operations are also used by JTRIG against targets. JTRIG have also changed photographs on social media sites, as well as emailing and texting colleagues and neighbours with "unsavory information" about the targeted individual.

A computer virus named Ambassadors Reception has been used by GCHQ “in a variety of different areas” and has been described in the slides as “very effective.” The virus can “encrypt itself, delete all emails, encrypt all files, [and] make [the] screen shake” when sent to adversaries. The virus can also block a user from logging on to their computer. Information obtained by GCHQ is also used in “close access technical operations,” in which targets are physically observed by intelligence officers, sometimes in person at hotels. Telephone calls can also be listened to and hotel computers tapped, the documents ask, “Can we influence hotel choice? Can we cancel their visits?”.


...
Wikipedia

...