Skip to content or view screen version

GCHQ internet trolls, false flags, and other

Watching the Stasi | 25.02.2014 11:48

Read this article to see how GCHG indymedia/internet trolls operate, and watch out for them

Remember this when people comment on articles on here

 https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/

Watching the Stasi

Comments

Hide the following 2 comments

ULTRA FIASCO A(ND) MORONIC FARCE

26.02.2014 13:21

Parasites & psychopaths indeed ...
Parasites & psychopaths indeed ...

>>>>> "We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?" <<<<<

Definitely. Here is a spoofing attack against an activist traveller from Britain, which appeared at the blog of the former after he moved on from one protest site on the European mainland to another:

[screenshot.jpg]

Parasites & psychopaths indeed, as awareness people were puzzled why someone talking "we will fight them every step out of our way" would write "they have to fight us every step out of their way" from the next stop in the trip... maybe he had alcohol? So some of the natural descriptions plagiarised in this old spoof were being legitimately used again, and their appearance worked as the trigger causing the spies to expose their clinical insanity and thereby confirming the suspicion.

The obvious conclusion is that David Cameron has finally judged himself.

*N*I*E*M*A*N*D* *B*L*A*C*K*
- Homepage: http://www.indymedia.org.uk/en/2013/05/509250.html


more on GCHQ

01.03.2014 13:43

GCHQ DISRUPTION Operational Playbook
 http://cryptome.org/2014/02/gchq-disruption.pdf

GCHQ The Art of Covert Online Deception Training
 http://cryptome.org/2014/02/gchq-online-deception.pdf

GCHQ Psychology SIGDEV
 http://cryptome.org/2014/02/gchq-psychology.pdf

NSA-GCHQ Discovery SIGINT Targeting
 http://cryptome.org/2014/02/nsa-gchq-discovery.pdf

GCHQ Cyber Attack Operations
 http://cryptome.org/2014/02/gchq-cyber-attack.pdf

GCHQ Attacked Anonymous
 http://cryptome.org/2014/02/gchq-anonymous.pdf

GCHQ Optic Nerve Grabbed Yahoo Images
 http://cryptome.org/2014/02/gchq-optic-nerve.pdf

GCHQ Full-Spectrum Cyber Effects
 http://cryptome.org/2014/02/gchq-cyber-effects.pdf

NSA-GCHQ Allegedly Hack Cryptographer Quisquater
 http://cryptome.org/2014/02/nsa-gchq-quisquater.pdf

GCHQ: Chaining Tweets
 http://cryptome.org/2014/01/gchq-newtons-cat.pdf

GCHQ Squeaky Dolphin Psychological Operations
 http://cryptome.org/2014/01/gchq-squeaky-dolphin.pdf

GCHQ Mobile Theme Briefing
 http://cryptome.org/2014/01/gchq-mobile-theme.pdf

In the Matter of UK State Spying
 http://cryptome.org/2014/01/uk-state-spy.pdf

Draft UK Charter for Press Self-Regulation
 http://cryptome.org/2013/10/uk-press-selfie-13-1011.pdf

UK Police Spying Commissioners Report 2012-13
 http://cryptome.org/2013/07/uk-cop-spy-2012-13.pdf
 http://cryptome.org/2013/07/uk-spy-commish-2012.pdf

US-UK Traffic Analysis and Cryptanalysis 1946
 http://cryptome.org/2013/07/us-uk-ta-ca-1946.pdf

GCHQ COMINT
 http://cryptome.org/2013/12/nsa-gchq-se-fra-comint.pdf

Quantum Spying
 http://cryptome.org/2013/12/nsa-gchq-fra-quantum.pdf
 http://cryptome.org/2013/12/gchq-se-fra-quantum-3.pdf

GCHQ Spied Games-Virtual Environments
 http://cryptome.org/2013/12/nsa-gchq-spy-games.pdf
 http://cryptome.org/2013/12/nsa-spy-games.pdf

UK Draft Communications Data Spying Bill
 http://cryptome.org/2012/06/uk-data-spy.pdf

Challenge of Internet Privacy 2014
 http://cryptome.org/2014/01/net-privacy-2014.pdf

NSA Spy G8-G20
 http://cryptome.org/2014/01/nsa-5-eyes-spy-g20-dk.pdf

NSA G8-G20 Summit
 http://cryptome.org/2013/12/nsa-g8-g20-spying-02.pdf

Anti-War Spied by FBI
 http://cryptome.org/2013/11/anti-war-fbi-spy.pdf

Spying Wikipedia Editors
 http://cryptome.org/2013/09/spy-wikipedia-editors.pdf

EU
 http://cryptome.org/2013/10/enisa-crypto-2013.pdf
 http://cryptome.org/2013/09/europarl-nsa.pdf
 http://cryptome.org/2013/07/ep-spy-oversee.pdf
 http://cryptome.org/2014/02/army-rfi-sm-spy.pdf
 http://cryptome.org/2014/02/eu-nsa-14-0212.pdf

Power Grid
 http://cryptome.org/2014/01/hidden-power-grid-attacks.pdf

Wassenaar Arrangement List of Dual-Use Tech
 http://cryptome.org/2013/12/wassenaar-list-13-1204.pdf

TOR
 http://cryptome.org/2013/10/nsa-iat-tor.pdf
 http://cryptome.org/2013/10/nsa-tor-stinks.pdf
 http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf
 http://cryptome.org/2013/10/nsa-tor.pdf
 http://cryptome.org/2013/10/gchq-mullenize.pdf
 http://cryptome.org/2013/09/tor-fed-trust.pdf
 http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf
 http://cryptome.org/2013/09/tor-network-dissent.pdf
 http://cryptome.org/2013/09/tor-lira.pdf
 http://cryptome.org/2013/08/tor-users-routed.pdf
 http://cryptome.org/2013/08/tor-sponsors-13-0831.pdf

Snowden fan club