Difference between revisions of "Joint Threat Research Intelligence Group"
m (Text replacement - "|wikipedia=http://en.wikipedia.org" to "|wikipedia=https://en.wikipedia.org") |
(Unstub) |
||
Line 14: | Line 14: | ||
== Mission == | == Mission == | ||
The scope of the JTRIG's mission includes using "dirty tricks" to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications.<ref name=NBCFeb14/><ref>{{cite web|url=https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/|title=How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations|author=Glenn Greenwald|publisher=The Intercept|date=2014-02-24}} - contains the DISRUPTION Operational Playbook slide presentation by GCHQ</ref> Known as "Effects" operations, the work of JTRIG had become a "major part" of GCHQ's operations by 2010.<ref | The scope of the JTRIG's mission includes using "dirty tricks" to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications.<ref name=NBCFeb14/><ref>{{cite web|url=https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/|title=How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations|author=Glenn Greenwald|publisher=The Intercept|date=2014-02-24}} - contains the DISRUPTION Operational Playbook slide presentation by GCHQ</ref> Known as "Effects" operations, the work of JTRIG had become a "major part" of GCHQ's operations by 2010.<ref | ||
+ | |||
==Activities== | ==Activities== | ||
Line 19: | Line 20: | ||
<ref>https://firstlook.org/theintercept/document/2014/07/14/jtrig-tools-techniques/</ref> | <ref>https://firstlook.org/theintercept/document/2014/07/14/jtrig-tools-techniques/</ref> | ||
+ | Documents leaked by Edward Snowden reveal that JTRIG use [[computer viruses]] to make people's computers unusable, including encrypting of deleting files or emails.<ref>https://www.theregister.co.uk/2014/02/07/snowden_documents_show_british_digital_spies_using_viruses_and_honey_traps/</ref><ref>http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive1_nbc_document.pdf</ref> | ||
+ | |||
+ | According to documents released to NBC News by [[Edward Snowden]], JTRIG's role is to "deny, disrupt, degrade and deceive". This includes use of [[DDOS]] attacks on chatrooms.<ref>https://www.theregister.co.uk/2014/02/07/snowden_documents_show_british_digital_spies_using_viruses_and_honey_traps/</ref> | ||
{{SMWDocs}} | {{SMWDocs}} | ||
==References== | ==References== | ||
{{reflist}} | {{reflist}} | ||
− |
Revision as of 10:05, 20 April 2018
Joint Threat Research Intelligence Group | |
---|---|
Parent organization | GCHQ |
Type | intelligence agency |
Interests | cyberespionage |
The Joint Threat Research Intelligence Group (JTRIG) is a unit of the Government Communications Headquarters (GCHQ), the UK intelligence agency.[1]
Discovery
The group became public knowledge after the Edward Snowden Affair as it is mentioned in documents he publicised.[2]
Mission
The scope of the JTRIG's mission includes using "dirty tricks" to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications.[2][3] Known as "Effects" operations, the work of JTRIG had become a "major part" of GCHQ's operations by 2010.Cite error: Invalid <ref>
tag;
invalid names, e.g. too many
Documents leaked by Edward Snowden reveal that JTRIG use computer viruses to make people's computers unusable, including encrypting of deleting files or emails.[4][5]
According to documents released to NBC News by Edward Snowden, JTRIG's role is to "deny, disrupt, degrade and deceive". This includes use of DDOS attacks on chatrooms.[6]
Related Quotation
Page | Quote | Author | Date |
---|---|---|---|
GCHQ | “Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and | Glenn Greenwald | 24 February 2014 |
References
- ↑ "Snowden leaks: GCHQ 'attacked Anonymous' hackers". BBC. 5 February 2014. Retrieved 7 February 2014.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑ a b "Snowden Docs: British Spies Used Sex and 'Dirty Tricks'". NBC News. 7 February 2014. Retrieved 7 February 2014.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑ Glenn Greenwald (2014-02-24). "How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations". The Intercept.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto"). - contains the DISRUPTION Operational Playbook slide presentation by GCHQ
- ↑ https://www.theregister.co.uk/2014/02/07/snowden_documents_show_british_digital_spies_using_viruses_and_honey_traps/
- ↑ http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive1_nbc_document.pdf
- ↑ https://www.theregister.co.uk/2014/02/07/snowden_documents_show_british_digital_spies_using_viruses_and_honey_traps/