Deprecated: mb_convert_encoding(): Handling HTML entities via mbstring is deprecated; use htmlspecialchars, htmlentities, or mb_encode_numericentity/mb_decode_numericentity instead in /home/eslemanabaycom/public_html/wp-content/plugins/fb-instant-articles/vendor/facebook/facebook-instant-articles-sdk-php/src/Facebook/InstantArticles/Transformer/Transformer.php on line 249

Deprecated: mb_convert_encoding(): Handling HTML entities via mbstring is deprecated; use htmlspecialchars, htmlentities, or mb_encode_numericentity/mb_decode_numericentity instead in /home/eslemanabaycom/public_html/wp-content/plugins/fb-instant-articles/vendor/facebook/facebook-instant-articles-sdk-php/src/Facebook/InstantArticles/Transformer/Transformer.php on line 249

Deprecated: Creation of dynamic property Facebook\InstantArticles\AMP\AMPHeader::$headerBar is deprecated in /home/eslemanabaycom/public_html/wp-content/plugins/fb-instant-articles/vendor/facebook/facebook-instant-articles-sdk-extensions-in-php/src/Facebook/InstantArticles/AMP/AMPHeader.php on line 51
GCHQ’s “Chinese menu” of tools

Digital Media Trends

GCHQ’s “Chinese menu” of tools

By Esleman Abay

September 08, 2022

“Effects capabilities” allow analysts to twist truth subtly or spam relentlessly.

by Sean Gallagher – 2014

What appears to be an internal Wiki page detailing the cyber-weaponry used by the British spy agency GCHQ was published today by Glenn Greenwald of The Intercept. The page, taken from the documents obtained by former NSA contractor Edward Snowden, lists dozens of tools used by GCHQ to target individuals and their computing devices, spread disinformation posing as others, and “shape” opinion and information available online.

The page had been maintained by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) Covert Internet Technical Development team, but it fell out of use by the time Snowden copied it. Greenwald and NBC previously reported on JTRIG’s “dirty tricks” tactics for psychological operations and information warfare, and the new documents provide a hint at how those tactics were executed. GCHQ’s capabilities included tools for manipulating social media, spoofing communications from individuals and groups, and warping the perception of content online through manipulation of polls and web pages’ traffic and search rankings.

Originally intended to inform other organizations within GCHQ (and possibly NSA) of new capabilities being developed by the group, the JTRIG CITD team noted on the page, “We don’t update this page anymore, it became somewhat of a Chinese menu for effects operations.” The page lists 33 “effects capability” tools, as well as a host of other capabilities for collecting information, tracking individuals, attacking computers, and extracting information from seized devices.

As described in a previously revealed GCHQ document, effects tools are defined as “using online techniques to make something happen in the real world.” The capabilities give GCHQ the ability to widely track, manipulate, and interfere with online communications between targets. One, called Miniature Hero, allows for the “provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” Other tools allow for widespread automated postings on video sites and social networks, plus the silencing of individuals who qualify as “terrorists” or “extremists” (which, as recently revealed by Jacob Appelbaum, could be construed to include Linux users).

The effects tools fall into a few broad categories, including:

Denial of service and access:

Information harassment tools: 

Information disruption tools:

Misinformation and spoofing tools.

And then there’s GCHQ’s focus on Second Life. The agency has already developed Lump, a tool for identifying the avatar name of a user based on their Second Life agent ID. That’s useful for targeting an individual based on intercepted traffic to the virtual reality environment. And the JTRIG developer team was also working on Glitterball: “Online Gaming Capabilities for Sensitive Operations. Currently Second Life.”

The capabilities described in the Wiki page aren’t theoretical. GCHQ used a number of them in Afghanistan to disrupt Taliban operations. They were able to send text messages to targeted Taliban leaders every 10 seconds, place calls to them with voice messages regularly, and even “delete a target’s online presence.” JTRIG has also used social media in Iran in an attempt to target and disrupt Iranian nuclear development