my priv article - 02

- or copy n paste following adresses to your browsers-adress-bar (autoTranslate..)
check via - THEMEN (Stichworte) or search engines if its a good one ... torrentz ??

    Dir_8     Hoplinks     Guestbook     Feedback
TV channel - Russia (5hrs full power news row of 10.06.015) laws/article7298707.ece indianamericans/article7220167.ece selling/article7298695.ece - ind. Rupiahh on the raise.
Anybody ever heared of BBG ... Broadcasting Board of Govs, found on Hindustantimes in real check (april 015)
(09.06 22.37hrs) - on TTIPS - Amur Leopard - Titicaca Riesenfrosch - Gyrocopter on capitol hill komische TTIPS der Bodensatz schwimmt oben

"New Cage": Johannes Fischler beschreibt, wie die Esoterik 2.0 die Köpfe leert und die Kassen füllt (Buch: Molden Verlag) Studiogespräch: Wolfgang Ritschl - Buchtip booktip

____________________ of 2014 -
    (this one and more articles by Al Jazeera)       (Medwedews twitter account gehackt - my account)
      ( Paul Watson - captain of via facebook )

      (most hot for mercenaries n commercialistas !-)

- (theintercept - jtrig-manipulation)

- (Sub-com EZLN)

- moises/ (Sub-com EZLN)
- (on Anonymous, payPal n payBack !-)
- (on Putin)
- Snowden (Snowden)
- (Lybia - US)

- (problem yahoo)

- jtrig-manipulation

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents. Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled

“The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.” Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote

a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework ? Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:

I can approve this article above as by knowing Katholix ( and sensitivo-torreroes.sp who thought oi d play footebole with em) who do always want to leave bad tastes-Nachgeschmack, fuzz by suffer n the more and can not escape their habit-cyrclings ... got somehow stuck in projecting depression n their suffering, get ya doctor or psycho.doc. In this regard i like Paulo Coelhos saying what made me do register at Twitter (leave me alone with ya depressions and suffer-moods)
so when i react negative dont be surprised ! - )
I dont need your suffer games and complaining after ...
which does some reputation

I can approve this article above by my own experience as is for example by facebooking to get the honey 4 changing my facebooks profile pic as it shows my websites adress ...

i ve to say other articles ar too long and formatting by source coding these articles is too much of odd work, so i ve to split and code pages seperately ... !

Webprojects - my standards - hoplinks -