It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


Help ATS via PayPal:
learn more

Snowden releases documents showing UK controlled the masses...think the US is not also?

page: 1

log in


posted on Jul, 15 2014 @ 12:07 PM
This falls in line with the story a few weeks back that said that Facebook was used for psychological experiments. Seems some new evidence has come to light with certain aspects of the UK's programs explained.

ASTRAL PROJECTION: Remote GSM secure covert Internet proxy using TOR hidden service
POISON ARROW: Safe malware download capability
AIRWOLF: YouTube profile, comment and video collection
BIRDSTRIKE: Twitter monitoring and profile collection
GLASSBACK: Technique of getting a target's IP address by pretending to be a spammer and ringing them. Target does not need to answer.
MINIATURE HERO: Active skype capability. Provision of realtime call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.
PHOTON TORPEDO: A technique to actively grab the IP address of MSN messenger user
SPRING-BISHOP: Finding private photos of targets on Facebook
BOMB BAY: The capacity to increase website hits, rankings
BURLESQUE: The capacity to send spoofed SMS messages
GESTATOR: Amplification of a given message, normally video, on popular multimedia websites (YouTube)
SCRAPHEAP CHALLENGE: Perfect spoofing of emails from Blackberry targets
SUNBLOCK: Ability to deny functionality to send/receive email or view material online
SWAMP DONKEY: A tool that will silently locate all predefined types of file and encrypt them on a targets machine
UNDERPASS: Change outcome of online polls (previously known as NUBILO).
WARPATH: Mass delivery of SMS messages to support an Information Operations campaign.
HUSK: Secure one-on-one web based dead-drop messaging platform.

Many times on here I read...are there shills on here? CIA? DHS? well, what do you think?

The government can track you and point you were it wants you to go, do, say,eat, fart..everything. However, they cannot find a lost plane? Wake up folks.

The UK spy agency's dark arts were revealed in documents first published by The Intercept, and each piece of software is described in a wiki document written up by GCHQ's Joint Threat Research Intelligence Group (JTRIG). The document, which reads like a software inventory, calls the tools part of the agency's "weaponised capability."

Some of the most interesting capabilities of the tools on the list include the ability to seed the web with false information — such as tweaking the results of online polls — inflating page view counts, censoring video content deemed "extremist" and the use of psychological manipulation on targets — something similar to a research project conducted with Facebook's approval, which resulted in heavy criticism and outrage levied at the social media site.

With Eric Holder recently saying that he is afraid more of homeland extremism than an overseas threat, I think we can see where some of this tech explained could be headed in the US. The borders are open which is a perfect excuse for a localized attack and/or conflict.

Stay vigilant and safe...

LINK[edit by]edit on 07pm31pmf0000002014-07-15T13:48:10-05:000110 by matafuchs because: (no reason given)

posted on Jul, 15 2014 @ 12:36 PM
All governments do it .. some just more blatently than others ..

posted on Jul, 15 2014 @ 12:37 PM

posted on Jul, 15 2014 @ 12:57 PM
It was always thought they were all in it together and this whole fiasco is a distraction.

posted on Jul, 15 2014 @ 12:59 PM
Not surprised.

posted on Jul, 15 2014 @ 01:47 PM
a reply to: Kram09

Sorry, here you go.


posted on Jul, 15 2014 @ 03:02 PM
Most of those things are simple to do if you know internet programming (TCP/IP) and read the internet RFC documents. Then many of those things can be done using functions like "traceroute" and "ping".

posted on Jul, 15 2014 @ 03:09 PM
If nothing else, I just liked the names that they gave to the processes...SWAMP DONKEY was my favorite...

new topics

top topics

active topics


log in