Tuesday 15 July 2014

IRISH BLOG JOURNALIST AUTHOR ASSASSINATION ATTEMPTS




I Brian Clarke author of  the Irish Blog have been the target of British Secret Service Dirty Tricks for quite some time now. A week ago on Facebook, it came to my attention, that a story has been in circulation, that I have asked a young woman to send me her knickers 15 times by message. I do not know this woman and neither is she on my friends lists. 


Nothing particularly surprising there. An obvious Dirty Tricks tactic from MI5 who want to shut Irish Blog down and have been conducting a more subtle censorship on it for quite some time, aside from slowing it down with their intranets. What has been surprising though is the response to it. I still have some very loyal support and solidarity and believe me at times like this I really appreciate it.


I am not going to name people for obvious reasons. I do have transcripts of these conversations and while the individuals concerned may have been under the influence of drugs they may have also been the victims of MI5 hacking, like the poor lady who originally received the abuse by Facebook messaging in a case of obvious text hacking. I personally do not know the precise details.


While I would normally dismiss MI5 dirty tricks as part of the territory but it has been combined, with several recent attempts on my life by contrived road accidents. I have my own ideas on all of this but without evidence I cannot prove anything, other than the transcripts. However all of this has eerie similarities of other organizations, including the Provisionals working with MI5, using other republican, loyalist groups and individuals, as fronts for disinformation and assassination. I believe drugs are playing a leading part in corrupting Irish republicanism. 



 If anyone genuinely needs help with recovery from this they will have my full support as I have personal first hand experience of this problem. 



British spies used 'dirty tricks' including 'honey traps and deleting online profiles' to intimidate and trap enemies according to leaked Snowden documents 

  • Revelations from documents taken from NSA leaked by Edward Snowden
  • Outline techniques used by Joint Threat Research and Intelligence Group
  • Spy unit whose goal is to 'destroy, deny, degrade [and] disrupt' enemies
"British spies employed 'dirty tricks' including 'honey traps' to trap nations, hackers, terror groups, suspected criminals and arms dealers, according to leaked documents. 
The bombshell revelations have been made public through the release of documents taken from the National Security Agency by whistle-blower Edward Snowden.
The Powerpoint slides outline techniques apparently used by the Joint Threat Research and Intelligence Group (JTRIG), a British spy unit whose goal is to 'destroy, deny, degrade [and] disrupt' enemies. 
British spies employed 'dirty tricks' including honey traps' in a bid to trap nations, hackers, terror groups, suspected criminals and arms dealers
British spies employed 'dirty tricks' including honey traps' in a bid to trap nations, hackers, terror groups, suspected criminals and arms dealers
The slides from 2010 and 2012, published by NBC News show that the JTRIG completed their mission by 'discrediting' adversaries through misinformation and hacking their communications.
Two main methods of attack detailed in the 'Effects' campaigns are cyber operations and propaganda campaigns. 
The bombshell revelations have been made public through the release of documents taken from the National Security Agency by whistleblower Edward Snowden
The bombshell revelations have been made public through the release of documents taken from the National Security Agency by whistleblower Edward Snowden
JTRIG, which is part of the NSA’s British counterpart, the cyber spy agency known as GCHQ, used Twitter, Flickr, Facebook and YouTube for deception, mass messaging and 'pushing stories'.
Another strategy is 'false flag' operations - this is when British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.
The main cyber attack is the ‘distributed denial of service’ (DDoS) attack.
This is when computers are taken over by hackers and they bombard a website’s host computers with requests for information causing it to crash - this is a method successfully used by Wikileaks hackers. 
Earlier this week it was revealed that JTRIG agents issued their DDoS on Anonymous chat rooms, preventing its users from communicating with one another. 
In one case, reported the BBC, agents are said to have tricked a hacker nicknamed P0ke who claimed to have stolen data from the US government. They did this by sending him a link to a BBC article entitled: 'Who loves the hacktivists?'
Eric King, an attorney who currently teaches IT law at the London School of Economics, told NBC it is 'remarkable' that the GCHQ has become so adept at launching DDoS attacks without 'clear lawful authority,'  particularly because the British government has criticised similar strategies used by other governments.
'GCHQ has no clear authority to send a virus or conduct cyber-attacks,' he said. 'Hacking is one of the most invasive methods of surveillance.'
According to notes on the 2012 documents, a computer virus called Ambassadors Reception was 'used in a variety of different areas' and was 'very effective.'
When sent to adversaries, says the presentation, the virus will 'encrypt itself, delete all emails, encrypt all files, make [the] screen shake' and block the computer user from logging on.
One of the ways to block a target communicating reads: 'Bombard their phone with text messages, bombard their phone with calls, delete their online presence, block up their fax machine.'
The slide details examples of how this was used in Afghanistan including significantly disrupting the Taliban, sending targets a text message 'every 10 seconds or so' and 'calling targets on a regular basis'.
The British cyber spies also used blog posts and information spread via blogs in an operation against Iran.
Mobile phone user
A young woman looking at Facebook website on laptop computer
One of the ways to stop a target communicating reads: 'Bombard their phone with text messages, bombard their phone with calls, delete their online presence, block up their fax machine'
The same 2012 presentation describes the 'honey trap' method of discrediting a target commenting it is 'very successful' when it works. 
The individual is lured 'to go somewhere on the internet, or a physical location' where they are then 'met by a friendly face.'
It does not give any examples of when the honey trap has been used by British agents, but the same slide also details how 'paranoia' can be heightened by changing a target's photo on a social networking website - the slide reads 'You have been warned JTRIG is about!' 
A programme called 'Royal Concierge' took advantage of hotel reservation systems to track the  location of foreign diplomats and the slides encourage agents to monitor targets through 'close access technical operations'.
It also suggests they question 'Can we influence hotel choice? Can we cancel their visits?'
According to reports in Der Spiegel last year, British intelligence tapped the reservations systems of over 350 top hotels around the world for the past three years to set up the programme. 
Using the GCHQ’s SIGINT (signal-intelligence) program it was used to spy on trade delegations, foreign diplomats, and other targets with a taste for the high life.
NBC news reported GCHQ would not comment on the newly published documents or on JTRIG’s operations. 
In a statement it told them: 'All of GCHQ's work is carried out in accordance with a strict legal and policy framework,' said the statement, 'which ensure[s] that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All of our operational processes rigorously support this position.' "

TO WHOM IT CONCERNS, THERE IS A DOSSIER THAT WILL BE MADE PUBLIC REGARDING ALL DIRTY TRICKS CONDUCTED ON MYSELF BRIAN CLARKE, BY ALL BRITISH SECRET SERVICE AGENTS, SINCE FIRST I MET GERRY CONLON IN LONDON MANY YEARS AGO, THAT WILL BE MADE PUBLIC IN THE EVENT OF MY UNTIMELY DEATH

No comments: