Posted: February 8, 2014 in -
Tags: , , , , , , , , , , , , ,


Latest Edward Snowden Document



Honey-trap; a great option. Very successful when it works.

– Get someone to go somewhere on the internet, or a physical location to be met by a “friendly face”.

– JTRIG has the ability to “shape” the environment on occasions.

Photo changes; you have been warned, “JTRIG is about!”

Can take “paranoia” to a whole new level.

Blog writing:

-Has worked on a number of different Ops.

– One example is on a Serious Crime Op,REDACTED

– Other examples on Iran work.


– Infiltration work.

– Helps JTRIG acquire credibility with online groups etc.

– Helps with bringing SIGINT/Effects together.

  • Place ‘secret’ information on a compromised computer
  • Send ‘secret’ information across a network visible to sigint
  • Provide ‘secret’ information through an online agent


Do the analyst’s (sic) know not just what their target is doing, but what is it thinking?


Now read how these tactics concern the 9/11 attacks:

Disinformation Killed 9/11 “Truth”

Your Comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s