TOP SECRET: Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations (2011; pdf)

TOP SECRET: Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations (2011)

Mandeep K. Dhami, PhD
Human Systems Group, Information Management Department, Dstl
10 March 2011

TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations. pdf

TOP SECRET

Executive Summary

The importance of influence in cyberspace was highlighted in the recent National Security Strategy and the Strategic Defence and Security Review (UK Government, 2010a, 2010b).

JTRIG provides most of GCHQ’s cyber effects and online HUMINT
capability. It currently lies at the leading edge of cyber influence practice and expertise. JTRIG targets a range of individual, group and state actors across the globe who pose criminal, security and defence threats. JTRIG staff use a range of techniques to, for example, discredit, disrupt, delay, deny, degrade, and deter. The techniques include: uploading YouTube videos containing persuasive messages; establishing online aliases with Facebook and Twitter accounts, blogs and forum memberships for conducting HUMINT or encouraging discussion on specific issues; sending spoof emails and text messages as well as providing spoof online resources; and setting up spoof trade sites.

Chapter 2 presents the findings of interviewees with a sample of 22 JTRIG staff and seven other staff from GCHQ who support JTRIG’s operations. Based on these interviewees, the present report concludes that JTRIG’s effects and online HUMINT capability can be further enhanced by providing behavioural science support and improving some of JTRIG’s non-technical operational planning and management.

Chapter 3 considers how JTRIG’s effects and online HUMINT operations can be grounded in scientific theory and evidence from social psychology (i.e., social cognition, attitudes, persuasive communications, conformity, obedience, interpersonal relationships, trust and distrust, and psychological profiling), including its applications to advertising and marketing, and from criminology (i.e., crime
prevention).

Chapter 4 discusses how the effectiveness of JTRIG’s effects and online HUMINT operations can be enhanced by improving the current process of assessing the risks associated with conducting operations and the measurement of operational success, and by providing staff with practice/conduct guidelines. The present report provides the following seven recommendations for supporting and improving JTRIG’s effects and online HUMINT capability:

 Recommendation 1. JTRIG should train its staff to understand and appropriately apply specific behavioural techniques (see Annexes A to C).

 Recommendation 2. Dstl should develop a research programme that: (1) measures the generalisability of specific social influence techniques across cultural groups representative of the types of targets of interest to defence and security organisations so that techniques can be applied appropriately. And, (2) reviews the body of work on influence in cyberspace in order to inform cyber influence operations.

This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under
other UK information legislation. Refer disclosure requests to GCHQ on x , email @gchq.gsi.gov.uk

 Recommendation 3. Dstl ought to develop a programme of work that assesses the feasibility of compiling psychological profiles based on information available about the individual on the internet so that those conducting online HUMINT operations can compile and exploit such profiles.

 Recommendation 4. Dstl ought to develop a programme of work that: (1) reviews the literature identifying the cost-benefit factors motivating individuals to become involved in specific crimes (especially online). And, (2) develops a catalogue of crime prevention techniques that can be applied online.

 Recommendation 5. JTRIG should design a comprehensive operational risk assessment process.

 Recommendation 6. JTRIG should develop a catalogue of measures that provide reliable and valid data on the effectiveness of its online effects and HUMINT operations.

 Recommendation 7. JTRIG should develop relevant guidelines describing best practice when conducting operations.

The implementation of recommendations 1 and 5 to 7 require more or less immediate consideration. The implementation of recommendations 2 to 4 refer to delivery of support in the medium- to long-term.