background preloader

Revealed: US spy operation that manipulates social media

Revealed: US spy operation that manipulates social media
The US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda. A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an "online persona management service" that will allow one US serviceman or woman to control up to 10 separate identities based all over the world. The project has been likened by web experts to China's attempts to control and restrict free speech on the internet. Critics are likely to complain that it will allow the US military to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives. OEV is seen by senior US commanders as a vital counter-terrorism and counter-radicalisation programme.

http://www.theguardian.com/technology/2011/mar/17/us-spy-operation-social-networks

Related:  CovertUS defense & militarySurveillance IIesalyn

UFO DIGEST COM: UFO and Paranormal News From Around The World By William C. Treurniet Summary. Luminous orbs seen moving across the sky sometimes behave as if they are under intelligent control. This article discusses evidence that some orbs are made with covert technology which can create balls of glowing plasma in the atmosphere from a distance. The orbs appear also to be used as pixels for drawing three-dimensional objects in the sky. How to Read Gates's Shift on the Wars In Establishment Washington, Defense Secretary Robert Gates enjoys a charmed life based on a charming persona. The Fawning Corporate Media (FCM) is always ready with fulsome praise for his “candor” and “leadership” – and even for his belated recognition that the wars in Iraq and Afghanistan were nuts. “Certain kinds of public candor are so unexpected that they have the shock value of a gunshot at the opera,” purred a Boston Globe editorial about Gates’s admission that only a crazy person would commit U.S. ground forces to wars like those in Iraq and Afghanistan. The editorial then lamented Gates’s planned retirement later this year and urged President Barack Obama “to look hard for a successor with some of Gates’s unusual leadership qualities.” Unusual leadership qualities, indeed.

Can the NSA and CIA use your phone to track your location? July 26, 2011, 12:43 PM — There's no need to panic, or start shopping for aluminum-foil headwear, but the super-secret National Security Agency has apparently been thinking frequently enough about whether the NSA is allowed to intercept location data from cell phones to track U.S. citizens that the agency's chief lawyer was able to speak intelligently about it off the cuff while interviewing for a different job. "There are certain circumstances where that authority may exist," even if the NSA has no warrant to investigate a the person whose privacy it is invading or global permission to eavesdrop on everyone, according to Matthew Olsen, the NSA's general counsel. He didn't come to talk about that particularly; he said it yesterday in response to a question from the Senate Select Committee on Intelligence, which was considering whether he'd be a good choice to run the National Counterterrorism Center. So far, though, no law.

NSA TEMPEST Attack can remotely view your computer using radio waves! This is a public service announcement. Using an antenna and some gadgets from your local electronics store, you can spy on your neighbors TV. If you think that’s scary, the National Security Agency can view your cellphone screen from over a kilometer away, listen to signals from your monitor cable, and use your computer’s power supply to snoop on you. This security flaw inherent in all digital devices is the greatest threat to our privacy and has massive implications for the future of the entire digital world. This article will give some examples of how this technology works, why it matters, and provide you with a plethora of research links to get educated about this rarely discussed topic. I encourage you to read the links, protect your sensitive material as best you can, and demand the same electromagnetic protection for consumer products that the military expects.

The 5 Most Blatantly Corrupt Industries in the World . . . And What YOU Can Do About It Corruption is everywhere, but nowhere is it so blatant and so deep-seated as in the 5 following industries: Banking, Energy, Agriculture/Biotech, Media, and Healthcare. Conspicuously missing from this list, of course, is politics. The reason that politics was not included is because political corruption is very rarely confined to the political arena. Technologies & History of Directed Energy Weapons - Organised Crime of Covert Electronic Assault, Stalking & Surveillance - New Zealand More on what these victims endure Read the short story below - About what victims endure Pages 1-7.Page 8 onward includes plenty of credible information with directions to the informative links page - to back/up the histories and usages of these tactics etc Re below... The True Story-The Bourne Identity(History Channel) A very informative documentary about the early days of experiments on controlling the human mind and creating assassination with no memory of their killing actions.

The Pentagon Labyrinth: 10 Short Essays to Help You Through It Aug.16.2010 by dni The Pentagon Labyrinth: Ten Short Essays to Help You Through It aims to help both newcomers and seasoned observers learn how to grapple with the problems of national defense. Intended for readers who are frustrated with the superficial nature of the debate on national security, this handbook takes advantage of the insights of ten unique professionals, each with decades of experience in the armed services, the Pentagon bureaucracy, Congress, the intelligence community, military history, journalism and other disciplines. The short but provocative essays will help you to:

Do We Have the NSA on the Run, or Is a Much Worse Surveillance State in the Making? December 20, 2013 | Like this article? Join our email list: Stay up to date with the latest headlines via email. Earlier this week, Obama's hand-picked panel charged with reviewing the nation's surveillance state issued a set of recommendations that includes limiting the indiscriminate mass collection of telephone records and other reforms.

The 3 rules of a secure cell phone Big brother is coming after your phone. The government is increasingly interested in your calls, your movements, and your purchases. Don’t believe me? They don’t even need a warrant to seize your records anymore: Think about this: you probably have your credit locked (or you should!) Guantánamo Bay contractor on shortlist to run UK police services A US Pentagon contractor that was involved in building Guantánamo Bay is on a shortlist of private consortiums bidding for a £1.5bn contract to run key policing services in the West Midlands and Surrey. The Texas-based Kellogg Brown & Root, which was sold off by the controversial Halliburton corporation in 2007, is part of a consortium which has made it to the final shortlist for a contract that will see large-scale involvement of the private sector in British policing for the first time. When KBR was still part of Halliburton it won a large share of Pentagon contracts to build and manage US military bases in Iraq after the 2003 invasion. Its former chief executive, Dick Cheney, was US vice-president. The Guardian has learned that 15 groups of companies and individual firms have made it on to the most recent shortlist. More than 200 firms initially expressed an interest at a "bidders' conference" held in March.

Xbox Live among game services targeted by US and UK spy agencies To the National Security Agency analyst writing a briefing to his superiors, the situation was clear: their current surveillance efforts were lacking something. The agency's impressive arsenal of cable taps and sophisticated hacking attacks was not enough. What it really needed was a horde of undercover Orcs. That vision of spycraft sparked a concerted drive by the NSA and its UK sister agency GCHQ to infiltrate the massive communities playing online games, according to secret documents disclosed by whistleblower Edward Snowden. The files were obtained by the Guardian and are being published on Monday in partnership with the New York Times and ProPublica.

List of cyber-weapons developed by Pentagon to streamline computer warfare “So whether it’s a tank, an M-16 or a computer virus, it’s going to follow the same rules so that we can understand how to employ it, when you can use it, when you can’t, what you can and can’t use,” a senior military official said. The integration of cyber-technologies into a formal structure of approved capabilities is perhaps the most significant operational development in military cyber-doctrine in years, the senior military official said. The framework clarifies, for instance, that the military needs presidential authorization to penetrate a foreign computer network and leave a cyber-virus that can be activated later.

Catalog Reveals NSA Has Back Doors for Numerous Devices Editor's note: This article accompanies our main feature story on the NSA's Tailored Access Operations unit. You can read it here. When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.

NSA Devises Radio Pathway Into Computers not connected to the internet By DAVID E. SANGER and THOM SHANKER WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.

Related:  (H)acktivismeFacebook: privacyEducational Social Engineeringconspiracy and the newsconstructOpen Government vs. Authoritarianism