BP accused of harassing oil spill critics on Facebook(0)
BP is embroiled in a new controversy after accusations that the British corporation hired a public relations firm to harass and intimidate Facebook users who condemned the company for its handling of the Gulf of Mexico oil spill.
The largest environmental disaster in US history began on April 20, 2010 with an explosion on the Deepwater Horizon oil rig located near the Mississippi River Delta. Read More
Click to kick trolls out: New anti-abuse button introduced on Twitter(0)
Twitter has announced new rules, including an in-tweet button to report abuse instantly, following massive troll attacks targeting female British journalists and activists, who successfully campaigned for placing a woman’s image on a British banknote.
Twitter announced in its blog on Saturday that it is introducing new rules to combat online trolling. The major innovation is a one-click “report abuse” button, which will appear gradually on all Twitter versions for different mobile devices Read More
CIA admits full monitoring of Facebook and other social networks(0)
Most people use social media like Facebook and Twitter to share photos of friends and family, chat with friends and strangers about random and amusing diversions, or follow their favorite websites, bands and television shows.
But what does the US military use those same networks for? Well, we can’t tell you: That’s “classified,” a CENTCOM spokesman recently informed Raw Story. Read More
Are My “Friends” Even Real People?(0)
These days, with Facebook and Twitter and social media galore, it can be increasingly hard to tell who your “friends” are.
But after this, Internet users would be well advised to ask another question entirely:
In the continuing saga of data security firm HBGary, a new caveat has come to light:
The revelation was among those contained in the company’s emails, which were dumped onto bittorrent networks after hackers with cyber protest group “Anonymous” broke into their systems.
In another document unearthed by “Anonymous,” one of HBGary’s employees also mentioned gaming geolocation services to make it appear as though selected fake persons were at actual events.
While there are certainly legitimate applications for such software, such as managing multiple “official” social media accounts from a single input, the more nefarious potential is clear.
Unfortunately, the Air Force’s contract description doesn’t help dispel suspicions. As the text explains, the software would require licenses for 50 users with 10 personas each, for a total of 500.
These personas would have to be,
It continues, noting the need for secure virtual private networks that randomize the operator’s Internet protocol (IP) address, making it impossible to detect that it’s a single person orchestrating all these posts.
Another entry calls for static IP address management for each persona, making it appear as though each fake person was consistently accessing from the same computer each time.
The contract also sought methods to anonymously establish virtual private servers with private hosting firms in specific geographic locations. This would allow that server’s “geosite” to be integrated with their social media profiles, effectively gaming geolocation services.
The Air Force added that the “place of performance” for the contract would be at MacDill Air Force Base, along with Kabul, Afghanistan and Baghdad. The contract was offered on June 22, 2010.
It was not clear exactly what the Air Force was doing with this software, or even if it had been procured.
“Persona management software” can be used to manipulate public opinion on key information, such as news reports. An unlimited number of virtual “people” could be marshaled by only a few real individuals, empowering them to create the illusion of consensus.
You could call it a virtual flash mob, or a digital “Brooks Brothers Riot,” so to speak: compelling, but not nearly as spontaneous as it appears.
That’s precisely what got DailyKos blogger Happy Rockefeller in a snit: the potential for military-run armies of fake people manipulating and, in some cases, even manufacturing the appearance of public opinion.
It was Rockefeller who was first to highlight the Air Force’s “persona” contract, which was available on a public website.
A call to MacDill Air Force Base, requesting an explanation of the contract and what this software might be used for, was answered by a public affairs officer who promised a call-back.
No reply was received at time of this story’s publication.
Other e-mails circulated by HBGary’s CEO illuminate highly personal data about critics of the US Chamber of Commerce, including detailed information about their spouses and children, as well as their locations and professional links. The firm, it was revealed, was just one part of a group called “Team Themis,” tasked by the Chamber to come up with strategies for responding to progressive bloggers and others.
“Team Themis” also included a proposal to use malware hacks against progressive organizations, and the submission of fake documents in an effort to discredit established groups.
HBGary was also behind a plot by Bank of America to destroy WikiLeaks’ technology platform, other emails revealed. The company was humiliated by members of “Anonymous” after CEO Aaron Barr bragged that he’d “infiltrated” the group.
A request for comment emailed to HBGary did not receive a reply.
A list of interested vendors responding to the Air Force contract for “persona management software” included HBGary subsideary HBGary Federal, further analysis of a government website has revealed.
Other companies that offered their services included,
CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information(0)
In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity. Read More
Twenty-Five Ways To Suppress Truth: The Rules of Disinformation(0)
“Twenty-Five Ways To Suppress Truth: The Rules of Disinformation” by H. Michael Sweeney is built upon “Thirteen Techniques for Truth Suppression” by David Martin, the following may be useful to the initiate in the world of dealing with veiled and half-truth, lies, and suppression of truth when serious crimes are studied in public forums. Read More
Feds Targeting Alternative Media In Information Warfare Campaign(1)
Government documents reveal federal counter-intelligence agencies are targeting alternative news sites in an information warfare campaign.
After nearly a year-long struggle with USWGO reporter Brian Hill has been able to force the federal government to hand over documents a short list of documents revealing alternative media news sites being monitored. Read More
Websites Will Be Forced To Identify Trolls(0)
Websites will be legally obliged to provide victims with the identity of people who post abusive and defamatory online messages about them under plans by the Government. Read More
The Anti-Truther Bible: The Ten Commandments..(0)
This is Propaganda That Has Been Released By The Website Listed Below…
1. I am the Forever Knowing One, thy Father, thy Government, thy Savior and Eternal Protector, which gives you life and guides you to the light, to the right and true way. Read More
|28 Year Old CEO Of Bitcoin Exchange Dead After Possible Suicide ?(0)|
|Navy Commander Who Successfully Interrogated 9/11 Terrorist Mastermind KSM Found Murdered(0)|
|Another “Successful Banker” Found Dead – Nine In Total Now(0)|
|So-far eight international bankers died in 2014….(0)|
March 7th, 2014
March 6th, 2014
March 6th, 2014