Skip to content or view mobile version

Home | Mobile | Editorial | Mission | Privacy | About | Contact | Help | Security | Support

A network of individuals, independent and alternative media activists and organisations, offering grassroots, non-corporate, non-commercial coverage of important social and political issues.

Spying and Propaganda Through Social Media

Julie Levesque (repost) | 29.02.2012 09:07 | Other Press | Technology | World

A new study by the Mediterranean Council for Intelligence Studies’ (MCIS) 2012 Intelligence Studies Yearbook points to the use of social media as “the new cutting edge in open-source tactical intelligence collection”. IntelNews.org’s Joseph Fitsanakis, who co-authored the study, reports:

We explain that Facebook, Twitter, YouTube, and a host of other social networking platforms are increasingly viewed by intelligence agencies as invaluable channels of information acquisition. We base our findings on three recent case studies, which we believe highlight the intelligence function of social networking. (Joseph Fitsanakis, Research: Spies increasingly using Facebook, Twitter to gather data, intelNews.org, February 13, 2012)



What the study fails to mention, however, is the use of social media by intelligence agencies for other purposes. The study leads us to believe that social media is solely an intelligence gathering tool, when in fact, a number of reports have shown that it is used for propaganda including the creation of fake identities in support of covert operations. Those practices are discussed in Army of Fake Social Media Friends to Promote Propaganda, Social Media: Air Force ordered software to manage army of Fake Virtual People and Pentagon Seeks to Manipulate Social Media for Propaganda Purposes, published on Global Research in 2011.

The MCIS study is partly based on the “Arab Spring” framework which allegedly “prompted the US government to begin developing guidelines for culling intelligence from social media networks”. (Ibid.)

Again, this leaves out the fact that the U.S. Government provides “activist training” to foreign nationals to destabilize their country of origin. This tactic is detailed in Tony Cartalucci’s latest article, Egypt: US-funded Agitators on Trial: US “Democracy Promotion” = Foreign-funded Sedition.

“Cyber dissidence” is sponsored among others by CIA-linked Freedom House. The First of The Bush Institute’s Human Freedom Events, Co-Sponsored by Freedom House was titled “The Conference on Cyber Dissidents: Global Successes and Challenges”.

The Conference on Cyber Dissidents highlighted the work, methods, courage and achievements of its eight dissident guest speakers, from seven nations. Five of these nations are places where freedom has been extinguished (all rated “not free” by Freedom House): China, Cuba, Iran, Syria, and Russia. Two others are places where freedom is in peril (both rated “partly free” by Freedom House) because of an authoritarian government accumulating more power, as in Venezuela, or because of the threat of internal terrorist groups, as in Colombia. (The Conference on Cyber Dissidents: Global Successes and Challenges, The George W. Bush Presidential Center)

Countries where “freedom has been extinguished” and which are U.S. allies, such as Bahrain or Saudi Arabia, are not listed above. The only U.S. ally listed is Colombia and its freedom is said to be threatened by terrorist groups, rather than by its governement. It is worth noting that the Colombian government has been accused of spying on its journalists and the Inter-American Commission on Human Rights (IACHR) says freedom of expression ‘barely exists’ in Colombia.

The goal of “activist training” by U.S. NGOs is to destabilize America’s political enemies in the name of freedom. “Cyber dissidence” is in turn used by intelligence agencies for covert operations.

Julie Levesque (repost)
- Homepage: http://occupycorporatism.com/?p=6711

Comments

Hide the following 4 comments

Privacy tip: Firefox + Ghostery + AdBlock Plus

01.03.2012 16:53

Internet Explorer is Microsoft and Chrome is Google, so I would recommend use Firefox as your web browser with the Ghostery add-on.

Ghostery blocks a wide range of tracking and advertising cookies and other nasties. Notice all the Facebook "Like" icons everywhere? They allow Facebook to track all the other sites you visit.

The AdBlock Plus add-on is also handy to have to get rid of all the advertising crap. Makes sites load a lot faster too.

 https://www.mozilla.org/en-US/firefox/fx/
 https://addons.mozilla.org/en-US/firefox/addon/ghostery/
 https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/

anon


further reading

01.03.2012 20:57

Tech tools for Activists
 http://london.indymedia.org/system/file_upload/2010/10/12/281/2010_10_10_hacktionlab_guide_laid_out.pdf

The Pentagon will invest up to 42 million dollars in a program that will monitor and influence social media websites, such as twitter.
 http://techland.time.com/2011/08/02/defense-department-initiative-seeks-to-analyze-social-media-patterns/#0_undefined,0_

Visible Technologies -Social Media monitoring
Attensity - Social search engine
SafeWeb PrivacyMatrix -browsing

cyber-threat-summary
 http://wlstorage.net/file/cyber-threat-summary.pdf

us-dhs-leftwing-extremist-cyber-threat
 http://wlstorage.net/file/us-dhs-leftwing-extremist-cyber-threat.pdf

new monitoring use of the SIPRNet
 http://www.fas.org/irp/congress/2011_hr/infoshare-qfr.pdf

Internet Governance and the Domain Name System
 http://www.fas.org/sgp/crs/misc/R42351.pdf

cyberwar
 http://www.fas.org/sgp/crs/natsec/RL33532.pdf

Who Watches the Watchmen?
 http://www.fas.org/sgp/eprint/ross.pdf

Smart Meter Data: Privacy and Cybersecurity
 http://www.fas.org/sgp/crs/misc/R42338.pdf

Spectrum Policy in the Age of Broadband
 http://www.fas.org/sgp/crs/misc/R40674.pdf

The Federal Networking and Information Technology Research and Development Program
 http://www.fas.org/sgp/crs/misc/RL33586.pdf

Communications Security Monitoring
 http://www.fas.org/irp/doddir/army/ar380-53.pdf

Federal Laws Relating to Cybersecurity
 http://www.fas.org/sgp/crs/natsec/R42114.pdf

Governmental Tracking of Cell Phones and Vehicles
 http://www.fas.org/sgp/crs/intel/R42109.pdf

cyber and internet governance issues
 http://wikileaks.org/gifiles/docs/167291_-alpha-insight-ct-cyber-cyber-and-internet-governance-issues.html
 http://wikileaks.org/gifiles/attach/13/13943_GSC-CyberBulletin-4-October-2011.pdf

Re: hacker questions
 http://wikileaks.org/gifiles/docs/1549513_re-hacker-questions-.html

Fwd: Re: US 'to view major cyber attacks as acts of war'
 http://wikileaks.org/gifiles/docs/1661172_fwd-re-us-to-view-major-cyber-attacks-as-acts-of-war-.html

Cyber Security Question...
 http://wikileaks.org/gifiles/docs/5482669_cyber-security-question-.html

palantir software
 http://wikileaks.org/gifiles/docs/745547_re-ct-tactical-palantir-software-.html

open-source-practice
 http://wikileaks.org/gifiles/docs/5091635_re-a-thought-on-open-source-practice-.html

~~~


more

04.03.2012 14:06

Surveillance and Censorship in UK and EU
 http://cryptome.org/0003/great-secret.pdf

Best Practices for Keeping Your Home Network Secure
 http://www.fas.org/irp/nsa/best_practices.pdf

Cyber Threats to Government and ISP Facilities
 http://cryptome.org/0003/gov-isp-threats.htm

Global Grid Study
 http://www.fas.org/irp/agency/dod/jason/grid.pdf

Common Industrial Control System Cyber Security Weaknesses
 http://www.fas.org/sgp/eprint/nstb.pdf

Cyberwarfare
 http://www.fas.org/sgp/crs/intel/RL30735.pdf

DoD Unified Capabilities for Networks
 http://cryptome.org/dodi/dodi-8100-04.pdf

Science of Cyber-Security
 http://www.fas.org/irp/agency/dod/jason/cyber.pdf

Information Warfare-Defense
 http://www.dod.mil/pubs/foi/Science_and_Technology/DSB/834.pdf

Information Architecture for the Battlefield
 http://www.dod.mil/pubs/foi/Science_and_Technology/DSB/724.pdf

Command Control and Communications Problems
 http://www.dod.mil/pubs/foi/Science_and_Technology/WSEG/503.pdf

maintaining information security in a warfighting environment
 http://www.fas.org/irp/agency/dod/jason/classpol.pdf

.


yeah

04.03.2012 22:37

DoD Handling Dissent/Protest by Service Members
 http://cryptome.org/dodi/dodi-1325-06.pdf

NSA Overview of Cloud Computing
 http://cryptome.org/2012/01/nsa-cloud.pdf

Security and Privacy in Public Cloud Computing
 http://cryptome.org/0003/SP-800-144.pdf

DHS Updates Social Media Spying Targets
 http://cryptome.org/2012/01/dhs-sm-spy-a.pdf

DHS Joint Cybersecurity Services Pilot
 http://cryptome.org/2012/01/0080.pdf

NSA Review of Information for the Public
 http://cryptome.org/2012/01/0072.pdf

FBI Social Media and Open Sources Spying
 http://cryptome.org/2012/01/0065.pdf

British Bases in Cyprus and Signals Intelligence
 http://cryptome.org/2012/01/0060.pdf

Internet Trust Next Generation
 http://cryptome.org/2012/01/0042.pdf

PGP Spying
 http://cryptome.org/2012/01/0013.pdf

285 Pages of DHS Media Monitoring Docs
 http://epic.org/foia/epic-v-dhs-media-monitoring/EPIC-FOIA-DHS-Media-Monitoring-12-2012.pdf

Navy Critical Infrastructure Program
 http://cryptome.org/dodi/secnav-3501-1c.pdf

Air Force COMINT Solicitation
 http://cryptome.org/0006/af-comint-sol.pdf

Militarizing Civil Agencies for Peace of Mind
 http://cryptome.org/0005/gsa-1122.zip

Raytheon Cybersecurity Technology
 http://cryptome.org/0005/raytheon-cysec.zip

Raytheon Intelligence and Information Systems
 http://cryptome.org/raytheon-iis.pdf

Critical Infrastructure Needs Cybersecurity
 http://cryptome.org/0005/gao-11-865t.pdf

Marine Full Spectrum Cyberspace Operations
 http://cryptome.org/dodi/usmc-cyber.zip

DoD Strategy for Operating in Cyberspace
 http://cryptome.org/0005/dod-cyberspace.zip

FBI Computer Patheticism
 http://cryptome.org/nara/fbi/fbi-04-0204.pdf

Smart Grid Cybersecurity Weaknesses
 http://cryptome.org/0003/gao-11-117.zip
 http://cryptome.org/0003/nistir-7628.zip
 http://cryptome.org/0002/doe100510-2.pdf
 http://cryptome.org/0002/doe100510.pdf
 http://cryptome.org/2012/01/gao-12-507t.pdf

NSA And Computer Development
 http://cryptome.org/0002/nsa-computers.pdf

Global Free Flow of Information on the Internet
 http://cryptome.org/0002/doc092910.pdf

DARPA RFP for Cyber Insider Threat
 http://cryptome.org/dodi/cinder.pdf

China Military and Security Developments 2010
 http://cryptome.org/dodi/cmpr-2010.zip

False Blogs and Military Information Strategy
 http://cryptome.org/dodi/jsou-06-5.pdf

Electronic Intelligence (ELINT) at NSA
 http://cryptome.org/nsa-elint.zip

Field Manual 2.0 Intelligence
 http://cryptome.org/dodi/fm-2-0-intel.zip

Covert Blogs as Military Information Operations
 http://cryptome.org/covert-blogs.zip

Soviet Capabilities in Electronic Warfare
 http://cryptome.org/soviet-ew.zip

How the FBI Surveils the Net
 http://cryptome.org/fbi-cgvop.zip

UK Police Guide to Computer/Electronic Evidence
 http://cryptome.org/acpo-guide.htm

NSA to intercept TETRA police networks
 http://cryptome.org/nsa-tetra.htm

.


Upcoming Coverage
View and post events
Upcoming Events UK
24th October, London: 2015 London Anarchist Bookfair
2nd - 8th November: Wrexham, Wales, UK & Everywhere: Week of Action Against the North Wales Prison & the Prison Industrial Complex. Cymraeg: Wythnos o Weithredu yn Erbyn Carchar Gogledd Cymru

Ongoing UK
Every Tuesday 6pm-8pm, Yorkshire: Demo/vigil at NSA/NRO Menwith Hill US Spy Base More info: CAAB.

Every Tuesday, UK & worldwide: Counter Terror Tuesdays. Call the US Embassy nearest to you to protest Obama's Terror Tuesdays. More info here

Every day, London: Vigil for Julian Assange outside Ecuadorian Embassy

Parliament Sq Protest: see topic page
Ongoing Global
Rossport, Ireland: see topic page
Israel-Palestine: Israel Indymedia | Palestine Indymedia
Oaxaca: Chiapas Indymedia
Regions
All Regions
Birmingham
Cambridge
Liverpool
London
Oxford
Sheffield
South Coast
Wales
World
Other Local IMCs
Bristol/South West
Nottingham
Scotland
Social Media
You can follow @ukindymedia on indy.im and Twitter. We are working on a Twitter policy. We do not use Facebook, and advise you not to either.
Support Us
We need help paying the bills for hosting this site, please consider supporting us financially.
Other Media Projects
Schnews
Dissident Island Radio
Corporate Watch
Media Lens
VisionOnTV
Earth First! Action Update
Earth First! Action Reports
Topics
All Topics
Afghanistan
Analysis
Animal Liberation
Anti-Nuclear
Anti-militarism
Anti-racism
Bio-technology
Climate Chaos
Culture
Ecology
Education
Energy Crisis
Fracking
Free Spaces
Gender
Globalisation
Health
History
Indymedia
Iraq
Migration
Ocean Defence
Other Press
Palestine
Policing
Public sector cuts
Repression
Social Struggles
Technology
Terror War
Workers' Movements
Zapatista
Major Reports
NATO 2014
G8 2013
Workfare
2011 Census Resistance
Occupy Everywhere
August Riots
Dale Farm
J30 Strike
Flotilla to Gaza
Mayday 2010
Tar Sands
G20 London Summit
University Occupations for Gaza
Guantanamo
Indymedia Server Seizure
COP15 Climate Summit 2009
Carmel Agrexco
G8 Japan 2008
SHAC
Stop Sequani
Stop RWB
Climate Camp 2008
Oaxaca Uprising
Rossport Solidarity
Smash EDO
SOCPA
Past Major Reports
Encrypted Page
You are viewing this page using an encrypted connection. If you bookmark this page or send its address in an email you might want to use the un-encrypted address of this page.
If you recieved a warning about an untrusted root certificate please install the CAcert root certificate, for more information see the security page.

Global IMC Network


www.indymedia.org

Projects
print
radio
satellite tv
video

Africa

Europe
antwerpen
armenia
athens
austria
barcelona
belarus
belgium
belgrade
brussels
bulgaria
calabria
croatia
cyprus
emilia-romagna
estrecho / madiaq
galiza
germany
grenoble
hungary
ireland
istanbul
italy
la plana
liege
liguria
lille
linksunten
lombardia
madrid
malta
marseille
nantes
napoli
netherlands
northern england
nottingham imc
paris/île-de-france
patras
piemonte
poland
portugal
roma
romania
russia
sardegna
scotland
sverige
switzerland
torun
toscana
ukraine
united kingdom
valencia

Latin America
argentina
bolivia
chiapas
chile
chile sur
cmi brasil
cmi sucre
colombia
ecuador
mexico
peru
puerto rico
qollasuyu
rosario
santiago
tijuana
uruguay
valparaiso
venezuela

Oceania
aotearoa
brisbane
burma
darwin
jakarta
manila
melbourne
perth
qc
sydney

South Asia
india


United States
arizona
arkansas
asheville
atlanta
Austin
binghamton
boston
buffalo
chicago
cleveland
colorado
columbus
dc
hawaii
houston
hudson mohawk
kansas city
la
madison
maine
miami
michigan
milwaukee
minneapolis/st. paul
new hampshire
new jersey
new mexico
new orleans
north carolina
north texas
nyc
oklahoma
philadelphia
pittsburgh
portland
richmond
rochester
rogue valley
saint louis
san diego
san francisco
san francisco bay area
santa barbara
santa cruz, ca
sarasota
seattle
tampa bay
united states
urbana-champaign
vermont
western mass
worcester

West Asia
Armenia
Beirut
Israel
Palestine

Topics
biotech

Process
fbi/legal updates
mailing lists
process & imc docs
tech