Skip to content or view screen version

Spying and Propaganda Through Social Media

Julie Levesque (repost) | 29.02.2012 09:07 | Other Press | Technology | World

A new study by the Mediterranean Council for Intelligence Studies’ (MCIS) 2012 Intelligence Studies Yearbook points to the use of social media as “the new cutting edge in open-source tactical intelligence collection”. IntelNews.org’s Joseph Fitsanakis, who co-authored the study, reports:

We explain that Facebook, Twitter, YouTube, and a host of other social networking platforms are increasingly viewed by intelligence agencies as invaluable channels of information acquisition. We base our findings on three recent case studies, which we believe highlight the intelligence function of social networking. (Joseph Fitsanakis, Research: Spies increasingly using Facebook, Twitter to gather data, intelNews.org, February 13, 2012)



What the study fails to mention, however, is the use of social media by intelligence agencies for other purposes. The study leads us to believe that social media is solely an intelligence gathering tool, when in fact, a number of reports have shown that it is used for propaganda including the creation of fake identities in support of covert operations. Those practices are discussed in Army of Fake Social Media Friends to Promote Propaganda, Social Media: Air Force ordered software to manage army of Fake Virtual People and Pentagon Seeks to Manipulate Social Media for Propaganda Purposes, published on Global Research in 2011.

The MCIS study is partly based on the “Arab Spring” framework which allegedly “prompted the US government to begin developing guidelines for culling intelligence from social media networks”. (Ibid.)

Again, this leaves out the fact that the U.S. Government provides “activist training” to foreign nationals to destabilize their country of origin. This tactic is detailed in Tony Cartalucci’s latest article, Egypt: US-funded Agitators on Trial: US “Democracy Promotion” = Foreign-funded Sedition.

“Cyber dissidence” is sponsored among others by CIA-linked Freedom House. The First of The Bush Institute’s Human Freedom Events, Co-Sponsored by Freedom House was titled “The Conference on Cyber Dissidents: Global Successes and Challenges”.

The Conference on Cyber Dissidents highlighted the work, methods, courage and achievements of its eight dissident guest speakers, from seven nations. Five of these nations are places where freedom has been extinguished (all rated “not free” by Freedom House): China, Cuba, Iran, Syria, and Russia. Two others are places where freedom is in peril (both rated “partly free” by Freedom House) because of an authoritarian government accumulating more power, as in Venezuela, or because of the threat of internal terrorist groups, as in Colombia. (The Conference on Cyber Dissidents: Global Successes and Challenges, The George W. Bush Presidential Center)

Countries where “freedom has been extinguished” and which are U.S. allies, such as Bahrain or Saudi Arabia, are not listed above. The only U.S. ally listed is Colombia and its freedom is said to be threatened by terrorist groups, rather than by its governement. It is worth noting that the Colombian government has been accused of spying on its journalists and the Inter-American Commission on Human Rights (IACHR) says freedom of expression ‘barely exists’ in Colombia.

The goal of “activist training” by U.S. NGOs is to destabilize America’s political enemies in the name of freedom. “Cyber dissidence” is in turn used by intelligence agencies for covert operations.

Julie Levesque (repost)
- Homepage: http://occupycorporatism.com/?p=6711

Comments

Hide the following 4 comments

Privacy tip: Firefox + Ghostery + AdBlock Plus

01.03.2012 16:53

Internet Explorer is Microsoft and Chrome is Google, so I would recommend use Firefox as your web browser with the Ghostery add-on.

Ghostery blocks a wide range of tracking and advertising cookies and other nasties. Notice all the Facebook "Like" icons everywhere? They allow Facebook to track all the other sites you visit.

The AdBlock Plus add-on is also handy to have to get rid of all the advertising crap. Makes sites load a lot faster too.

 https://www.mozilla.org/en-US/firefox/fx/
 https://addons.mozilla.org/en-US/firefox/addon/ghostery/
 https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/

anon


further reading

01.03.2012 20:57

Tech tools for Activists
 http://london.indymedia.org/system/file_upload/2010/10/12/281/2010_10_10_hacktionlab_guide_laid_out.pdf

The Pentagon will invest up to 42 million dollars in a program that will monitor and influence social media websites, such as twitter.
 http://techland.time.com/2011/08/02/defense-department-initiative-seeks-to-analyze-social-media-patterns/#0_undefined,0_

Visible Technologies -Social Media monitoring
Attensity - Social search engine
SafeWeb PrivacyMatrix -browsing

cyber-threat-summary
 http://wlstorage.net/file/cyber-threat-summary.pdf

us-dhs-leftwing-extremist-cyber-threat
 http://wlstorage.net/file/us-dhs-leftwing-extremist-cyber-threat.pdf

new monitoring use of the SIPRNet
 http://www.fas.org/irp/congress/2011_hr/infoshare-qfr.pdf

Internet Governance and the Domain Name System
 http://www.fas.org/sgp/crs/misc/R42351.pdf

cyberwar
 http://www.fas.org/sgp/crs/natsec/RL33532.pdf

Who Watches the Watchmen?
 http://www.fas.org/sgp/eprint/ross.pdf

Smart Meter Data: Privacy and Cybersecurity
 http://www.fas.org/sgp/crs/misc/R42338.pdf

Spectrum Policy in the Age of Broadband
 http://www.fas.org/sgp/crs/misc/R40674.pdf

The Federal Networking and Information Technology Research and Development Program
 http://www.fas.org/sgp/crs/misc/RL33586.pdf

Communications Security Monitoring
 http://www.fas.org/irp/doddir/army/ar380-53.pdf

Federal Laws Relating to Cybersecurity
 http://www.fas.org/sgp/crs/natsec/R42114.pdf

Governmental Tracking of Cell Phones and Vehicles
 http://www.fas.org/sgp/crs/intel/R42109.pdf

cyber and internet governance issues
 http://wikileaks.org/gifiles/docs/167291_-alpha-insight-ct-cyber-cyber-and-internet-governance-issues.html
 http://wikileaks.org/gifiles/attach/13/13943_GSC-CyberBulletin-4-October-2011.pdf

Re: hacker questions
 http://wikileaks.org/gifiles/docs/1549513_re-hacker-questions-.html

Fwd: Re: US 'to view major cyber attacks as acts of war'
 http://wikileaks.org/gifiles/docs/1661172_fwd-re-us-to-view-major-cyber-attacks-as-acts-of-war-.html

Cyber Security Question...
 http://wikileaks.org/gifiles/docs/5482669_cyber-security-question-.html

palantir software
 http://wikileaks.org/gifiles/docs/745547_re-ct-tactical-palantir-software-.html

open-source-practice
 http://wikileaks.org/gifiles/docs/5091635_re-a-thought-on-open-source-practice-.html

~~~


more

04.03.2012 14:06

Surveillance and Censorship in UK and EU
 http://cryptome.org/0003/great-secret.pdf

Best Practices for Keeping Your Home Network Secure
 http://www.fas.org/irp/nsa/best_practices.pdf

Cyber Threats to Government and ISP Facilities
 http://cryptome.org/0003/gov-isp-threats.htm

Global Grid Study
 http://www.fas.org/irp/agency/dod/jason/grid.pdf

Common Industrial Control System Cyber Security Weaknesses
 http://www.fas.org/sgp/eprint/nstb.pdf

Cyberwarfare
 http://www.fas.org/sgp/crs/intel/RL30735.pdf

DoD Unified Capabilities for Networks
 http://cryptome.org/dodi/dodi-8100-04.pdf

Science of Cyber-Security
 http://www.fas.org/irp/agency/dod/jason/cyber.pdf

Information Warfare-Defense
 http://www.dod.mil/pubs/foi/Science_and_Technology/DSB/834.pdf

Information Architecture for the Battlefield
 http://www.dod.mil/pubs/foi/Science_and_Technology/DSB/724.pdf

Command Control and Communications Problems
 http://www.dod.mil/pubs/foi/Science_and_Technology/WSEG/503.pdf

maintaining information security in a warfighting environment
 http://www.fas.org/irp/agency/dod/jason/classpol.pdf

.


yeah

04.03.2012 22:37

DoD Handling Dissent/Protest by Service Members
 http://cryptome.org/dodi/dodi-1325-06.pdf

NSA Overview of Cloud Computing
 http://cryptome.org/2012/01/nsa-cloud.pdf

Security and Privacy in Public Cloud Computing
 http://cryptome.org/0003/SP-800-144.pdf

DHS Updates Social Media Spying Targets
 http://cryptome.org/2012/01/dhs-sm-spy-a.pdf

DHS Joint Cybersecurity Services Pilot
 http://cryptome.org/2012/01/0080.pdf

NSA Review of Information for the Public
 http://cryptome.org/2012/01/0072.pdf

FBI Social Media and Open Sources Spying
 http://cryptome.org/2012/01/0065.pdf

British Bases in Cyprus and Signals Intelligence
 http://cryptome.org/2012/01/0060.pdf

Internet Trust Next Generation
 http://cryptome.org/2012/01/0042.pdf

PGP Spying
 http://cryptome.org/2012/01/0013.pdf

285 Pages of DHS Media Monitoring Docs
 http://epic.org/foia/epic-v-dhs-media-monitoring/EPIC-FOIA-DHS-Media-Monitoring-12-2012.pdf

Navy Critical Infrastructure Program
 http://cryptome.org/dodi/secnav-3501-1c.pdf

Air Force COMINT Solicitation
 http://cryptome.org/0006/af-comint-sol.pdf

Militarizing Civil Agencies for Peace of Mind
 http://cryptome.org/0005/gsa-1122.zip

Raytheon Cybersecurity Technology
 http://cryptome.org/0005/raytheon-cysec.zip

Raytheon Intelligence and Information Systems
 http://cryptome.org/raytheon-iis.pdf

Critical Infrastructure Needs Cybersecurity
 http://cryptome.org/0005/gao-11-865t.pdf

Marine Full Spectrum Cyberspace Operations
 http://cryptome.org/dodi/usmc-cyber.zip

DoD Strategy for Operating in Cyberspace
 http://cryptome.org/0005/dod-cyberspace.zip

FBI Computer Patheticism
 http://cryptome.org/nara/fbi/fbi-04-0204.pdf

Smart Grid Cybersecurity Weaknesses
 http://cryptome.org/0003/gao-11-117.zip
 http://cryptome.org/0003/nistir-7628.zip
 http://cryptome.org/0002/doe100510-2.pdf
 http://cryptome.org/0002/doe100510.pdf
 http://cryptome.org/2012/01/gao-12-507t.pdf

NSA And Computer Development
 http://cryptome.org/0002/nsa-computers.pdf

Global Free Flow of Information on the Internet
 http://cryptome.org/0002/doc092910.pdf

DARPA RFP for Cyber Insider Threat
 http://cryptome.org/dodi/cinder.pdf

China Military and Security Developments 2010
 http://cryptome.org/dodi/cmpr-2010.zip

False Blogs and Military Information Strategy
 http://cryptome.org/dodi/jsou-06-5.pdf

Electronic Intelligence (ELINT) at NSA
 http://cryptome.org/nsa-elint.zip

Field Manual 2.0 Intelligence
 http://cryptome.org/dodi/fm-2-0-intel.zip

Covert Blogs as Military Information Operations
 http://cryptome.org/covert-blogs.zip

Soviet Capabilities in Electronic Warfare
 http://cryptome.org/soviet-ew.zip

How the FBI Surveils the Net
 http://cryptome.org/fbi-cgvop.zip

UK Police Guide to Computer/Electronic Evidence
 http://cryptome.org/acpo-guide.htm

NSA to intercept TETRA police networks
 http://cryptome.org/nsa-tetra.htm

.