A new study by the Mediterranean Council for Intelligence Studies’ (MCIS) 2012 Intelligence Studies Yearbook points to the use of social media as “the new cutting edge in open-source tactical intelligence collection”. IntelNews.org’s Joseph Fitsanakis, who co-authored the study, reports:
We explain that Facebook, Twitter, YouTube, and a host of other social networking platforms are increasingly viewed by intelligence agencies as invaluable channels of information acquisition. We base our findings on three recent case studies, which we believe highlight the intelligence function of social networking. (Joseph Fitsanakis, Research: Spies increasingly using Facebook, Twitter to gather data, intelNews.org, February 13, 2012)
What the study fails to mention, however, is the use of social media by intelligence agencies for other purposes. The study leads us to believe that social media is solely an intelligence gathering tool, when in fact, a number of reports have shown that it is used for propaganda including the creation of fake identities in support of covert operations. Those practices are discussed in Army of Fake Social Media Friends to Promote Propaganda, Social Media: Air Force ordered software to manage army of Fake Virtual People and Pentagon Seeks to Manipulate Social Media for Propaganda Purposes, published on Global Research in 2011.
The MCIS study is partly based on the “Arab Spring” framework which allegedly “prompted the US government to begin developing guidelines for culling intelligence from social media networks”. (Ibid.)
Again, this leaves out the fact that the U.S. Government provides “activist training” to foreign nationals to destabilize their country of origin. This tactic is detailed in Tony Cartalucci’s latest article, Egypt: US-funded Agitators on Trial: US “Democracy Promotion” = Foreign-funded Sedition.
“Cyber dissidence” is sponsored among others by CIA-linked Freedom House. The First of The Bush Institute’s Human Freedom Events, Co-Sponsored by Freedom House was titled “The Conference on Cyber Dissidents: Global Successes and Challenges”.
The Conference on Cyber Dissidents highlighted the work, methods, courage and achievements of its eight dissident guest speakers, from seven nations. Five of these nations are places where freedom has been extinguished (all rated “not free” by Freedom House): China, Cuba, Iran, Syria, and Russia. Two others are places where freedom is in peril (both rated “partly free” by Freedom House) because of an authoritarian government accumulating more power, as in Venezuela, or because of the threat of internal terrorist groups, as in Colombia. (The Conference on Cyber Dissidents: Global Successes and Challenges, The George W. Bush Presidential Center)
Countries where “freedom has been extinguished” and which are U.S. allies, such as Bahrain or Saudi Arabia, are not listed above. The only U.S. ally listed is Colombia and its freedom is said to be threatened by terrorist groups, rather than by its governement. It is worth noting that the Colombian government has been accused of spying on its journalists and the Inter-American Commission on Human Rights (IACHR) says freedom of expression ‘barely exists’ in Colombia.
The goal of “activist training” by U.S. NGOs is to destabilize America’s political enemies in the name of freedom. “Cyber dissidence” is in turn used by intelligence agencies for covert operations.
Comments
Hide the following 4 comments
Privacy tip: Firefox + Ghostery + AdBlock Plus
01.03.2012 16:53
Ghostery blocks a wide range of tracking and advertising cookies and other nasties. Notice all the Facebook "Like" icons everywhere? They allow Facebook to track all the other sites you visit.
The AdBlock Plus add-on is also handy to have to get rid of all the advertising crap. Makes sites load a lot faster too.
https://www.mozilla.org/en-US/firefox/fx/
https://addons.mozilla.org/en-US/firefox/addon/ghostery/
https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/
anon
further reading
01.03.2012 20:57
http://london.indymedia.org/system/file_upload/2010/10/12/281/2010_10_10_hacktionlab_guide_laid_out.pdf
The Pentagon will invest up to 42 million dollars in a program that will monitor and influence social media websites, such as twitter.
http://techland.time.com/2011/08/02/defense-department-initiative-seeks-to-analyze-social-media-patterns/#0_undefined,0_
Visible Technologies -Social Media monitoring
Attensity - Social search engine
SafeWeb PrivacyMatrix -browsing
cyber-threat-summary
http://wlstorage.net/file/cyber-threat-summary.pdf
us-dhs-leftwing-extremist-cyber-threat
http://wlstorage.net/file/us-dhs-leftwing-extremist-cyber-threat.pdf
new monitoring use of the SIPRNet
http://www.fas.org/irp/congress/2011_hr/infoshare-qfr.pdf
Internet Governance and the Domain Name System
http://www.fas.org/sgp/crs/misc/R42351.pdf
cyberwar
http://www.fas.org/sgp/crs/natsec/RL33532.pdf
Who Watches the Watchmen?
http://www.fas.org/sgp/eprint/ross.pdf
Smart Meter Data: Privacy and Cybersecurity
http://www.fas.org/sgp/crs/misc/R42338.pdf
Spectrum Policy in the Age of Broadband
http://www.fas.org/sgp/crs/misc/R40674.pdf
The Federal Networking and Information Technology Research and Development Program
http://www.fas.org/sgp/crs/misc/RL33586.pdf
Communications Security Monitoring
http://www.fas.org/irp/doddir/army/ar380-53.pdf
Federal Laws Relating to Cybersecurity
http://www.fas.org/sgp/crs/natsec/R42114.pdf
Governmental Tracking of Cell Phones and Vehicles
http://www.fas.org/sgp/crs/intel/R42109.pdf
cyber and internet governance issues
http://wikileaks.org/gifiles/docs/167291_-alpha-insight-ct-cyber-cyber-and-internet-governance-issues.html
http://wikileaks.org/gifiles/attach/13/13943_GSC-CyberBulletin-4-October-2011.pdf
Re: hacker questions
http://wikileaks.org/gifiles/docs/1549513_re-hacker-questions-.html
Fwd: Re: US 'to view major cyber attacks as acts of war'
http://wikileaks.org/gifiles/docs/1661172_fwd-re-us-to-view-major-cyber-attacks-as-acts-of-war-.html
Cyber Security Question...
http://wikileaks.org/gifiles/docs/5482669_cyber-security-question-.html
palantir software
http://wikileaks.org/gifiles/docs/745547_re-ct-tactical-palantir-software-.html
open-source-practice
http://wikileaks.org/gifiles/docs/5091635_re-a-thought-on-open-source-practice-.html
~~~
more
04.03.2012 14:06
http://cryptome.org/0003/great-secret.pdf
Best Practices for Keeping Your Home Network Secure
http://www.fas.org/irp/nsa/best_practices.pdf
Cyber Threats to Government and ISP Facilities
http://cryptome.org/0003/gov-isp-threats.htm
Global Grid Study
http://www.fas.org/irp/agency/dod/jason/grid.pdf
Common Industrial Control System Cyber Security Weaknesses
http://www.fas.org/sgp/eprint/nstb.pdf
Cyberwarfare
http://www.fas.org/sgp/crs/intel/RL30735.pdf
DoD Unified Capabilities for Networks
http://cryptome.org/dodi/dodi-8100-04.pdf
Science of Cyber-Security
http://www.fas.org/irp/agency/dod/jason/cyber.pdf
Information Warfare-Defense
http://www.dod.mil/pubs/foi/Science_and_Technology/DSB/834.pdf
Information Architecture for the Battlefield
http://www.dod.mil/pubs/foi/Science_and_Technology/DSB/724.pdf
Command Control and Communications Problems
http://www.dod.mil/pubs/foi/Science_and_Technology/WSEG/503.pdf
maintaining information security in a warfighting environment
http://www.fas.org/irp/agency/dod/jason/classpol.pdf
.
yeah
04.03.2012 22:37
http://cryptome.org/dodi/dodi-1325-06.pdf
NSA Overview of Cloud Computing
http://cryptome.org/2012/01/nsa-cloud.pdf
Security and Privacy in Public Cloud Computing
http://cryptome.org/0003/SP-800-144.pdf
DHS Updates Social Media Spying Targets
http://cryptome.org/2012/01/dhs-sm-spy-a.pdf
DHS Joint Cybersecurity Services Pilot
http://cryptome.org/2012/01/0080.pdf
NSA Review of Information for the Public
http://cryptome.org/2012/01/0072.pdf
FBI Social Media and Open Sources Spying
http://cryptome.org/2012/01/0065.pdf
British Bases in Cyprus and Signals Intelligence
http://cryptome.org/2012/01/0060.pdf
Internet Trust Next Generation
http://cryptome.org/2012/01/0042.pdf
PGP Spying
http://cryptome.org/2012/01/0013.pdf
285 Pages of DHS Media Monitoring Docs
http://epic.org/foia/epic-v-dhs-media-monitoring/EPIC-FOIA-DHS-Media-Monitoring-12-2012.pdf
Navy Critical Infrastructure Program
http://cryptome.org/dodi/secnav-3501-1c.pdf
Air Force COMINT Solicitation
http://cryptome.org/0006/af-comint-sol.pdf
Militarizing Civil Agencies for Peace of Mind
http://cryptome.org/0005/gsa-1122.zip
Raytheon Cybersecurity Technology
http://cryptome.org/0005/raytheon-cysec.zip
Raytheon Intelligence and Information Systems
http://cryptome.org/raytheon-iis.pdf
Critical Infrastructure Needs Cybersecurity
http://cryptome.org/0005/gao-11-865t.pdf
Marine Full Spectrum Cyberspace Operations
http://cryptome.org/dodi/usmc-cyber.zip
DoD Strategy for Operating in Cyberspace
http://cryptome.org/0005/dod-cyberspace.zip
FBI Computer Patheticism
http://cryptome.org/nara/fbi/fbi-04-0204.pdf
Smart Grid Cybersecurity Weaknesses
http://cryptome.org/0003/gao-11-117.zip
http://cryptome.org/0003/nistir-7628.zip
http://cryptome.org/0002/doe100510-2.pdf
http://cryptome.org/0002/doe100510.pdf
http://cryptome.org/2012/01/gao-12-507t.pdf
NSA And Computer Development
http://cryptome.org/0002/nsa-computers.pdf
Global Free Flow of Information on the Internet
http://cryptome.org/0002/doc092910.pdf
DARPA RFP for Cyber Insider Threat
http://cryptome.org/dodi/cinder.pdf
China Military and Security Developments 2010
http://cryptome.org/dodi/cmpr-2010.zip
False Blogs and Military Information Strategy
http://cryptome.org/dodi/jsou-06-5.pdf
Electronic Intelligence (ELINT) at NSA
http://cryptome.org/nsa-elint.zip
Field Manual 2.0 Intelligence
http://cryptome.org/dodi/fm-2-0-intel.zip
Covert Blogs as Military Information Operations
http://cryptome.org/covert-blogs.zip
Soviet Capabilities in Electronic Warfare
http://cryptome.org/soviet-ew.zip
How the FBI Surveils the Net
http://cryptome.org/fbi-cgvop.zip
UK Police Guide to Computer/Electronic Evidence
http://cryptome.org/acpo-guide.htm
NSA to intercept TETRA police networks
http://cryptome.org/nsa-tetra.htm
.