Difference between revisions of "Psychological warfare"
From Gender and Tech Resources
m (→Trolling) (Tag: VisualEditor) |
m (→Books) (Tag: VisualEditor) |
||
(38 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | '' | + | Wikipedia defines "social engineering" as "''psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.''" Although it has a bad name, aspects of social engineering actually touch many parts of daily life. <ref>Wikipedia: Social Engineering (security) https://en.wikipedia.org/wiki/Social_engineering_%28security%29</ref> |
− | + | Webster’s Dictionary defines social as "''of or relating to human society, the interaction of the individual and the group, or the welfare of human beings as members of society <social institutions>''" <ref>Webster's Dictionary: Social http://www.merriam-webster.com/dictionary/social</ref> and engineering (in this context) as as "''the control or direction of something (such as behavior)''". Next to it is the definition for another context of engineering: "''the work of designing and creating large structures (such as roads and bridges) or new products or systems by using scientific methods''". <ref>Webster's Dictionary: engineering http://www.merriam-webster.com/dictionary/engineering</ref> | |
− | + | Combine Webster's social definition with the second definition of engineering in a pair of goggles and you can see through the glasses of social engineers. In this view, social engineering is used in: | |
+ | * everyday life in the way parents get their children to give in to their demands, and children get their parents to give in to their demands and that makes for games people keep playing later. <ref>Games people play, Eric Berne https://archive.org/details/TheGamesPeoplePlay</ref> | ||
+ | * the way teachers interact with their students | ||
+ | * the way doctors, lawyers, or psychologists obtain information from their patients or clients | ||
+ | * law enforcement | ||
+ | * dating | ||
+ | * every human interaction from babies to politicians and everyone in between | ||
+ | Main focus here is on what we can learn from military operations, law enforcement, the politicians, the psychologists, and even children to better our abilities to detect manipulations that are not in our best interest and then secure ourselves from those as best as we can. | ||
== PsyOps == | == PsyOps == | ||
PSYOPS, as the military calls it, seek to exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives. | PSYOPS, as the military calls it, seek to exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives. | ||
− | + | ''‘Psychological Operations: Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organisations, groups, and individuals. The purpose of psychological operations is to induce or reinforce foreign attitudes and behavior favorable to the originator’s objectives. Also called PSYOP. See also consolidation psychological operations; overt peacetime psychological operations programs; perception management. ''‘ US Department of Defense. | |
− | [[ | + | [[Propaganda]] of some sort has been used in warfare for centuries, but all the social, economic, industrial, and military factors that make propaganda a large-scale part of war, first made themselves seriously felt in World War I when it became a formal branch of many governments in the form of institutions such as the British Ministry of Information, the German Ministry of Propaganda and Public Enlightenment, the American Committee on Public Information (in World War I), the Office of War Information (in World War II), and their counterparts in many other countries. |
+ | |||
+ | The function of war propaganda is to picture military successes on the propagandist’s side, project armed might and economic power the adversary has to face, and the moral superiority of the cause against which the adversary is fighting. And to inform the people back home with a free flow of information that stimulates the war effort, strengthens the nation to hold steadfast through a long conflict, to take losses courageously, to make sacrifices bravely, to buy (war) bonds generously, and to cooperate in every way possible in the great national effort for victory. Give us your children ... | ||
=== Rewriting history === | === Rewriting history === | ||
− | Most (if not all) of the techniques used in rewriting history (revisionism) are for deception or denial and vary from using forged documents | + | Most (if not all) of the techniques used in rewriting history (revisionism) are for deception or denial and vary from using forged documents as genuine sources (or inventing reasons to distrust genuine documents), to exploiting opinions by taking them out of their historical context. |
=== Disinformation === | === Disinformation === | ||
− | Unlike traditional propaganda techniques designed to engage emotional support, disinformation is designed to manipulate the audience at the rational level by either discrediting conflicting information or supporting false conclusions. | + | Unlike traditional propaganda techniques designed to engage emotional support, disinformation is designed to manipulate the audience at the rational level by either discrediting conflicting information or supporting false conclusions. See [[Propaganda#Logical_Analysis|Logical Analysis]]. |
+ | [[File:Iran_wants_war.jpg|360px|thumb|right]] | ||
=== Perception management === | === Perception management === | ||
− | In the 1980s, the Reagan administration pioneered “perception management” to get the American people to “kick the Vietnam Syndrome” and accept more U.S. interventionism, but that propaganda structure continues to this day getting the public to buy into endless war | + | ''In the 1980s, the Reagan administration pioneered “perception management” to get the American people to “kick the Vietnam Syndrome” and accept more U.S. interventionism, but that propaganda structure continues to this day getting the public to buy into endless war ... ''<ref>Consortium news: The Victory of "Perception Management" https://consortiumnews.com/2014/12/28/the-victory-of-perception-management/</ref> Also see [[Propaganda#Plain_Folks|Plain Folks]]. |
+ | |||
+ | In social engineering "communication modeling" is common and uses the same Shannon–Weaver model, the "mother of all models" that all other communication models do (Berlo, transactional). <ref>Shannon–Weaver model https://en.wikipedia.org/wiki/Shannon%E2%80%93Weaver_model | ||
+ | </ref> | ||
+ | |||
+ | Communication can take many different forms. There are auditory means, such as speech, song, and tone of voice, and there are nonverbal means, such as body language, sign language, para language, touch, and eye contact. Regardless of the type of communication used, the message and how it is delivered will have a definite effect on the receiver. Understanding the basic ground rules is essential to building a model for a target. Some rules cannot be broken, such as communication always having a sender and a receiver. Also, everyone has different personal realities that are built and affected by their past experiences and their perceptions. Everyone perceives, experiences, and interprets things differently based on these personal realities. Any given event will always be perceived differently by different people because of this fact. And these personal realities have been built by previous social engineering, first and foremost (and deepest) from our image makers, our parents, grandparents and siblings. | ||
+ | |||
+ | Each person has both a physical and a mental personal space. You allow or disallow people to enter that space or get close to you depending on many factors. Effective communication attempts to bring all participants into each other’s mental location. | ||
+ | |||
+ | When a social engineer communicates they are trying to bring someone else into their space and share that personal reality. The goal of a social engineer is to give both the verbal and nonverbal cues to alter the perception of the target (individual or group) so as to have the impact the social engineer desires. | ||
+ | |||
+ | === Promotion of specific form of intent === | ||
+ | Save for a few exceptions, all of us have been shaped by the dominant communications technologies of the 20th century (printing press, radio, television, and the telephone) and our use of them. These technologies make knowledge available, opens our minds to events around the world, and in the case of the telephone, extended our means of conversation. They have truly been technologies of freedom in that sense. Yet with all their advantages, these technologies also seem to exercise a tyranny, favouring passive reception of information and entertainment over thoughtful response, and in the case of the phone favouring immediate reaction over considered and deliberative response. And it seemed only a matter of time before some demagogues in a position to dominate our institutions saw the potential in our mass communications. | ||
+ | |||
+ | [[Propaganda|O wait]]. | ||
+ | |||
+ | We were favouring "listening" and "viewing" when in the 1990’s, the story of communications technology changed into the growth of computer communications favouring "free expression". A story of personal websites, blogging, free software, patent trolls and licensing struggles, social media, tunnels, protocols, cycle upon cycle of new hardware and software and a digital security arms race unfolded. The war-work-machine rolls on. | ||
+ | |||
+ | Pre-preparing the publics' minds (whether that happens intentionally or develops opportunistically) for specific events that catalyse massive shifts in governmental policy direction using films and documentary concepts (promoting specific forms of intent) is not a new thing. It is just so much more "advanced" these days. | ||
− | == | + | == Bag of digital tricks == |
=== Digital morphing === | === Digital morphing === | ||
− | Digital morphing — voice, video, and photo — | + | Digital morphing — voice, video, and photo — is now readily available on personal computers. It is very simple to tamper with any image and make it available to others. Compositing is perhaps the most common form of digital tampering with images. Image morphing is a digital technique that gradually transforms one image into another image, and to increase the confusion on what is meant by using the word "morphing", the term has been applied by non-specialist to refer to a broader class of digital tampering which is probably better referred to as re-touching. |
− | === | + | Computer generated images can also be generated entirely by a computer and a skilled artist/programmer. |
− | + | ||
+ | While "image enhancement" cannot fundamentally alter the appearance or meaning of an image (as compositing, morphing and re-touching do), it can still have a subtle effect on the interpretation of an image – for example, simple enhancements can obscure or exaggerate particular image details, or alter the time of day in which the image appears to have been taken. In addition to all of these, images and videos can have invisible alterations like digital watermarking for protecting copyright, and hidden files added by steganography applications. | ||
+ | |||
+ | === The fog === | ||
+ | |||
+ | [[File:The-Fog.jpg|360px|thumb|right]] | ||
+ | |||
+ | Rewriting history and disinformation tactics were such a success in the past that the tactic was expanded on for online use in what has been named "the fog": ''Computer scientists call it "Fog Computing" — a play on today’s cloud computing craze. And in a recent paper for Darpa, the Pentagon’s premiere research arm, researchers say they’ve built "a prototype for automatically generating and distributing believable misinformation … and then tracking access and attempted misuse of it. We call this 'disinformation technology.'"'' <ref>Wired Danger Room: Fog Computing http://www.wired.com/dangerroom/2012/07/fog-computing/</ref> | ||
=== Sockpuppetry === | === Sockpuppetry === | ||
− | + | <em>The internet has become a battlefield for virtual personalities—sockpuppets all attempting to gather information and using that information to help their causes and hurt their enemies. It’s a war without bystanders, for we’re all caught up in the fighting, whether we’re aware of it or not. </em><ref>Virtual Unreality: Just Because the Internet Told You, How Do You Know It’s True?<em> </em>http://www.penguin.com/book/virtual-unreality-by-charles-seife/9780670026081</ref> | |
− | + | We can’t physically meet most of the people we interact with on the internet. So we create avatars who represent us in the online world, personae that are designed (on some level, conscious or subconscious) to shape others’ ideas about who we really are. It is natural for us to create avatars that represent what we want to be rather than what we are, and to enhance our cause(s). And it is only a short step from there to manipulating others’ perceptions of us to give ourselves an advantage of some sort, to deceive, to become the petty tyrants we fight. | |
− | + | ||
− | + | Sockpuppetry (using false identities for deception) is centuries old, but the web has made creating sockpuppets, and falling for their tricks, easier than ever before <ref>Revealed: US spy operation that manipulates social media http://www.theguardian.com/technology/2011/mar/17/us-spy-operation-social-networks | |
+ | </ref> <ref>China Uses an Army of Sockpuppets to Control Public Opinion – and the US Will Too http://guardianlv.com/2013/11/china-uses-an-army-of-sockpuppets-to-control-public-opinion-and-the-us-will-too/ | ||
+ | </ref>. Secret services have even used dead children to create spy and infiltration personae <ref>Police spies stole identities of dead children http://www.theguardian.com/uk/2013/feb/03/police-spies-identities-dead-children | ||
+ | </ref> <ref>The Lives of Ronald Pinn http://www.lrb.co.uk/v37/n01/andrew-ohagan/the-lives-of-ronald-pinn | ||
+ | </ref>. | ||
+ | |||
+ | === Trolling === | ||
+ | Government agents are trained to troll to promote specific forms of intent and attack other forms. Intelligence agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself. For example, among the core self-identified purposes of JTRIG <ref>The Art of Deception: Training for a New Generation of Online Covert Operations https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/ | ||
+ | </ref> are two tactics: | ||
+ | * to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and | ||
+ | * to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. | ||
+ | See [[trolling]] for the minor and little petty tyrant version of this delightful and loving practice. | ||
=== Cyberbullying === | === Cyberbullying === | ||
Line 43: | Line 88: | ||
=== Digital morphing === | === Digital morphing === | ||
− | + | 'Digital morphing', altering what an image looks like, is in use in psychological operations and has been on the rise, especially on twitter and facebook. Horrible images of children that were sometimes taken years before, or images delivered as "proof" of certain troops being "somewhere in the middle east" yet small letters on a sign in the background are in hindu, those are easy to detect as having been tampered with using TinEye. <ref>TinEye: Reverse image search https://www.tineye.com/</ref> This tool will show you previously uploaded images of an indicated image on the net. Note that if it isn't found by TinEye, it doesn't mean it's not morphed. The image may be new (and altered), or not in Tineye's database. But if an older version is found that is different, likely the image you have that is different was morphed. | |
− | + | In which case you can use other techniques that work on the assumption that although digital forgeries may leave no visual clues that indicate tampering, they may alter the underlying statistics of an image. The set of image forensic tools for passive or blind approach for manipulation detection can be roughly categorized as pixel- based techniques, format-based techniques, camera-based techniques and geometric based techniques. | |
− | + | ||
− | For example, The Grand Chessboard, a fictional novel using the traditional narratives of state-centric Westphalian order as a necessary condition of international relations, can be used as a DIY exercise in pre-predictive programming research, where | + | === Detecting promotion of specific form of intent === |
+ | Pre-predictive programming is a research field sifting carefully through subtexts, semiotics, dialogue, conceptual architectures and basically identifying synchronous random anomalies with the subtly deliberate insertions in movie scripts, stories, documentaries, news, etc, that exist only to promote a specific form of intent in the collective publics mindset. | ||
+ | |||
+ | Effective countermoves to such promotions of specific forms of intent are resetting our own direction and intent, for example by roleplay and controlled folly, and building our own knowledge and resource bases for (re)interpretation of physical and emotional information. | ||
+ | |||
+ | For example, The Grand Chessboard, a fictional novel using the traditional narratives of state-centric Westphalian order as a necessary condition of international relations, can be used as a DIY exercise in pre-predictive programming research, where the reader is the central character of the novel. <strong>Warning</strong>:<em> If taken serious, reading can lead to causal fallacies and an almost inevitable blindness to the role and impact of non-state and non-corporate actors.</em> | ||
=== Underminers === | === Underminers === | ||
Underminers is a book and a movement using a highly practical approach to the process of undermining in all its many hues. At once entertaining, shocking and inspiring, Underminers draws on the author’s own experience dealing at first hand with the lies of the industrial machine, and that of a wide range of other people who have their own unique take on the swath of topics covered in the book. | Underminers is a book and a movement using a highly practical approach to the process of undermining in all its many hues. At once entertaining, shocking and inspiring, Underminers draws on the author’s own experience dealing at first hand with the lies of the industrial machine, and that of a wide range of other people who have their own unique take on the swath of topics covered in the book. | ||
+ | |||
+ | === Cyberbullying === | ||
+ | General defense from cyberbullying | ||
+ | |||
+ | * Don’t reply to messages from cyberbullies – this is exactly what cyberbullies want. They want to know that they’ve got you worried and upset. They are trying to mess with your mind and control you, to put fear into you. Don’t give them that. | ||
+ | * Do not keep this to yourself. You are NOT alone and you did NOT do anything to deserve this. Tell someone you know and trust. | ||
+ | * Do not erase or delete messages from cyberbullies – Do not read it, but keep it, it is evidence. You may get similar messages from other accounts. Note the accounts. Friends, your ISP, and/or telephone company can perhaps use these messages to help you. If you notice certain words or phrases that are also used by people you know, write them down. You can do a little research of your own to provide those you ask for help with more information. | ||
+ | * Protect yourself – Never arrange to meet with someone unless you take someone with you. Make sure it is in a public place. | ||
+ | * You may need to delete your current e-mail and social media accounts, phone accounts and set up new ones (unless you are keeping the account(s) active to try and catch the cyber bully). | ||
+ | |||
+ | More specifically for the gendersec context see [[Step_2#Dos_and_dont.27s_supporting_people_subject_to_online_violence|dos and donts supporting people subject to online violence]]. | ||
+ | === Sockpuppetry === | ||
+ | There are many (other) reasons for us for consciously creating multiple, fake, anonymous or pseudonymous identities online (without becoming the petty tyrants we fight): | ||
+ | * Engaging in the present with no need for past or future references. | ||
+ | * Being who you are naturally and freeing your speech. | ||
+ | * Dreaming another you into being for gaming, hobbies, trolling the trolls, defense from mass surveillance, confusing surveillance, etc. in a way that it doesn’t automatically become a part of your finger- and footprint. | ||
+ | * Being more resilient online. | ||
+ | * Career actualisation, increased individuality, autonomy and freedom by separating professional and private information. | ||
+ | * Exploring abandonment of being, and gaining recognition on how your “usual identity” can be a trap. | ||
+ | * Challenging yourself and engaging at the edge. | ||
+ | * Feeding (r)evolution and self-authority. | ||
+ | See [[Step 1#4._Creating_a_new_online_identity|creating a new online identity]]. | ||
== Resources == | == Resources == | ||
Line 57: | Line 128: | ||
=== News and watchdogs === | === News and watchdogs === | ||
* Public Intelligence https://publicintelligence.net/ | * Public Intelligence https://publicintelligence.net/ | ||
− | |||
=== Leaks === | === Leaks === | ||
Line 63: | Line 133: | ||
=== Books === | === Books === | ||
− | ''' | + | '''Mobbing''' |
+ | * The crowd: A study of the popular mind, 1896, Gustave Le Bon http://socserv2.socsci.mcmaster.ca/~econ/ugcm/3ll3/lebon/Crowds.pdf | ||
+ | * Group psychology and the analysis of the ego https://archive.org/details/grouppsychologya00freu | ||
+ | * Influence: The Psychology of Persuasion http://vk.com/doc198667109_184130561?hash=d42b246b009bbcc6eb&dl=19059d20bba184b45e | ||
+ | * Propaganda: The Formation of Men's Attitudes http://monoskop.org/images/4/44/Ellul_Jacques_Propaganda_The_Formation_of_Mens_Attitudes.pdf | ||
+ | * Mob psychology (Gutenberg) http://self.gutenberg.org/articles/Mob_psychology | ||
+ | '''Co-ercion and deception''' | ||
* The art of deception: Training for a new generation of online covert operations http://www.statewatch.org/news/2014/feb/the-art-of-deception-training-for-a-new.pdf | * The art of deception: Training for a new generation of online covert operations http://www.statewatch.org/news/2014/feb/the-art-of-deception-training-for-a-new.pdf | ||
− | |||
* The grand chessboard: American primacy and its geostrategic imperatives http://www.takeoverworld.info/Grand_Chessboard.pdf | * The grand chessboard: American primacy and its geostrategic imperatives http://www.takeoverworld.info/Grand_Chessboard.pdf | ||
− | |||
− | |||
− | |||
− | |||
* The roots of behaviour in war https://www.icrc.org/eng/assets/files/other/icrc_002_0854.pdf | * The roots of behaviour in war https://www.icrc.org/eng/assets/files/other/icrc_002_0854.pdf | ||
+ | * The science of coercion https://historicalunderbelly.files.wordpress.com/2012/12/0195102924.pdf | ||
− | ''' | + | '''Undermining''' |
* Underminers, A Practical Guide for Radical Change http://underminers.org/ | * Underminers, A Practical Guide for Radical Change http://underminers.org/ | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
=== Documentaries === | === Documentaries === | ||
Line 104: | Line 162: | ||
'''Who owns the future?''' | '''Who owns the future?''' | ||
* Who Owns the Future? (interview) https://www.youtube.com/watch?v=XdEuII9cv-U | * Who Owns the Future? (interview) https://www.youtube.com/watch?v=XdEuII9cv-U | ||
+ | |||
+ | === Satire === | ||
+ | * Africa For Norway - New charity single out now! https://www.youtube.com/watch?v=oJLqyuxm96k | ||
+ | |||
+ | * Clarke and Dawe - The War in Iraq. Not the Previous One. The Current One https://www.youtube.com/watch?v=6tF-5Xg_byk | ||
+ | * This Land is Mine https://www.youtube.com/watch?v=-evIyrrjTTY Reference, original and explanations about characters in the video: http://blog.ninapaley.com/2012/10/01/this-land-is-mine/ | ||
* A series of YouTube videos featuring actors performing melodramatic readings of Yelp reviews http://www.youtube.com/watch?v=QEdXhH97Z7E | * A series of YouTube videos featuring actors performing melodramatic readings of Yelp reviews http://www.youtube.com/watch?v=QEdXhH97Z7E | ||
Line 111: | Line 175: | ||
* [[Surveillance]] | * [[Surveillance]] | ||
* [[Game of drones]] | * [[Game of drones]] | ||
− | |||
* [[Petty tyrants]] | * [[Petty tyrants]] | ||
== References == | == References == |
Latest revision as of 14:46, 5 July 2015
Wikipedia defines "social engineering" as "psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme." Although it has a bad name, aspects of social engineering actually touch many parts of daily life. [1]
Webster’s Dictionary defines social as "of or relating to human society, the interaction of the individual and the group, or the welfare of human beings as members of society <social institutions>" [2] and engineering (in this context) as as "the control or direction of something (such as behavior)". Next to it is the definition for another context of engineering: "the work of designing and creating large structures (such as roads and bridges) or new products or systems by using scientific methods". [3]
Combine Webster's social definition with the second definition of engineering in a pair of goggles and you can see through the glasses of social engineers. In this view, social engineering is used in:
- everyday life in the way parents get their children to give in to their demands, and children get their parents to give in to their demands and that makes for games people keep playing later. [4]
- the way teachers interact with their students
- the way doctors, lawyers, or psychologists obtain information from their patients or clients
- law enforcement
- dating
- every human interaction from babies to politicians and everyone in between
Main focus here is on what we can learn from military operations, law enforcement, the politicians, the psychologists, and even children to better our abilities to detect manipulations that are not in our best interest and then secure ourselves from those as best as we can.
PsyOps
PSYOPS, as the military calls it, seek to exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives.
‘Psychological Operations: Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organisations, groups, and individuals. The purpose of psychological operations is to induce or reinforce foreign attitudes and behavior favorable to the originator’s objectives. Also called PSYOP. See also consolidation psychological operations; overt peacetime psychological operations programs; perception management. ‘ US Department of Defense.
Propaganda of some sort has been used in warfare for centuries, but all the social, economic, industrial, and military factors that make propaganda a large-scale part of war, first made themselves seriously felt in World War I when it became a formal branch of many governments in the form of institutions such as the British Ministry of Information, the German Ministry of Propaganda and Public Enlightenment, the American Committee on Public Information (in World War I), the Office of War Information (in World War II), and their counterparts in many other countries.
The function of war propaganda is to picture military successes on the propagandist’s side, project armed might and economic power the adversary has to face, and the moral superiority of the cause against which the adversary is fighting. And to inform the people back home with a free flow of information that stimulates the war effort, strengthens the nation to hold steadfast through a long conflict, to take losses courageously, to make sacrifices bravely, to buy (war) bonds generously, and to cooperate in every way possible in the great national effort for victory. Give us your children ...
Rewriting history
Most (if not all) of the techniques used in rewriting history (revisionism) are for deception or denial and vary from using forged documents as genuine sources (or inventing reasons to distrust genuine documents), to exploiting opinions by taking them out of their historical context.
Disinformation
Unlike traditional propaganda techniques designed to engage emotional support, disinformation is designed to manipulate the audience at the rational level by either discrediting conflicting information or supporting false conclusions. See Logical Analysis.
Perception management
In the 1980s, the Reagan administration pioneered “perception management” to get the American people to “kick the Vietnam Syndrome” and accept more U.S. interventionism, but that propaganda structure continues to this day getting the public to buy into endless war ... [5] Also see Plain Folks.
In social engineering "communication modeling" is common and uses the same Shannon–Weaver model, the "mother of all models" that all other communication models do (Berlo, transactional). [6]
Communication can take many different forms. There are auditory means, such as speech, song, and tone of voice, and there are nonverbal means, such as body language, sign language, para language, touch, and eye contact. Regardless of the type of communication used, the message and how it is delivered will have a definite effect on the receiver. Understanding the basic ground rules is essential to building a model for a target. Some rules cannot be broken, such as communication always having a sender and a receiver. Also, everyone has different personal realities that are built and affected by their past experiences and their perceptions. Everyone perceives, experiences, and interprets things differently based on these personal realities. Any given event will always be perceived differently by different people because of this fact. And these personal realities have been built by previous social engineering, first and foremost (and deepest) from our image makers, our parents, grandparents and siblings.
Each person has both a physical and a mental personal space. You allow or disallow people to enter that space or get close to you depending on many factors. Effective communication attempts to bring all participants into each other’s mental location.
When a social engineer communicates they are trying to bring someone else into their space and share that personal reality. The goal of a social engineer is to give both the verbal and nonverbal cues to alter the perception of the target (individual or group) so as to have the impact the social engineer desires.
Promotion of specific form of intent
Save for a few exceptions, all of us have been shaped by the dominant communications technologies of the 20th century (printing press, radio, television, and the telephone) and our use of them. These technologies make knowledge available, opens our minds to events around the world, and in the case of the telephone, extended our means of conversation. They have truly been technologies of freedom in that sense. Yet with all their advantages, these technologies also seem to exercise a tyranny, favouring passive reception of information and entertainment over thoughtful response, and in the case of the phone favouring immediate reaction over considered and deliberative response. And it seemed only a matter of time before some demagogues in a position to dominate our institutions saw the potential in our mass communications.
We were favouring "listening" and "viewing" when in the 1990’s, the story of communications technology changed into the growth of computer communications favouring "free expression". A story of personal websites, blogging, free software, patent trolls and licensing struggles, social media, tunnels, protocols, cycle upon cycle of new hardware and software and a digital security arms race unfolded. The war-work-machine rolls on.
Pre-preparing the publics' minds (whether that happens intentionally or develops opportunistically) for specific events that catalyse massive shifts in governmental policy direction using films and documentary concepts (promoting specific forms of intent) is not a new thing. It is just so much more "advanced" these days.
Bag of digital tricks
Digital morphing
Digital morphing — voice, video, and photo — is now readily available on personal computers. It is very simple to tamper with any image and make it available to others. Compositing is perhaps the most common form of digital tampering with images. Image morphing is a digital technique that gradually transforms one image into another image, and to increase the confusion on what is meant by using the word "morphing", the term has been applied by non-specialist to refer to a broader class of digital tampering which is probably better referred to as re-touching.
Computer generated images can also be generated entirely by a computer and a skilled artist/programmer.
While "image enhancement" cannot fundamentally alter the appearance or meaning of an image (as compositing, morphing and re-touching do), it can still have a subtle effect on the interpretation of an image – for example, simple enhancements can obscure or exaggerate particular image details, or alter the time of day in which the image appears to have been taken. In addition to all of these, images and videos can have invisible alterations like digital watermarking for protecting copyright, and hidden files added by steganography applications.
The fog
Rewriting history and disinformation tactics were such a success in the past that the tactic was expanded on for online use in what has been named "the fog": Computer scientists call it "Fog Computing" — a play on today’s cloud computing craze. And in a recent paper for Darpa, the Pentagon’s premiere research arm, researchers say they’ve built "a prototype for automatically generating and distributing believable misinformation … and then tracking access and attempted misuse of it. We call this 'disinformation technology.'" [7]
Sockpuppetry
The internet has become a battlefield for virtual personalities—sockpuppets all attempting to gather information and using that information to help their causes and hurt their enemies. It’s a war without bystanders, for we’re all caught up in the fighting, whether we’re aware of it or not. [8]
We can’t physically meet most of the people we interact with on the internet. So we create avatars who represent us in the online world, personae that are designed (on some level, conscious or subconscious) to shape others’ ideas about who we really are. It is natural for us to create avatars that represent what we want to be rather than what we are, and to enhance our cause(s). And it is only a short step from there to manipulating others’ perceptions of us to give ourselves an advantage of some sort, to deceive, to become the petty tyrants we fight.
Sockpuppetry (using false identities for deception) is centuries old, but the web has made creating sockpuppets, and falling for their tricks, easier than ever before [9] [10]. Secret services have even used dead children to create spy and infiltration personae [11] [12].
Trolling
Government agents are trained to troll to promote specific forms of intent and attack other forms. Intelligence agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself. For example, among the core self-identified purposes of JTRIG [13] are two tactics:
- to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and
- to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.
See trolling for the minor and little petty tyrant version of this delightful and loving practice.
Cyberbullying
Cyberbullying is also not under our control. And in the current state(s) of society, some of our little ones and more vulnerable members of society are in need of help, the help they are not getting locally because for example, everybody is too busy making money and racing around for that.
(Counter) moves
Digital morphing
'Digital morphing', altering what an image looks like, is in use in psychological operations and has been on the rise, especially on twitter and facebook. Horrible images of children that were sometimes taken years before, or images delivered as "proof" of certain troops being "somewhere in the middle east" yet small letters on a sign in the background are in hindu, those are easy to detect as having been tampered with using TinEye. [14] This tool will show you previously uploaded images of an indicated image on the net. Note that if it isn't found by TinEye, it doesn't mean it's not morphed. The image may be new (and altered), or not in Tineye's database. But if an older version is found that is different, likely the image you have that is different was morphed.
In which case you can use other techniques that work on the assumption that although digital forgeries may leave no visual clues that indicate tampering, they may alter the underlying statistics of an image. The set of image forensic tools for passive or blind approach for manipulation detection can be roughly categorized as pixel- based techniques, format-based techniques, camera-based techniques and geometric based techniques.
Detecting promotion of specific form of intent
Pre-predictive programming is a research field sifting carefully through subtexts, semiotics, dialogue, conceptual architectures and basically identifying synchronous random anomalies with the subtly deliberate insertions in movie scripts, stories, documentaries, news, etc, that exist only to promote a specific form of intent in the collective publics mindset.
Effective countermoves to such promotions of specific forms of intent are resetting our own direction and intent, for example by roleplay and controlled folly, and building our own knowledge and resource bases for (re)interpretation of physical and emotional information.
For example, The Grand Chessboard, a fictional novel using the traditional narratives of state-centric Westphalian order as a necessary condition of international relations, can be used as a DIY exercise in pre-predictive programming research, where the reader is the central character of the novel. Warning: If taken serious, reading can lead to causal fallacies and an almost inevitable blindness to the role and impact of non-state and non-corporate actors.
Underminers
Underminers is a book and a movement using a highly practical approach to the process of undermining in all its many hues. At once entertaining, shocking and inspiring, Underminers draws on the author’s own experience dealing at first hand with the lies of the industrial machine, and that of a wide range of other people who have their own unique take on the swath of topics covered in the book.
Cyberbullying
General defense from cyberbullying
- Don’t reply to messages from cyberbullies – this is exactly what cyberbullies want. They want to know that they’ve got you worried and upset. They are trying to mess with your mind and control you, to put fear into you. Don’t give them that.
- Do not keep this to yourself. You are NOT alone and you did NOT do anything to deserve this. Tell someone you know and trust.
- Do not erase or delete messages from cyberbullies – Do not read it, but keep it, it is evidence. You may get similar messages from other accounts. Note the accounts. Friends, your ISP, and/or telephone company can perhaps use these messages to help you. If you notice certain words or phrases that are also used by people you know, write them down. You can do a little research of your own to provide those you ask for help with more information.
- Protect yourself – Never arrange to meet with someone unless you take someone with you. Make sure it is in a public place.
- You may need to delete your current e-mail and social media accounts, phone accounts and set up new ones (unless you are keeping the account(s) active to try and catch the cyber bully).
More specifically for the gendersec context see dos and donts supporting people subject to online violence.
Sockpuppetry
There are many (other) reasons for us for consciously creating multiple, fake, anonymous or pseudonymous identities online (without becoming the petty tyrants we fight):
- Engaging in the present with no need for past or future references.
- Being who you are naturally and freeing your speech.
- Dreaming another you into being for gaming, hobbies, trolling the trolls, defense from mass surveillance, confusing surveillance, etc. in a way that it doesn’t automatically become a part of your finger- and footprint.
- Being more resilient online.
- Career actualisation, increased individuality, autonomy and freedom by separating professional and private information.
- Exploring abandonment of being, and gaining recognition on how your “usual identity” can be a trap.
- Challenging yourself and engaging at the edge.
- Feeding (r)evolution and self-authority.
See creating a new online identity.
Resources
News and watchdogs
- Public Intelligence https://publicintelligence.net/
Leaks
- How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
Books
Mobbing
- The crowd: A study of the popular mind, 1896, Gustave Le Bon http://socserv2.socsci.mcmaster.ca/~econ/ugcm/3ll3/lebon/Crowds.pdf
- Group psychology and the analysis of the ego https://archive.org/details/grouppsychologya00freu
- Influence: The Psychology of Persuasion http://vk.com/doc198667109_184130561?hash=d42b246b009bbcc6eb&dl=19059d20bba184b45e
- Propaganda: The Formation of Men's Attitudes http://monoskop.org/images/4/44/Ellul_Jacques_Propaganda_The_Formation_of_Mens_Attitudes.pdf
- Mob psychology (Gutenberg) http://self.gutenberg.org/articles/Mob_psychology
Co-ercion and deception
- The art of deception: Training for a new generation of online covert operations http://www.statewatch.org/news/2014/feb/the-art-of-deception-training-for-a-new.pdf
- The grand chessboard: American primacy and its geostrategic imperatives http://www.takeoverworld.info/Grand_Chessboard.pdf
- The roots of behaviour in war https://www.icrc.org/eng/assets/files/other/icrc_002_0854.pdf
- The science of coercion https://historicalunderbelly.files.wordpress.com/2012/12/0195102924.pdf
Undermining
- Underminers, A Practical Guide for Radical Change http://underminers.org/
Documentaries
War made easy
- War Made Easy - How Presidents and Pundits Keep Spinning Us To Death https://www.youtube.com/watch?v=R9DjSg6l9Vs
Psychological warfare
- Psywar https://vimeo.com/14772678
- A virus called fear https://www.youtube.com/watch?v=O-VLHNpwju0
- The power of nightmares https://archive.org/details/ThePowerOfNightmares-Episode1BabyItsColdOutside
The century of the self
- Happiness Machines https://vimeo.com/48842811
- The Engineering of Consent https://vimeo.com/48842898
- There is a Policeman Inside All of Our Heads, He Must Be Destroyed https://vimeo.com/112533840
- Eight People Sipping Wine In Kettering https://vimeo.com/75784765
Who owns the future?
- Who Owns the Future? (interview) https://www.youtube.com/watch?v=XdEuII9cv-U
Satire
- Africa For Norway - New charity single out now! https://www.youtube.com/watch?v=oJLqyuxm96k
- Clarke and Dawe - The War in Iraq. Not the Previous One. The Current One https://www.youtube.com/watch?v=6tF-5Xg_byk
- This Land is Mine https://www.youtube.com/watch?v=-evIyrrjTTY Reference, original and explanations about characters in the video: http://blog.ninapaley.com/2012/10/01/this-land-is-mine/
- A series of YouTube videos featuring actors performing melodramatic readings of Yelp reviews http://www.youtube.com/watch?v=QEdXhH97Z7E
Related
References
- ↑ Wikipedia: Social Engineering (security) https://en.wikipedia.org/wiki/Social_engineering_%28security%29
- ↑ Webster's Dictionary: Social http://www.merriam-webster.com/dictionary/social
- ↑ Webster's Dictionary: engineering http://www.merriam-webster.com/dictionary/engineering
- ↑ Games people play, Eric Berne https://archive.org/details/TheGamesPeoplePlay
- ↑ Consortium news: The Victory of "Perception Management" https://consortiumnews.com/2014/12/28/the-victory-of-perception-management/
- ↑ Shannon–Weaver model https://en.wikipedia.org/wiki/Shannon%E2%80%93Weaver_model
- ↑ Wired Danger Room: Fog Computing http://www.wired.com/dangerroom/2012/07/fog-computing/
- ↑ Virtual Unreality: Just Because the Internet Told You, How Do You Know It’s True? http://www.penguin.com/book/virtual-unreality-by-charles-seife/9780670026081
- ↑ Revealed: US spy operation that manipulates social media http://www.theguardian.com/technology/2011/mar/17/us-spy-operation-social-networks
- ↑ China Uses an Army of Sockpuppets to Control Public Opinion – and the US Will Too http://guardianlv.com/2013/11/china-uses-an-army-of-sockpuppets-to-control-public-opinion-and-the-us-will-too/
- ↑ Police spies stole identities of dead children http://www.theguardian.com/uk/2013/feb/03/police-spies-identities-dead-children
- ↑ The Lives of Ronald Pinn http://www.lrb.co.uk/v37/n01/andrew-ohagan/the-lives-of-ronald-pinn
- ↑ The Art of Deception: Training for a New Generation of Online Covert Operations https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/
- ↑ TinEye: Reverse image search https://www.tineye.com/