Psychological warfare
From Gender and Tech Resources
Wikipedia defines "social engineering" as "psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme." Although it has a bad name, aspects of social engineering actually touch many parts of daily life. [1]
Webster’s Dictionary defines social as "of or relating to human society, the interaction of the individual and the group, or the welfare of human beings as members of society <social institutions>" [2] and engineering (in this context) as as "the control or direction of something (such as behavior)". Next to it is the definition for another context of engineering: "the work of designing and creating large structures (such as roads and bridges) or new products or systems by using scientific methods". [3]
Combine Webster's social definition with the second definition of engineering in a pair of goggles and you can see through the glasses of social engineers. In this view, social engineering is used in:
- everyday life in the way parents get their children to give in to their demands, and children get their parents to give in to their demands and that makes for games people keep playing later. [4]
- the way teachers interact with their students
- the way doctors, lawyers, or psychologists obtain information from their patients or clients
- law enforcement
- dating
- every human interaction from babies to politicians and everyone in between
Main focus here is on what we can learn from military operations, law enforcement, the politicians, the psychologists, and even children to better our abilities to detect manipulations that are not in our best interest and then secure ourselves from those as best as we can.
PsyOps
PSYOPS, as the military calls it, seek to exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives.
‘Psychological Operations: Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organisations, groups, and individuals. The purpose of psychological operations is to induce or reinforce foreign attitudes and behavior favorable to the originator’s objectives. Also called PSYOP. See also consolidation psychological operations; overt peacetime psychological operations programs; perception management. ‘ US Department of Defense.
Propaganda of some sort has been used in warfare for centuries, but all the social, economic, industrial, and military factors that make propaganda a large-scale part of war, first made themselves seriously felt in World War I when it became a formal branch of many governments in the form of institutions such as the British Ministry of Information, the German Ministry of Propaganda and Public Enlightenment, the American Committee on Public Information (in World War I), the Office of War Information (in World War II), and their counterparts in many other countries.
The function of war propaganda is to picture military successes on the propagandist’s side, project armed might and economic power the adversary has to face, and the moral superiority of the cause against which the adversary is fighting. And to inform the people back home with a free flow of information that stimulates the war effort, strengthens the nation to hold steadfast through a long conflict, to take losses courageously, to make sacrifices bravely, to buy (war) bonds generously, and to cooperate in every way possible in the great national effort for victory. Give us your children ...
Rewriting history
Most (if not all) of the techniques used in rewriting history (revisionism) are for deception or denial and vary from using forged documents as genuine sources (or inventing reasons to distrust genuine documents), to exploiting opinions by taking them out of their historical context.
Disinformation
Unlike traditional propaganda techniques designed to engage emotional support, disinformation is designed to manipulate the audience at the rational level by either discrediting conflicting information or supporting false conclusions.
Perception management
In the 1980s, the Reagan administration pioneered “perception management” to get the American people to “kick the Vietnam Syndrome” and accept more U.S. interventionism, but that propaganda structure continues to this day getting the public to buy into endless war ... [5] Also see Plain Folks.
In social engineering "communication modeling" is common and uses the same Shannon–Weaver model, the "mother of all models" that all other communication models do (Berlo, transactional). [6]
Communication can take many different forms. There are auditory means, such as speech, song, and tone of voice, and there are nonverbal means, such as body language, sign language, para language, touch, and eye contact. Regardless of the type of communication used, the message and how it is delivered will have a definite effect on the receiver. Understanding the basic ground rules is essential to building a model for a target. Some rules cannot be broken, such as communication always having a sender and a receiver. Also, everyone has different personal realities that are built and affected by their past experiences and their perceptions. Everyone perceives, experiences, and interprets things differently based on these personal realities. Any given event will always be perceived differently by different people because of this fact. And these personal realities have been built by previous social engineering, first and foremost (and deepest) from our image makers, our parents, grandparents and siblings.
Each person has both a physical and a mental personal space. You allow or disallow people to enter that space or get close to you depending on many factors. Effective communication attempts to bring all participants into each other’s mental location.
When a social engineer communicates they are trying to bring someone else into their space and share that personal reality. The goal of a social engineer is to give both the verbal and nonverbal cues to alter the perception of the target (individual or group) so as to have the impact the social engineer desires.
Pre-preparing the publics' minds (whether that happens intentionally or develops opportunistically) for specific events that catalyse massive shifts in governmental policy direction using films and documentary concepts (promoting specific forms of intent) is not a new thing. It is just much more advanced these days.
Bag of digital tricks
Digital morphing
Digital morphing — voice, video, and photo — is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. And this is not only used to alter what the image looks like. Digital watermarking is in use for protecting copyright and steganography can be used to hide other files in images.
The fog
Rewriting history and disinformation tactics were such a success in the past that the tactic was expanded on for online use in what has been named "the fog": Computer scientists call it "Fog Computing" — a play on today’s cloud computing craze. And in a recent paper for Darpa, the Pentagon’s premiere research arm, researchers say they’ve built "a prototype for automatically generating and distributing believable misinformation … and then tracking access and attempted misuse of it. We call this 'disinformation technology.'" [7]
Sockpuppetry
Sockpuppetry (using false identities for deception) is centuries old, but the web has made creating sockpuppets, and falling for their tricks, easier than ever before. And we can make our own sockpuppets, if only for understanding our adversaries and finding (counter) moves. See sockpuppetry.
Trolling
Government agents are trained to troll to promote specific forms of intent and attack other forms. Intelligence agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself. For example, among the core self-identified purposes of JTRIG [8] are two tactics:
- to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and
- to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.
See trolling for the minor and little petty tyrant version of this delightful and loving practice.
Cyberbullying
Cyberbullying is also not under our control. And in the current state(s) of society, some of our little ones and more vulnerable members of society are in need of help, the help they are not getting locally because for example, everybody is too busy making money and racing around for that. See cyberbullying.
(Counter) moves
Build safe spaces
Digital morphing
Digital morphing of the first kind, altering what an image looks like, is in use in psychological operations and has been on the rise, especially on twitter and facebook. Horrible images of children that were sometimes taken years before, or images delivered as "proof" of certain troops being "somewhere" yet small letters on a sign are in hindu, those are easy to detect using TinEye. [9] This tool will show you previously uploaded images of an indicated image on the net. Note that if it isn't found by Tineye, it doesn't mean it's not morphed. The image may be new (and altered), or not in Tineye's database. But if an older version is found that is different, likely the image you have that is different was morphed.
In which case you can use other techniques that work on the assumption that although digital forgeries may leave no visual clues that indicate tampering, they may alter the underlying statistics of an image. The set of image forensic tools for passive or blind approach for manipulation detection can be roughly categorized as pixel- based techniques, format-based techniques, camera-based techniques geometric based techniques.
Specific form of intent
Pre-predictive programming is a research field sifting carefully through a movies subtext, semiotics, dialogue, the movies conceptual architecture and basically identifying the synchronous random anomalies with the subtly deliberate insertions in movie scripts that exist only to promote a specific form of intent in the collective publics mindset.
Effective countermoves are roleplay and controlled folly and building our own knowledge and resource base.
For example, The Grand Chessboard, a fictional novel using the traditional narratives of state-centric Westphalian order as a necessary condition of international relations, can be used as a DIY exercise in pre-predictive programming research, where you, the reader, are the central character of the novel. Word of warning: If taken serious, reading leads to causal fallacies and an almost inevitable blindness to the role and impact of non-state actors.
Underminers
Underminers is a book and a movement using a highly practical approach to the process of undermining in all its many hues. At once entertaining, shocking and inspiring, Underminers draws on the author’s own experience dealing at first hand with the lies of the industrial machine, and that of a wide range of other people who have their own unique take on the swath of topics covered in the book.
Resources
News and watchdogs
- Public Intelligence https://publicintelligence.net/
Leaks
- How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
Books
Immunisation
- The art of deception: Training for a new generation of online covert operations http://www.statewatch.org/news/2014/feb/the-art-of-deception-training-for-a-new.pdf
- The crowd: A study of the popular mind, 1896, Gustave Le Bon http://socserv2.socsci.mcmaster.ca/~econ/ugcm/3ll3/lebon/Crowds.pdf
- The grand chessboard: American primacy and its geostrategic imperatives http://www.takeoverworld.info/Grand_Chessboard.pdf
- Group psychology and the analysis of the ego https://archive.org/details/grouppsychologya00freu
- Influence: The Psychology of Persuasion http://vk.com/doc198667109_184130561?hash=d42b246b009bbcc6eb&dl=19059d20bba184b45e
- Propaganda: The Formation of Men's Attitudes http://monoskop.org/images/4/44/Ellul_Jacques_Propaganda_The_Formation_of_Mens_Attitudes.pdf
- The roots of behaviour in war https://www.icrc.org/eng/assets/files/other/icrc_002_0854.pdf
Underminers
- Underminers, A Practical Guide for Radical Change http://underminers.org/
Documentaries
War made easy
- War Made Easy - How Presidents and Pundits Keep Spinning Us To Death https://www.youtube.com/watch?v=R9DjSg6l9Vs
Psychological warfare
- Psywar https://vimeo.com/14772678
- A virus called fear https://www.youtube.com/watch?v=O-VLHNpwju0
- The power of nightmares https://archive.org/details/ThePowerOfNightmares-Episode1BabyItsColdOutside
The century of the self
- Happiness Machines https://vimeo.com/48842811
- The Engineering of Consent https://vimeo.com/48842898
- There is a Policeman Inside All of Our Heads, He Must Be Destroyed https://vimeo.com/112533840
- Eight People Sipping Wine In Kettering https://vimeo.com/75784765
Who owns the future?
- Who Owns the Future? (interview) https://www.youtube.com/watch?v=XdEuII9cv-U
- A series of YouTube videos featuring actors performing melodramatic readings of Yelp reviews http://www.youtube.com/watch?v=QEdXhH97Z7E
Music
- Africa For Norway - New charity single out now! https://www.youtube.com/watch?v=oJLqyuxm96k
Satire
- Clarke and Dawe - The War in Iraq. Not the Previous One. The Current One https://www.youtube.com/watch?v=6tF-5Xg_byk
- This Land is Mine https://www.youtube.com/watch?v=-evIyrrjTTY Reference and original, including an explanation about each character in the video: http://blog.ninapaley.com/2012/10/01/this-land-is-mine/
Related
References
- ↑ Wikipedia: Social Engineering (security) https://en.wikipedia.org/wiki/Social_engineering_%28security%29
- ↑ Webster's Dictionary: Social http://www.merriam-webster.com/dictionary/social
- ↑ Webster's Dictionary: engineering http://www.merriam-webster.com/dictionary/engineering
- ↑ Games people play, Eric Berne https://archive.org/details/TheGamesPeoplePlay
- ↑ Consortium news: The Victory of "Perception Management" https://consortiumnews.com/2014/12/28/the-victory-of-perception-management/
- ↑ Shannon–Weaver model https://en.wikipedia.org/wiki/Shannon%E2%80%93Weaver_model
- ↑ Wired Danger Room: Fog Computing http://www.wired.com/dangerroom/2012/07/fog-computing/
- ↑ The Art of Deception: Training for a New Generation of Online Covert Operations https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/
- ↑ TinEye: Reverse image search https://www.tineye.com/