Psychological warfare

From Gender and Tech Resources

Revision as of 09:29, 9 June 2015 by Lilith2 (Talk | contribs) (Pre-predictive programming)

‘Psychological Operations: Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organisations, groups, and individuals. The purpose of psychological operations is to induce or reinforce foreign attitudes and behavior favorable to the originator’s objectives. Also called PSYOP. See also consolidation psychological operations; overt peacetime psychological operations programs; perception management. ‘ US Department of Defense [1]

Propaganda of some sort has been used in warfare for centuries, but all the social, economic, industrial, and military factors that make propaganda a large-scale part of war, first made themselves seriously felt in World War I when it became a formal branch of many governments in the form of institutions such as the British Ministry of Information, the German Ministry of Propaganda and Public Enlightenment, the American Committee on Public Information (in World War I), the Office of War Information (in World War II), and their counterparts in many other countries.

The function of war propaganda is to picture military successes on the propagandist’s side, project armed might and economic power the adversary has to face, and the moral superiority of the cause against which the adversary is fighting. And to inform the people back home with a free flow of information that stimulates the war effort, strengthens the nation to hold steadfast through a long conflict, to take losses courageously, to make sacrifices bravely, to buy (war) bonds generously, and to cooperate in every way possible in the great national effort for victory. Give us your children ...

PsyOps

PSYOPS, as the military calls it, seek to exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives.

Known tricks

Explain.jpg

Rewriting history

Most (if not all) of the techniques used in rewriting history (revisionism) are for deception or denial and vary from using forged documents (the fog) as genuine sources (or inventing reasons to distrust genuine documents), to exploiting opinions by taking them out of their historical context.

Disinformation

Unlike traditional propaganda techniques designed to engage emotional support, disinformation is designed to manipulate the audience at the rational level by either discrediting conflicting information or supporting false conclusions.

Perception management

In the 1980s, the Reagan administration pioneered “perception management” to get the American people to “kick the Vietnam Syndrome” and accept more U.S. interventionism, but that propaganda structure continues to this day getting the public to buy into endless war ...

Advanced tricks

Digital morphing

Digital morphing — voice, video, and photo — has come of age and is in use in psychological operations. Has been on the rise, especially on twitter and facebook.

Promoting specific forms of intent

Pre-preparing the publics' minds for a specific event that catalyses a massive shift in governmental policy direction using films and documentary concepts is not a new thing. It is just much more advanced these days.

Sockpuppetry

Sockpuppetry (using false identities for deception) is centuries old, but the web has made creating sockpuppets, and falling for their tricks, easier than ever before. And we can make our own sockpuppets, if only for understanding our adversaries and finding (counter) moves. See sockpuppetry.

Trolling

Government agents are trained to troll to promote specific forms of intent and attack other forms. Intelligence agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself. For example, among the core self-identified purposes of JTRIG [2] are two tactics:

  • to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and
  • to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

See trolling for the minor and little petty tyrant version of this delightful and loving practice.

Cyberbullying

Cyberbullying is also not under our control. And in the current state(s) of society, some of our little ones and more vulnerable members of society are in need of help, the help they are not getting locally because for example, everybody is too busy making money and racing around for that. See cyberbullying.

(Counter) moves

Build safe spaces

Digital morphing

If you suspect an image was morphed, use TinEye, it will show you previously uploaded images on the net. [3] If it isn't found by Tineye, it doesn't mean it's not morphed. The image may be new (and altered), or not in Tineye's database. But if an older version is found that is different, likely the image you have that is different was morphed.

Specific form of intent

Pre-predictive programming is a research field sifting carefully through a movies subtext, semiotics, dialogue the movies conceptual architecture and basically identifying the synchronous random anomalies with the subtly deliberate insertions in movie scripts that exist only to promote a specific form of intent in the collective publics mindset.

Effective countermoves are roleplay and controlled folly and building our own knowledge base.

For example, The Grand Chessboard, a fictional novel using the traditional narratives of state-centric Westphalian order as a necessary condition of international relations, can be used as a DIY exercise in pre-predictive programming research, where you, the reader, are the central character of the novel. Word of warning: If taken serious, reading leads to causal fallacies and an almost inevitable blindness to the role and impact of non-state actors.

Underminers

Underminers is a book and a movement using a highly practical approach to the process of undermining in all its many hues. At once entertaining, shocking and inspiring, Underminers draws on the author’s own experience dealing at first hand with the lies of the industrial machine, and that of a wide range of other people who have their own unique take on the swath of topics covered in the book.

Resources

News and watchdogs

Leaks

Books

Immunisation

Underminers

Documentaries

War made easy

Psychological warfare

The century of the self

Who owns the future?

Related

References

  1. The information warfare site http://www.iwar.org.uk/psyops/
  2. The Art of Deception: Training for a New Generation of Online Covert Operations https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/
  3. TinEye: Reverse image search https://www.tineye.com/