Psychological warfare

From Gender and Tech Resources

Revision as of 18:25, 12 June 2015 by Lilith2 (Talk | contribs)

Wikipedia defines "social engineering" as "psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme." Although it has a bad name, aspects of social engineering actually touch many parts of daily life. [1]

Webster’s Dictionary defines social as "of or relating to human society, the interaction of the individual and the group, or the welfare of human beings as members of society <social institutions>" [2] and engineering (in this context) as as "the control or direction of something (such as behavior)". Next to it is the definition for another context of engineering: "the work of designing and creating large structures (such as roads and bridges) or new products or systems by using scientific methods". [3]

Combine Webster's social definition with the second definition of engineering in a pair of goggles and you can see through the glasses of social engineers. In this view, social engineering is used in:

  • everyday life in the way parents get their children to give in to their demands, and children get their parents to give in to their demands and that makes for games people keep playing later. [4]
  • the way teachers interact with their students
  • the way doctors, lawyers, or psychologists obtain information from their patients or clients
  • law enforcement
  • dating
  • every human interaction from babies to politicians and everyone in between

Main focus here is on what we can learn from military operations, law enforcement, the politicians, the psychologists, and even children to better our abilities to detect manipulations that are not in our best interest and then secure ourselves from those as best as we can.

PsyOps

PSYOPS, as the military calls it, seek to exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives.

‘Psychological Operations: Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organisations, groups, and individuals. The purpose of psychological operations is to induce or reinforce foreign attitudes and behavior favorable to the originator’s objectives. Also called PSYOP. See also consolidation psychological operations; overt peacetime psychological operations programs; perception management. ‘ US Department of Defense.

Propaganda of some sort has been used in warfare for centuries, but all the social, economic, industrial, and military factors that make propaganda a large-scale part of war, first made themselves seriously felt in World War I when it became a formal branch of many governments in the form of institutions such as the British Ministry of Information, the German Ministry of Propaganda and Public Enlightenment, the American Committee on Public Information (in World War I), the Office of War Information (in World War II), and their counterparts in many other countries.

The function of war propaganda is to picture military successes on the propagandist’s side, project armed might and economic power the adversary has to face, and the moral superiority of the cause against which the adversary is fighting. And to inform the people back home with a free flow of information that stimulates the war effort, strengthens the nation to hold steadfast through a long conflict, to take losses courageously, to make sacrifices bravely, to buy (war) bonds generously, and to cooperate in every way possible in the great national effort for victory. Give us your children ...

Iran wants war.jpg

Perception management

In the 1980s, the Reagan administration pioneered “perception management” to get the American people to “kick the Vietnam Syndrome” and accept more U.S. interventionism, but that propaganda structure continues to this day getting the public to buy into endless war ... [5]

In social engineering "communication modeling" is common and uses the same Shannon–Weaver model, the "mother of all models" that all other communication models do (Berlo, transactional). [6]

Communication can take many different forms. There are auditory means, such as speech, song, and tone of voice, and there are nonverbal means, such as body language, sign language, para language, touch, and eye contact. Regardless of the type of communication used, the message and how it is delivered will have a definite effect on the receiver. Understanding the basic ground rules is essential to building a model for a target. Some rules cannot be broken, such as communication always having a sender and a receiver. Also, everyone has different personal realities that are built and affected by their past experiences and their perceptions. Everyone perceives, experiences, and interprets things differently based on these personal realities. Any given event will always be perceived differently by different people because of this fact. And these personal realities have been built by previous social engineering, first and foremost (and deepest) from our image makers, our parents, grandparents and siblings.

Each person has both a physical and a mental personal space. You allow or disallow people to enter that space or get close to you depending on many factors. Effective communication attempts to bring all participants into each other’s mental location.

When a social engineer communicates they are trying to bring someone else into their space and share that personal reality. The goal of a social engineer is to give both the verbal and nonverbal cues to alter the perception of the target (individual or group) so as to have the impact the social engineer desires.

Pre-preparing the publics' minds (whether that happens intentionally or develops opportunistically) for specific events that catalyse massive shifts in governmental policy direction using films and documentary concepts (promoting specific forms of intent) is not a new thing. It is just much more advanced these days. See Plain Folks in propaganda.

Rewriting history

Most (if not all) of the techniques used in rewriting history (revisionism) are for deception or denial and vary from using forged documents (the fog) as genuine sources (or inventing reasons to distrust genuine documents), to exploiting opinions by taking them out of their historical context.

Disinformation

Unlike traditional propaganda techniques designed to engage emotional support, disinformation is designed to manipulate the audience at the rational level by either discrediting conflicting information or supporting false conclusions.

Bag of digital tricks

Digital morphing

Digital morphing — voice, video, and photo — has come of age and is in use in psychological operations. Has been on the rise, especially on twitter and facebook.

Sockpuppetry

Sockpuppetry (using false identities for deception) is centuries old, but the web has made creating sockpuppets, and falling for their tricks, easier than ever before. And we can make our own sockpuppets, if only for understanding our adversaries and finding (counter) moves. See sockpuppetry.

Trolling

Government agents are trained to troll to promote specific forms of intent and attack other forms. Intelligence agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself. For example, among the core self-identified purposes of JTRIG [7] are two tactics:

  • to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and
  • to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

See trolling for the minor and little petty tyrant version of this delightful and loving practice.

Cyberbullying

Cyberbullying is also not under our control. And in the current state(s) of society, some of our little ones and more vulnerable members of society are in need of help, the help they are not getting locally because for example, everybody is too busy making money and racing around for that. See cyberbullying.

(Counter) moves

Build safe spaces

Digital morphing

If you suspect an image was morphed, use TinEye, it will show you previously uploaded images on the net. [8] If it isn't found by Tineye, it doesn't mean it's not morphed. The image may be new (and altered), or not in Tineye's database. But if an older version is found that is different, likely the image you have that is different was morphed.

Specific form of intent

Pre-predictive programming is a research field sifting carefully through a movies subtext, semiotics, dialogue the movies conceptual architecture and basically identifying the synchronous random anomalies with the subtly deliberate insertions in movie scripts that exist only to promote a specific form of intent in the collective publics mindset.

Effective countermoves are roleplay and controlled folly and building our own knowledge and resource base.

For example, The Grand Chessboard, a fictional novel using the traditional narratives of state-centric Westphalian order as a necessary condition of international relations, can be used as a DIY exercise in pre-predictive programming research, where you, the reader, are the central character of the novel. Word of warning: If taken serious, reading leads to causal fallacies and an almost inevitable blindness to the role and impact of non-state actors.

Underminers

Underminers is a book and a movement using a highly practical approach to the process of undermining in all its many hues. At once entertaining, shocking and inspiring, Underminers draws on the author’s own experience dealing at first hand with the lies of the industrial machine, and that of a wide range of other people who have their own unique take on the swath of topics covered in the book.

Resources

News and watchdogs

Leaks

Books

Immunisation

Underminers

Documentaries

War made easy

Psychological warfare

The century of the self

Who owns the future?

Music

Satire

Related

References

  1. Wikipedia: Social Engineering (security) https://en.wikipedia.org/wiki/Social_engineering_%28security%29
  2. Webster's Dictionary: Social http://www.merriam-webster.com/dictionary/social
  3. Webster's Dictionary: engineering http://www.merriam-webster.com/dictionary/engineering
  4. Games people play, Eric Berne https://archive.org/details/TheGamesPeoplePlay
  5. Consortium news: The Victory of "Perception Management" https://consortiumnews.com/2014/12/28/the-victory-of-perception-management/
  6. Shannon–Weaver model https://en.wikipedia.org/wiki/Shannon%E2%80%93Weaver_model
  7. The Art of Deception: Training for a New Generation of Online Covert Operations https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/
  8. TinEye: Reverse image search https://www.tineye.com/