Difference between revisions of "Red pill or blue pill?"

From Gender and Tech Resources

(Covert operations)
(Replaced content with " ")
 
(13 intermediate revisions by the same user not shown)
Line 1: Line 1:
Spent time searching the subject of who your social media friends might be? Ever wonder what the intelligence agencies are up to with fake profiles? Driven mad at people who derail intelligent discussions? It’s simple. In information operations, the goal is to create people who ‘are what they think’ to the advantage of ‘the man behind the curtain’ or a center tower as described in Foucaults panopticon.
 
  
== Bits and pieces from history ==
 
It doesn't take long or a lot of work to find dots and snippets of the recent past that give us glimpses of what was to come.
 
 
* In 2005 the BBC reports that the US military is planning to win the hearts of young people in the Middle East by publishing a new comic in order to "''achieve long-term peace and stability in the Middle East''" <ref>US army to produce Mid-East comic http://news.bbc.co.uk/2/hi/middle_east/4396351.stm</ref> and reveals in 2006 US plans to '''fight the net''<nowiki/>': A newly declassified document gives a fascinating glimpse into the US military's plans for "information operations" - from psychological operations, to attacks on hostile computer networks <ref>US plans to 'fight the net' revealed http://news.bbc.co.uk/2/hi/americas/4655196.stm
 
</ref>.
 
* The Raw Story reports in 2007 that CENTCOM sent emails to "''bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information''" <ref>Raw obtains CENTCOM email to bloggers http://www.rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016.html</ref>.
 
* More alarming seems to be the article from the Register on wargame simulations: Sentient world: war games on the grandest scale informing us that the US DOD is developing a parallel to Planet Earth, with billions of individual "nodes" to reflect every man, woman, and child this side of the dividing line between reality and artificial reality to see how long you can go without food or water, or how you will respond to televised propaganda <ref>Sentient world: war games on the grandest scale http://www.theregister.co.uk/2007/06/23/sentient_worlds/
 
</ref>.
 
* 2009 is the year the US Air Force releases ‘Counter-Blog’ marching orders to its airmen as part of an Air Force push to "''counter the people out there in the blogosphere who have negative opinions about the U.S. government and the Air Force''" <ref>Air Force Releases ‘Counter-Blog’ Marching Orders http://www.wired.com/2009/01/usaf-blog-respo/
 
</ref>.
 
* The tension was tangible through linguistic patterns in the IRC channels of the anonymous hives in 2011. An anonymous operation was starting up <ref>International Lulz: Anonymous Aids Rebellions in Tunisia, Algeria and Libya https://www.techdirt.com/articles/20110520/15384614363/international-lulz-anonymous-aids-rebellions-tunisia-algeria-libya.shtml
 
</ref>. Photos and messages kept appearing on atrocities commited by Ghadafi. Do-gooders jumped in, farts saw an opportunity for leadership. But all was not what it seemed as we'd learn later. Human rights investigations reported NATO bombing the Great Man-Made River <ref>NATO bombs the Great Man-Made River http://humanrightsinvestigations.org/2011/07/27/great-man-made-river-nato-bombs/
 
</ref>, RT reported on the plundering of Libya by Goldman Sachs <ref>Goldman Sachs Rips Off Libya, Donald Trump Admits Screwing Gaddafi https://www.youtube.com/watch?v=BvIPUHVI3Cg#t=21
 
</ref> and two weeks later again, with the numbers <ref>Bankers raping and pillaging Libya. Goldman Sachs and Colonel Gaddafi https://www.youtube.com/watch?v=_sfY-OR_olQ
 
</ref>. O aye, and many more lies behind the West's war on Libya <ref>The lies behind the West's war on Libya http://www.pambazuka.net/en/category.php/features/72575
 
</ref>. It is not as if the anonymous operation made any real difference, but still the old adage goes, fool me once shame on you, fool me twice ...
 
 
== Covert operations ==
 
The larger context of the above bits and pieces is that of covert operations, a practice as old as warfare, the oldest occupation of mankind. Many events in history have been changed because of covert missions by military or by secret organizations led by a government.
 
 
<em>“History isn’t like that. History unravels gently, like an old sweater. It has been patched and darned many times, reknitted to suit different people, shoved in a box under the sink of censorship to be cut up for the dusters of propaganda, yet it always – eventually – manages to spring back into its old familar shape. History has a habit of changing the people who think they are changing it. History always has a few tricks up its frayed sleeve. It’s been around a long time.” ~ Terry Pratchett, Mort</em>
 
 
Discoveries and experiences are being shared, conspiracies disclosed <ref>25 Most Top Secret Military Operations In History https://www.youtube.com/watch?v=_dWiRtkzaAQ
 
</ref>, injustices revealed, the dead named, and sometimes governments change as a result of that. More likely, when a government changes it is caused by covert operations.
 
 
===== Signals Intelligence (SIGINT) =====
 
Intelligence-gathering by interception of signals, between people (COMINT) or from electronic signals not directly used in communication (ELINT).
 
 
===== Communications Intelligence (COMINT) =====
 
Covers all electronic communications in the US and the world "to ensure national security". The NSA at Ft Meade, Maryland has had the most advanced computers in the world since the 60s. Technology is developed and implemented in secret.
 
 
===== Electronic Intelligence (ELINT) =====
 
ELINT is divided into Technical ELINT (TechELINT) and Operational ELINT (OpELINT)
 
 
Technical ELINT obtains signal structure, emission characteristics, modes of operation, emitter functions, and weapons systems associations of such emitters as radars, beacons, jammers, and navigational signals for determining its capabilities and role in a larger system as part of electronic warfare.
 
 
Operational ELINT focuses on locating  specific  ELINT  targets  and  determining operational patterns of the systems named Electronic Order of Battle (EOB) for supporting military operational planners and tactical military commanders on the battlefield.
 
 
===== Foreign Instrumentation Signals Intelligence (FISINT) =====
 
TELINT (Telemetry Intelligence), later named FISINT (Foreign Instrumentation Signals Intelligence) used for intercepting, processing, and analysis of foreign telemetry is closely related to TechELINT and conducted by DoD. 
 
 
===== Human intelligence (HUMINT) =====
 
Any information that can be gathered from any human sources. The National Clandestine Service (NCS) is the branch of the CIA responsible for the collection of HUMINT.
 
 
===== Domestic Intelligence (DOMINT) =====
 
The NSA has a permanent national security anti-terrorist surveillance network in place. This surveillance network seems hidden from the public, save for the leaks.
 
 
== Psychological warfare ==
 
''‘Psychological Operations: Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals. The purpose of psychological operations is to induce or reinforce foreign attitudes and behavior favorable to the originator’s objectives. Also called PSYOP. See also consolidation psychological operations; overt peacetime psychological operations programs; perception management. ''‘ US Department of Defense <ref>The information warfare site http://www.iwar.org.uk/psyops/</ref>
 
 
=== Shock doctrine ===
 
 
== Propaganda ==
 
Propaganda is "''any form of communication in support of national objectives designed to influence the opinions, emotions, attitudes, or behavior of any group in<nowiki> </nowiki>order to benefit the sponsor, either directly or indirectly''". Governments have always tried to control their citizens. Those in authority want control of the people’s hearts, minds and allegiances, and block or censor dissident voices. Probably every conflict is fought on at least two grounds: the battlefield and the minds of the people via propaganda. The “good guys” and the “bad guys” can often both be guilty of misleading their people with distortions, exaggerations, subjectivity, inaccuracy and even fabrications, in order to receive support and a sense of legitimacy. The good guise and the bad guise. Black and white. A fight for supremacy, for government. The king is dead, long live the king. We can learn how their game is played for how to deal with (counteract) these propaganda wars <ref>The Semantics of “Good” & “Evil” http://theanarchistlibrary.org/library/robert-anton-wilson-the-semantics-of-good-evil
 
</ref>.
 
 
=== Rewriting history ===
 
Most (if not all) of the techniques used in rewriting history (revisionism) are for deception or denial and vary from using forged documents (the fog) as genuine sources (or inventing reasons to distrust genuine documents), to exploiting opinions by taking them out of their historical context.
 
 
=== Disinformation ===
 
Unlike traditional propaganda techniques designed to engage emotional support, disinformation is designed to manipulate the audience at the rational level by either discrediting conflicting information or supporting false conclusions.
 
 
=== Sleeper effect ===
 
 
== News and watchdogs ==
 
 
== Interesting reads ==
 
 
=== Fallacies ===
 
* How to Detect Propaganda (pdf) - Adapted from: The Institute for Propaganda Analysis, 1937 http://www.mindivogel.com/uploads/1/1/3/9/11394148/how_to_detect_propaganda.pdf
 
* Love is a Fallacy (pdf) - story by by Max Shulman p.10 https://www.dartmouth.edu/~aporia/spring08.pdf
 
 
=== Sleeper Effect ===
 
* The Influence of Speaker Credibility on Information Recall (pdf) - Michael E. Corrie http://www.uwlax.edu/urc/JUR-online/PDF/2003/corrie.pdf
 
* Detecting and Explaining the Sleeper Effect (pdf) - Darlene B. Hannah & Brian Sternthal http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.455.3259&rep=rep1&type=pdf
 
* The Sleeper Effect in Persuasion: A Meta-Analytic Review (pdf) - Tarcan Kumkale and Dolores Albarracın http://home.ku.edu.tr/~tkumkale/sleeper.pdf
 
 
== Documentaries ==
 
 
=== Counterintelligence ===
 
* Counter-Intelligence: I - The Company https://vimeo.com/65148608
 
* Counter-Intelligence: II - The Deep State https://vimeo.com/65942057
 
* Counter-Intelligence: III - The Strategy of Tension https://vimeo.com/66019647
 
* Counter-Intelligence: IV - Necrophilous https://vimeo.com/66019647
 
* Counter-Intelligence: V - Drone Nation https://vimeo.com/66183267
 
 
=== Psychological warfare ===
 
* Psywar https://vimeo.com/14772678
 
 
== References ==
 

Latest revision as of 10:35, 31 May 2015