Operation Earnest Voice

Operation Earnest Voice is an astroturfing campaign by the Federal government of the United States.[1] The aim of the initiative is to use sockpuppets to spread pro-American propaganda on social networking services based outside of the US.[1][2][3][4] The campaign is operated by the United States Central Command (CENTCOM), thought to have been directed at jihadists across Pakistan, Afghanistan and other countries in the Middle East.[1]

According to CENTCOM, the US-based Facebook and Twitter networks are not targeted by the program because US laws prohibit state agencies from spreading propaganda among US citizens as according to the Smith–Mundt Modernization Act of 2012.[5] However, according to the Smith–Mundt Modernization Act of 2012, dissemination of foreign propaganda to domestic audiences is expressly allowed over the Internet including social media networks.[6] Isaac R. Porche, a researcher at the RAND Corporation, claims it would not be easy to exclude US audiences when dealing with Internet communications.[4]

Details

The US government signed a $2.8 million contract with the Ntrepid web-security company to develop a specialized software, allowing agents of the government to post propaganda on "foreign-language websites".[1]

Main characteristics of the software, as stated in the software development request, are:

  • Fifty user "operator" licenses, 10 sockpuppets controllable by each user.[2]
  • Sockpuppets are to be "replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent." Sockpuppets are to "be able to appear to originate in nearly any part of the world."[2]
  • A special secure VPN, allowing sockpuppets to appear to be posting from "randomly selected IP addresses," in order to "hide the existence of the operation."[7]
  • Fifty static IP addresses to enable government agencies to "manage their persistent online personas," with identities of government and enterprise organizations protected which will allow for different state agents to use the same sockpuppet, and easily switch between different sockpuppets to "look like ordinary users as opposed to one organization."[7]
  • Nine private servers, "based on the geographic area of operations the customer is operating within and which allow a customer's online persona(s) to appear to originate from." These servers should use commercial hosting centers around the world.[7]
  • Virtual machine environments, deleted after each session termination, to avoid interaction with "any virus, worm, or malicious software."[7]

Statements

USCC commander David Petraeus, in his congressional testimony, stated that Operation Earnest Voice would "reach [a country's] regional audiences through traditional media, as well as via Web sites and regional public-affairs blogging," as an effort to "counter extremist ideology and propaganda".[1] However, his successor, Jim Mattis, altered the program to have "regional blogging" fall under general USCC public-affairs activity. On how they would operate on these blogs, Petraeus explained: "We bring out the moderate voices. We amplify those. And in more detail, we detect and we flag if there is adversary, hostile, corrosive content in some open-source Web forum, [and] we engage with the Web administrators to show that this violates Web site provider policies."[8]

gollark: Hahahahanope.
gollark: I don't think they could ever really be depleted anyway.
gollark: I predict that the "boredom point" when people mostly leave and/or stop consuming large amounts of metals will occur before the ore depletion point.
gollark: Er, it's not bound to happen.
gollark: Assuming 100 ores a chunk, we have >50 million.

See also

References

  1. Fielding, Nick; Cobain, Ian (17 March 2011). "Revealed: US spy operation that manipulates social media". The Guardian. Retrieved 29 January 2017.
  2. Lee, Amy (17 March 2011). "U.S. Military Launches Spy Operation Using Fake Online Identities". The Huffington Post. Retrieved 29 January 2017.
  3. Spillius, Alex (17 March 2011). "Pentagon buys social networking 'spy software'". The Daily Telegraph. Retrieved 22 June 2013.
  4. Waterman, Shaun (1 March 2011). "U.S. Central Command 'friending' the enemy in psychological war". The Washington Times. Retrieved 29 January 2017.
  5. Thornberry, Mac (10 May 2012). "The Smith–Mundt Modernization Act of 2012 (H.R. H. R. 5736)" (PDF). GovTrack. Retrieved 29 January 2017.
  6. "Text of H.R. 5736 (112th): Smith–Mundt Modernization Act of 2012 (Introduced version)". GovTrack. Retrieved 2017-03-01.
  7. United States Air Force (22 June 2010). "Persona Management Software. Solicitation Number: RTB220610". FedBizOpps.gov. Archived from the original on 22 February 2011. Retrieved 1 February 2017.
  8. Pincus, Walter (28 March 2011). "New and old information operations in Afghanistan: What works?". The Washington Post. Retrieved 29 January 2017.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.