FAQFAQ   SearchSearch   MemberlistMemberlist  Chat Chat  UsergroupsUsergroups  CalendarCalendar RegisterRegister   ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

Revealed: Pentagon psyop to manipulate social media

 
Post new topic   Reply to topic    9/11, 7/7 & the War on Freedom Forum Index -> 9/11 & 7/7 Truth News
View previous topic :: View next topic  
Author Message
TonyGosling
Editor
Editor


Joined: 25 Jul 2005
Posts: 14903
Location: St. Pauls, Bristol, England

PostPosted: Fri Mar 18, 2011 1:28 am    Post subject: Revealed: Pentagon psyop to manipulate social media Reply with quote

Revealed: US spy operation that manipulates social media
Exclusive: Military's 'sock puppet' software creates fake online identities to spread pro-American propaganda
http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-soci al-networks
Nick Fielding and Ian Cobain - guardian.co.uk, Thursday 17 March 2011 13.19 GMT
General David Petraeus has said American efforts to spy on social media are aimed at 'countering extremist ideology [Zionism perchance!] and propaganda and ensuring credible voices are heard'. Photograph: Cliff Owen/AP
The US military is developing software that will let it secretly manipulate social media using fake online personas designed to influence internet conversations and spread pro-American propaganda.
A Californian corporation has been awarded a contract with the US Central Command (Centcom) to develop what is described as an "online persona management service" that will allow one serviceman or woman to control up to 10 separate identities at once.
The contract stipulates each persona must have a convincing background, history and supporting details, and that up to 50 controllers must be able to operate false identities from their workstations "without fear of being discovered by sophisticated adversaries".
The project has been likened by web experts to China's attempts to control and restrict free speech on the internet.
Centcom's contract requires the provision of one "virtual private server" in the United States and eight appearing to be outside the US to give the impression the fake personas are real people located in different parts of the world. It calls for "traffic mixing", blending the persona controllers' internet usage with the usage of people outside Centcom in a manner that must offer "excellent cover and powerful deniability".
Once developed the software could allow US service personnel, working around the clock in one location, to respond to emerging online conversations with a host of co-ordinated blogposts, tweets, retweets, chatroom posts and other interventions. Details of the contract suggest this location would be MacDill air force base near Tampa, Florida, home of US Special Operations Command.
Centcom spokesman Commander Bill Speaks said: "The technology supports classified blogging activities on foreign language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US."
He said none of the interventions were in English, as it would be unlawful to "address US audiences" with such technology, and any English-language use of social media by Centcom was always clearly attributed. The languages in which the interventions are conducted include Arabic, Farsi, Urdu and Pashto.
The multiple persona contract is thought to have been awarded as part of a programme called Operation Earnest Voice (OEV), which was first developed in Iraq as an psychological weapon against the online presence of al-Qaida supporters and others ranged against coalition forces. Since then OEV is reported to have expanded into a $200m programme and is thought to have been used against jihadists across Pakistan, Afghanistan and the Middle East.
OEV is seen by senior US commanders as a vital counter-terrorism and counter-radicalisation programme. In evidence to the US Senate's armed services committee last year General David Petraeus, then commander of Centcom, described the operation as an effort to "counter extremist ideology and propaganda and to ensure that credible voices in the region are heard". He said the US military's objective was to be "first with the truth".
This month Petraeus's successor, General James Mattis, told the same committee that OEV "supports all activities associated with degrading the enemy narrative, including web engagement and web-based product distribution capabilities".
The discovery that the US military is developing false online personalities – known to users of social media as "sock puppets" – could encourage other governments, private companies and non-government organisations to do the same.
Critics are likely to complain that it will allow the US military to create a false consenus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives.
Centcom confirmed that the $2.76m contract was awarded to Ntrepid, a newly formed corporation registered in Los Angeles. It would not disclose whether the multiple persona project is in operation or discuss any related contracts.
Nobody was available for comment at Ntrepid.
In his evidence to the Senate committee Gen Mattis said: "OEV seeks to disrupt recruitment and training of suicide bombers; deny safe havens for our adversaries; and counter extremist ideology and propaganda." Centcom was working with "our coalition partners" to develop new techniques and tactics that the US could use "to counter the adversary in the cyber domain".
According to a report by the inspector general of the US defence department, in Iraq OEV was managed by the multinational forces rather than Centcom.
Asked whether any UK military personnel had been involved in OEV, Britain's Ministry of Defence said it could "find no evidence" of this. The MoD refused to say whether it had been involved in the development of persona management programmes, however, saying: "We don't comment on cyber capability."
OEV was discussed last year at a gathering of electronic warfare specialists in Washington DC, where a senior Centcom officer told delegates that its purpose was to "communicate critical messages and to counter the propaganda of our adversaries".
Persona management by the US military would face legal challenges if it were turned against citizens of the US, where a number of people engaged in so-call sock puppetry have faced prosecution.
Last year a New York lawyer who impersonated a scholar was sentenced to jail after being convicted of "criminal impersonation" and identity theft.
It is unclear whether a persona management programme would contravene UK law. Legal experts say it could fall foul of the Forgery and Counterfeiting Act 1981, which states that "a person is guilty of forgery if he makes a false instrument, with the intention that he or another shall use it to induce somebody to accept it as genuine, and by reason of so accepting it to do or not to do some act to his own or any other person's prejudice". However, this would apply only if a website or social network could be shown to have suffered "prejudice" as a result.

_________________
www.rethink911.org
www.actorsandartistsfor911truth.org
www.mediafor911truth.org
www.pilotsfor911truth.org
www.mp911truth.org
www.ae911truth.org
www.rl911truth.org
www.stj911.org
www.l911t.com
www.v911t.org
www.thisweek.org.uk
www.abolishwar.org.uk
www.elementary.org.uk
www.radio4all.net/index.php/contributor/2149
http://utangente.free.fr/2003/media2003.pdf
"The maintenance of secrets acts like a psychic poison which alienates the possessor from the community" Carl Jung
https://37.220.108.147/members/www.bilderberg.org/phpBB2/


Last edited by TonyGosling on Fri Oct 28, 2011 1:12 am; edited 2 times in total
Back to top
View user's profile Send private message Visit poster's website MSN Messenger
TonyGosling
Editor
Editor


Joined: 25 Jul 2005
Posts: 14903
Location: St. Pauls, Bristol, England

PostPosted: Sat Apr 02, 2011 11:28 pm    Post subject: Reply with quote

The Secret State's Quest for 'Persona Management Software'

written by Tom Burghardt
http://www.pacificfreepress.com/news/1/8396-the-secret-states-quest-fo r-persona-management-software.html

Sock Puppet Planet: The Secret State's Quest for 'Persona Management Software'
by Tom Burghardt l Antifascist Calling...
Not since AT&T whistleblower Marc Klein's 2006 revelations that U.S. telecommunications giants were secretly collaborating with the government to spy on Americans, has a story driven home the point that we are confronted by a daunting set of invisible enemies: the security and intelligence firms constellating the dark skies of the National Security State.

As echoes from last month's disclosures by the cyber-guerrilla collective Anonymous continue to reverberate, leaked HBGary emails and documents are providing tantalizing insight into just how little daylight there is between private companies and the government. The latest front in the ongoing war against civil liberties and privacy rights is the Pentagon's interest in "persona management software."

A euphemism for a suite of high-tech tools that equip an operative--military or corporate, take your pick--with multiple avatars or sock puppets, our latter day shadow warriors hope to achieve a leg up on their opponents in the "war of ideas" through stealthy propaganda campaigns rebranded as "information operations."



A Pervasive Surveillance State

The signs of a pervasive surveillance state are all around us. From the "persistent cookies" that track our every move across the internet to indexing dissidents already preemptively detained in public and private data bases: threats to our freedom to speak out without harassment, or worse, have never been greater.

As constitutional scholar Jack Balkin warned, the transformation of what was once a democratic republic based on the rule of law into a "National Surveillance State," feature "huge investments in electronic surveillance and various end runs around traditional Bill of Rights protections and expectations about procedure."

"These end runs," Balkin wrote, "included public private cooperation in surveillance and exchange of information, expansion of the state secrets doctrine, expansion of administrative warrants and national security letters, a system of preventive detention, expanded use of military prisons, extraordinary rendition to other countries, and aggressive interrogation techniques outside of those countenanced by the traditional laws of war."

Continuing the civil liberties' onslaught, The Wall Street Journal reported last week that Barack Obama's "change" regime has issued new rules that "allow investigators to hold domestic-terror suspects longer than others without giving them a Miranda warning, significantly expanding exceptions to the instructions that have governed the handling of criminal suspects for more than four decades."

The Journal points out that the administrative "revision" of long-standing rules and case law "marks another step back from [Obama's] pre-election criticism of unorthodox counterterror methods."

Also last week, The Raw Story revealed that the FBI has plans to "embark on a $1 billion biometrics project and construct an advanced biometrics facility to be shared with the Pentagon."

The Bureau's new biometrics center, part of which is already operating in Clarksburg, West Virginia, "will be based on a system constructed by defense contractor Lockheed Martin."

"Starting with fingerprints," The Raw Story disclosed, the center will function as "a global law enforcement database for the sharing of those biometric images." Once ramped-up "the system is slated to expand outward, eventually encompassing facial mapping and other advanced forms of computer-aided identification."

The transformation of the FBI into a political Department of Precrime is underscored by moves to gift state and local police agencies with electronic fingerprint scanners. Local cops would be "empowered to capture prints from any suspect, even if they haven't been arrested or convicted of a crime."

"In such a context," Stephen Graham cautions in Cities Under Siege, "Western security and military doctrine is being rapidly imagined in ways that dramatically blur the juridical and operational separation between policing, intelligence and the military; distinctions between war and peace; and those between local, national and global operations."

This precarious state of affairs, Graham avers, under conditions of global economic crisis in the so-called democratic West as well as along the periphery in what was once called the Third World, has meant that "wars and associated mobilizations ... become both boundless and more or less permanent."

Under such conditions, Dick Cheney's infamous statement that the "War on Terror" might last "decades" means, according to Graham, that "emerging security policies are founded on the profiling of individuals, places, behaviours, associations, and groups."

But to profile more effectively, whether in Cairo, Kabul, or New York, state security apparatchiks and their private partners find it necessary to squeeze ever more data from a surveillance system already glutted by an overabundance of "situational awareness."

"Last October," Secrecy News reported, "the DNI revealed that the FY2010 budget for the National Intelligence Program (NIP) was $53.1 billion. And the Secretary of Defense revealed that the FY2010 budget for the Military Intelligence Program (MIP) was $27.0 billion, the first time the MIP budget had been disclosed, for an aggregate total intelligence budget of $80.1 billion for FY 2010."

This excludes of course, the CIA and Pentagon's black budget that hides a welter of top secret and above Special Access Programs under a dizzying array of code names and acronyms. In February, Wired disclosed that the black budget "appears to be about $56 billion, the same as last year," but this "may only be the tip of an iceberg of secret funds."

While the scandalous nature of such outlays during a period of intense economic and social attacks on the working class are obvious, less obvious are the means employed by the so-called "intelligence community" to defend an indefensible system of exploitation and corruption.

Which brings us back to the HBGary hack.

"Operation MetalGear"

While media have focused, rightly so, on the sleazy campaign proposed to Bank of America and the U.S. Chamber of Commerce by the high-powered law firm and lobby shop Hunton & Williams (H&W) to bring down WikiLeaks and tar Chamber critics, the treasure trove of emails leaked by Anonymous also revealed a host of Pentagon programs pointed directly at the heart of our freedom to communicate.

In fact, The Tech Herald revealed that while Palantir and Berico sought to distance themselves from HBGary and Hunton & William's private spy op, "in 2005, Palantir was one of countless startups funded by the CIA, thanks to their venture funding arm, In-Q-Tel."

"Most of In-Q-Tel's investments," journalist Steve Ragan wrote, "center on companies that specialize in automatic collection and processing of information."

In other words Palantir, and dozens of other security start-ups to the tune of $200 million since 1999, was a recipient of taxpayer-funded largess from the CIA's venture capitalist arm for products inherently "dual-use" in nature.

"Palantir Technologies," The Tech Herald revealed, was "the main workhorse when it comes to Team Themis' activities."

In proposals sent to H&W, a firm recommended to Bank of America by a Justice Department insider, "Team Themis said they would 'leverage their extensive knowledge of Palantir's development and data integration environments' allowing all of the data collected to be 'seamlessly integrated into the Palantir analysis framework to enhance link and artifact analysis'."

Following the sting of HBGary Federal and parent company HBGary, Anonymous disclosed on-going interest and contract bids between those firms, Booz Allen Hamilton and the U.S. Air Force to develop software that will allow cyber-warriors to create fake personas that help "manage" Pentagon interventions into social media platforms like Facebook, Twitter and blogs.

As Ragan points out, while the "idea for such technology isn't new," and that "reputation and persona management techniques have been used by the government and the private sector for years," what makes these disclosures uniquely disturbing are apparent plans by the secret state to use the software for propaganda campaigns that can just as easily target an American audience as one in a foreign country.

While neither HBGary nor Booz Allen secured those contracts, interest by HBGary Federal's disgraced former CEO Aaron Barr and others catering to the needs of the militarist state continue to drive development forward.

Dubbed "Operation MetalGear", Anonymous believes that the program "involves an army of fake cyber personalities immersed in social networking websites for the purposes of manipulating the mass population via influence, crawling information from major online communities (such as Facebook), and identifying anonymous personalities via correlating stored information from multiple sources to establish connections between separate online accounts, using this information to arrest dissidents and activists who work anonymously."

As readers recall, such tools were precisely what Aaron Barr boasted would help law enforcement officials take down Anonymous and identify WikiLeaks supporters.

According to a solicitation (RTB220610) found on the FedBizOpps.Gov web site, under the Orwellian tag "Freedom of Information Act Support," the Air Force is seeking software that "will allow 10 personas per user, replete with background, history, supporting details, and cyber presences that are technically, culturally and geographacilly [sic] consistent."

We're informed that "individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries."

Creepily, "personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information."

Aiming for maximum opacity, the RFI demands that the licence "protects the identity of government agencies and enterprise organizations." An "enterprise organization" is a euphemism for a private contractor hired by the government to do its dirty work.

The proposal specifies that the licensed software will enable "organizations to manage their persistent online personas by assigning static IP addresses to each persona. Individuals can perform static impersonations, which allow them to look like the same person over time. Also allows organizations that frequent same site/service often to easily switch IP addresses to look like ordinary users as opposed to one organization."

While Barr's premature boasting may have brought Team Themis to ground, one wonders how many other similar operations continue today under cover of the Defense Department's black budget.

Corporate Cut-Outs

Following up on last month's revelations, The Guardian disclosed that a "Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an 'online persona management service' that will allow one US serviceman or woman to control up to 10 separate identities based all over the world."

That firm, a shadowy Los Angeles-based outfit called Ntrepid is devoid of information on its corporate web site although a company profile avers that the firm "provides national security and law enforcement customers with software, hardware, and managed services for cyber operations, analytics, linguistics, and tagging & tracking."

According to Guardian reporters Nick Fielding and Ian Cobain, Ntrepid was awarded a $2.76M contract by CENTCOM, which refused to disclose "whether the multiple persona project is already in operation or discuss any related contracts."

Blurring corporate lines of accountability even further, The Tech Herald revealed that Ntrepid may be nothing more than a "ghost corporation," a cut-out wholly owned and operated by Cubic Corporation.

A San Diego-based firm describing itself as "a global leader in defense and transportation systems and services" that "is emerging as an international supplier of smart cards and RFID solutions," Cubic clocks in at No. 75 on Washington Technology's list of 2010 Top Government Contractors.

Founded by Walter J. Zable, the firm's Chairman of the Board and CEO, Cubic has been described as one of the oldest and largest defense electronics firms on the West Coast.

Chock-a-block with high-level connections to right-wing Republicans including Darrell Issa, Duncan Hunter and Dan Coates, during the 2010 election cycle Cubic officers donated some $90,000 to Republican candidates, including $25,000 to the National Republican Congressional Committee and some $30,000 to the National Republican Senatorial Committee, according to the Center for Responsive Politics' OpenSecrets.org.

With some $1 billion in 2009 revenue largely derived from the Defense Department, the company's "Cyber Solutions" division "provides specialized cyber security products and solutions for defense, intelligence and homeland security customers."

The RFI for the Air Force disclosed by Anonymous Ragan reports, "was written for Anonymizer, a company acquired in 2008 by intelligence contractor Abraxas Corporation. The reasoning is that they had existing persona management software and abilities."

In turn, Abraxas was purchased by Cubic in 2010 for $124 million, an acquisition which Washington Technology described as one of the "best intelligence-related" deals of the year.

As The Tech Herald revealed, "some of the top talent at Anonymizer, who later went to Abraxas, left the Cubic umbrella to start another intelligence firm. They are now listed as organizational leaders for Ntrepid, the ultimate winner of the $2.7 million dollar government contract."

Speculation is now rife that since "Ntrepid's corporate registry lists Abraxas' previous CEO and founder, Richard Helms, as the director and officer, along with Wesley Husted, the former CFO, who is an Ntrepid officer as well," the new firm may be little more than an under-the-radar front for Cubic.

Amongst the Security Services offered by the firm we learn that "Cubic subsidiaries are working individually and in concert to develop a wide range of security solutions" that include: "C4ISR data links for homeland security intelligence, surveillance and reconnaissance missions;" a Cubic Virtual Analysis Center which promises to deliver "superior situational awareness to decision makers in government, industry and nonprofit organizations," human behavior pattern analysis, and other areas lusted after by securocrats.

The Guardian informs us that the "multiple persona contract is thought to have been awarded as part of a programme called Operation Earnest Voice (OEV), which was first developed in Iraq as a psychological warfare weapon against the online presence of al-Qaida supporters and others ranged against coalition forces."

"Since then," Fielding and Cobain wrote, "OEV is reported to have expanded into a $200m programme and is thought to have been used against jihadists across Pakistan, Afghanistan and the Middle East."

While CENTCOM's then-commander, General David Petraeus told the Senate Armed Services Committee last year that the program was designed to "counter extremist ideology and propaganda," in light of HBGary revelations, one must ask whether firms involved in the dirty tricks campaign against WikiLeaks have deployed versions of "persona management software" against domestic opponents.

While we cannot say with certainty this is the case, mission creep from other "War on Terror" fronts, notably ongoing NSA warrantless wiretapping programs and Defense Department spy ops against antiwar activists, also involving "public-private partnerships" amongst security firms and the secret state, should give pause.




Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. In addition to publishing in Covert Action Quarterly and Global Research, an independent research and media group of writers, scholars, journalists and activists based in Montreal, he is a Contributing Editor with Cyrano's Journal Today. His articles can be read on Dissident Voice, The Intelligence Daily, Pacific Free Press, Uncommon Thought Journal, and the whistleblowing website WikiLeaks. He is the editor of Police State America: U.S. Military "Civil Disturbance" Planning, distributed by AK Press and has contributed to the new book from Global Research, The Global Economic Crisis: The Great Depression of the XXI Century.

_________________
www.rethink911.org
www.actorsandartistsfor911truth.org
www.mediafor911truth.org
www.pilotsfor911truth.org
www.mp911truth.org
www.ae911truth.org
www.rl911truth.org
www.stj911.org
www.l911t.com
www.v911t.org
www.thisweek.org.uk
www.abolishwar.org.uk
www.elementary.org.uk
www.radio4all.net/index.php/contributor/2149
http://utangente.free.fr/2003/media2003.pdf
"The maintenance of secrets acts like a psychic poison which alienates the possessor from the community" Carl Jung
https://37.220.108.147/members/www.bilderberg.org/phpBB2/
Back to top
View user's profile Send private message Visit poster's website MSN Messenger
nrmis
Validated Poster
Validated Poster


Joined: 18 Mar 2007
Posts: 294

PostPosted: Thu Apr 25, 2013 10:58 pm    Post subject: Reply with quote

Forum Shill gets Busted: ATS and GLP Censor to Cover his Tracks

Quote:
CHECKLIST

Do any of the respondents display the urge to supply information that could be helpful to your mission?

Do the respondents appear hostile to your attempts to steer the discussion?

Have you made a personal chart taking care to note who appear to be the “leaders” versus who appear to be the “followers”?

Have you attempted to gauge the “temperature” of the forum’s users?

In other words, the prevailing social psychology of the forum’s members?

Have you been more successful with one or the other XStart methods that were demonstrated in N-7015A.DOC?

Have more technical members (Computer Programmers, Administrators, or Moderators) of the forum deduced or accused you of hiding behind a proxy?

Would you gain more trust and/or credibility if you were to use one of the Agency’s allotted “HOME” pools? (most often needed when handling EVTS that are more sensitive to the pop. of a specific locale but also location centered web sites such as FB or Patch)

Has your PREDEV “persona” been successful or do you gauge that the users find you to be too obtrusive? Accusations of being “ever present” are.


Link: http://www.insanemedia.net/forum-shill-gets-busted-ats-and-glp-censor- n-7015a/2924
Back to top
View user's profile Send private message
scienceplease 2
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 06 Apr 2009
Posts: 1678

PostPosted: Sat Apr 27, 2013 11:41 pm    Post subject: Reply with quote

nrmis wrote:
Forum Shill gets Busted: ATS and GLP Censor to Cover his Tracks

Quote:
CHECKLIST

Do any of the respondents display the urge to supply information that could be helpful to your mission?

Do the respondents appear hostile to your attempts to steer the discussion?

Have you made a personal chart taking care to note who appear to be the “leaders” versus who appear to be the “followers”?

Have you attempted to gauge the “temperature” of the forum’s users?

In other words, the prevailing social psychology of the forum’s members?

Have you been more successful with one or the other XStart methods that were demonstrated in N-7015A.DOC?

Have more technical members (Computer Programmers, Administrators, or Moderators) of the forum deduced or accused you of hiding behind a proxy?

Would you gain more trust and/or credibility if you were to use one of the Agency’s allotted “HOME” pools? (most often needed when handling EVTS that are more sensitive to the pop. of a specific locale but also location centered web sites such as FB or Patch)

Has your PREDEV “persona” been successful or do you gauge that the users find you to be too obtrusive? Accusations of being “ever present” are.


Link: http://www.insanemedia.net/forum-shill-gets-busted-ats-and-glp-censor- n-7015a/2924


Good find.

There are legions of PysOp operatives in the US.
Multiple units per armed forces and multiple units per intelligence agency (there's about six in the USA, I believe).

https://en.wikipedia.org/wiki/Psychological_Operations_%28United_State s%29

Wikipedia points to the tip of an iceberg...
Back to top
View user's profile Send private message
TonyGosling
Editor
Editor


Joined: 25 Jul 2005
Posts: 14903
Location: St. Pauls, Bristol, England

PostPosted: Fri Jun 13, 2014 12:09 pm    Post subject: Reply with quote

Pentagon preparing for mass civil breakdown
Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements
http://www.theguardian.com/environment/earth-insight/2014/jun/12/penta gon-mass-civil-breakdown

A US Department of Defense (DoD) research programme is funding universities to model the dynamics, risks and tipping points for large-scale civil unrest across the world, under the supervision of various US militaryagencies. The multi-million dollar programme is designed to develop immediate and long-term "warfighter-relevant insights" for senior officials and decision makers in "the defense policy community," and to inform policy implemented by "combatant commands."

Launched in 2008 – the year of the global banking crisis – the DoD 'Minerva Research Initiative' partners with universities "to improve DoD's basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the US."

Among the projects awarded for the period 2014-2017 is a Cornell University-led study managed by the US Air Force Office of Scientific Research which aims to develop an empirical model "of the dynamics of social movement mobilisation and contagions." The project will determine "the critical mass (tipping point)" of social contagians by studying their "digital traces" in the cases of "the 2011 Egyptian revolution, the 2011 Russian Duma elections, the 2012 Nigerian fuel subsidy crisis and the 2013 Gazi park protests in Turkey."

Twitter posts and conversations will be examined "to identify individuals mobilised in a social contagion and when they become mobilised."

Another project awarded this year to the University of Washington "seeks to uncover the conditions under which political movements aimed at large-scale political and economic change originate," along with their "characteristics and consequences." The project, managed by the US Army Research Office, focuses on "large-scale movements involving more than 1,000 participants in enduring activity," and will cover 58 countries in total.

Last year, the DoD's Minerva Initiative funded a project to determine 'Who Does Not Become a Terrorist, and Why?' which, however, conflates peaceful activists with "supporters of political violence" who are different from terrorists only in that they do not embark on "armed militancy" themselves. The project explicitly sets out to study non-violent activists:

"In every context we find many individuals who share the demographic, family, cultural, and/or socioeconomic background of those who decided to engage in terrorism, and yet refrained themselves from taking up armed militancy, even though they were sympathetic to the end goals of armed groups. The field of terrorism studies has not, until recently, attempted to look at this control group. This project is not about terrorists, but aboutsupporters of political violence."

The project's 14 case studies each "involve extensive interviews with ten or more activists and militants in parties and NGOs who, though sympathetic to radical causes, have chosen a path of non-violence."

I contacted the project's principal investigator, Prof Maria Rasmussen of the US Naval Postgraduate School, asking why non-violent activists working for NGOs should be equated to supporters of political violence – and which "parties and NGOs" were being investigated – but received no response.

Similarly, Minerva programme staff refused to answer a series of similar questions I put to them, including asking how "radical causes" promoted by peaceful NGOs constituted a potential national security threat of interest to the DoD.

Among my questions, I asked:

"Does the US Department of Defense see protest movements and social activism in different parts of the world as a threat to US national security? If so, why? Does the US Department of Defense consider political movements aiming for large scale political and economic change as a national security matter? If so, why? Activism, protest, 'political movements' and of course NGOs are a vital element of a healthy civil society and democracy - why is it that the DoD is funding research to investigate such issues?"

Minerva's programme director Dr Erin Fitzgerald said "I appreciate your concerns and am glad that you reached out to give us the opportunity to clarify" before promising a more detailed response. Instead, I received the following bland statement from the DoD's press office:

"The Department of Defense takes seriously its role in the security of the United States, its citizens, and US allies and partners. While every security challenge does not cause conflict, and every conflict does not involve the US military, Minerva helps fund basic social science research that helps increase the Department of Defense's understanding of what causes instability and insecurity around the world. By better understanding these conflicts and their causes beforehand, the Department of Defense can better prepare for the dynamic future security environment."

In 2013, Minerva funded a University of Maryland project in collaboration with the US Department of Energy's Pacific Northwest National Laboratory to gauge the risk of civil unrest due to climate change. The three-year $1.9 million project is developing models to anticipate what could happen to societies under a range of potential climate change scenarios.

From the outset, the Minerva programme was slated to provide over $75 million over five years for social and behavioural science research. This year alone it has been allocated a total budget of $17.8 million by US Congress.

An internal Minerva staff email communication referenced in a 2012 Masters dissertation reveals that the programme is geared toward producing quick results that are directly applicable to field operations. The dissertation was part of a Minerva-funded project on "counter-radical Muslim discourse" at Arizona State University.

The internal email from Prof Steve Corman, a principal investigator for the project, describes a meeting hosted by the DoD's Human Social Cultural and Behavioural Modeling (HSCB) programme in which senior Pentagon officials said their priority was "to develop capabilities that are deliverable quickly" in the form of "models and tools that can be integrated with operations."

Although Office of Naval Research supervisor Dr Harold Hawkins had assured the university researchers at the outset that the project was merely "a basic research effort, so we shouldn't be concerned about doing applied stuff", the meeting in fact showed that DoD is looking to "feed results" into "applications," Corman said in the email. He advised his researchers to "think about shaping results, reports, etc., so they [DoD] can clearly see their application for tools that can be taken to the field."

Many independent scholars are critical of what they see as the US government's efforts to militarise social science in the service of war. In May 2008, the American Anthropological Association (AAA) wrote to the US government noting that the Pentagon lacks "the kind of infrastructure for evaluating anthropological [and other social science] research" in a way that involves "rigorous, balanced and objective peer review", calling for such research to be managed instead by civilian agencies like the National Science Foundation (NSF).

The following month, the DoD signed a memorandum of understanding (MoU) with the NSF to cooperate on the management of Minerva. In response, the AAA cautioned that although research proposals would now be evaluated by NSF's merit-review panels. "Pentagon officials will have decision-making power in deciding who sits on the panels":

"… there remain concerns within the discipline that research will only be funded when it supports the Pentagon's agenda. Other critics of the programme, including the Network of Concerned Anthropologists, have raised concerns that the programme would discourage research in other important areas and undermine the role of the university as a place for independent discussion and critique of the military."

According to Prof David Price, a cultural anthropologist at St Martin's University in Washington DC and author of Weaponizing Anthropology: Social Science in Service of the Militarized State, "when you looked at the individual bits of many of these projects they sort of looked like normal social science, textual analysis, historical research, and so on, but when you added these bits up they all shared themes of legibility with all the distortions of over-simplification. Minerva is farming out the piece-work of empire in ways that can allow individuals to disassociate their individual contributions from the larger project."

Prof Price has previously exposed how the Pentagon's Human Terrain Systems (HTS) programme - designed to embed social scientists in military field operations - routinely conducted training scenarios set in regions "within the United States."

Citing a summary critique of the programme sent to HTS directors by a former employee, Price reported that the HTS training scenarios "adapted COIN [counterinsurgency] for Afghanistan/Iraq" to domestic situations "in the USA where the local population was seen from the military perspective as threatening the established balance of power and influence, and challenging law and order."

One war-game, said Price, involved environmental activists protesting pollution from a coal-fired plant near Missouri, some of whom were members of the well-known environmental NGO Sierra Club. Participants were tasked to "identify those who were 'problem-solvers' and those who were 'problem-causers,' and the rest of the population whom would be the target of the information operations to move their Center of Gravity toward that set of viewpoints and values which was the 'desired end-state' of the military's strategy."

Such war-games are consistent with a raft of Pentagon planning documents which suggest that National Security Agency (NSA) mass surveillance is partially motivated to prepare for the destabilising impact of coming environmental, energy and economic shocks.

James Petras, Bartle Professor of Sociology at Binghamton University in New York, concurs with Price's concerns. Minerva-funded social scientists tied to Pentagon counterinsurgency operations are involved in the "study of emotions in stoking or quelling ideologically driven movements," he said, including how "to counteract grassroots movements."

Minerva is a prime example of the deeply narrow-minded and self-defeating nature of military ideology. Worse still, the unwillingness of DoD officials to answer the most basic questions is symptomatic of a simple fact – in their unswerving mission to defend an increasingly unpopular global system serving the interests of a tiny minority, security agencies have no qualms about painting the rest of us as potential terrorists.

_________________
www.rethink911.org
www.actorsandartistsfor911truth.org
www.mediafor911truth.org
www.pilotsfor911truth.org
www.mp911truth.org
www.ae911truth.org
www.rl911truth.org
www.stj911.org
www.l911t.com
www.v911t.org
www.thisweek.org.uk
www.abolishwar.org.uk
www.elementary.org.uk
www.radio4all.net/index.php/contributor/2149
http://utangente.free.fr/2003/media2003.pdf
"The maintenance of secrets acts like a psychic poison which alienates the possessor from the community" Carl Jung
https://37.220.108.147/members/www.bilderberg.org/phpBB2/
Back to top
View user's profile Send private message Visit poster's website MSN Messenger
outsider
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 30 Jul 2006
Posts: 5173
Location: East London

PostPosted: Mon Jan 12, 2015 4:54 pm    Post subject: Reply with quote

Leaked Video Of Cruise Missile Hitting Pentagon on 9/11:
http://beforeitsnews.com/9-11-and-ground-zero/2013/01/leaked-video-of- cruise-missile-hitting-pentagon-on-911-2439418.html

Not very clear, but far more credible than the OCT.

_________________
'And he (the devil) said to him: To thee will I give all this power, and the glory of them; for to me they are delivered, and to whom I will, I give them'. Luke IV 5-7.
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic   Reply to topic    9/11, 7/7 & the War on Freedom Forum Index -> 9/11 & 7/7 Truth News All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group