Snowdens dokument avslöjar att både organiserat näthat och all världens internetmanipulationer är ofta direkt konstruerade av maktens kriminella medarbetare, för att passa myndigheternas och storföretagens agenda.
How the Government Manipulates Your Thoughts Online - Big Brother Watch
Publicerad den 26 feb 2014Abby Martin talks about journalist Glenn Greenwald's report regarding the intelligence community's use of subversive and manipulative online tactics to destroy the reputations of businesses and individuals.
Text: The American Dream 2014-02-26
- It isn’t just that the British government is trying to influence what people are thinking.
- The reality is that this is far bigger than a mere propaganda campaign.
- As Greenwald recently noted on his new website, the “integrity of the Internet itself” is at stake…
By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.So what techniques are the British using to control and manipulate discourse on the Internet? According to Greenwald, the documents that Snowden has uncovered show that they are willing to sink to despicable lows in order to get the results that they desire…
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.
The following is a list of Internet infiltration techniques that were listed on one particular slide that Snowden leaked…
-Set Piece Operation
-False Flag Operation
-False Rescue Operation
You can check out this slide for yourself right here.
There is also evidence that the Canadian government has been involved in this sort of thing as well. The following comes from Natural News…
You’ve probably run into them before — those seemingly random antagonizers who always end up diverting the conversation in an online chat room or article comment section away from the issue at hand, and towards a much different agenda. Hot-button issues like illegal immigration, the two-party political system, the “war on terror” and even alternative medicine are among the most common targets of such attackers, known as internet “trolls” or “shills,” who in many cases are nothing more than paid lackeys hired by the federal government and other international organizations to sway and ultimately control public opinion.You can see a video news report about this activity up in Canada right here.
Several years ago, Canada’s CTV News aired a short segment about how its own government had been exposed for hiring secret agents to monitor social media and track online conversations, as well as the activities of certain dissenting individuals. This report, which in obvious whitewashing language referred to such activities as the government simply “weighing in and correcting” allegedly false information posted online, basically admitted that the Canadian government had assumed the role of secret online police.
- Are you disturbed yet?
- You should be.
So what kind of people are the governments of the western world targeting online?
Well, when it comes to the U.S. government, all you have to do is to look at their official documents to see who they consider the “problems” to be. For much more on this, please see my previous article entitled “72 Types Of Americans That Are Considered ‘Potential Terrorists’ In Official Government Documents“.
Sadly, the reality of the matter is that the days of the free and open Internet are numbered. The governments of the world are increasing their control over the Internet with each passing day, and eventually a time will likely come when we will not be able to communicate openly like this any longer.
Things have gotten so bad in the U.S. already that even Google is spooked…
A recent court decision that endorsed a broad view of the Federal Communications Commission’s authority over the Internet has Google and other Web companies nervous.
In closed-door meetings with regulators and Capitol Hill staff, Google’s lawyers have said they’re worried how the FCC may use its newfound powers, according to multiple people familiar with the meetings.
The extent of the FCC’s authority over Google and other Web services remains unclear, and the current FCC has given no indication that it is interested in pushing aggressive new regulations. But the possibility that the commission could begin telling Google how to organize its search results or handle its users’ data is enough to spook the company’s army of Washington lobbyists.And this is just the beginning.
If you think that the control freaks that are running things now are bad, just wait until you see the next generation of control freaks.
For example, there is one prominent student writer at Harvard that apparently believes that free speech at her university should be abolished and that any professor that does not advocate for her politically-correct version of “justice” should be fired…
A student writer at Harvard University is raising eyebrows after publishing her belief that free speech on campus should be abolished and professors with opposing views be fired.
Sandra Korn, a senior who writes a column for the Harvard Crimson newspaper, thinks radical leftism is the only permissible political philosophy, and the First Amendment only hinders colleges from brainwashing students with her viewpoint.
“Let’s give up on academic freedom in favor of justice,” states the subtitle of her Feb. 18 column, in which she insists Harvard stop guaranteeing students and professors the right to hold controversial views and conduct research putting liberalism in a negative light.This is what control freaks always want.
“If our university community opposes racism, sexism, and heterosexism, why should we put up with research that counters our goals?” Korn asks.
They always want to shut down those that are presenting opposing views.
They don’t believe in free speech and a “marketplace of ideas”. Rather, they believe in shoving what they believe down the rest of our throats.
And now we have solid proof that the governments of the western world are paying people to manipulate discourse on social media, blogs, forums and websites.
- So will there be great outrage over this, or will the apathetic public just roll over and ignore this like they have so many other times the past few years?
Secret units within the 'Five Eyes" global spying network engage in covert online operations that aim to invade, deceive, and control online communities and individuals through the spread of false information and use of ingenious social-science tactics.
Such teams of highly trained professionals have several main objectives, such as “to inject all sorts of false material onto the internet” and “to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable,” The Intercept’s Glenn Greenwald reported based on intelligence documents leaked by former NSA contractor Edward Snowden.
The new information comes via a document from the Joint Threat Research Intelligence Group (JTRIG) of Britain’s Government Communications Headquarters (GCHQ), entitled 'The Art of Deception: Training for Online Covert Operations,' which is top secret and only for dissemination within the Five Eyes intelligence partnership that includes Britain, the US, Australia, Canada, and New Zealand.
The document outlines what tactics are used to achieve JTRIG’s main objectives.
Among those tactics that seek to “discredit a target” include “false flag operations” (posting material online that is falsely attributed to a target), fake victim blog posts (writing as a victim of a target to disseminate false information), and posting “negative information” wherever pertinent online.
Other discrediting tactics used against individuals include setting a "honey-trap" (using sex to lure targets into compromising situations), changing a target's photo on a social media site, and emailing or texting "colleagues, neighbours, friends etc."
- To "discredit a company," GCHQ may "leak confidential information to companies/the press via blog...post negative information on appropriate forums [or] stop deals/ruin business relationships."
JTRIG's ultimate purpose, as defined by GCHQ in the document, is to use "online techniques to make something happen in the real world or cyber world." These online covert actions follow the “4 D's:” deny, disrupt, degrade, deceive.
As Greenwald pointed out, the tactics employed by JTRIG are not used for spying on other nations, militaries, or intelligence services, but for “traditional law enforcement” against those merely suspected of crimes.
These targets can include members of Anonymous, “hacktivists,” or really any person or entity GCHQ deems worthy of antagonizing.
“[I]t is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption,” Greenwald wrote.
In addition, the targets do not need to have ties to terror activity or pose any national security threat. More likely, targets seem to fall closer to political activists that may have, for instance, used “denial of service” tactics, popular with Anonymous and hacktivists, which usually do only a limited amount of damage to a target.
“These surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats,” Greenwald wrote.
In addition to the personal attacks on targets, JTRIG also involves the use of psychological and social-science tactics to steer online activism and discourse. The document details GCHQ’s “Human Science
Operations Cell,” which focuses on “online human intelligence” and “strategic influence and disruption” that are used to dissect how targets can be manipulated using “leaders,” “trust,” “obedience,” and “compliance.”
- Using tested manipulation tactics, JTRIG attempts to influence discourse and ultimately sow discord through deception.
When reached for comment by The Intercept, GCHQ avoided answering pointed questions on JTRIG while insisting its methods were legal.
“It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position,” GCHQ stated.
STORY LEAK 2013-08-09
- How many times now has such ‘conspiracy nonsense’ now been reported years later by the mega media as undeniable fact?
In the case of the US intelligence propaganda machine that even the New York Times has covered in an article entitled ‘The Real War on Reality‘, we are seeing just that. The New York Times report goes on to detail information uncovered from hacked data regarding the military operation to stage ‘grassroots’ responses and organizations in order to deceive via psyop. Professor of philosophy Peter Ludlow writes for the Times:
“The hack also revealed evidence that Team Themis was developing a “persona management” system — a program, developed at the specific request of the United States Air Force, that allowed one user to control multiple online identities (“sock puppets”) for commenting in social media spaces, thus giving the appearance of grass roots support. The contract was eventually awarded to another private intelligence firm.”This cyber warfare is clearly not just in the capacity of ‘improving international reputation’ as military commanders are claiming on record (just like there is ‘no such thing’ as domestic spying and it’s only for terrorists). Instead, we’re talking about running a major network of computers that are constantly running code specifically written to post to social media and news comment pages. Something that was revealed all the way back in 2011 by RawStory and brushed off in the name of national security by the military.
Intelligence Agencies Running Mass Number of Propaganda Accounts
STORY LEAK 2013-08-09
And remember, this is the same military that says political activists are terrorists and need to be targeted. At the highest levels, combating ‘terrorism’ simply means going after law-abiding citizens and journalists — especially so-called ‘leakers’. With propaganda scripts that run 24/7 and are intended to discredit people like Edward Snowden, top level intelligence agencies are teaming up with the military to combat whistleblowers through such phony means.
An excerpt from a particularly concerning summary of a recent German report on how political activists are targeted reads:
“The targets of these attacks are scientists… It does not stop at skirmishes in the scientific community. Hackers regularly target various web pages. Evaluations of IP log files show that not only Monsanto visits the pages regularly, but also various organizations of the U.S. government, including the military. These include the Navy Network Information Center, the Federal Aviation Administration and the United States Army Intelligence Center, an institution of the US Army, which trains soldiers with information gathering.”Now admittedly the news is not getting nearly as much coverage as it should, especially when considering it highlights two essential points:
1. This means that the United States military and intelligence communities are highly afraid of alternative networks and the overall public perception when it comes to the United States government and the state of the corrupt political mafia at large.
2. This also means that the United States military and intelligence agencies are losing the informational battle, and the only way they can even fight back is to run a conglomerate of fake accounts attacking legitimate users and journalists. You know, the terrorists that dare to question anything.
Social media pages, comment systems on top news websites, and various other areas online are the targets of a pinpointed ‘cyber psyop’ by a government that simply can’t answer real questions. And instead of actually doing anything about the outrage, disinformation campaigns are of utmost priority.
Snowden: Myndigheternas agent-troll bakom riggat näthat och manipulation på webben
- Den otroliga historien om Svensk Frihet på Nätet.
Starring: Sverige, Carl Bildt, UD, USA, ett sovande folk och ett antal mycket små hundar...
- Hur mycket av denna fantastiska "frihet på nätet" klarar Sverige egentligen av?