Most people use social media like Facebook and Twitter to share photos of friends and family, chat with friends and strangers about random and amusing diversions, or follow their favorite websites, bands and television shows.
But what does the US military use those same networks for? Well, we can’t tell you: That’s “classified,” a CENTCOM spokesman recently informed Raw Story.
One use that’s confirmed, however, is the manipulation of social media through the use of fake online “personas” managed by the military. Recently the US Air Force had solicited private sector vendors for something called “persona management software.” Such a technology would allow single individuals to command virtual armies of fake, digital “people” across numerous social media portals.
These “personas” were to have detailed, fictionalized backgrounds, to make them believable to outside observers, and a sophisticated identity protection service was to back them up, preventing suspicious readers from uncovering the real person behind the account. They even worked out ways to game geolocating services, so these “personas” could be virtually inserted anywhere in the world, providing ostensibly live commentary on real events, even while the operator was not really present.
When Raw Story first reported on the contract for this software, it was unclear what the Air Force wanted with it or even if it had been acquired. The potential for misuse, however, was abundantly clear.
A fake virtual army of people could be used to help create the impression of consensus opinion in online comment threads, or manipulate social media to the point where valuable stories are suppressed.
Ultimately, this can have the effect of causing a net change to the public’s opinions and understanding of key world events.
Pre-historic tokens used in conjunction with cuneiform 2014 07 22
An archaeological dig in southeast Turkey has uncovered a large number of clay tokens that were used as records of trade until the advent of writing, or so it had been believed. But a new find of tokens, dates from a time when writing was commonplace – thousands of years after it was previously assumed this technology had become obsolete.
Are immigration opponents Nazis? 2014 07 22
It seems the usual suspects are calling anyone who opposes unlimited immigration to be a "Nazi". The Left seems to be in constant fear of "Nazis" that lurk in public policy discussions and I assume under their beds. If you oppose any Leftist position, you are a.... take a wild guess...wait for it.... a NAZI! Tim Wise recently went ...
What Did US Spy Satellites See in Ukraine? 2014 07 22 Exclusive: The U.S. media’s Ukraine bias has been obvious, siding with the Kiev regime and bashing ethnic Russian rebels and Russia’s President Putin. But now – with the scramble to blame Putin for the Malaysia Airlines shoot-down – the shoddy journalism has grown truly dangerous, says Robert Parry.
In the heat of the U.S. media’s latest war hysteria – rushing to ...
Oh, Great: Robots Are Set to Conduct National Security Clearance Interviews 2014 07 22 Advancing a career in the US government might soon require an interview with a computer-generated head who wants to know about that time you took ketamine.
Psychologists at the National Center for Credibility Assessment (NCCA) are developing an interview system that uses a responsive on-screen avatar for the first stage of the national security clearance process.
Initial screening for a variety ...
Is Anything on the Internet Real Anymore? 2014 07 22
Is there anybody…out there?
I promise I’m a real person asking this question and typing this article…but beyond that, I can’t promise much else about anything you or I see on the Internet.
This article on ZDNet, “GCHQ’s dark arts: Leaked documents reveal online manipulation, Facebook, YouTube snooping,” confirms — beyond a shadow of any possible doubt — that a barrage of ...