And You Thought Internet Dating Was Hard Before

download And You Thought Internet Dating Was Hard Before

of 9

Transcript of And You Thought Internet Dating Was Hard Before

  • 8/3/2019 And You Thought Internet Dating Was Hard Before

    1/9

    And you thought Internet dating was hard before! Revealed:US spy operation that manipulates social media

    On March 17, 2011, in US NEWS , by PecanGroup

    Revealed: US spy operation that manipulates social media

    Militarys sock puppet software creates fake online identities to spread pro -Americanpropaganda

    Jeff Jarvis: Washington shows the morals of a clumsy spammer

    * guardian.co.uk, Thursday 17 March 2011 13.19 GMT

    General David Petraeus Gen David Petraeus has previously said US online psychologicaloperations are aimed at countering extremist ideology and propaganda.

    The US military is developing software that will let it secretly manipulate social media sites suchas Facebook and Twitter by using fake online personas to influence internet conversations andspread pro-American propaganda.

    http://pecangroup.org/archives/884http://pecangroup.org/archives/884http://pecangroup.org/archives/884http://pecangroup.org/archives/category/us-newshttp://pecangroup.org/archives/category/us-newshttp://pecangroup.org/archives/category/us-newshttp://pecangroup.org/archives/884http://pecangroup.org/archives/884http://pecangroup.org/http://pecangroup.org/http://pecangroup.org/archives/884http://pecangroup.org/archives/884http://pecangroup.org/archives/category/us-newshttp://pecangroup.org/archives/884http://pecangroup.org/archives/884
  • 8/3/2019 And You Thought Internet Dating Was Hard Before

    2/9

    Sooooo fake...................like duh!

    A Californian corporation has been awarded a contract with United States Central Command(Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop

  • 8/3/2019 And You Thought Internet Dating Was Hard Before

    3/9

    what is described as an online persona management service that will allow one US serv icemanor woman to control up to 10 separate identities based all over the world.

    The project has been likened by web experts to Chinas attempts to control and restrict freespeech on the internet. Critics are likely to complain that it will allow the US military to create a

    false consensus in online conversations, crowd out unwelcome opinions and smothercommentaries or reports that do not correspond with its own objectives.

    The discovery that the US military is developing false online personalities known to users of social media as sock puppets could also encourage other governments, private companiesand non-government organisations to do the same.

    The Centcom contract stipulates that each fake online persona must have a convincingbackground, history and supporting details, and that up to 50 US-based controllers should be ableto operate false identities from their workstations without fear of being discovered bysophisticated adversaries.

    Centcom spokesman Commander Bill Speaks said: The techno logy supports classified bloggingactivities on foreign-language websites to enable Centcom to counter violent extremist andenemy propaganda outside the US.

    He said none of the interventions would be in English, as it would be unlawful to address USaudiences with such technology, and any English -language use of social media by Centcom wasalways clearly attributed. The languages in which the interventions are conducted includeArabic, Farsi, Urdu and Pashto.

    Once developed, the software could allow US service personnel, working around the clock in

    one location, to respond to emerging online conversations with any number of co-ordinatedFacebook messages, blogposts, tweets, retweets, chatroom posts and other interventions. Detailsof the contract suggest this location would be MacDill air force base near Tampa, Florida, homeof US Special Operations Command.

    Centcoms contract requires for each controller the provision of one virtual private serverlocated in the United States and others appearing to be outside the US to give the impression thefake personas are real people located in different parts of the world.

    It also calls for traffic mixing, blending the persona controllers internet usage with the usageof people outside Centcom in a manner that must offer excellent cover and powerful

    deniability. The multiple persona contract is thought to have been awarded as part of a programme calledOperation Earnest Voice (OEV), which was first developed in Iraq as a psychological warfareweapon against the online presence of al-Qaida supporters and others ranged against coalitionforces. Since then, OEV is reported to have expanded into a $200m programme and is thought tohave been used against jihadists across Pakistan, Afghanistan and the Middle East.

    http://pecangroup.org/archives/884http://pecangroup.org/archives/884http://pecangroup.org/archives/884http://pecangroup.org/archives/884
  • 8/3/2019 And You Thought Internet Dating Was Hard Before

    4/9

    Hmmmm this ONE could be real....do they have wifi in Tora Bora?

    OEV is seen by senior US commanders as a vital counter-terrorism and counter-radicalisation programme. In evidence to the US Senates armed services committee last year, General DavidPetraeus, then commander of Centcom, described the operation as an effort to counter extremistideology and propaganda and to ensure that credible voices in the region are heard. He said theUS militarys objective was to be first with the truth.

    This month Petraeuss successor, General James Mattis, told the same committee that OEVsupports all activities associated with degrading the enemy nar rative, including web

    engagement and web- based product distribution capabilities.

    Centcom confirmed that the $2.76m contract was awarded to Ntrepid, a newly formedcorporation registered in Los Angeles. It would not disclose whether the multiple persona projectis already in operation or discuss any related contracts.

    Nobody was available for comment at Ntrepid.

  • 8/3/2019 And You Thought Internet Dating Was Hard Before

    5/9

    In his evidence to the Senate committee, Gen Mattis said: OEV seeks to disrupt recruitment andtraining of suicide bombers; deny safe havens for our adversaries; and counter extremistideology and propaganda. He added that Centcom was working with our coalition partners todevelop new techniques and tactics the US could use to counter the adversary in the cyber domain.

    According to a report by the inspector general of the US defence department in Iraq, OEV wasmanaged by the multinational forces rather than Centcom.

    Asked whether any UK military personnel had been involved in OEV, Britains Ministry of Defence said it could find no evidence. The MoD refused to say whether it had been involvedin the development of persona management programmes, saying: We dont comment on cyber capability.

    OEV was discussed last year at a gathering of electronic warfare specialists in Washington DC,where a senior Centcom officer told delegates that its purpose was to communicate critical

    messages and to counter the propaganda of our adversaries. Persona management by the US military would face legal challenges if it were turned againstcitizens of the US, where a number of people engaged in sock puppetry have faced prosecution.

    Last year a New York lawyer who impersonated a scholar was sentenced to jail after beingconvicted of criminal impersonation and identity theft.

    It is unclear whether a persona management programme would contravene UK law. Legalexperts say it could fall foul of the Forgery and Counterfeiting Act 1981, which states that aperson is guilty of forgery if he makes a false instrument, with the intention that he or anothershall use it to induce somebody to accept it as genuine, and by reason of so accepting it to do ornot to do some act to his own or any other persons prejudice. However, this would apply onlyif a website or social network could be shown to have suffered prejudice as a result.

    http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks

    How to Detect a Fake Facebook Profile

    Posted by dotJenna on May 3rd, 2010 in Facebook Tips, Featured | View CommentsHow to Detect a Fake Facebook Profile

    BEWARE!!! Do not automatically assume that all your Facebook friends are real people, or arewho they say they are. There are crooks, liars, thiefs and predators who create false profiles

    http://send.onenetworkdirect.net/z/5826/CD146182/
  • 8/3/2019 And You Thought Internet Dating Was Hard Before

    6/9

    using other peoples identities and stolen pictures. The anonymity of th e web gives the perfectcover for bad people. Ive heard some heart -breaking stories ranging from fake relationships torape and murder. Please pass this article. Check your friend list and eliminate anyone yoususpect may be a fake. It could be a matter of life and death for you, or someone in yournetwork.

    Stay alert when allowing friends into your network. We share a lot of information on these sites;data that in the wrong hands can be disastrous. The fakes are pretty easy to spot once you knowtheir sneaky tricks. I found a few fake Facebook profiles that are sprinkled throughout thisarticle. Click on the images below to see a larger view of what fake profilers do.

    How Fake Profilers Work

    Someone operating with a false made-up identity is a con. Do not be naive. Con-artists prey onvulnerabilities of unsuspecting people, seeking to defraud them out of value (ie: money,attention, sex or worse). Most of us dont think like criminals, so its hard to fathom deliberate

    deception. Frauds, liars and crooks h owever, prey on this weakness, knowing we dont suspectfoul play. We must be vigilant. Its unpleasant to ponder, but we must realize that bad peoplewho mean harm are lurking in our friendly networks. Stay alert, especially when it comes toletting people see your very personal and private information. Tell every teen you know as theyare more susceptible to flattery and in need of attention, and can suffer serious consequences.

    Be leery of anyone who is too friendly, too into your everything you post o r complimentingyou daily. This is not normal behavior and could be an imposter trying to flatter you. Its hard toresist when someone feeds your ego, saying everything you want to hear, but dont be a mark.Fake creeps are not sincere.

    Dirty Tricks

  • 8/3/2019 And You Thought Internet Dating Was Hard Before

    7/9

    Most fakers have several fake profiles on the web, so do not be fooled if you are friends with twopeople who interact and vouch for one another. This happened to me, and turned out to be oneperson. Imposters will also try to make you more comfortable by interacting with your otherfriends and family members. They create fake relationships, fake Twitter profiles, fake websitesand anything else that will get you to take your guard down and trust them. Ive seen companies

    created, false addresses given and fake voice mailboxes set- up. (No, Im not kidding, wish Iwere.)Fakers Go Unexposed

    It is humiliating to be duped by an imposter, so many instances of harm by these crooks gounreported in your network. Shame and embarrassment stop the viral process. Chanc es thatyou have a harmful person posing with a fake profile on your Facebook profile are very high. If afaker wants something from you, he or she will tell you everything you want to hear whilepumping you for private information. He or she will then try to blackmail you to keep you quiet.Facebook imposters are not stupid. They know how to keep their identity concealed, even aftertheir victims know the truth.

    Every Man for Himself Unfortunately there is no law yet for operating a fake Facebook Profile. There is a huge gap inlegislature regarding the web. Technology is moving so fast while our government seems to begetting slower. The web is like the Wild West where you must take care of yourself by armingyourself with knowledge. No one will take care of the validity of your network for you. Youmust do so for yourself and your family members. There are laws under consideration due toserious crimes that have occurred, but these laws apply to children and teens, not adults. Weneed to get the word out to save heartache and lives.Carefully Consider Your Friends

    Dont get in a hurry when allowing friends into your network. Check the profile carefully tomake sure youre dealing with a legitimate person. Before accepting a friend request fromsomeone youve never met in person, check them out thoroughly. Questions to Ask Before Accepting a Friend

    If more than 2- 3 of the following points are true, youre very likely dealing with a fake person. Irecommend deleting them or blocking their profile. Not every fake profiler intends you harm atall, but then again, why are they hiding? Create your own set of boundaries to determine what

    profiles you allow into your network. Dont just let anyone in, even if youre a marketer.

    Does the pic look perfect?A perfect pic is cause for alert. People are not perfect, so check any profile carefully that has amodel photo or a stock photo as the profile picture. This also applies for pics of beautiful womenand handsome men. Dont let your libido drive you to trusti ng someone because they fulfill afantasy. Make sure the person is not really a troll in real life.

    Do you see pics of the persons family? A real person will have pics of family on their Facebook Profile. If a person does not, it doesntmean its fake, j ust let that be a red-flag.

  • 8/3/2019 And You Thought Internet Dating Was Hard Before

    8/9

    Is the person tagged by anyone on the web?A real person will have friends on Facebook with whom they are engaging. A real person has alife and will have tagged photos of him or herself in the Photo Gallery.

    Are there more photos of objects than the person?

    Fakers often try to make the photo area full by adding pics of odd items like flowers, trees, andother graphics. Real people dont usually add a zillion object -oriented photos to their Facebook Account. If they do, then they will also have personal pics too.

    Does the person talk?A faker may have so many fake accounts, he or she cant comment regularly. I have seen fakeprofilers comment often, so this is not always the case, but sometimes you can tell from the postsmade if the person is legitimate. Some fake profiles are easier to distinguish than others.

    Does the person fulfill your every fantasy?If a really cute girl is acting like a total slut, saying all the right things, chances are its really a

    guy living out his fantasies. (Sorry, but welcome to Facebook.) Same goes for a hot guy tellingyou that youre the most beautiful thing hes ever seen if it seems too good to be true, itprobably is.

    Does the person have several photos?Beware because entire photo albums can easily be stolen. Real Facebook photos are added inlayers. A cute girl who seems socially active will have SEVERAL photo albums, not just 1-2. Acute girl (or guy) will also have SEVERAL profile pics. If you see a profile with 1-2 photos of a

    person and then several pics of objects, you know its a fake. Photos can be easily swiped fromother profiles anywhere in the world. A profile with only 1 picture is a fake unless the person isbrand new.

    Does the person interact with his or her FB friends outside of FB?You can tell this by the people who post on the page. Fakes operate only on the web, they wonthave posts, comments or photos of real-life activities. The posts will all be related to Facebook activities. If the re is interaction, a faker will have it only with Facebook friends. Look for signsof real life especially photos. Photos of outside activities need to have the persons picsthroughout.

    Are there several doo dad widgets on the Profile page? Fakes will use a lot of widgets to try to beef up the page and make it look more used. Toomany widgets is a sign that a page is a fake.

    Is the info area filled out completely?A sparse info page can be a sign of a fake, however, Ive seen fake profiles with very elaboratemade-up personal info on the info page so dont let this be the only thing you check. Go to thewebsite. Dont trust the Twitter account because fakers can easily create a fake Twitter accountto fool you.

  • 8/3/2019 And You Thought Internet Dating Was Hard Before

    9/9

    Can the person be found in a Google Search?Practically everyone has info on themselves on Google. Check the person in Google. Findwebsites from prior years listing the person. Do not accept as proof recent social media profilesor recent websites. Many fakers are very astute in web design and can whip up websites in a

    jiffy. Find proof of a life prior to this year. Find pics of earlier times, even it its just 2 years ago.

    Does the person give his or her full name?A full name should be given on the profile, not a fake name. This is not the only indicator, butone of the things you want to check.Do Not Be Fooled

    Do not be fooled by the following:

    * The person seems normal.* The person is friends with many of your friends already.* The person engages with you regularly.

    Allowing Fakes to Get Close to You

    The real danger is in allowing someone who is not real into your social circle, where you interactand engage directly with them. This is dangerous because bonds are built between people, andyou may be building a relationship with a non-existe nt person. Thats a terrible experience for anyone to endure. Several people have had this happen that I know. Its a real problem.

    The most vulnerable are young people who are seeking approval and may be susceptible to thecunning words of a liar.

    I want to protect you from predators out there who steal other peoples pictures and identities,add a fake name and pretend like they are someone else on Facebook. Beware of Fake Facebook Profiles. The anonymity of the web gives crooks, liars and cheaters the perfect front to theirgame. Test every person. Dont be afraid to look their name up on the internet. Spread the word.

    http://www.dotjenna.com/how-to-detect-a-fake-facebook-profile/

    Send to Facebook Please Link to PECAN! Spread the TRUTH, and the TRUTH will set you free!

    And yo

    dating w as hard before! Revealed: US spy operationsocial media

    http://pecangroup.org/archives/884

    http://pecangroup.org/archives/884http://pecangroup.org/archives/884