Operation Earnest Voice

Operation Earnest Voice is an astroturfing campaign by the US government.[1] The aim of the initiative is to use sockpuppets to spread pro-American propaganda on social networking sites based outside of the US.[2][3][4][5] The campaign is operated by the United States Military Central Command (CENTCOM), thought to have been directed at jihadists across Pakistan, Afghanistan and other countries the Middle East.[2]

According to CENTCOM, the US-based Facebook and Twitter networks are not targeted by the program because US laws prohibit state agencies from spreading propaganda among US citizens as according to the Smith-Mundt Modernization Act of 2012.[6] However, according to the Smith-Mundt Modernization Act of 2012, dissemination of foreign propaganda to domestic audiences is expressly allowed over the internet including social media networks.[7] Isaac R. Porche, a researcher at the RAND corporation, claims it would not be easy to exclude US audiences when dealing with internet communications.[5]

Details of the program

The US government signed a $2.8 million contract with the Ntrepid web-security company to develop a specialized software, allowing agents of the government to post propaganda on "foreign-language websites".[2]

Main characteristics of the software, as stated in the software development request, are:

  • 50 user "operator" licenses, 10 sockpuppets controllable by each user.[3]
  • Sockpuppets are to be "replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent". Sockpuppets are to "be able to appear to originate in nearly any part of the world." [3]
  • A special secure VPN, allowing sockpuppets to appear to be posting from "randomly selected IP addresses," in order to "hide the existence of the operation."[8]
  • 50 static IP addresses to enable government agencies to "manage their persistent online personas," with identities of government and enterprise organizations protected which will allow for different state agents to use the same sockpuppet, and easily switch between different sockpuppets to "look like ordinary users as opposed to one organization."[8]
  • 9 private servers, "based on the geographic area of operations the customer is operating within and which allow a customer's online persona(s) to appear to originate from." These servers should use commercial hosting centers around the world.[8]
  • Virtual machine environments, deleted after each session termination, to avoid interaction with "any virus, worm, or malicious software."[8]

Statements

USCC commander David Petraeus, in his congressional testimony, stated that Operation Earnest Voice would "reach [a country's] regional audiences through traditional media, as well as via Web sites and regional public-affairs blogging," as an effort to "counter extremist ideology and propaganda".[2] However, his successor, James Mattis, altered the program to have "regional blogging" fall under general USCC public-affairs activity. On how they would operate on these blogs, Petraeus explained: "We bring out the moderate voices. We amplify those. And in more detail, we detect and we flag if there is adversary, hostile, corrosive content in some open-source Web forum, [and] we engage with the Web administrators to show that this violates Web site provider policies."[9]

See also

References

  1. Monbiot, George (February 24, 2011). "The need to protect the internet from 'astroturfing' grows ever more urgent". The Guardian. London, UK. Retrieved 1 February 2017.
  2. 1 2 3 4 Fielding, Nick; Cobain, Ian (17 March 2011). "Revealed: US spy operation that manipulates social media". The Guardian. Retrieved 29 January 2017.
  3. 1 2 3 Lee, Amy (17 March 2011). "U.S. Military Launches Spy Operation Using Fake Online Identities". The Huffington Post. Retrieved 29 January 2017.
  4. Spillius, Alex (17 March 2013). "Pentagon buys social networking 'spy software'". The Telegraph. Retrieved 22 June 2013.
  5. 1 2 Smithson, S. (1 March 2011). "U.S. Central Command 'friending' the enemy in psychological war". The Washington Times. p. 2. Retrieved 29 January 2017.
  6. "House Resolution 5736" (PDF). Retrieved 29 January 2017.
  7. "Text of H.R. 5736 (112th): Smith-Mundt Modernization Act of 2012 (Introduced version) - GovTrack.us". GovTrack.us. Retrieved 2017-03-01.
  8. 1 2 3 4 U.S. Air Force (22 June 2010). "Persona Management Software. Solicitation Number: RTB220610". FedBizOpps. Archived from the original on 22 February 2011. Retrieved 1 February 2017.
  9. Pincus, Walter (March 28, 2011). "New and old information operations in Afghanistan: What works?". Washington Post. Retrieved 29 January 2017.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.