scienceplease 2 Trustworthy Freedom Fighter
Joined: 06 Apr 2009 Posts: 1702
|
Posted: Tue Feb 25, 2014 3:48 pm Post subject: How Covert Agents Infiltrate the Internet |
|
|
No matter what you think of the Snowden smokescreen... one thing is proven, the intelligence agencies and politicians and mass media are deliberately lying to us. Glenn Greenwald reveals the systematic way this occurs in this Must-Read article.
Word of warning: Greenwald either deliberately or accidentally obfuscates "false flag events" to something somewhat more benign than our general understanding... see below.
Quote: | How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
By Glenn Greenwald 24 Feb 2014
One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group).
...
I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ documents.
... [big snip]...
These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.
Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
|
https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
In one of the (many) graphics it references Caldini+2 - I don't know what the +2 stands for by wikipedia fills in the rest
http://en.wikipedia.org/wiki/Robert_Cialdini
He's written one of "the smartest books we know" (Money.com, 2005) "Influence: The Psychology of Persuasion"
Quote: | 6 key principles of influence by Robert Cialdini
Reciprocity – People tend to return a favor, thus the pervasiveness of free samples in marketing. In his conferences, he often uses the example of Ethiopia providing thousands of dollars in humanitarian aid to Mexico just after the 1985 earthquake, despite Ethiopia suffering from a crippling famine and civil war at the time. Ethiopia had been reciprocating for the diplomatic support Mexico provided when Italy invaded Ethiopia in 1935. The good cop/bad cop strategy is also based on this principle.
Commitment and Consistency – If people commit, orally or in writing, to an idea or goal, they are more likely to honor that commitment because of establishing that idea or goal as being congruent with their self-image. Even if the original incentive or motivation is removed after they have already agreed, they will continue to honor the agreement. Cialdini notes Chinese brainwashing on American prisoners of war to rewrite their self-image and gain automatic unenforced compliance. See cognitive dissonance.
Social Proof – People will do things that they see other people are doing. For example, in one experiment, one or more confederates would look up into the sky; bystanders would then look up into the sky to see what they were seeing. At one point this experiment aborted, as so many people were looking up that they stopped traffic. See conformity, and the Asch conformity experiments.
Authority – People will tend to obey authority figures, even if they are asked to perform objectionable acts. Cialdini cites incidents such as the Milgram experiments in the early 1960s and the My Lai massacre.
Liking – People are easily persuaded by other people that they like. Cialdini cites the marketing of Tupperware in what might now be called viral marketing. People were more likely to buy if they liked the person selling it to them. Some of the many biases favoring more attractive people are discussed. See physical attractiveness stereotype.
Scarcity – Perceived scarcity will generate demand. For example, saying offers are available for a "limited time only" encourages sales. |
|
|