Jump to content
IndiaDivine.org

Invasive Federal tactics for Information Warfare on the Internet

Rate this topic


Guest guest

Recommended Posts

s

Mon, 12 Sep 2005 18:43:23 -0500

Invasive Federal tactics for Information Warfare on the Internet

 

 

Invasive Federal tactics for Information Warfare on the Internet

 

 

 

http://www.cs.virginia.edu/~alb/misc/infowarDistraction.html

 

 

 

 

Information Warfare on the Internet

 

 

 

 

[i posted this to alt.mindcontrol in early December, 1997. The group

had been flooded with posts for sex-related web sites, and included

graphic jpeg images. While this post is mostly about Usenet news

groups, much of it applies to email and web sites too. The term

information warfare is, in many respects, just a new word for what

used to be called propaganda.]

 

The recent porn posts in alt.mindcontrol fit in as one of a variety of

techniques for disrupting internet news groups. If you read about the

basic cointelpro techniques, most such disruptions are variations on

those themes. They are also deniable, and this uncertainty is

cultivated and prized by harassers because it can lead to (justified)

paranoia and false accusations that discredit the victim.

 

 

 

 

Information techniques

 

* Distraction with irrelevant posts. What better example than the

recent porn posts? Discussion is lost in the noise. (In this case, the

posts may make the group " appealing " to a new audience, so a small

silver lining is that new people can be informed about mind control.)

 

* Distraction by voluminous postings with no information by

blowhards and empty name-callers. (Can be hard to distinguish from

genuine blowhards.) People who wallow in the mud do not need to

outdebate you; they only need to drag you down there with them. Kill

files can help if your newsreader has them.

 

* Planting of provocateurs (and sleeper agents, etc.). These

people will vary from the posters who suddenly show up one day under

an alias attacking regular posters, to people who seem like regular

posters themselves. They may work in teams, supporting each other and

giving the illusion of popular support on the net. (Remember, net IDs

are basically free, and one person can have many.) As cointelpro

showed, there is little that is more poisonous to an organization than

to have it tear itself apart from the inside with accusations of

moles. (The CIA knows all about this from its own mole hunts.) Moles

love to accuse others of being moles; then again, there are real

moles. You have to judge for yourself who to listen to or what to

believe.

 

Hardware techniques

 

* Spoofing. Forgeries and modified content. Does not need to be

global over the whole internet, for example just your local news

server can be modified. If they control your regular communication

line like your phone line there is no end to the illusions that can be

created. There is a danger that some forms of spoofing will be

detected, though, and it is harder to do, so I think these techniques

are used less widely than the others.

 

* Canceling posts. Posts disappear or only propagate in a limited

region. This has deniability as just network problems, since sometimes

there really are network problems. One technique is to secretly

" localize " posts that are not approved by some censor or gatekeeper.

Most people will not notice if their post only appears on their local

news server, and will assume it has propagated worldwide. They will

just think no one has replied (though spoof replies can be posted

locally, too). I check to see that my posts show up at DejaNews.

Hardly foolproof, but at least then I know people can read them there

(at least until more sophisticated spoofing is available, perhaps

tailored to domain names or user names).

 

* Delaying posts. By controlling when posts show up, the flow of

the debate can be controlled. A heads-up warning can be given to the

plants on the group to counter arguments ahead of time. They can also

make the same arguments or statements themselves ahead of time to

build their own " credibility " or to steal thunder.

 

* Controlling search engines. If no one can find it, it is not

there. I do not have any evidence that this has happened. The real

danger is the possibility of " voluntary " self-censorship like we have

seen, for example, in the newspapers with regard to radiation

experiments.

 

Combined hardware/information techniques

 

* Feedback pathways. An important aspect of psychological warfare

is to have a feedback path to the victim. (This is like a control

signal in dynamical systems theory.) The feedback path may be used

covertly to manipulate the victim, the victim may become aware of it

on his or her own, or the victim may be purposely made aware of it.

 

Harassers often want victims think their harassers have control

over them. To know they are being watched. This can help induce

psychological trauma and regression in the victim. [According to the

KUBARK interrogation manual, " All coercive techniques are designed to

induce regression. " ] A feedback path can alert the victim that he is

being manipulated. This can be done by telephones ringing or fax

machines. It can be done with sophisticated mind control methods. It

could even be done in newspapers if some person or agency knew the

newspapers the victim reads and could influence their content (e.g.

the final cointelpro link below).

 

But the internet is a fairly new medium that fits this bill

perfectly if the subject reads newsgroups. In a simple example, you

cancel a person's post and then post your own article hinting that you

have done it. (Incidentally, psychological torturers can pretend to

have caused anything they are aware of having happened.) The person

gets angry, but they may not be sure, and if they accuse the tormentor

they are ridiculed. (Always try to goad the victims into doing things

in public that will discredit them.)

 

When the hardware is expanded to include home surveillance and

mind control techniques, the effects can be magnified immensely.

 

Can anyone truly doubt that these techniques have been extensively

studied and documented by our government? The stonewall of denial

fights for every inch of ground, no matter how trivial. People will

still deny obvious, documented (cointelpro) things like this to delay

having to deny the next step of the chain ( " Yes, maybe they studied it

but they would never test it on Americans [they did], and they surely

are not still doing it today [they are]. " )

 

Secret agencies are still arms of the federal government.

 

cointelpro:

 

http://mediafilter.org/MFF/USDCO.idx.html

http://dickshovel.netgate.net/coin.html

http://www.webcom.com/~pinknoiz/covert/cointelpro.html

 

and at the last site, especially

 

http://www.webcom.com/~pinknoiz/covert/seberg.html

 

 

 

M wrote:

 

 

 

 

Monday, September 12, 2005 6:44 AM

[A-C] I found this message in my " spam " folder!

 

 

Re: Court upholds detention without trial for U.S. Citizens

I found this message in my " spam " folder!

Apparently, which ISP you are using has a lot to do with it.

This is not about anything that you volunteered for.

Your Internet Service Provider may be violating your freedom

of speech.

Since the Passage of the Homeland Security law,

MANY of my political adversaries have disappeared from the

internet.

Am I pleased?

ABSOLUTELY NOT!

Our freedom of speech is being taken away.

 

My own former ISP has told me that they have been provided

with long lists of numerous domains that have already been " blacklisted " .

 

Most of the Internet Service Providers are now using a program

which " filters out " certain emails. Those who send the emails;

which are not being delivered,

ARE NOT GETTING AN ERROR MESSAGE,

TO ADVISE THEM THAT THEIR MESSAGE WAS NOT DELIVERED.

These messages are simply " black holed " .

 

This program; which " filters out " certain emails, is allegedly

to " protect " us from things such as spam, adult content, viruses, and

" hate speech " , etc.

Who decides which " speech " is allowable?????

The " Thought Police " are here now.

I have repeatedly tested this program, by sending VERY SMALL

political messages, TO ONE SINGLE RECIPIENT, who is a close friend.

The messages had no " adult content " , no virus, and had nothing

that could remotely be called " hate speech " .

MANY OF these messages WERE NOT DELIVERED.

 

My own former Internet Service Provider has told me that the

program; which " filters out " certain emails, was developed using

guidelines from the Department of Homeland Security. At the same time,

the Internet Service Provider is now being told that they are now

regulated by the Federal Communications Commission; which in turn,

receives guidelines from the Department of Homeland Security. OF

COURSE there is no legitimate justification for Federal Communications

Commission regulation of the internet; since it does not use shared

air ways.

" Surveillance " of the internet is not new.

Visit:

http://www.dojgovnet/USDOJ_Carnivore_Scam.htm

 

To read e-mail the FBI can order an Internet Service Provider

to place a special monitoring computer called Carnivore (now renamed

Data Collection System 1000) on its network servers. The FBI can then

select the e-mail of surveillance targets for capture and storage. Not

content with this device, the FBI now seeks to expand its surveillance

capability to the entire Internet.

 

" Surveillance " has now been upgraded to include actual censorship.

Visit:

http://www.cdt.org/speech/

 

a famous quote from Rev. Martin Niemoller

Rev. Martin Niemoller, commenting on events in Germany

1933-1939 said:

 

" In Germany, they came first for the Communists,

and I didn't speak up because I wasn't a Communist.

Then they came for the Jews,

and I didn't speak up because I wasn't a Jew.

Then they came for the Trade Unionists,

and I didn't speak up because I wasn't a Trade Unionist.

Then they came for the Catholics, and

I didn't speak up because I was a Protestant.

Then they came for me, and by that time, no one was left to

speak up. " -- Rev. Dr. Martin Niemoeller, July 1,

1937; arrested by the Third Reich

 

 

 

 

" An evil exists that threatens every man, woman,

and child of this great nation.

We must take steps to ensure our domestic security and protect

our homeland. "

- Adolf Hitler, proposing the creation of the Gestapo in Nazi

Germany.

 

Sound familiar?

America, you better pull yer head out...........

 

Homeland Security=Gestapo

 

 

Constitutional rights:

 

Freedom of religion

Freedom of speech

Freedom of assembly

The right to keep and bear arms.

 

Are NOT dependent on which religion or ideology

someone believes. If one group can be liquidated, it will just be a

matter of time before they get around YOU.

 

THIS MESSAGE ALSO WILL BE A TEST TO BE CERTAIN THAT MY FREEDOM

OF SPEECH IS NOT BEING LIMITED, AND MY CIVIL RIGHTS ARE NOT BEING

VIOLATED.

 

The internet has the capacity to defend itself... for the time

being.

It would be wise to send test messages, to close friends, to

determine if your FREEDOM OF SPEECH IS BEING LIMITED.

If you find that your FREEDOM OF SPEECH IS BEING LIMITED,

change your Internet Service Provider at once.

 

I suggest that you visit

 

http://www.1smartisp.net/sc/?page=ispsignup

 

to learn about ISP access that is respectful of freedom of speech.

 

 

My former ISP gave me the web page for the company that makes

the filter,

AND ADMITTED that the protcols were developed from guidelines from

The Department of Homeland Security.

 

You will find the page at http://www.surfcontrol.com/products/

 

Here is the page, where they tell, as much as they will tell

you, about what gets filtered out:

 

http://www.surfcontrol.com/Default.aspx?id=354 & mnuid=1.4.1.4

 

 

http://www.surfcontrol.com/products/email/images/screen_email_dictionary.gif

 

This is a direct copy and past:

 

E-mail Dictionary Description/Criteria

 

Adult Sexually Explicit Adult-Oriented

 

Alcohol/Tobacco/Drugs Instructions Products Terms Promotion

 

Arts/Entertainment Media Humorous Horoscopes Art Activity Guides

 

Computing/Internet/Hacking Software Parts Accessories Hacking

 

Confidential Customize to meet your confidentiality needs

 

Finance Stock Trading Money Management Accounting

 

Gambling Tips Term Online Casinos Betting Pools

 

Hate Speech/Offensive Prejudice based on Race, Gender,

Religion, etc.

 

Job Search Employment Agencies Job Listings Career Searches

 

Medical/Healthcare Medical and health care terminology

 

Shopping Internet Mall Online Catalogs Retail Stores

 

Spam Spam Bulk E-mail Mass Marketing

 

Sports Sports-related content

 

Travel Airlines Accommodations Destinations

 

Violence / Weapons Avocation or depictions of violent acts

 

They only mention the most popular types of censorship; HOWEVER,

You will notice that many of the categories include an open

door for the censorship of free speech, THAT IS PURELY LAWFUL, and

unoffensive.

 

OF COURSE, anyone can voluntarily install this software if

that is what they want.

 

I spoke with my former ISP on the phone several times a day

for a week.

 

I also spoke with several other ISP competitors, while

shopping for one that would not censor me.

I got not contradictory information, and everyone said they

were not allowed to hand out the guidelines.

Both The Federal Communication Commission and Homeland

Security were referenced repeatedly.

Link to comment
Share on other sites

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...