Operation Earnest Voice

Last updated

Operation Earnest Voice (OEV) is a State-sponsored Internet propaganda by the United States Central Command (CENTCOM). [1] Initially, the program was developed as a psychological weapon and later thought to have been directed at jihadists across Pakistan, Afghanistan as well as countries in the Middle East. [2]

Contents

Details

OEV was first used in Iraq. [3] In 2011, the US government signed a $2.8 million contract with the Ntrepid web-security company to develop a specialized software, allowing agents of the government to post propaganda on "foreign-language websites". The aim of the initiative is to use sockpuppets to spread pro-American propaganda on social networking services based outside of the United States. [2]

Main characteristics of the software, as stated in the software development request, are:

Statements

USCC commander David Petraeus, in his congressional testimony, stated that Operation Earnest Voice would "reach [a country's] regional audiences through traditional media, as well as via Web sites and regional public-affairs blogging," as an effort to "counter extremist ideology and propaganda". [2] However, his successor, Jim Mattis, altered the program to have "regional blogging" fall under general USCC public-affairs activity. On how they would operate on these blogs, Petraeus explained: "We bring out the moderate voices. We amplify those. And in more detail, we detect and we flag if there is adversary, hostile, corrosive content in some open-source Web forum, [and] we engage with the Web administrators to show that this violates Web site provider policies." [1]

See also

Related Research Articles

An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Such restrictions can be applied at various levels: a government can attempt to apply them nationwide, or they can, for example, be applied by an Internet service provider to its clients, by an employer to its personnel, by a school to its students, by a library to its visitors, by a parent to a child's computer, or by an individual user to their own computers. The motive is often to prevent access to content which the computer's owner(s) or other authorities may consider objectionable. When imposed without the consent of the user, content control can be characterised as a form of internet censorship. Some filter software includes time control functions that empowers parents to set the amount of time that child may spend accessing the Internet or playing games or other computer activities.

<span class="mw-page-title-main">History of the Internet</span>

The history of the Internet has its origin in the efforts of scientists and engineers to build and interconnect computer networks. The Internet Protocol Suite, the set of rules used to communicate between networks and devices on the Internet, arose from research and development in the United States and involved international collaboration, particularly with researchers in the United Kingdom and France.

<span class="mw-page-title-main">Internet</span> Global system of connected computer networks

The Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and applications of the World Wide Web (WWW), electronic mail, internet telephony, and file sharing.

Voice over Internet Protocol (VoIP), also known as IP telephony, refers to a set of technologies used for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables voice calls to be transmitted as data packets, facilitating various methods of voice communication, including traditional applications like Skype, Microsoft Teams, Google Voice, and VoIP phones. Regular telephones can also be used for VoIP by connecting them to the Internet via analog telephone adapters (ATAs), which convert traditional telephone signals into digital data packets that can be transmitted over IP networks.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

Astroturfing is the deceptive practice of hiding the sponsors of an orchestrated message or organization to make it appear as though it originates from, and is supported by, unsolicited grassroots participants. It is a practice intended to give the statements or organizations credibility by withholding information about the source's financial backers.

Blogger is an American online content management system founded in 1999 that enables its users to write blogs with time-stamped entries. Pyra Labs developed it before being acquired by Google in 2003. Google hosts the blogs, which can be accessed through a subdomain of blogspot.com. Blogs can also be accessed from a user-owned custom domain by using DNS facilities to direct a domain to Google's servers. A user can have up to 100 blogs or websites per account.

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

In computing, Internet geolocation is software capable of deducing the geographic position of a device connected to the Internet. For example, the device's IP address can be used to determine the country, city, or ZIP code, determining its geographical location. Other methods include examination of Wi-Fi hotspots.

<span class="mw-page-title-main">Google Talk</span> Instant messaging service

Google Talk was an instant messaging service that provided both text and voice communication. The instant messaging service was variously referred to colloquially as Gchat, Gtalk, or Gmessage among its users.

<span class="mw-page-title-main">Sock puppet account</span> False online identity used for deception

A sock puppet is a false online identity used for deceptive purposes. The term originally referred to a hand puppet made from a sock. Sock puppets include online identities created to praise, defend, or support a person or organization, to manipulate public opinion, or to circumvent restrictions such as viewing a social media account that a user is blocked from. Sock puppets are unwelcome in many online communities and forums.

<span class="mw-page-title-main">Freegate</span> Internet software utility

Freegate is a software application developed by Dynamic Internet Technology (DIT) that enables internet users to view websites blocked by their governments. The program takes advantage of a range of proxy servers called Dynaweb. This allows users to bypass Internet firewalls that block web sites by using DIT's Peer-to-peer (P2P)-like proxy network system. FreeGate's anti-censorship capability is further enhanced by a new, unique encryption and compression algorithm in the versions of 6.33 and above. Dynamic Internet Technology estimates Freegate had 200,000 users in 2004. The maintainer and CEO of DIT is Bill Xia.

The following outline is provided as an overview of and topical guide to the Internet.

In computing, logging is the act of keeping a log of events that occur in a computer system, such as problems, errors or just information on current operations. These events may occur in the operating system or in other software. A message or log entry is recorded for each such event. These log messages can then be used to monitor and understand the operation of the system, to debug problems, or during an audit. Logging is particularly important in multi-user software, to have a central overview of the operation of the system.

<span class="mw-page-title-main">Internet censorship</span> Legal control of the internet

Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains but exceptionally may extend to all Internet resources located outside the jurisdiction of the censoring state. Internet censorship may also put restrictions on what information can be made internet accessible. Organizations providing internet access – such as schools and libraries – may choose to preclude access to material that they consider undesirable, offensive, age-inappropriate or even illegal, and regard this as ethical behavior rather than censorship. Individuals and organizations may engage in self-censorship of material they publish, for moral, religious, or business reasons, to conform to societal norms, political views, due to intimidation, or out of fear of legal or other consequences.

Ntrepid is an American software, hardware, and cyber security company, registered in Florida and based in Herndon, Virginia.

<span class="mw-page-title-main">PROTECT IP Act</span> US Senate Bill

The PROTECT IP Act was a proposed law with the stated goal of giving the US government and copyright holders additional tools to curb access to "rogue websites dedicated to the sale of infringing or counterfeit goods", especially those registered outside the U.S. The bill was introduced on May 12, 2011, by Senator Patrick Leahy (D-VT) and 11 bipartisan co-sponsors. The Congressional Budget Office estimated that implementation of the bill would cost the federal government $47 million through 2016, to cover enforcement costs and the hiring and training of 22 new special agents and 26 support staff. The Senate Judiciary Committee passed the bill, but Senator Ron Wyden (D-OR) placed a hold on it.

<span class="mw-page-title-main">Propaganda in Iran</span>

Propaganda in Iran originates from the Iranian government and "private" entities, which are usually state controlled.

An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a pseudonym, or through more sophisticated techniques such as layered encryption routing, manipulation of post dates, or posting only from publicly accessible computers. Motivations for posting anonymously include a desire for privacy or fear of retribution by an employer, a government, or another group.

The public opinion brigades is a state-sponsored web brigade of the Communist Party of Vietnam or linked to the Communist Government of Vietnam.

References

  1. 1 2 Pincus, Walter (28 March 2011). "New and old information operations in Afghanistan: What works?". The Washington Post . Retrieved 12 June 2021.
  2. 1 2 3 Fielding, Nick; Cobain, Ian (17 March 2011). "Revealed: US spy operation that manipulates social media". The Guardian . Retrieved 12 June 2021.
  3. Spillius, Alex (17 March 2011). "Pentagon buys social networking 'spy software'". The Daily Telegraph . Retrieved 12 June 2021.
  4. United States Air Force (22 June 2010). "Persona Management Software. Solicitation Number: RTB220610". FedBizOpps.gov. Archived from the original on 22 February 2011. Retrieved 1 February 2017.