Operation Earnest Voice

Last updated

Operation Earnest Voice (OEV) is a communications program by the United States Central Command (CENTCOM). [1] Initially, the program was developed as a psychological weapon and later thought to have been directed at jihadists across Pakistan, Afghanistan and other countries in the Middle East. [2]

Contents

Details

OEV was first used in Iraq. [3] In 2011, the US government signed a $2.8 million contract with the Ntrepid web-security company to develop a specialized software, allowing agents of the government to post propaganda on "foreign-language websites". The aim of the initiative is to use sockpuppets to spread pro-American propaganda on social networking services based outside of the United States. [2]

Main characteristics of the software, as stated in the software development request, are:

Statements

USCC commander David Petraeus, in his congressional testimony, stated that Operation Earnest Voice would "reach [a country's] regional audiences through traditional media, as well as via Web sites and regional public-affairs blogging," as an effort to "counter extremist ideology and propaganda". [2] However, his successor, Jim Mattis, altered the program to have "regional blogging" fall under general USCC public-affairs activity. On how they would operate on these blogs, Petraeus explained: "We bring out the moderate voices. We amplify those. And in more detail, we detect and we flag if there is adversary, hostile, corrosive content in some open-source Web forum, [and] we engage with the Web administrators to show that this violates Web site provider policies." [1]

See also

Related Research Articles

<span class="mw-page-title-main">Internet</span> Global system of connected computer networks

The Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.

<span class="mw-page-title-main">Blog</span> Discussion or informational site published on the internet

A blog is an informational website consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order so that the most recent post appears first, at the top of the web page. Until 2009, blogs were often the work of a single individual, occasionally of a small group, and often covered a single subject or topic. In the 2010s, "multi-author blogs" (MABs) emerged, featuring the writing of multiple authors and sometimes professionally edited. MABs from newspapers, other media outlets, universities, think tanks, advocacy groups, and similar institutions account for an increasing quantity of blog traffic. The rise of Twitter and other "microblogging" systems helps integrate MABs and single-author blogs into the news media. Blog can also be used as a verb, meaning to maintain or add content to a blog.

Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for voice calls for the delivery of voice communication sessions over Internet Protocol (IP) networks, such as the Internet.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

<span class="mw-page-title-main">LiveJournal</span> Russian social networking service

LiveJournal, stylised as LiVEJOURNAL, is a Russian-owned social networking service where users can keep a blog, journal, or diary. American programmer Brad Fitzpatrick started LiveJournal on April 15, 1999, as a way of keeping his high school friends updated on his activities. In January 2005, American blogging software company Six Apart purchased Danga Interactive, the company that operated LiveJournal, from Fitzpatrick.

Astroturfing is the practice of hiding the sponsors of a message or organization to make it appear as though it originates from, and is supported by, grassroots participants. It is a practice intended to give the statements or organizations credibility by withholding information about the source's financial backers.

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

In computing, Internet geolocation is software capable of deducing the geographic position of a device connected to the Internet. For example, the device's IP address can be used to determine the country, city, or ZIP code, determining its geographical location. Other methods include examination of Wi-Fi hotspots, a MAC address, image metadata, or credit card information.

<span class="mw-page-title-main">Sock puppet account</span> Online identity used for purposes of deception

A sock puppet is a false online identity used for deceptive purposes. The term originally referred to a hand puppet made from a sock. Sock puppets include online identities created to praise, defend, or support a person or organization, to manipulate public opinion, or to circumvent restrictions such as viewing a social media account that a user is blocked from. Sock puppets are unwelcome in many online communities and forums.

<span class="mw-page-title-main">Propaganda in the United States</span> Overview of propaganda in the United States

In the United States, propaganda is spread by both government and non-government entities. Throughout its history, to the present day, the United States government has issued various forms of propaganda to both domestic and international audiences. The US government has instituted various domestic propaganda bans throughout its history, however, some commentators question the extent to which these bans are respected.

<span class="mw-page-title-main">Intellipedia</span> US Intelligence Community encyclopedia

Intellipedia is an online system for collaborative data sharing used by the United States Intelligence Community (IC). It was established as a pilot project in late 2005 and formally announced in April 2006. Intellipedia consists of three wikis running on the separate JWICS (Intellipedia-TS), SIPRNet (Intellipedia-S), and DNI-U (Intellipedia-U) networks. The levels of classification allowed for information on the three wikis are Top Secret Sensitive Compartmented Information, Secret (S), and Sensitive But Unclassified information, respectively. Each of the wikis is used by individuals with appropriate clearances from the 18 agencies of the US intelligence community and other national-security related organizations, including Combatant Commands and other federal departments. The wikis are not open to the public.

The following outline is provided as an overview of and topical guide to the Internet.

<span class="mw-page-title-main">Google Voice</span> Telecommunications service by Google

Google Voice is a telephone service that provides a U.S. phone number to Google Account customers in the U.S. and Google Workspace customers in Canada, Denmark, France, the Netherlands, Portugal, Spain, Sweden, Switzerland, the United Kingdom and the contiguous United States. It is used for call forwarding and voicemail services, voice and text messaging, as well as U.S. and international calls. Calls are forwarded to the phone number that each user must configure in the account web portal. Users can answer and receive calls on any of the phones configured to ring in the web portal. While answering a call, the user can switch between the configured phones. Subscribers in the United States can make outgoing calls to domestic and international destinations. The service is configured and maintained by users in a web-based application, similar in style to Google's email service Gmail, or Android and iOS applications on smartphones or tablets.

magicJack VoIP product, Telecom company

MagicJack is an Internet-based telephone service (VoIP) provider in the United States and Canada. It offers nationwide VoIP and cellphone services.

<span class="mw-page-title-main">Ribbit (telecommunications company)</span>

Ribbit was a telecommunications company based in Mountain View, California. It was acquired by BT Group on July 29, 2008 for $105 million.

Ntrepid is an American software, hardware, and cyber security company, registered in Florida and based in Herndon, Virginia.

Lords of Dharmaraja is the name of a hacker group, allegedly operating in India. This group came into the limelight for threatening to release the source code of Symantec's product Norton Antivirus, and for allegations on Government of India "arm-twisting" international mobile manufacturers to spy on United States-China Economic and Security Review Commission(USCC). Symantec has confirmed that the Symantec Endpoint Protection 11.0 and Symantec Antivirus 10.2 version source code has been compromised and obtained by the group, while United States authorities are still investigating allegations suspecting India's hand in spying.

An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a pseudonym, or through more sophisticated techniques such as layered encryption routing, manipulation of post dates, or posting only from publicly accessible computers. Motivations for posting anonymously include a desire for privacy or fear of retribution by an employer, a government, or another group.

140 Proof is an advertising company that uses social data from many sources in targeting relevant ads based on consumers' interests as indicated by their social activity across networks.

SpyEye is a malware program that attacks users running Google Chrome, Safari, Opera, Firefox and Internet Explorer on Microsoft Windows operating systems. This malware uses keystroke logging and form grabbing to steal user credentials for malicious use. SpyEye allows hackers to steal money from online bank accounts and initiate transactions even while valid users are logged into their bank account

References

  1. 1 2 Pincus, Walter (28 March 2011). "New and old information operations in Afghanistan: What works?". The Washington Post . Retrieved 12 June 2021.
  2. 1 2 3 Fielding, Nick; Cobain, Ian (17 March 2011). "Revealed: US spy operation that manipulates social media". The Guardian . Retrieved 12 June 2021.
  3. Spillius, Alex (17 March 2011). "Pentagon buys social networking 'spy software'". The Daily Telegraph . Retrieved 12 June 2021.
  4. United States Air Force (22 June 2010). "Persona Management Software. Solicitation Number: RTB220610". FedBizOpps.gov. Archived from the original on 22 February 2011. Retrieved 1 February 2017.