Jimmy Dore on spy operations and social media. Not new to

readers on this site, but too important to not re-post before it is removed.

[video:https://www.youtube.com/watch?v=4GI7lMPPmgc]

Tags: 
Share
up
16 users have voted.

Comments

studentofearth's picture

just in case the video disappears or a C99er wanted a fuller picture of the information.

Exclusive: Inside the Military's Secret Undercover Army Newsweek - May 17, 2021

The largest undercover force the world has ever known is the one created by the Pentagon over the past decade. Some 60,000 people now belong to this secret army, many working under masked identities and in low profile, all part of a broad program called "signature reduction." The force, more than ten times the size of the clandestine elements of the CIA, carries out domestic and foreign assignments, both in military uniforms and under civilian cover, in real life and online, sometimes hiding in private businesses and consultancies, some of them household name companies.

The unprecedented shift has placed an ever greater number of soldiers, civilians, and contractors working under false identities, partly as a natural result in the growth of secret special forces but also as an intentional response to the challenges of traveling and operating in an increasingly transparent world. The explosion of Pentagon cyber warfare, moreover, has led to thousands of spies who carry out their day-to-day work in various made-up personas, the very type of nefarious operations the United States decries when Russian and Chinese spies do the same.
...
For the one percent, though, for those who have to make it through passport control under false identities, there are various biometrics defeat systems, some physical and some electronic. One such program was alluded to in a little noticed document dump published by Wikileaks in early 2017 and called "Vault 7": over 8,000 classified CIA tools used in the covert world of electronic spying and hacking. It is called ExpressLane, where U.S. intelligence has embedded malware into foreign biometrics and watchlist systems, allowing American cyber spies to steal foreign data.

An IT wizard working for Wikileaks in Berlin says the code with ExpressLane suggests that the United States can manipulate these databases. "Imagine for a moment that someone is going through passport control," he says, hesitant to use his real name because of fear of indictment in the United States. "NSA or the CIA is tasked to corrupt—change—the data on the day the covert asset goes through. And then switch it back. It's not impossible."
...
This quiet company can transform any object, including a person, as they do in Hollywood, a "silicon face appliance" sculpted to perfectly alter someone's looks. They can age, change gender, and "increase body mass," as one classified contract says. And they can change fingerprints using a silicon sleeve that so snugly fits over a real hand it can't be detected, embedding altered fingerprints and even impregnated with the "We're still in the infancy of our transparent world," says the retired senior officer, cautioning against imagining that there is some "identity gap" similar to the "bomber gap" of the Cold War.
...
"We're winning this war, including on the cyber side, even if secrecy about what we are doing makes the media portrayal of the Russians again look like they are ten feet tall."

He admits that processing big data in the future will likely further impinge on everyone's clandestine operations, but he says the benefits to society, even narrowly in just making terrorist activity and travel that much more difficult, outweigh the difficulties created for military operational security. The officer calls the secrecy legitimate but says that the Defense Department leadership has dropped the ball in recognizing the big picture. The military services should be asking more questions about the ethics, propriety and even legality of soldiers being turned into spies and assassins, and what this means for the future.

Still, the world of signature reduction keeps growing: evidence, says the retired officer, that modern life is not as transparent as most of us think.oils found in real skin. Asked whether the appliance is effective, one source, who has gone through the training, laughs. "If I tell you, I'll have to kill you."

The Smith-Mundt Modernization Act of 2012 River Cities Reader - Dec 9, 2019

The Smith-Mundt Modernization Act (SMMA) was buried in the 2012 National Defense Authorization Act for good reason – because it repealed the 1948 Smith-Mundt Act. The Smith-Mundt Act is also known as the U.S. Information and Education Act, which authorized the State Department to engage in propagandizing foreign countries as a form of public diplomacy.

The SMA established that via the Broadcasting Board of Governors (BBG), Voice of America (VOA), and Radio Free Europe (RFE), the U.S. State Department and Office of Public Affairs were authorized to disseminate propaganda to foreign publics, but were strictly prohibited from releasing that same propaganda in America for public consumption. Put simply, our government was permitted to lie to people in other countries, but not to us here at home.

This prohibition was lifted in 2012, when the SMMA was signed into law by President Obama, allowing the same propaganda disseminated by our government to foreign publics, to now be released in the U.S. for the very first time.
...
The SMMA promotes unholy alliances between the U.S. State Department and America's corporate media that unbinds reporters and news departments from the solemn responsibility to verify information.
...
Grasping the importance of the SMMA in undermining America's free press, its impact on our governance, culture, and socioeconomic structure as a free society, cannot be understated. Not only is the Fourth Estate utterly compromised relative to the information it does convey, but there is a far greater mission of corruption in the massive amount of need-to-know information it does not convey. Systematically omitting relevant information from the public forum, tailoring narratives and messaging in the guise of legitimate news, redundant scripting across networks, and disallowing nearly all critical debate or analysis, is classic communications manipulation, strategically designed as part of a larger behavior modification agenda.

This is hardly new.

Sophisticated behavior-science methodologies has been in play through media for decades. When you react with far more emotion than reason to news items, without stopping to question any part of that item, you've been successfully triggered into a highly specific, predetermined response – a conditioned response.

Triggering itself is a primary means of conditioning, with lots of proven behavior science to inform it. So now its your turn to inform yourself so that you can identify the oft-applied behavior modification techniques being deployed constantly throughout media genres, including social media – such as short, fast-paced segments, redundancy/repetition, subliminal suggestion, cognitive dissonance, projection, nudging – the formidable list of conditioning techniques is worth knowing if you hope to avoid or overcome these traps. Only then will you advance onto recognizing propagandized newz so that you can resolutely reject it. Otherwise drone on.

up
20 users have voted.

Still yourself, deep water can absorb many disturbances with minimal reaction.
--When the opening appears release yourself.