“The Art of Deception: Training for Online Covert Operations.”
Group items matching
in title, tags, annotations or urlHow Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations - The Intercept - 0 views
-
-
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.
-
Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
- ...4 more annotations...
Surprise: Obama's New US Trade Rep Overturns ITC, Stops Ban On Apple Products | Techdirt - 0 views
-
"Still, in a somewhat surprising move, Obama's recently appointed US Trade Rep., Michael Froman, has stepped in to directly overturn an ITC injunction issued against Apple products -- including iPhones and iPads, after the ITC sided with Samsung, saying that those devices violated Samsung's patents. The decision by Froman is final -- Samsung can't appeal, and it means that those iPhones and iPads won't get blocked at customs, as would likely have happened otherwise. You can read Froman's letter about this, in which he delves into some detail about the administrations worries about "patent hold up" -- mainly on standards-essential patents (SEPs) that have so-called FRAND (fair, reasonable and non-discriminatory) licensing commitments. As the letter notes:"
White House releases trusted Internet ID plan - security, government, Google, Gary Locke, Center for Democracy and Technology, Access control and authentication - Computerworld - 0 views
-
The U.S. government will coordinate private-sector efforts to create trusted identification systems for the Internet, with the goal of giving consumers and businesses multiple options for authenticating identity online, according to a plan released by President Barack Obama's administration. The National Institute of Standards and Technology (NIST) will work with private companies to drive development and adoption of trusted ID technologies, White House officials said. The National Strategy for Trusted Identities in Cyberspace (NSTIC), released by the Department of Commerce on Friday, aims to protect the privacy and security of Internet users by encouraging a broad online authentication market in the U.S. "The fact is that the old password and username combination we often use to verify people is no longer good enough," Commerce Secretary Gary Locke said at an NSTIC release event hosted by the U.S. Chamber of Commerce. "It leaves too many consumers, government agencies and businesses vulnerable to ID and data theft."
1 - 5 of 5
Showing 20▼ items per page