FascistBook: The Growing Case for Government Targeting via Social Media
Posted by Author H. Michael Sweeney
The Growing Case for Government Targeting via Social Mediaby H. Michael Sweeney, copyright © 2011, ProparanoidPress, all rights reserved permissions to reproduce available on request to pppbooks at comcast (net) In two parts. Dateline Portland, OR August 15, 2011
Part I, The Social Media Beast and its Masters
I write this as an activist, investigative writer with seven books generally on abuse of power, privacy, and security matters, and a consultant to targeted persons. So I get an awful lot of feedback from countless persons on the issue this article regards. Namely, that social networks are nothing more than government tools for spying on and targeting the politically incorrect among us. I fear there is truth in the supposition.
I’m on Twitter and FaceBook, and switched almost exclusively to FaceBook as I can get more reach there more quickly than on Twitter. Tweets tend to be more frivolous and for whatever reason, are less likely to share. In the space of time it took me to get 25 Followers on Twitter, I had over 500 on FaceBook, and the quality of exchange was much higher. Kudos to FaceBook on that score, at least — though I think that may be premature given how things are of late, as will be reviewed in Part II of this blog.
To be fair, understand that I do not write this as an expert on FaceBook or social media in general. In point of fact, I struggle with many aspects of what older hands might consider child’s play. It is a complex topic and even more complex software. What I am considered expert on is my personal experience and the that includes shared experiences with thousands of other users and clients, and the general topics relating to the problem as represented in my books, consulting, and other activities. So I can put experiences into context, and I think I can relate them with logical analysis. Only where a given item of concern may be questionable with respect to deciding it represents a mere technical glitch or misunderstanding of procedure, vs. a deliberate spy or harassment tactic, should my lack of FaceBook experience be much of an issue. ANYONE, may feel free to correct or educate me on any errant matter expressed. (Note: in nearly a year since this post first went up, no such corrections have been offered. Yay!) I will do my best to flag areas where there is a difference between supposition or conjecture, and evident realities, as well as points in between.
I will additionally suggest one might get more out of this article if they also review my blog, 33 Axioms of Fascism.
The Intelligence Community and Social Media
It is well known, or should be, that virtually all of the Social Networks have gained funding and, in many cases, direct negotiated working partnerships with government agencies. Of principal concern are those which involve the military or intelligence community, and their greater apparat, which would include think tanks, research firms, PR firms, financial institutions, Institutes and Foundations, Round Table Groups, and other entities which tend o do their bidding (or be their bosses) or support them in key ways. Collectively, this mish-mash forms what generally represents a spy ring network in functionality. Even Law Enforcement Agencies at the local level are now players. That is a pretty broad-based group, and should be explored more carefully…
Examples might be:
The Rand Corporation, a CIA/DOD think tank which has developed several new information gathering systems for its clients. This includes ExpertLens, a new system “to aid complex decision making, adapting online and social media technologies” and which incorporates the Delphi method, Nominal Group Technique, and CrowdSourcing to collect information and forecast against solutions. These are very savvy ‘products’ which can be customized for a wide variety of needs and uses, and incorporated into pre existing informational collection and analysis systems. Are they a potential threat to privacy in social media? You bet.
Public Relation Firms:
Hill & Knowlton is CIA’s PR firm of choice, who conspired to fraudulently get Americans behind the idea to kick Iraq out of Kuwait. They used outright lies before Congress and in media campaigns about bayoneted babies to steal incubators. Same thing happened, by the way, in WWI, when the munitions industry went out of its way to buy a handful of newspapers responsible for the bulk of public opinion, and insure they told us Germans were cutting the breasts off of Belgian women. Its in the Congressional Record (prior link). Wasn’t true, of course, but it heated up the debate and did contribute significantly to the war mood. HK publicly admits to using social media to shape opinions, which translates as disinformation given that their publicly posted policy on such use in no way reflects the kind of blatant dishonesty which they have repeatedly exhibited.
DARPA, the Defense Advanced Research Project Agency is actually a corporate-like research entity reporting to the Department of Defense and, secondarily, contracting with major corporations. They are very interested in “solicitating innoative research proposals in the area of social media.” Many analysts see this as a move to track social media for ‘propaganda,’ which from their perspective would be any politically incorrect agenda “so that they can be countered before they can gain traction,” which would, of course, require direct intervention in some way, such as will be discussed in Part II of this blog. This will dovetail nicely with other items in this list, ‘coincidentally.’
In-Q-Tel is a CIA venture capital firm that invests in start ups it thinks can serve Agency needs. They originally wanted to be named In-Q-It, but someone (blush) registered those names (.com, .org, .net) before they thought to do it, and rather than pay me (given the animosity between us at the time) a few hundred dollars for the names, elected to instead spend thousands to change the company name. They have since invested heavily in all manner of Internet spying ventures, and continue to seek new avenues. They have not touched ‘closed networks’ such as FaceBook, as yet, at least not directly. However, they have invested in the makers of software used by FaceBook, Google, Yahoo, and others to develop and operate their social media, giving way to speculation that back-door access is quite likely a problem worth considering.
The Project for a New American Century (PNAC), as I expose in my book set Fatal Rebirth, is a kind of Foundation which has no peers when it comes to treasonous villainy. September 11 attacks, the resulting Gulf Oil Wars, Homeland Security, the entire election and War Cabinet of the Bush White House, as well as their policies, were all laid out well in advance (1997), and all came to pass almost exactly as planned, and on schedule. They are not finished either. Their membership roster included a rogues gallery of war profiteers, Bush dynasty cronies and family, and villains like Richard Perle.
Questions: How is it that the invasion date of Afghanistan was known prior to September 11? How is it that Colin Powell and DOD Generals were trolling other nations in support of a war against Afghanistan before September 11? Without September 11, what justification for a war did they expect would materialize? Talk about prior knowledge. Amen, Truthers!
I use them as example here, because one of their PNAC friends, Arianna Huffington, wrote an op-ed article in Lebanon’s Daily Star entitled ‘Social media will help fuel change in the Middle East,’ essentially giving the ‘idea’ to the youth of Islamic nations as the article spread virally, that they could use their phones and computers to organize against their government(s). This was some several months before it actually happened in Libya exactly as she wrote it. Huffington, by the way, is described as having very profitable business ties to the Israeli arms industry and has been female companion to Mortimer Zuckerman, a pro-Israel media magnate. So what’s a nice Jewish girl like her doing writing for Islamic media about social networks for revolutionaries? Clearly, this is a form of manipulation of social media users for political gain… a form of social media control being used as Political Control Technology.
Round Table Groups:
The Council on Foreign Relations (CFR) is one of the Round Table Groups better known in the U.S., as they are based in New York. Unabashed globalists with an agenda for a One-World Government, they infect every element of the corporate world as well as every institution of government. Mere Congressmen cower in their presence and hang on their every word, most of them being members who, as if talking about a fellow Wizard at Hogwarts, fawn over and point out membership in their speeches as if a medallion for Exceptional Wizardry.
It is not. It is a signpost of treasonous shame. They seek to destroy national sovereignty. Their best known members are, perhaps, Rockefeller, Bush, Clinton, Carter, Brzezinski, and Kissinger. The CFR lay the foundation for September 11 in Brzezinski’s book, The Grand Chessboard, in which he said the U.S. must remain dominant in the World, and that to do that, we need to control the oil production of the Middle East and Soviet fields bordering with the Middle East. It stated that unless there was some catalyst event to justify a war in the the region, there was sadly no way to achieve that. So PNAC set about to insure it happened just that way. Good old American Capitalism at its best.
With respect to Social Media, CFR has published another work which essentially says what we all know, that it is a great tool for civilians to organize and can become a tool for political change of governments, to include their downfall. It goes on to say, that properly managed, it can become a tool to translate unrest toward rapid and undesirable (their perspective) changes to a more evenly paced and acceptable (their perspective) change. They stress the importance of gaining such a tool. So you can bet that somewhere, people are making it so. In fact, pretty much everyone listed.
Lately, the New York Police Department has established their own Social Media Unit to infect social media with the presence of Cops looking for clues. Well, that might be OK if looking for a specific clue from a specific suspect in an ongoing investigation, but NOT if it is general snooping to create intelligence files on citizens — as has been common practice in almost every major city well before Internet even existed. Portland and San Francisco PDs, and 18 other Police agencies were involved in trading such files on 20,000 non criminals who had never been subject of investigations, as well as those who had, with B’nai B’rith/Anti Defamation League, South African spies, and CIA. So we know it happens. In fact, my dossier was involved, obtained through FOIA. A lawsuit against ADL by San Francisco was dropped amid huge pressure common to anyone who says bad things about any Jewish organization. Well, that didn’t include me, then, but it does, now: Bad ADL.
Too Many Masters, Too Few Slaves
In each of the above examples, I simply used the first group or firm, etc., that popped into my head (deliberately skipping over some of the more obvious choices, because I already know the answer, for them), and then Googled to see if they had any truck to do with social media which borders on manipulation or spying. In every single case, it was found to be true. From this we might deduce, then, it is likely that EVERY such agency in each category has already or will soon effect a similar intention or action which can be pinned to its lapel. The problem is, that means literally many hundreds of groups who seek to control and subvert social media networks to their own internal and often insidious needs. The bulk of these I would not trust with my life, much less my Nation’s security, and certainly not my privacy, much less counting on them to obey the law.
But there are only so many such social networks, and only a few of them are large enough to merit attention. The larger they are, I suspect, the more valuable a target they become. The largest of these is FaceBook. So it is perhaps no surprise that charges of spying and digital assault on the politically incorrect should be more common to FaceBook users than any other such media forum. Both because there are so many users (more than 700,000,000, or about 1 out of every five computer users World-wide), and because there are so many wanna’ be system infiltrators who rank them the number one choice for manipulation.
I don’t think that Mark Zuckerberg, CEO/President and creator of FaceBook is dumb, but I think he would be stupid to do the things he has done already to cooperate with these kinds of manipulating bastards, unless the scope of the problem as just described, was not known at the time. You can bet he and his brethren competitors were fed a line of crap which started with ‘National Security,’ and ended with ‘personal assurances,’ and you can bet that 90% of that was bull. I can’t imagine anyone willing to give endless back doors and unchecked control of their cash cow to a bunch of people who, in the final analysis, would probably be shot if there were a revolution right now, and their side lost. But once such a bed has been made… as with a deal with the Mafia or the Tong… you can’t go back and undo it. So whatever state FaceBook and its competitors are really in in terms of bedding with evil partners, they, and we, are stuck with it… at least until that revolution takes place.
As I see it, and as is true for all social networks…
There are three basic paths for abuse to take root
1. Those already inherent in the design or added to it intentionally by the creator/owner of the network which enable their own form of ‘control’ over their client’s experiences, and which could be used in punitive or immoral ways if desired. That does not mean they do so intentionally, but it creates temptation. They would, we presume, be very difficult to discover and almost impossible to prove, but there are clues which might suggest their presence and use. Saying something bad about the media and, in almost every instance, suffering a punitive response, would imply such to be the case.
2. Those added by agreement or as concession to investors or partners. These are undoubtedly on purpose and very likely to be employed to the detriment of end users, where present. These would generally need to be extremely covert in nature and almost impossible to detect. The exception might be harassment or targeting methodologies, but a clever programmer can make these look like glitches. Well, I don’t know of any activist on FaceBook without their glitches.
3. Those obtained by back door access, hacks, etc. You can bet these are in constant wholesale use, where present. Absolutely covert and highly illegal in nature, there will not be any opportunity allowed for discovery, which means that they are not used for harassment. They are snooping solutions, only. Thus short of an announcement of discovery, the end user will never know of its existence, which is also true of the operator of the social media. For this reason, I fear In-Q-Tel’s strategy more than, say, DARPA’s. I fear DARPA’s more than I fear Hill and Knowlton.
This ends Part I.
Part II, will look at some specific facts, issues and actual experiences reported about FaceBook in media and by users. The issues described in the three paths, above, will be considered and applied where possible in an attempt to evaluate. We need a sense of reality, not conjecture, when it comes to charges of spying and targeting, lest the decisions we make be more dangerous by false assumptions.
- Three very insightful articles about transparency on the Internet (empressoftheglobaluniverse.wordpress.com)
- FaceBook wants your Unborn Child (manveetsingh.wordpress.com)
- America’s Fascist Revolution and The Internet as a Counter-revolutionary Force (rogueoperator.wordpress.com)
- Pentagon looks to social media as new battlefield (destructionist.wordpress.com)
About Author H. Michael SweeneyAuthor of privacy/security/abuse of power, Founder Free Will Society, PALADINs (Post Apocalyptic Local Area Defense Information Network)
Posted on August 15, 2011, in Abuse of Power, Conspiracy, Political Commentary, Targeted Individuals and tagged activism, activists, CrowdSourcing, FaceBook, Google, History, Nominal Group Technique, Social media, Social network, spying, targeted individuals, Twitter, Yahoo. Bookmark the permalink. 1 Comment.