General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsRevealed: US spy operation that manipulates social media ('sock puppet' software)
This is from 2011. I wonder if any progress has been made since then. A mockingbird is quoted in the article as saying the sock puppets would never be used in the USA because that would be illegal.
http://www.theguardian.com/technology/2011/mar/17/us-spy-operation-social-networks
Revealed: US spy operation that manipulates social media
Military's 'sock puppet' software creates fake online identities to spread pro-American propaganda
Jeff Jarvis: Washington shows the morals of a clumsy spammer
The US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda.
A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an "online persona management service" that will allow one US serviceman or woman to control up to 10 separate identities based all over the world.
The project has been likened by web experts to China's attempts to control and restrict free speech on the internet. Critics are likely to complain that it will allow the US military to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives.
The discovery that the US military is developing false online personalities known to users of social media as "sock puppets" could also encourage other governments, private companies and non-government organisations to do the same.
The Centcom contract stipulates that each fake online persona must have a convincing background, history and supporting details, and that up to 50 US-based controllers should be able to operate false identities from their workstations "without fear of being discovered by sophisticated adversaries".
more...
CJCRANE
(18,184 posts)Karmadillo
(9,253 posts)a link for those in a similar situation.
http://en.wikipedia.org/wiki/Sybil_attack
The Sybil attack in computer security is an attack wherein a reputation system is subverted by forging identities in peer-to-peer networks. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder.[1] The name was suggested in or before 2002 by Brian Zill at Microsoft Research.[2] The term "pseudospoofing" had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".[3]
KoKo
(84,711 posts)Thanks for the info...
Response to Karmadillo (Original post)
Name removed Message auto-removed
Fumesucker
(45,851 posts)DU runs pretty old, there are a good number of Vietnam era vets here, from back when a bigger percentage of the population served.
MannyGoldstein
(34,589 posts)The US doesn't do that sort of thing.
Electric Monk
(13,869 posts)Silly me, I've been having opinions of my own for free!
http://www.democraticunderground.com/10026279986
Orsino
(37,428 posts)The socks are eady to spot.
The socks are easy to spot.
The socks are eady to spot.