*Note. I have not read this article in it's entirety due to time constraints, but it seemed to have some very valuable information.
The Gentleperson's Guide To Forum Spies
A sends:
The Gentleperson's Guide To Forum Spies (spooks, feds, etc.)
http://pastebin.com/irj4Fyd5
1. COINTELPRO Techniques for dilution, misdirection and control of a internet
forum
2. Twenty-Five Rules of Disinformation
3. Eight Traits of the Disinformationalist
4. How to Spot a Spy (Cointelpro Agent)
5. Seventeen Techniques for Truth Suppression
______________________________________________________________________________________
COINTELPRO Techniques for dilution, misdirection and control of a internet
forum..
There are several techniques for the control and manipulation of a internet
forum no matter what, or who is on it. We will go over each technique and
demonstrate that only a minimal number of operatives can be used to eventually
and effectively gain a control of a 'uncontrolled forum.'
Technique #1 - 'FORUM SLIDING'
If a very sensitive posting of a critical nature has been posted on a forum
- it can be quickly removed from public view by 'forum sliding.' In this
technique a number of unrelated posts are quietly prepositioned on the forum
and allowed to 'age.' Each of these misdirectional forum postings can then
be called upon at will to trigger a 'forum slide.' The second requirement
is that several fake accounts exist, which can be called upon, to ensure
that this technique is not exposed to the public. To trigger a 'forum slide'
and 'flush' the critical post out of public view it is simply a matter of
logging into each account both real and fake and then 'replying' to prepositined
postings with a simple 1 or 2 line comment. This brings the unrelated postings
to the top of the forum list, and the critical posting 'slides' down the
front page, and quickly out of public view. Although it is difficult or
impossible to censor the posting it is now lost in a sea of unrelated and
unuseful postings. By this means it becomes effective to keep the readers
of the forum reading unrelated and non-issue items.
Technique #2 - 'CONSENSUS CRACKING'
A second highly effective technique (which you can see in operation all the
time at
www.abovetopsecret.com)
is 'consensus cracking.' To develop a consensus crack, the following technique
is used. Under the guise of a fake account a posting is made which looks
legitimate and is towards the truth is made - but the critical point is that
it has a VERY WEAK PREMISE without substantive proof to back the posting.
Once this is done then under alternative fake accounts a very strong position
in your favour is slowly introduced over the life of the posting. It is
IMPERATIVE that both sides are initially presented, so the uninformed reader
cannot determine which side is the truth. As postings and replies are made
the stronger 'evidence' or disinformation in your favour is slowly 'seeded
in.' Thus the uninformed reader will most like develop the same position
as you, and if their position is against you their opposition to your posting
will be most likely dropped. However in some cases where the forum members
are highly educated and can counter your disinformation with real facts and
linked postings, you can then 'abort' the consensus cracking by initiating
a 'forum slide.'
Technique #3 - 'TOPIC DILUTION'
Topic dilution is not only effective in forum sliding it is also very useful
in keeping the forum readers on unrelated and non-productive issues. This
is a critical and useful technique to cause a 'RESOURCE BURN.' By implementing
continual and non-related postings that distract and disrupt (trolling )
the forum readers they are more effectively stopped from anything of any
real productivity. If the intensity of gradual dilution is intense enough,
the readers will effectively stop researching and simply slip into a 'gossip
mode.' In this state they can be more easily misdirected away from facts
towards uninformed conjecture and opinion. The less informed they are the
more effective and easy it becomes to control the entire group in the direction
that you would desire the group to go in. It must be stressed that a proper
assessment of the psychological capabilities and levels of education is first
determined of the group to determine at what level to 'drive in the wedge.'
By being too far off topic too quickly it may trigger censorship by a forum
moderator.
Technique #4 - 'INFORMATION COLLECTION'
Information collection is also a very effective method to determine the
psychological level of the forum members, and to gather intelligence that
can be used against them. In this technique in a light and positive environment
a 'show you mine so me yours' posting is initiated. From the number of replies
and the answers that are provided much statistical information can be gathered.
An example is to post your 'favourite weapon' and then encourage other members
of the forum to showcase what they have. In this matter it can be determined
by reverse proration what percentage of the forum community owns a firearm,
and or a illegal weapon. This same method can be used by posing as one of
the form members and posting your favourite 'technique of operation.' From
the replies various methods that the group utilizes can be studied and effective
methods developed to stop them from their activities.
Technique #5 - 'ANGER TROLLING'
Statistically, there is always a percentage of the forum posters who are
more inclined to violence. In order to determine who these individuals are,
it is a requirement to present a image to the forum to deliberately incite
a strong psychological reaction. From this the most violent in the group
can be effectively singled out for reverse IP location and possibly local
enforcement tracking. To accomplish this only requires posting a link to
a video depicting a local police officer massively abusing his power against
a very innocent individual. Statistically of the million or so police officers
in America there is always one or two being caught abusing there powers and
the taping of the activity can be then used for intelligence gathering purposes
- without the requirement to 'stage' a fake abuse video. This method is extremely
effective, and the more so the more abusive the video can be made to look.
Sometimes it is useful to 'lead' the forum by replying to your own posting
with your own statement of violent intent, and that you 'do not care what
the authorities think!!' inflammation. By doing this and showing no fear
it may be more effective in getting the more silent and self-disciplined
violent intent members of the forum to slip and post their real intentions.
This can be used later in a court of law during prosecution.
Technique #6 - 'GAINING FULL CONTROL'
It is important to also be harvesting and continually maneuvering for a forum
moderator position. Once this position is obtained, the forum can then be
effectively and quietly controlled by deleting unfavourable postings - and
one can eventually steer the forum into complete failure and lack of interest
by the general public. This is the 'ultimate victory' as the forum is no
longer participated with by the general public and no longer useful in
maintaining their freedoms. Depending on the level of control you can obtain,
you can deliberately steer a forum into defeat by censoring postings, deleting
memberships, flooding, and or accidentally taking the forum offline. By this
method the forum can be quickly killed. However it is not always in the interest
to kill a forum as it can be converted into a 'honey pot' gathering center
to collect and misdirect newcomers and from this point be completely used
for your control for your agenda purposes.
CONCLUSION
Remember these techniques are only effective if the forum participants DO
NOT KNOW ABOUT THEM. Once they are aware of these techniques the operation
can completely fail, and the forum can become uncontrolled. At this point
other avenues must be considered such as initiating a false legal precidence
to simply have the forum shut down and taken offline. This is not desirable
as it then leaves the enforcement agencies unable to track the percentage
of those in the population who always resist attempts for control against
them. Many other techniques can be utilized and developed by the individual
and as you develop further techniques of infiltration and control it is
imperative to share then with HQ.
______________________________________________________________________________________
Twenty-Five Rules of Disinformation
Note: The first rule and last five (or six, depending on situation) rules
are generally not directly within the ability of the traditional disinfo
artist to apply. These rules are generally used more directly by those at
the leadership, key players, or planning level of the criminal conspiracy
or conspiracy to cover up.
1. Hear no evil, see no evil, speak no evil. Regardless of what you know,
don't discuss it -- especially if you are a public figure, news anchor, etc.
If it's not reported, it didn't happen, and you never have to deal with the
issues.
2. Become incredulous and indignant. Avoid discussing key issues and instead
focus on side issues which can be used show the topic as being critical of
some otherwise sacrosanct group or theme. This is also known as the 'How
dare you!' gambit.
3. Create rumor mongers. Avoid discussing issues by describing all charges,
regardless of venue or evidence, as mere rumors and wild accusations. Other
derogatory terms mutually exclusive of truth may work as well. This method
which works especially well with a silent press, because the only way the
public can learn of the facts are through such 'arguable rumors'. If you
can associate the material with the Internet, use this fact to certify it
a 'wild rumor' from a 'bunch of kids on the Internet' which can have no basis
in fact.
4. Use a straw man. Find or create a seeming element of your opponent's argument
which you can easily knock down to make yourself look good and the opponent
to look bad. Either make up an issue you may safely imply exists based on
your interpretation of the opponent/opponent arguments/situation, or select
the weakest aspect of the weakest charges. Amplify their significance and
destroy them in a way which appears to debunk all the charges, real and
fabricated alike, while actually avoiding discussion of the real issues.
5. Sidetrack opponents with name calling and ridicule. This is also known
as the primary 'attack the messenger' ploy, though other methods qualify
as variants of that approach. Associate opponents with unpopular titles such
as 'kooks', 'right-wing', 'liberal', 'left-wing', 'terrorists', 'conspiracy
buffs', 'radicals', 'militia', 'racists', 'religious fanatics', 'sexual
deviates', and so forth. This makes others shrink from support out of fear
of gaining the same label, and you avoid dealing with issues.
6. Hit and Run. In any public forum, make a brief attack of your opponent
or the opponent position and then scamper off before an answer can be fielded,
or simply ignore any answer. This works extremely well in Internet and
letters-to-the-editor environments where a steady stream of new identities
can be called upon without having to explain criticism, reasoning -- simply
make an accusation or other attack, never discussing issues, and never answering
any subsequent response, for that would dignify the opponent's viewpoint.
7. Question motives. Twist or amplify any fact which could be taken to imply
that the opponent operates out of a hidden personal agenda or other bias.
This avoids discussing issues and forces the accuser on the defensive.
8. Invoke authority. Claim for yourself or associate yourself with authority
and present your argument with enough 'jargon' and 'minutia' to illustrate
you are 'one who knows', and simply say it isn't so without discussing issues
or demonstrating concretely why or citing sources.
9. Play Dumb. No matter what evidence or logical argument is offered, avoid
discussing issues except with denials they have any credibility, make any
sense, provide any proof, contain or make a point, have logic, or support
a conclusion. Mix well for maximum effect.
10. Associate opponent charges with old news. A derivative of the straw man
-- usually, in any large-scale matter of high visibility, someone will make
charges early on which can be or were already easily dealt with - a kind
of investment for the future should the matter not be so easily contained.)
Where it can be foreseen, have your own side raise a straw man issue and
have it dealt with early on as part of the initial contingency plans. Subsequent
charges, regardless of validity or new ground uncovered, can usually then
be associated with the original charge and dismissed as simply being a rehash
without need to address current issues -- so much the better where the opponent
is or was involved with the original source.
11. Establish and rely upon fall-back positions. Using a minor matter or
element of the facts, take the 'high road' and 'confess' with candor that
some innocent mistake, in hindsight, was made -- but that opponents have
seized on the opportunity to blow it all out of proportion and imply greater
criminalities which, 'just isn't so.' Others can reinforce this on your behalf,
later, and even publicly 'call for an end to the nonsense' because you have
already 'done the right thing.' Done properly, this can garner sympathy and
respect for 'coming clean' and 'owning up' to your mistakes without addressing
more serious issues.
12. Enigmas have no solution. Drawing upon the overall umbrella of events
surrounding the crime and the multitude of players and events, paint the
entire affair as too complex to solve. This causes those otherwise following
the matter to begin to lose interest more quickly without having to address
the actual issues.
13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning
backwards or with an apparent deductive logic which forbears any actual material
fact.
14. Demand complete solutions. Avoid the issues by requiring opponents to
solve the crime at hand completely, a ploy which works best with issues
qualifying for rule 10.
15. Fit the facts to alternate conclusions. This requires creative thinking
unless the crime was planned with contingency conclusions in place.
16. Vanish evidence and witnesses. If it does not exist, it is not fact,
and you won't have to address the issue.
17. Change the subject. Usually in connection with one of the other ploys
listed here, find a way to side-track the discussion with abrasive or
controversial comments in hopes of turning attention to a new, more manageable
topic. This works especially well with companions who can 'argue' with you
over the new topic and polarize the discussion arena in order to avoid discussing
more key issues.
18. Emotionalize, Antagonize, and Goad Opponents. If you can't do anything
else, chide and taunt your opponents and draw them into emotional responses
which will tend to make them look foolish and overly motivated, and generally
render their material somewhat less coherent. Not only will you avoid discussing
the issues in the first instance, but even if their emotional response addresses
the issue, you can further avoid the issues by then focusing on how 'sensitive
they are to criticism.'
19. Ignore proof presented, demand impossible proofs. This is perhaps a variant
of the 'play dumb' rule. Regardless of what material may be presented by
an opponent in public forums, claim the material irrelevant and demand proof
that is impossible for the opponent to come by (it may exist, but not be
at his disposal, or it may be something which is known to be safely destroyed
or withheld, such as a murder weapon.) In order to completely avoid discussing
issues, it may be required that you to categorically deny and be critical
of media or books as valid sources, deny that witnesses are acceptable, or
even deny that statements made by government or other authorities have any
meaning or relevance.
20. False evidence. Whenever possible, introduce new facts or clues designed
and manufactured to conflict with opponent presentations -- as useful tools
to neutralize sensitive issues or impede resolution. This works best when
the crime was designed with contingencies for the purpose, and the facts
cannot be easily separated from the fabrications.
21. Call a Grand Jury, Special Prosecutor, or other empowered investigative
body. Subvert the (process) to your benefit and effectively neutralize all
sensitive issues without open discussion. Once convened, the evidence and
testimony are required to be secret when properly handled. For instance,
if you own the prosecuting attorney, it can insure a Grand Jury hears no
useful evidence and that the evidence is sealed and unavailable to subsequent
investigators. Once a favorable verdict is achieved, the matter can be considered
officially closed. Usually, this technique is applied to find the guilty
innocent, but it can also be used to obtain charges when seeking to frame
a victim.
22. Manufacture a new truth. Create your own expert(s), group(s), author(s),
leader(s) or influence existing ones willing to forge new ground via scientific,
investigative, or social research or testimony which concludes favorably.
In this way, if you must actually address issues, you can do so
authoritatively.
23. Create bigger distractions. If the above does not seem to be working
to distract from sensitive issues, or to prevent unwanted media coverage
of unstoppable events such as trials, create bigger news stories (or treat
them as such) to distract the multitudes.
24. Silence critics. If the above methods do not prevail, consider removing
opponents from circulation by some definitive solution so that the need to
address issues is removed entirely. This can be by their death, arrest and
detention, blackmail or destruction of their character by release of blackmail
information, or merely by destroying them financially, emotionally, or severely
damaging their health.
25. Vanish. If you are a key holder of secrets or otherwise overly illuminated
and you think the heat is getting too hot, to avoid the issues, vacate the
kitchen.
______________________________________________________________________________________
Eight Traits of the Disinformationalist
1) Avoidance. They never actually discuss issues head-on or provide constructive
input, generally avoiding citation of references or credentials. Rather,
they merely imply this, that, and the other. Virtually everything about their
presentation implies their authority and expert knowledge in the matter without
any further justification for credibility.
2) Selectivity. They tend to pick and choose opponents carefully, either
applying the hit-and-run approach against mere commentators supportive of
opponents, or focusing heavier attacks on key opponents who are known to
directly address issues. Should a commentator become argumentative with any
success, the focus will shift to include the commentator as well.
3) Coincidental. They tend to surface suddenly and somewhat coincidentally
with a new controversial topic with no clear prior record of participation
in general discussions in the particular public arena involved. They likewise
tend to vanish once the topic is no longer of general concern. They were
likely directed or elected to be there for a reason, and vanish with the
reason.
4) Teamwork. They tend to operate in self-congratulatory and complementary
packs or teams. Of course, this can happen naturally in any public forum,
but there will likely be an ongoing pattern of frequent exchanges of this
sort where professionals are involved. Sometimes one of the players will
infiltrate the opponent camp to become a source for straw man or other tactics
designed to dilute opponent presentation strength.
5) Anti-conspiratorial. They almost always have disdain for 'conspiracy
theorists' and, usually, for those who in any way believe JFK was not killed
by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists,
do they focus on defending a single topic discussed in a NG focusing on
conspiracies? One might think they would either be trying to make fools of
everyone on every topic, or simply ignore the group they hold in such disdain.Or,
one might more rightly conclude they have an ulterior motive for their actions
in going out of their way to focus as they do.
6) Artificial Emotions. An odd kind of 'artificial' emotionalism and an unusually
thick skin -- an ability to persevere and persist even in the face of
overwhelming criticism and unacceptance. This likely stems from intelligence
community training that, no matter how condemning the evidence, deny everything,
and never become emotionally involved or reactive. The net result for a disinfo
artist is that emotions can seem artificial.
Most people, if responding in anger, for instance, will express their animosity
throughout their rebuttal. But disinfo types usually have trouble maintaining
the 'image' and are hot and cold with respect to pretended emotions and their
usually more calm or unemotional communications style. It's just a job, and
they often seem unable to 'act their role in character' as well in a
communications medium as they might be able in a real face-to-face
conversation/confrontation. You might have outright rage and indignation
one moment, ho-hum the next, and more anger later -- an emotional yo-yo.
With respect to being thick-skinned, no amount of criticism will deter them
from doing their job, and they will generally continue their old disinfo
patterns without any adjustments to criticisms of how obvious it is that
they play that game -- where a more rational individual who truly cares what
others think might seek to improve their communications style, substance,
and so forth, or simply give up.
7) Inconsistent. There is also a tendency to make mistakes which betray their
true self/motives. This may stem from not really knowing their topic, or
it may be somewhat 'freudian', so to speak, in that perhaps they really root
for the side of truth deep within.
I have noted that often, they will simply cite contradictory information
which neutralizes itself and the author. For instance, one such player claimed
to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar,
incoherent style) on having only a grade-school education. I'm not aware
of too many Navy pilots who don't have a college degree. Another claimed
no knowledge of a particular topic/situation but later claimed first-hand
knowledge of it.
8) Time Constant. Recently discovered, with respect to News Groups, is the
response time factor. There are three ways this can be seen to work, especially
when the government or other empowered player is involved in a cover up
operation:
a) ANY NG posting by a targeted proponent for truth can result in an IMMEDIATE
response. The government and other empowered players can afford to pay people
to sit there and watch for an opportunity to do some damage. SINCE DISINFO
IN A NG ONLY WORKS IF THE READER SEES IT - FAST RESPONSE IS CALLED FOR, or
the visitor may be swayed towards truth.
b) When dealing in more direct ways with a disinformationalist, such as email,
DELAY IS CALLED FOR - there will usually be a minimum of a 48-72 hour delay.
This allows a sit-down team discussion on response strategy for best effect,
and even enough time to 'get permission' or instruction from a formal chain
of command.
c) In the NG example 1) above, it will often ALSO be seen that bigger guns
are drawn and fired after the same 48-72 hours delay - the team approach
in play. This is especially true when the targeted truth seeker or their
comments are considered more important with respect to potential to reveal
truth. Thus, a serious truth sayer will be attacked twice for the same sin.
______________________________________________________________________________________
How to Spot a Spy (Cointelpro Agent)
One way to neutralize a potential activist is to get them to be in a group
that does all the wrong things. Why?
1) The message doesn't get out.
2) A lot of time is wasted
3) The activist is frustrated and discouraged
4) Nothing good is accomplished.
FBI and Police Informers and Infiltrators will infest any group and they
have phoney activist organizations established.
Their purpose is to prevent any real movement for justice or eco-peace from
developing in this country.
Agents come in small, medium or large. They can be of any ethnic background.
They can be male or female.
The actual size of the group or movement being infiltrated is irrelevant.
It is the potential the movement has for becoming large which brings on the
spies and saboteurs.
This booklet lists tactics agents use to slow things down, foul things up,
destroy the movement and keep tabs on activists.
It is the agent's job to keep the activist from quitting such a group, thus
keeping him/her under control.
In some situations, to get control, the agent will tell the activist:
"You're dividing the movement."
[Here, I have added the psychological reasons as to WHY this maneuver works
to control people]
This invites guilty feelings. Many people can be controlled by guilt. The
agents begin relationships with activists behind a well-developed mask of
"dedication to the cause." Because of their often declared dedication, (and
actions designed to prove this), when they criticize the activist, he or
she - being truly dedicated to the movement - becomes convinced that somehow,
any issues are THEIR fault. This is because a truly dedicated person tends
to believe that everyone has a conscience and that nobody would dissimulate
and lie like that "on purpose." It's amazing how far agents can go in
manipulating an activist because the activist will constantly make excuses
for the agent who regularly declares their dedication to the cause. Even
if they do, occasionally, suspect the agent, they will pull the wool over
their own eyes by rationalizing: "they did that unconsciously... they didn't
really mean it... I can help them by being forgiving and accepting " and
so on and so forth.
The agent will tell the activist:
"You're a leader!"
This is designed to enhance the activist's self-esteem. His or her narcissistic
admiration of his/her own activist/altruistic intentions increase as he or
she identifies with and consciously admires the altruistic declarations of
the agent which are deliberately set up to mirror those of the activist.
This is "malignant pseudoidentification." It is the process by which the
agent consciously imitates or simulates a certain behavior to foster the
activist's identification with him/her, thus increasing the activist's
vulnerability to exploitation. The agent will simulate the more subtle
self-concepts of the activist.
Activists and those who have altruistic self-concepts are most vulnerable
to malignant pseudoidentification especially during work with the agent when
the interaction includes matter relating to their competency, autonomy, or
knowledge.
The goal of the agent is to increase the activist's general empathy for the
agent through pseudo-identification with the activist's self-concepts.
The most common example of this is the agent who will compliment the activist
for his competency or knowledge or value to the movement. On a more subtle
level, the agent will simulate affects and mannerisms of the activist which
promotes identification via mirroring and feelings of "twinship". It is not
unheard of for activists, enamored by the perceived helpfulness and competence
of a good agent, to find themselves considering ethical violations and perhaps,
even illegal behavior, in the service of their agent/handler.
The activist's "felt quality of perfection" [self-concept] is enhanced, and
a strong empathic bond is developed with the agent through his/her imitation
and simulation of the victim's own narcissistic investments. [self-concepts]
That is, if the activist knows, deep inside, their own dedication to the
cause, they will project that onto the agent who is "mirroring" them.
The activist will be deluded into thinking that the agent shares this feeling
of identification and bonding. In an activist/social movement setting, the
adversarial roles that activists naturally play vis a vis the
establishment/government, fosters ongoing processes of intrapsychic splitting
so that "twinship alliances" between activist and agent may render whole
sectors or reality testing unavailable to the activist. They literally "lose
touch with reality."
Activists who deny their own narcissistic investments [do not have a good
idea of their own self-concepts and that they ARE concepts] and consciously
perceive themselves (accurately, as it were) to be "helpers" endowed with
a special amount of altruism are exceedingly vulnerable to the affective
(emotional) simulation of the accomplished agent.
Empathy is fostered in the activist through the expression of quite visible
affects. The presentation of tearfulness, sadness, longing, fear, remorse,
and guilt, may induce in the helper-oriented activist a strong sense of
compassion, while unconsciously enhancing the activist's narcissistic investment
in self as the embodiment of goodness.
The agent's expresssion of such simulated affects may be quite compelling
to the observer and difficult to distinguish from deep emotion.
It can usually be identified by two events, however:
First, the activist who has analyzed his/her own narcissistic roots and is
aware of his/her own potential for being "emotionally hooked," will be able
to remain cool and unaffected by such emotional outpourings by the agent.
As a result of this unaffected, cool, attitude, the Second event will occur:
The agent will recompensate much too quickly following such an affective
expression leaving the activist with the impression that "the play has ended,
the curtain has fallen," and the imposture, for the moment, has finished.
The agent will then move quickly to another activist/victim.
The fact is, the movement doesn't need leaders, it needs MOVERS. "Follow
the leader" is a waste of time.
A good agent will want to meet as often as possible. He or she will talk
a lot and say little. One can expect an onslaught of long, unresolved
discussions.
Some agents take on a pushy, arrogant, or defensive manner:
1) To disrupt the agenda
2) To side-track the discussion
3) To interrupt repeatedly
4) To feign ignorance
5) To make an unfounded accusation against a person.
Calling someone a racist, for example. This tactic is used to discredit a
person in the eyes of all other group members.
Saboteurs
Some saboteurs pretend to be activists. She or he will ....
1) Write encyclopedic flyers (in the present day, websites)
2) Print flyers in English only.
3) Have demonstrations in places where no one cares.
4) Solicit funding from rich people instead of grass roots support
5) Display banners with too many words that are confusing.
6) Confuse issues.
7) Make the wrong demands.
Cool Compromise the goal.
9) Have endless discussions that waste everyone's time. The agent may accompany
the endless discussions with drinking, pot smoking or other amusement to
slow down the activist's work.
Provocateurs
1) Want to establish "leaders" to set them up for a fall in order to stop
the movement.
2) Suggest doing foolish, illegal things to get the activists in trouble.
3) Encourage militancy.
4) Want to taunt the authorities.
5) Attempt to make the activist compromise their values.
6) Attempt to instigate violence. Activisim ought to always be non-violent.
7) Attempt to provoke revolt among people who are ill-prepared to deal with
the reaction of the authorities to such violence.
Informants
1) Want everyone to sign up and sing in and sign everything.
2) Ask a lot of questions (gathering data).
3) Want to know what events the activist is planning to attend.
4) Attempt to make the activist defend him or herself to identify his or
her beliefs, goals, and level of committment.
Recruiting
Legitimate activists do not subject people to hours of persuasive dialog.
Their actions, beliefs, and goals speak for themselves.
Groups that DO recruit are missionaries, military, and fake political parties
or movements set up by agents.
Surveillance
ALWAYS assume that you are under surveillance.
At this point, if you are NOT under surveillance, you are not a very good
activist!
Scare Tactics
They use them.
Such tactics include slander, defamation, threats, getting close to disaffected
or minimally committed fellow activists to persuade them (via psychological
tactics described above) to turn against the movement and give false testimony
against their former compatriots. They will plant illegal substances on the
activist and set up an arrest; they will plant false information and set
up "exposure," they will send incriminating letters [emails] in the name
of the activist; and more; they will do whatever society will allow.
This booklet in no way covers all the ways agents use to sabotage the lives
of sincere an dedicated activists.
If an agent is "exposed," he or she will be transferred or replaced.
COINTELPRO is still in operation today under a different code name. It is
no longer placed on paper where it can be discovered through the freedom
of information act.
The FBI counterintelligence program's stated purpose: To expose, disrupt,
misdirect, discredit, and otherwise neutralize individuals who the FBI categorize
as opposed to the National Interests. "National Security" means the FBI's
security from the people ever finding out the vicious things it does in violation
of people's civil liberties.
______________________________________________________________________________________
Seventeen Techniques for Truth Suppression
Strong, credible allegations of high-level criminal activity can bring down
a government. When the government lacks an effective, fact-based defense,
other techniques must be employed. The success of these techniques depends
heavily upon a cooperative, compliant press and a mere token opposition
party.
1. Dummy up. If it's not reported, if it's not news, it didn't happen.
2. Wax indignant. This is also known as the "How dare you?" gambit.
3. Characterize the charges as "rumors" or, better yet, "wild rumors." If,
in spite of the news blackout, the public is still able to learn about the
suspicious facts, it can only be through "rumors." (If they tend to believe
the "rumors" it must be because they are simply "paranoid" or
"hysterical.")
4. Knock down straw men. Deal only with the weakest aspects of the weakest
charges. Even better, create your own straw men. Make up wild rumors (or
plant false stories) and give them lead play when you appear to debunk all
the charges, real and fanciful alike.
5. Call the skeptics names like "conspiracy theorist," "nutcase," "ranter,"
"kook," "crackpot," and, of course, "rumor monger." Be sure, too, to use
heavily loaded verbs and adjectives when characterizing their charges and
defending the "more reasonable" government and its defenders. You must then
carefully avoid fair and open debate with any of the people you have thus
maligned. For insurance, set up your own "skeptics" to shoot down.
6. Impugn motives. Attempt to marginalize the critics by suggesting strongly
that they are not really interested in the truth but are simply pursuing
a partisan political agenda or are out to make money (compared to
over-compensated adherents to the government line who, presumably, are
not).
7. Invoke authority. Here the controlled press and the sham opposition can
be very useful.
8. Dismiss the charges as "old news."
9. Come half-clean. This is also known as "confession and avoidance" or "taking
the limited hangout route." This way, you create the impression of candor
and honesty while you admit only to relatively harmless, less-than-criminal
"mistakes." This stratagem often requires the embrace of a fall-back position
quite different from the one originally taken. With effective damage control,
the fall-back position need only be peddled by stooge skeptics to carefully
limited markets.
10. Characterize the crimes as impossibly complex and the truth as ultimately
unknowable.
11. Reason backward, using the deductive method with a vengeance. With thoroughly
rigorous deduction, troublesome evidence is irrelevant. E.g. We have a completely
free press. If evidence exists that the Vince Foster "suicide" note was forged,
they would have reported it. They haven't reported it so there is no such
evidence. Another variation on this theme involves the likelihood of a conspiracy
leaker and a press who would report the leak.
12. Require the skeptics to solve the crime completely. E.g. If Foster was
murdered, who did it and why?
13. Change the subject. This technique includes creating and/or publicizing
distractions.
14. Lightly report incriminating facts, and then make nothing of them. This
is sometimes referred to as "bump and run" reporting.
15. Baldly and brazenly lie. A favorite way of doing this is to attribute
the "facts" furnished the public to a plausible-sounding, but anonymous,
source.
16. Expanding further on numbers 4 and 5, have your own stooges "expose"
scandals and champion popular causes. Their job is to pre-empt real opponents
and to play 99-yard football. A variation is to pay rich people for the job
who will pretend to spend their own money.
17. Flood the Internet with agents. This is the answer to the question, "What
could possibly motivate a person to spend hour upon hour on Internet news
groups defending the government and/or the press and harassing genuine critics?"
Don t the authorities have defenders enough in all the newspapers, magazines,
radio, and television? One would think refusing to print critical letters
and screening out serious callers or dumping them from radio talk shows would
be control enough, but, obviously, it is not.
Monday, July 30, 2012
Willard Romney Goes To The Boss's House
SOURCE
JERUSALEM--Mitt Romney took a break from meeting Israeli officials here this afternoon to visit the Western Wall, one of Judaism's holiest places.
Arriving on Tisha B'Av, a Jewish day of mourning, Romney was quickly surrounded by dozens of worshipers, some of them Americans.
The candidate and his wife, Ann, parted ways upon arrival at the historic site, also known as the Wailing Wall. Ann Romney went to a part of the wall restricted to women.
Surrounded by Secret Service and machine gun-holding Israeli security on a sunny day, Romney made his way to the wall, greeting and thanking admirers who were shouting their approval for the Republican.
He was met at the wall by a rabbi bearing a map of the site and chatted with him for a minute before taking a slip of paper and making an inscription. Romney put his right hand on the wall and bowed and prayed for about 20 seconds. He then found a clear space in the wall, which is filled with slips of paper, and put it in the crevice.
Leaving the wall, Romney was given a copy of a book, "Touching the Stone of Our Heritage," by the rabbi.
The candidate ignored a variety of questions shouted at him by both the American and Israeli press as well as the worshipers.
When of the Americans yelled, "Mr. Romney, say hello to Georgia!" the candidate looked over his shoulder and waved: "Hello, Georgia."
Other Jews at the wall yelled out pleas for Romney to stand with Israel, release Israeli spy Jonathan Pollard from prison and recognize Jerusalem as the Jewish capital.
Also present with Romney at the wall were his son, Josh, and one of his top donors, Phil Rosen, a New York lawyer, who is here partly for a Romney fundraiser tomorrow morning.
Saturday, July 28, 2012
Government Employees, Unions, And Bankruptcy
SOURCE
During an economic boom, exuberance finds itself lodged in all types of industries. When profits soar, so does the public’s disregard for prudence. And as tax revenues rise, politicians can’t help but give in to their bread and butter of buying votes. Periods of accelerated economic growth typically come in two different forms. If capital is drawn from a pool of real savings to finance investment in more efficient forms of production, the boost in wages and income will be sustainable as long as consumers remain willing to purchase whatever is being produced in greater amounts. In the case of a credit-expansion boom fueled primarily by fractional reserve banking and interest rate manipulation through a central bank, the boom conditions are destined toward bust. Liquidation then becomes necessary as the bust gets underway and malinvestments come to light.
For private industry it means slashing costs, laying off workers, and possible bankruptcy to discharge debt. For government, it typically means shoring up the lost revenue due to unemployment by raising taxes and promising to cut spending by some significant amount. Usually those promised cuts never come to fruition. Political reelection hinges too much upon filling the pockets of voter blocs. When private enterprise tightens its belt, the state hardly bats an eye since its revenue is dependent on how much it decides to fleece from taxpayers in any given year.
Some levels of government aren’t so lucky however. Without ready access to a printing press or eager creditors, local municipalities in the U.S. are facing tough choices as the Great Recession drags on. Unable to cope with the rising cost of providing public services, many cities are taking drastic action. Three major cities in California have recenlty declared bankruptcy; including San Bernardino which is the second largest city to do so in recent history. The city council of Detroit, which is facing about $12 billion in pension and benefit obligations, has voted to allow a state advisory board to assist the former manufacturing powerhouse grapple with a fiscal future that is anything but promising. North Las Vegas, Nevada is facing the same kind of hurdle with a gaping $30 million budget deficit. According to Mayor Sharon Buck, “We’ve balanced our budget, we’ve paid all of our bills [and] all of our bonds are paid…Our biggest issue is salaries and compensation and benefits. And they’re very unsustainable.” Most recently, the mayor of Scranton, Pennsylvania cut the wages of city workers to the state’s minimum wage of $7.25 an hour. The unions which represent the city’s firefighters, police officers, and other public workers are taking the issue to court.
In carrying out such a drastic pay cut, Mayor Chris Doherty defied a previous court order. The unions’ attorney called the defiance “incredible.” The president of the International Association of Fire Fighters, Local 60, lamented that “there are kids working at ice cream stands earning more than their fathers, which is ridiculous.”
In actuality, there is nothing ridiculous about Mayor Doherty’s behavior. The city is out of money to pay its workers. After riding the taxpayer-funded gravy train, the trip has come to an abrupt end. The mayor can’t pay money he doesn’t have. In his words “I can’t print it in the basement.”
But to this writer, Doherty didn’t go far enough in cutting the pay of city workers. In a just world, public sector workers would be paid the rightful amount equal to their contribution to society: zero dollars an hour. If production is to entail mutual exchange and careful consideration toward profit and loss accounting, then government produces nothing without a negative effect on some individuals. The government worker is paid solely through whatever funds were forcefully taken from actual producers of wealth. The kid working in an ice cream stand whom the president of the firefighter’s union referred to is providing a valued service to society. His pay is based off of whatever marginal revenue he brings in. The firefighter paid by tax dollars is a functioning leech whose pay is totally separated from any measure of consumer satisfaction. Government workers have little, if any, incentive to serve the public in an efficient or convenient manner. In America, police have no legal obligation to assist you. And if you think the local fire company will be there at your beck and call, just ask Gene Cranick of Tennessee who watched his house burn down with fire crews standing by as he neglected to pay a $75 dollar fee beforehand. The selfless civil servants simply watched the spectacle of a man’s home being destroyed even as Cranick offered to pay the fee for service right then and there. Compare this to the private, for-profit firefighting that existed in many towns in 19th century America. As urban historian Mark Tebeau describes it in an interview with NPR’s Robert Siegel nearly two years ago:
SIEGEL: Now, I read this today – and you tell me if there’s any truth to it -that sometimes competitive fire brigades in their zeal to be the one to put out fire, maybe to get an award or be backed by an insurer, might actually have played a little defense against another competing fire company.
Prof. TEBEAU: Yeah. They would race to the fires. This reflected community tensions of the era, as well as a sort of manly pride in being first not only to get to the scene, but first to put the fire out.
No doubt Cranick, who found himself on the wrong end of government’s over-bureaucratization, would have jumped for joy at the prospect of multiple fire brigades rushing to save his home.
By virtue of its monopoly on coercion, the public sector exists wholeheartedly at the expense of society. Worse are the unions that piggyback off this extortion and kick taxpayers in the gut even harder just to take a few extra dollars out of their wallets. Unions remain empowered through their government-granted privilege of forcing employers to bargain with them; including the various levels of government. But this only scratches the surface to the despicable nature of both private sector and public sector unions. As libertarian economist Walter Block notes:
Yes, unions are disgusting and repulsive institutions, as the right side of the political spectrum properly emphasizes. They restrict entry into the labor market, and either beat up potential competitors who they characterize as “scabs” (where are the politically correct opponents of hate speech when we need them?), and/or get the government to do this evil deed for them, via legislation such as the Wagner Act which forbids employers from hiring replacement workers on a permanent basis.
What the city of Scranton has in common with San Bernardino, Detroit, et al. is that its dire fiscal condition is due to one thing and one thing only: benefits promised to unionized workers. For decades, public sector workers and their professionally dressed cohorts in plunder known as union representatives have operated under the fallacious assumption that government is the gift that never stops giving. But in today’s environment of economic stagnation, their dreams of living off of stolen fruits of labor are thankfully starting to represent reality. Whole countries in the European Union are beginning to crumble under the weight of their bloated government workforces and entitlement programs. American cities are currently facing up to the extravagant benefits promised to public workers. In a mater of years, Illinois and California will likely follow.
To quote Pat Buchanan,” The salad days of the government employee are coming to an end, as they have already in Greece, Italy and Spain.” To those sick and tired of the tax-eater mentality that is destroying the very core of society’s productive capacity and moral base, those days can’t come soon enough.
During an economic boom, exuberance finds itself lodged in all types of industries. When profits soar, so does the public’s disregard for prudence. And as tax revenues rise, politicians can’t help but give in to their bread and butter of buying votes. Periods of accelerated economic growth typically come in two different forms. If capital is drawn from a pool of real savings to finance investment in more efficient forms of production, the boost in wages and income will be sustainable as long as consumers remain willing to purchase whatever is being produced in greater amounts. In the case of a credit-expansion boom fueled primarily by fractional reserve banking and interest rate manipulation through a central bank, the boom conditions are destined toward bust. Liquidation then becomes necessary as the bust gets underway and malinvestments come to light.
For private industry it means slashing costs, laying off workers, and possible bankruptcy to discharge debt. For government, it typically means shoring up the lost revenue due to unemployment by raising taxes and promising to cut spending by some significant amount. Usually those promised cuts never come to fruition. Political reelection hinges too much upon filling the pockets of voter blocs. When private enterprise tightens its belt, the state hardly bats an eye since its revenue is dependent on how much it decides to fleece from taxpayers in any given year.
Some levels of government aren’t so lucky however. Without ready access to a printing press or eager creditors, local municipalities in the U.S. are facing tough choices as the Great Recession drags on. Unable to cope with the rising cost of providing public services, many cities are taking drastic action. Three major cities in California have recenlty declared bankruptcy; including San Bernardino which is the second largest city to do so in recent history. The city council of Detroit, which is facing about $12 billion in pension and benefit obligations, has voted to allow a state advisory board to assist the former manufacturing powerhouse grapple with a fiscal future that is anything but promising. North Las Vegas, Nevada is facing the same kind of hurdle with a gaping $30 million budget deficit. According to Mayor Sharon Buck, “We’ve balanced our budget, we’ve paid all of our bills [and] all of our bonds are paid…Our biggest issue is salaries and compensation and benefits. And they’re very unsustainable.” Most recently, the mayor of Scranton, Pennsylvania cut the wages of city workers to the state’s minimum wage of $7.25 an hour. The unions which represent the city’s firefighters, police officers, and other public workers are taking the issue to court.
In carrying out such a drastic pay cut, Mayor Chris Doherty defied a previous court order. The unions’ attorney called the defiance “incredible.” The president of the International Association of Fire Fighters, Local 60, lamented that “there are kids working at ice cream stands earning more than their fathers, which is ridiculous.”
In actuality, there is nothing ridiculous about Mayor Doherty’s behavior. The city is out of money to pay its workers. After riding the taxpayer-funded gravy train, the trip has come to an abrupt end. The mayor can’t pay money he doesn’t have. In his words “I can’t print it in the basement.”
But to this writer, Doherty didn’t go far enough in cutting the pay of city workers. In a just world, public sector workers would be paid the rightful amount equal to their contribution to society: zero dollars an hour. If production is to entail mutual exchange and careful consideration toward profit and loss accounting, then government produces nothing without a negative effect on some individuals. The government worker is paid solely through whatever funds were forcefully taken from actual producers of wealth. The kid working in an ice cream stand whom the president of the firefighter’s union referred to is providing a valued service to society. His pay is based off of whatever marginal revenue he brings in. The firefighter paid by tax dollars is a functioning leech whose pay is totally separated from any measure of consumer satisfaction. Government workers have little, if any, incentive to serve the public in an efficient or convenient manner. In America, police have no legal obligation to assist you. And if you think the local fire company will be there at your beck and call, just ask Gene Cranick of Tennessee who watched his house burn down with fire crews standing by as he neglected to pay a $75 dollar fee beforehand. The selfless civil servants simply watched the spectacle of a man’s home being destroyed even as Cranick offered to pay the fee for service right then and there. Compare this to the private, for-profit firefighting that existed in many towns in 19th century America. As urban historian Mark Tebeau describes it in an interview with NPR’s Robert Siegel nearly two years ago:
SIEGEL: Now, I read this today – and you tell me if there’s any truth to it -that sometimes competitive fire brigades in their zeal to be the one to put out fire, maybe to get an award or be backed by an insurer, might actually have played a little defense against another competing fire company.
Prof. TEBEAU: Yeah. They would race to the fires. This reflected community tensions of the era, as well as a sort of manly pride in being first not only to get to the scene, but first to put the fire out.
No doubt Cranick, who found himself on the wrong end of government’s over-bureaucratization, would have jumped for joy at the prospect of multiple fire brigades rushing to save his home.
By virtue of its monopoly on coercion, the public sector exists wholeheartedly at the expense of society. Worse are the unions that piggyback off this extortion and kick taxpayers in the gut even harder just to take a few extra dollars out of their wallets. Unions remain empowered through their government-granted privilege of forcing employers to bargain with them; including the various levels of government. But this only scratches the surface to the despicable nature of both private sector and public sector unions. As libertarian economist Walter Block notes:
Yes, unions are disgusting and repulsive institutions, as the right side of the political spectrum properly emphasizes. They restrict entry into the labor market, and either beat up potential competitors who they characterize as “scabs” (where are the politically correct opponents of hate speech when we need them?), and/or get the government to do this evil deed for them, via legislation such as the Wagner Act which forbids employers from hiring replacement workers on a permanent basis.
What the city of Scranton has in common with San Bernardino, Detroit, et al. is that its dire fiscal condition is due to one thing and one thing only: benefits promised to unionized workers. For decades, public sector workers and their professionally dressed cohorts in plunder known as union representatives have operated under the fallacious assumption that government is the gift that never stops giving. But in today’s environment of economic stagnation, their dreams of living off of stolen fruits of labor are thankfully starting to represent reality. Whole countries in the European Union are beginning to crumble under the weight of their bloated government workforces and entitlement programs. American cities are currently facing up to the extravagant benefits promised to public workers. In a mater of years, Illinois and California will likely follow.
To quote Pat Buchanan,” The salad days of the government employee are coming to an end, as they have already in Greece, Italy and Spain.” To those sick and tired of the tax-eater mentality that is destroying the very core of society’s productive capacity and moral base, those days can’t come soon enough.
Friday, July 27, 2012
Thursday, July 26, 2012
Prescription Pills Kills 6200% More Americans Than Homicidal Shootings
SOURCE
(NaturalNews) In the aftermath of the Aurora, Colorado Batman movie theater shooting, President Obama chimed in on the gun control debate yesterday, saying, "Every day, the number of young people we lose to violence is about the same as the number of people we lost in that movie theater. For every Columbine or Virginia Tech, there are dozens gunned down on the streets of Chicago or Atlanta..." (http://www.washingtontimes.com/news/2012/jul/25/obama-calls-measures-...)
What he didn't say, however, is that every day 290 people are killed by FDA-approved prescription drugs, and that's the conservative number published by the Journal of the American Medical Association.
As no one seems to believe these numbers are real, I'll quote the source: The Journal of the American Medical Association (JAMA) Vol 284, No 4, July 26th 2000, authored by Dr Barbara Starfield, MD, MPH, of the Johns Hopkins School of Hygiene and Public Health.
That study, which is twelve years old -- and drug deaths have risen considerably since then -- documents 106,000 deaths per year from the "adverse effects" of FDA-approved prescription medications.
To reach this number from outbreaks of violent shootings, you'd have to see an Aurora Colorado Batman movie massacre take place every HOUR of every day, 365 days a year.
(story continues at the top link)
(NaturalNews) In the aftermath of the Aurora, Colorado Batman movie theater shooting, President Obama chimed in on the gun control debate yesterday, saying, "Every day, the number of young people we lose to violence is about the same as the number of people we lost in that movie theater. For every Columbine or Virginia Tech, there are dozens gunned down on the streets of Chicago or Atlanta..." (http://www.washingtontimes.com/news/2012/jul/25/obama-calls-measures-...)
What he didn't say, however, is that every day 290 people are killed by FDA-approved prescription drugs, and that's the conservative number published by the Journal of the American Medical Association.
As no one seems to believe these numbers are real, I'll quote the source: The Journal of the American Medical Association (JAMA) Vol 284, No 4, July 26th 2000, authored by Dr Barbara Starfield, MD, MPH, of the Johns Hopkins School of Hygiene and Public Health.
That study, which is twelve years old -- and drug deaths have risen considerably since then -- documents 106,000 deaths per year from the "adverse effects" of FDA-approved prescription medications.
To reach this number from outbreaks of violent shootings, you'd have to see an Aurora Colorado Batman movie massacre take place every HOUR of every day, 365 days a year.
(story continues at the top link)
Wednesday, July 25, 2012
Saturday, July 21, 2012
5 Essential Privacy Tools For The Next Crypto War
This is an excerpt from a Forbes article. Some good food for thought, although some of the last names of the software developers may warrant a pause on whether or not to use that specific software.
SOURCE
1. Email Privacy – Naked email is like a postcard for anyone to read. Pretty Good Privacy (PGP), an open source software program created by Phil Zimmermann in 1991, is the global standard for point-to-point encrypted and authenticated email. Hushmail is an OpenPGP-compatible web-based email platform that does not have access to your user password for decryption. Both products, when used correctly, offer subpoena-proof email communication.
2. File Privacy – Your files might be stored in the encrypted cloud but that doesn’t mean that they’re 100% safe for your eyes only. Free and open-source TrueCrypt allows you to encrypt folders or entire drives locally prior to syncing with Dropbox. BoxCryptor also facilitates local file encryption prior to cloud uploading and it comes with added compatibility for Android and iOS.
There is an alternative to the dual-application process described above. Although most cloud-based storage services transfer over an encrypted session and store data in an encrypted form, the files are still accessible to the service provider which makes the data vulnerable to court-ordered subpoena. In order to rectify this, two different zero-knowledge data storage companies provide secure online data backup and syncing – SpiderOak and Wuala. For obvious reasons, there is no password recovery and employees have zero access to your data.
3. Voice Privacy – Wiretapping will become more prevalent in the days and months ahead. From the creator of PGP, Zfone is a new secure VoIP phone software product utilizing a protocol called ZRTP which lets you make encrypted phone calls over the Internet. The project’s trademark is “whisper in someone’s ear from a thousand miles away.” You can listen to Zimmermann present Zfone at DEFCON 15.
Also utilizing ZRTP, open-source Jitsi provides secure video calls, conferencing, chat, and desktop sharing. Because of security issues and lawful interception, Tor Project’s Jacob Appelbaum recommends using Jitsi instead of Skype.
Designed specifically for mobile devices and utilizing ZRTP, open-source RedPhone from Whisper Systems is an application that enables encrypted voice communication between RedPhone users on Android.
4. Chat Privacy – Encrypting your chat or instant messaging sessions is just as important as encrypting your email. Cryptocat establishes a secure, encrypted chat session that is not subject to commercial or government surveillance. Similar to Cryptocat, the older and more durable Off-the-record Messaging (OTR) cryptographic protocol generates new key pairs for every chat implementing a form of perfect forward secrecy and deniable encryption. It is available via Pidgin plugin.
5. Traffic Privacy – The final step in the process is geo-privacy, which refers to the protection of ‘information privacy’ with regard to geographic information. Virtual Private Networks, or VPNs, have been used consistently for anonymous web browsing and IP address masking. Just make sure that your VPN provider does not log IP addresses and that they accept a form of payment that does not link you to the transaction.
Additionally, the Tor Project provides free software and an open network for privacy-oriented Internet usage. Intended to protect users’ personal freedom, privacy, and ability to conduct confidential business, Tor (The onion router) is a system that improves online anonymity by routing Internet traffic through a worldwide volunteer network of layering and encrypting servers which impedes network surveillance or traffic analysis.
SOURCE
1. Email Privacy – Naked email is like a postcard for anyone to read. Pretty Good Privacy (PGP), an open source software program created by Phil Zimmermann in 1991, is the global standard for point-to-point encrypted and authenticated email. Hushmail is an OpenPGP-compatible web-based email platform that does not have access to your user password for decryption. Both products, when used correctly, offer subpoena-proof email communication.
2. File Privacy – Your files might be stored in the encrypted cloud but that doesn’t mean that they’re 100% safe for your eyes only. Free and open-source TrueCrypt allows you to encrypt folders or entire drives locally prior to syncing with Dropbox. BoxCryptor also facilitates local file encryption prior to cloud uploading and it comes with added compatibility for Android and iOS.
There is an alternative to the dual-application process described above. Although most cloud-based storage services transfer over an encrypted session and store data in an encrypted form, the files are still accessible to the service provider which makes the data vulnerable to court-ordered subpoena. In order to rectify this, two different zero-knowledge data storage companies provide secure online data backup and syncing – SpiderOak and Wuala. For obvious reasons, there is no password recovery and employees have zero access to your data.
3. Voice Privacy – Wiretapping will become more prevalent in the days and months ahead. From the creator of PGP, Zfone is a new secure VoIP phone software product utilizing a protocol called ZRTP which lets you make encrypted phone calls over the Internet. The project’s trademark is “whisper in someone’s ear from a thousand miles away.” You can listen to Zimmermann present Zfone at DEFCON 15.
Also utilizing ZRTP, open-source Jitsi provides secure video calls, conferencing, chat, and desktop sharing. Because of security issues and lawful interception, Tor Project’s Jacob Appelbaum recommends using Jitsi instead of Skype.
Designed specifically for mobile devices and utilizing ZRTP, open-source RedPhone from Whisper Systems is an application that enables encrypted voice communication between RedPhone users on Android.
4. Chat Privacy – Encrypting your chat or instant messaging sessions is just as important as encrypting your email. Cryptocat establishes a secure, encrypted chat session that is not subject to commercial or government surveillance. Similar to Cryptocat, the older and more durable Off-the-record Messaging (OTR) cryptographic protocol generates new key pairs for every chat implementing a form of perfect forward secrecy and deniable encryption. It is available via Pidgin plugin.
5. Traffic Privacy – The final step in the process is geo-privacy, which refers to the protection of ‘information privacy’ with regard to geographic information. Virtual Private Networks, or VPNs, have been used consistently for anonymous web browsing and IP address masking. Just make sure that your VPN provider does not log IP addresses and that they accept a form of payment that does not link you to the transaction.
Additionally, the Tor Project provides free software and an open network for privacy-oriented Internet usage. Intended to protect users’ personal freedom, privacy, and ability to conduct confidential business, Tor (The onion router) is a system that improves online anonymity by routing Internet traffic through a worldwide volunteer network of layering and encrypting servers which impedes network surveillance or traffic analysis.
Colorado Shooter Was Camp Counselor for Jewish Big Brothers and Sisters
Hmmm, jewish, in Colorado. Reminds me of THIS and THIS
SOURCE
James Holmes, the Colorado graduate student who is suspected of killing 12 moviegoers and wounding 58 others on Friday during the premiere of “The Dark Knight Rises,” worked as a camp counselor in Los Angeles County in 2008 that was run by Jewish Big Brothers and Sisters (JBBBS), the group’s CEO told NBC4 on Saturday.
James Holmes, 24, worked as cabin counselor at Camp Max Straus in the summer of 2008, according to Randy Schwab, the CEO of Jewish Big Brothers Big Sisters.
Schwab’s statement read: “It is with shock and sorrow that we learned of the incident in Aurora. Our hearts and prayers go out to all the families and friends of those involved in this horrible tragedy. On behalf of Camp Max Straus I want to offer our deepest sympathies and condolences.”
Schwab said that, as cabin counselor, Holmes was in charge of the care and guidance of about 10 children. His role was to ensure that the children had a “wonderful camp experience.”
According to Schwab, Holmes helped the children in his care “learn confidence, self esteem and how to work in small teams to effect positive outcomes.”
His statement continued: “These skills are learned through activities such as archery, horseback riding, swimming, art, sports and high ropes course.”
Camp Max Straus is a nonsectarian program for children ages 7-14, which is run by Jewish Big Brothers and Big Sisters of Los Angeles.
SOURCE
James Holmes, the Colorado graduate student who is suspected of killing 12 moviegoers and wounding 58 others on Friday during the premiere of “The Dark Knight Rises,” worked as a camp counselor in Los Angeles County in 2008 that was run by Jewish Big Brothers and Sisters (JBBBS), the group’s CEO told NBC4 on Saturday.
James Holmes, 24, worked as cabin counselor at Camp Max Straus in the summer of 2008, according to Randy Schwab, the CEO of Jewish Big Brothers Big Sisters.
Schwab’s statement read: “It is with shock and sorrow that we learned of the incident in Aurora. Our hearts and prayers go out to all the families and friends of those involved in this horrible tragedy. On behalf of Camp Max Straus I want to offer our deepest sympathies and condolences.”
Schwab said that, as cabin counselor, Holmes was in charge of the care and guidance of about 10 children. His role was to ensure that the children had a “wonderful camp experience.”
According to Schwab, Holmes helped the children in his care “learn confidence, self esteem and how to work in small teams to effect positive outcomes.”
His statement continued: “These skills are learned through activities such as archery, horseback riding, swimming, art, sports and high ropes course.”
Camp Max Straus is a nonsectarian program for children ages 7-14, which is run by Jewish Big Brothers and Big Sisters of Los Angeles.
Friday, July 20, 2012
Wednesday, July 11, 2012
Sunday, July 8, 2012
It Gets Better. Oh Really?
Through a RAMZPAUL video I learned of the jewish sodomite dan savage, who in this particular video was berating high school kids who didn't appreciate him bashing Christianity.
The Savage Sodomite started a website called "It Gets Better" this is from their website
"In September 2010, syndicated columnist and author Dan Savage created a YouTube video with his partner Terry Miller to inspire hope for young people facing harassment. In response to a number of students taking their own lives after being bullied in school, they wanted to create a personal way for supporters everywhere to tell LGBT youth that, yes, it does indeed get better."
So they claim that being a homosexual gets better the older you become. Does it? I don't see how, I'm well out of high school now and I have become no more accepting of these deviants than I was as a youth. I'm probably more prone now to yell slurs at them than ever before, and this holds true for other WASPs I know.
But I'm sure these mental defectives can handle a bit of harassment, but ultimately what do they have to look forward to? Of course the ultimate fate awaiting these queers is the Anally Inflicted Death Sentence. A disease (cure) which weakens your immune system to the point where you can't even fight off a common cold, unlike all the normal heterosexuals who live into old age.
So does it get better? No, it get's worse. You are still shunned by society even if in public people under penalty by the State must be kind to your face, they talk about your degeneracy behind your back. You live a life of disease and filth and ultimately through AIDS which destroys your body you end up dying of a disease which any normal person can fight off in a day.
So to sum up, yes it does get better, for us heterosexuals because over time you homos through your degenerate lifestyles put yourselves in early graves.
The Savage Sodomite started a website called "It Gets Better" this is from their website
"In September 2010, syndicated columnist and author Dan Savage created a YouTube video with his partner Terry Miller to inspire hope for young people facing harassment. In response to a number of students taking their own lives after being bullied in school, they wanted to create a personal way for supporters everywhere to tell LGBT youth that, yes, it does indeed get better."
So they claim that being a homosexual gets better the older you become. Does it? I don't see how, I'm well out of high school now and I have become no more accepting of these deviants than I was as a youth. I'm probably more prone now to yell slurs at them than ever before, and this holds true for other WASPs I know.
But I'm sure these mental defectives can handle a bit of harassment, but ultimately what do they have to look forward to? Of course the ultimate fate awaiting these queers is the Anally Inflicted Death Sentence. A disease (cure) which weakens your immune system to the point where you can't even fight off a common cold, unlike all the normal heterosexuals who live into old age.
So does it get better? No, it get's worse. You are still shunned by society even if in public people under penalty by the State must be kind to your face, they talk about your degeneracy behind your back. You live a life of disease and filth and ultimately through AIDS which destroys your body you end up dying of a disease which any normal person can fight off in a day.
So to sum up, yes it does get better, for us heterosexuals because over time you homos through your degenerate lifestyles put yourselves in early graves.
Netanyahu Worked Inside Nuclear Smuggling Ring
SOURCE
On June 27, 2012, the FBI partially declassified and released seven additional pages [.pdf] from a 1985–2002 investigation into how a network of front companies connected to the Israeli Ministry of Defense illegally smuggled nuclear triggers out of the U.S.* The newly released FBI files detail how Richard Kelly Smyth — who was convicted of running a U.S. front company — met with Benjamin Netanyahu in Israel during the smuggling operation. At that time, Netanyahu worked at the Israeli node of the smuggling network, Heli Trading Company. Netanyahu, who currently serves as Israel’s prime minister, recently issued a gag order that the smuggling network’s unindicted ringleader refrain from discussing “Project Pinto.”
As revealed in previously released FBI files and the tell-all book Confidential: The Life of Secret Agent Turned Hollywood Tycoon Arnon Milchan, the Hollywood producer was recruited into Israel’s economic espionage division (LAKAM) in his 20s and learned how to establish front companies and secret bank accounts for smuggling operations. Arnon Milchan encouraged Smyth, a California engineer, to incorporate MILCO in 1972 and serve as a front for the Israel-based Heli Trading’s (also known as Milchan Limited) acquisitions of sensitive military technologies on behalf of the Ministry of Defense. Smyth fled the U.S. after being indicted for violating the Arms Export Control Act in the mid-1980s. In July 2001, Smyth was arrested in Spain by Interpol and returned to the U.S., and in November, he was convicted of exporting 800 nuclear triggers (called krytrons).
FBI agents interviewed Smyth on April 16-17, 2002, at the U.S. attorney’s office in Los Angeles. The secret interview report details how during a trip to Israel Smyth was “spotted” by Milchan, who claimed he worked as an exclusive purchasing agent for the Ministry of Defense. Smyth was introduced around to high military officials including then-general Ariel Sharon. Smyth was also put in contact with Benjamin Netanyahu, who worked at Heli Trading Company. According to the FBI report, “Smyth and [Netanyahu] would meet in restaurants in Tel Aviv and in [Netanyahu's] home and/or business. It was not uncommon for [Netanyahu] to ask Smyth for unclassified material.”
Milchan pulled Smyth into his glamorous, star-studded movie circuit. “While in the United States [Smyth] met with [Milchan] numerous times in Los Angeles. … Milchan and Smyth would have dinner frequently and would visit one another’s house often … it was quite common for [Milchan] to invite [Smyth] to various Hollywood parties and introduce [Smyth] to celebrities.”
During the 2002 Smyth counterintelligence debriefing, the FBI learned that the Ministry of Defense ordered and paid Heli Trading for krytrons. Heli in turn sourced them from MILCO in a clandestine operation codenamed Project Pinto. The report reveals how MILCO illegally shipped prohibited articles under general Commerce Department export licenses rather than smuggling them out via Israeli diplomatic pouches. The last time Smyth saw Milchan was in 1985. The Ministry of Defense issued a burn notice on Smyth after discussions with U.S. officials about the krytron smuggling. According to the FBI report, “Shortly thereafter, [Smyth] fled the United States.”
A March 2012 statement by the co-authors of Confidential claims that “Hollywood mega-producer and former secret agent Arnon Milchan has been asked directly by Israeli Prime Minister Benjamin Netanyahu and President Shimon Peres to avoid any public discussion of the book Confidential, asserting that the matter is too sensitive at this time.” Although the book’s authors point to the escalating tensions over Iran’s nuclear program, Netanyahu’s own hands-on involvement in nuclear weapons–related covert action against America is presumably a far more compelling reason for the gag order.
* The FBI referred an additional 164 pages of the Mandatory Declassification Review to another government agency — presumably the CIA — for further review. The additional pages will likely never be released. The CIA has refused requests for similar documents in order to preserve intelligence sources and methods abroad.
On June 27, 2012, the FBI partially declassified and released seven additional pages [.pdf] from a 1985–2002 investigation into how a network of front companies connected to the Israeli Ministry of Defense illegally smuggled nuclear triggers out of the U.S.* The newly released FBI files detail how Richard Kelly Smyth — who was convicted of running a U.S. front company — met with Benjamin Netanyahu in Israel during the smuggling operation. At that time, Netanyahu worked at the Israeli node of the smuggling network, Heli Trading Company. Netanyahu, who currently serves as Israel’s prime minister, recently issued a gag order that the smuggling network’s unindicted ringleader refrain from discussing “Project Pinto.”
As revealed in previously released FBI files and the tell-all book Confidential: The Life of Secret Agent Turned Hollywood Tycoon Arnon Milchan, the Hollywood producer was recruited into Israel’s economic espionage division (LAKAM) in his 20s and learned how to establish front companies and secret bank accounts for smuggling operations. Arnon Milchan encouraged Smyth, a California engineer, to incorporate MILCO in 1972 and serve as a front for the Israel-based Heli Trading’s (also known as Milchan Limited) acquisitions of sensitive military technologies on behalf of the Ministry of Defense. Smyth fled the U.S. after being indicted for violating the Arms Export Control Act in the mid-1980s. In July 2001, Smyth was arrested in Spain by Interpol and returned to the U.S., and in November, he was convicted of exporting 800 nuclear triggers (called krytrons).
FBI agents interviewed Smyth on April 16-17, 2002, at the U.S. attorney’s office in Los Angeles. The secret interview report details how during a trip to Israel Smyth was “spotted” by Milchan, who claimed he worked as an exclusive purchasing agent for the Ministry of Defense. Smyth was introduced around to high military officials including then-general Ariel Sharon. Smyth was also put in contact with Benjamin Netanyahu, who worked at Heli Trading Company. According to the FBI report, “Smyth and [Netanyahu] would meet in restaurants in Tel Aviv and in [Netanyahu's] home and/or business. It was not uncommon for [Netanyahu] to ask Smyth for unclassified material.”
Milchan pulled Smyth into his glamorous, star-studded movie circuit. “While in the United States [Smyth] met with [Milchan] numerous times in Los Angeles. … Milchan and Smyth would have dinner frequently and would visit one another’s house often … it was quite common for [Milchan] to invite [Smyth] to various Hollywood parties and introduce [Smyth] to celebrities.”
During the 2002 Smyth counterintelligence debriefing, the FBI learned that the Ministry of Defense ordered and paid Heli Trading for krytrons. Heli in turn sourced them from MILCO in a clandestine operation codenamed Project Pinto. The report reveals how MILCO illegally shipped prohibited articles under general Commerce Department export licenses rather than smuggling them out via Israeli diplomatic pouches. The last time Smyth saw Milchan was in 1985. The Ministry of Defense issued a burn notice on Smyth after discussions with U.S. officials about the krytron smuggling. According to the FBI report, “Shortly thereafter, [Smyth] fled the United States.”
A March 2012 statement by the co-authors of Confidential claims that “Hollywood mega-producer and former secret agent Arnon Milchan has been asked directly by Israeli Prime Minister Benjamin Netanyahu and President Shimon Peres to avoid any public discussion of the book Confidential, asserting that the matter is too sensitive at this time.” Although the book’s authors point to the escalating tensions over Iran’s nuclear program, Netanyahu’s own hands-on involvement in nuclear weapons–related covert action against America is presumably a far more compelling reason for the gag order.
* The FBI referred an additional 164 pages of the Mandatory Declassification Review to another government agency — presumably the CIA — for further review. The additional pages will likely never be released. The CIA has refused requests for similar documents in order to preserve intelligence sources and methods abroad.
Quote Of The Week
"AIDS is not the disease, it's the cure. The disease is the mental and spiritual disorder known as homosexuality" - Nico
What Facebook Knows
SOURCE
If Facebook were a country, a conceit that founder Mark Zuckerberg has entertained in public, its 900 million members would make it the third largest in the world.
It would far outstrip any regime past or present in how intimately it records the lives of its citizens. Private conversations, family photos, and records of road trips, births, marriages, and deaths all stream into the company's servers and lodge there. Facebook has collected the most extensive data set ever assembled on human social behavior. Some of your personal information is probably part of it.
And yet, even as Facebook has embedded itself into modern life, it hasn't actually done that much with what it knows about us. Now that the company has gone public, the pressure to develop new sources of profit (see "The Facebook Fallacy") is likely to force it to do more with its hoard of information. That stash of data looms like an oversize shadow over what today is a modest online advertising business, worrying privacy-conscious Web users (see "Few Privacy Regulations Inhibit Facebook") and rivals such as Google. Everyone has a feeling that this unprecedented resource will yield something big, but nobody knows quite what.
Heading Facebook's effort to figure out what can be learned from all our data is Cameron Marlow, a tall 35-year-old who until recently sat a few feet away from Zuckerberg. The group Marlow runs has escaped the public attention that dogs Facebook's founders and the more headline-grabbing features of its business. Known internally as the Data Science Team, it is a kind of Bell Labs for the social-networking age. The group has 12 researchers—but is expected to double in size this year. They apply math, programming skills, and social science to mine our data for insights that they hope will advance Facebook's business and social science at large. Whereas other analysts at the company focus on information related to specific online activities, Marlow's team can swim in practically the entire ocean of personal data that Facebook maintains. Of all the people at Facebook, perhaps even including the company's leaders, these researchers have the best chance of discovering what can really be learned when so much personal information is compiled in one place.
Facebook has all this information because it has found ingenious ways to collect data as people socialize. Users fill out profiles with their age, gender, and e-mail address; some people also give additional details, such as their relationship status and mobile-phone number. A redesign last fall introduced profile pages in the form of time lines that invite people to add historical information such as places they have lived and worked. Messages and photos shared on the site are often tagged with a precise location, and in the last two years Facebook has begun to track activity elsewhere on the Internet, using an addictive invention called the "Like" button. It appears on apps and websites outside Facebook and allows people to indicate with a click that they are interested in a brand, product, or piece of digital content.
Since last fall, Facebook has also been able to collect data on users' online lives beyond its borders automatically: in certain apps or websites, when users listen to a song or read a news article, the information is passed along to Facebook, even if no one clicks "Like." Within the feature's first five months, Facebook catalogued more than five billion instances of people listening to songs online. Combine that kind of information with a map of the social connections Facebook's users make on the site, and you have an incredibly rich record of their lives and interactions.
"This is the first time the world has seen this scale and quality of data about human communication," Marlow says with a characteristically serious gaze before breaking into a smile at the thought of what he can do with the data. For one thing, Marlow is confident that exploring this resource will revolutionize the scientific understanding of why people behave as they do. His team can also help Facebook influence our social behavior for its own benefit and that of its advertisers. This work may even help Facebook invent entirely new ways to make money.
Contagious Information
Marlow eschews the collegiate programmer style of Zuckerberg and many others at Facebook, wearing a dress shirt with his jeans rather than a hoodie or T-shirt. Meeting me shortly before the company's initial public offering in May, in a conference room adorned with a six-foot caricature of his boss's dog spray-painted on its glass wall, he comes across more like a young professor than a student. He might have become one had he not realized early in his career that Web companies would yield the juiciest data about human interactions.
In 2001, undertaking a PhD at MIT's Media Lab, Marlow created a site called Blogdex that automatically listed the most "contagious" information spreading on weblogs. Although it was just a research project, it soon became so popular that Marlow's servers crashed. Launched just as blogs were exploding into the popular consciousness and becoming so numerous that Web users felt overwhelmed with information, it prefigured later aggregator sites such as Digg and Reddit. But Marlow didn't build it just to help Web users track what was popular online. Blogdex was intended as a scientific instrument to uncover the social networks forming on the Web and study how they spread ideas. Marlow went on to Yahoo's research labs to study online socializing for two years. In 2007 he joined Facebook, which he considers the world's most powerful instrument for studying human society. "For the first time," Marlow says, "we have a microscope that not only lets us examine social behavior at a very fine level that we've never been able to see before but allows us to run experiments that millions of users are exposed to."
Marlow's team works with managers across Facebook to find patterns that they might make use of. For instance, they study how a new feature spreads among the social network's users. They have helped Facebook identify users you may know but haven't "friended," and recognize those you may want to designate mere "acquaintances" in order to make their updates less prominent. Yet the group is an odd fit inside a company where software engineers are rock stars who live by the mantra "Move fast and break things." Lunch with the data team has the feel of a grad-student gathering at a top school; the typical member of the group joined fresh from a PhD or junior academic position and prefers to talk about advancing social science than about Facebook as a product or company. Several members of the team have training in sociology or social psychology, while others began in computer science and started using it to study human behavior. They are free to use some of their time, and Facebook's data, to probe the basic patterns and motivations of human behavior and to publish the results in academic journals—much as Bell Labs researchers advanced both AT&T's technologies and the study of fundamental physics.
It may seem strange that an eight-year-old company without a proven business model bothers to support a team with such an academic bent, but Marlow says it makes sense. "The biggest challenges Facebook has to solve are the same challenges that social science has," he says. Those challenges include understanding why some ideas or fashions spread from a few individuals to become universal and others don't, or to what extent a person's future actions are a product of past communication with friends. Publishing results and collaborating with university researchers will lead to findings that help Facebook improve its products, he adds.
For one example of how Facebook can serve as a proxy for examining society at large, consider a recent study of the notion that any person on the globe is just six degrees of separation from any other. The best-known real-world study, in 1967, involved a few hundred people trying to send postcards to a particular Boston stockholder. Facebook's version, conducted in collaboration with researchers from the University of Milan, involved the entire social network as of May 2011, which amounted to more than 10 percent of the world's population. Analyzing the 69 billion friend connections among those 721 million people showed that the world is smaller than we thought: four intermediary friends are usually enough to introduce anyone to a random stranger. "When considering another person in the world, a friend of your friend knows a friend of their friend, on average," the technical paper pithily concluded. That result may not extend to everyone on the planet, but there's good reason to believe that it and other findings from the Data Science Team are true to life outside Facebook. Last year the Pew Research Center's Internet & American Life Project found that 93 percent of Facebook friends had met in person. One of Marlow's researchers has developed a way to calculate a country's "gross national happiness" from its Facebook activity by logging the occurrence of words and phrases that signal positive or negative emotion. Gross national happiness fluctuates in a way that suggests the measure is accurate: it jumps during holidays and dips when popular public figures die. After a major earthquake in Chile in February 2010, the country's score plummeted and took many months to return to normal. That event seemed to make the country as a whole more sympathetic when Japan suffered its own big earthquake and subsequent tsunami in March 2011; while Chile's gross national happiness dipped, the figure didn't waver in any other countries tracked (Japan wasn't among them). Adam Kramer, who created the index, says he intended it to show that Facebook's data could provide cheap and accurate ways to track social trends—methods that could be useful to economists and other researchers.
Other work published by the group has more obvious utility for Facebook's basic strategy, which involves encouraging us to make the site central to our lives and then using what it learns to sell ads. An early study looked at what types of updates from friends encourage newcomers to the network to add their own contributions. Right before Valentine's Day this year a blog post from the Data Science Team listed the songs most popular with people who had recently signaled on Facebook that they had entered or left a relationship. It was a hint of the type of correlation that could help Facebook make useful predictions about users' behavior—knowledge that could help it make better guesses about which ads you might be more or less open to at any given time. Perhaps people who have just left a relationship might be interested in an album of ballads, or perhaps no company should associate its brand with the flood of emotion attending the death of a friend. The most valuable online ads today are those displayed alongside certain Web searches, because the searchers are expressing precisely what they want. This is one reason why Google's revenue is 10 times Facebook's. But Facebook might eventually be able to guess what people want or don't want even before they realize it.
Recently the Data Science Team has begun to use its unique position to experiment with the way Facebook works, tweaking the site—the way scientists might prod an ant's nest—to see how users react. Eytan Bakshy, who joined Facebook last year after collaborating with Marlow as a PhD student at the University of Michigan, wanted to learn whether our actions on Facebook are mainly influenced by those of our close friends, who are likely to have similar tastes. That would shed light on the theory that our Facebook friends create an "echo chamber" that amplifies news and opinions we have already heard about. So he messed with how Facebook operated for a quarter of a billion users. Over a seven-week period, the 76 million links that those users shared with each other were logged. Then, on 219 million randomly chosen occasions, Facebook prevented someone from seeing a link shared by a friend. Hiding links this way created a control group so that Bakshy could assess how often people end up promoting the same links because they have similar information sources and interests.
He found that our close friends strongly sway which information we share, but overall their impact is dwarfed by the collective influence of numerous more distant contacts—what sociologists call "weak ties." It is our diverse collection of weak ties that most powerfully determines what information we're exposed to.
That study provides strong evidence against the idea that social networking creates harmful "filter bubbles," to use activist Eli Pariser's term for the effects of tuning the information we receive to match our expectations. But the study also reveals the power Facebook has. "If [Facebook's] News Feed is the thing that everyone sees and it controls how information is disseminated, it's controlling how information is revealed to society, and it's something we need to pay very close attention to," Marlow says. He points out that his team helps Facebook understand what it is doing to society and publishes its findings to fulfill a public duty to transparency. Another recent study, which investigated which types of Facebook activity cause people to feel a greater sense of support from their friends, falls into the same category.
But Marlow speaks as an employee of a company that will prosper largely by catering to advertisers who want to control the flow of information between its users. And indeed, Bakshy is working with managers outside the Data Science Team to extract advertising-related findings from the results of experiments on social influence. "Advertisers and brands are a part of this network as well, so giving them some insight into how people are sharing the content they are producing is a very core part of the business model," says Marlow.
Facebook told prospective investors before its IPO that people are 50 percent more likely to remember ads on the site if they're visibly endorsed by a friend. Figuring out how influence works could make ads even more memorable or help Facebook find ways to induce more people to share or click on its ads.
Social Engineering
Marlow says his team wants to divine the rules of online social life to understand what's going on inside Facebook, not to develop ways to manipulate it. "Our goal is not to change the pattern of communication in society," he says. "Our goal is to understand it so we can adapt our platform to give people the experience that they want." But some of his team's work and the attitudes of Facebook's leaders show that the company is not above using its platform to tweak users' behavior. Unlike academic social scientists, Facebook's employees have a short path from an idea to an experiment on hundreds of millions of people.
In April, influenced in part by conversations over dinner with his med-student girlfriend (now his wife), Zuckerberg decided that he should use social influence within Facebook to increase organ donor registrations. Users were given an opportunity to click a box on their Timeline pages to signal that they were registered donors, which triggered a notification to their friends. The new feature started a cascade of social pressure, and organ donor enrollment increased by a factor of 23 across 44 states.
Marlow's team is in the process of publishing results from the last U.S. midterm election that show another striking example of Facebook's potential to direct its users' influence on one another. Since 2008, the company has offered a way for users to signal that they have voted; Facebook promotes that to their friends with a note to say that they should be sure to vote, too. Marlow says that in the 2010 election his group matched voter registration logs with the data to see which of the Facebook users who got nudges actually went to the polls. (He stresses that the researchers worked with cryptographically "anonymized" data and could not match specific users with their voting records.)
This is just the beginning. By learning more about how small changes on Facebook can alter users' behavior outside the site, the company eventually "could allow others to make use of Facebook in the same way," says Marlow. If the American Heart Association wanted to encourage healthy eating, for example, it might be able to refer to a playbook of Facebook social engineering. "We want to be a platform that others can use to initiate change," he says.
Advertisers, too, would be eager to know in greater detail what could make a campaign on Facebook affect people's actions in the outside world, even though they realize there are limits to how firmly human beings can be steered. "It's not clear to me that social science will ever be an engineering science in a way that building bridges is," says Duncan Watts, who works on computational social science at Microsoft's recently opened New York research lab and previously worked alongside Marlow at Yahoo's labs. "Nevertheless, if you have enough data, you can make predictions that are better than simply random guessing, and that's really lucrative."
Doubling Data
Like other social-Web companies, such as Twitter, Facebook has never attained the reputation for technical innovation enjoyed by such Internet pioneers as Google. If Silicon Valley were a high school, the search company would be the quiet math genius who didn't excel socially but invented something indispensable. Facebook would be the annoying kid who started a club with such social momentum that people had to join whether they wanted to or not. In reality, Facebook employs hordes of talented software engineers (many poached from Google and other math-genius companies) to build and maintain its irresistible club. The technology built to support the Data Science Team's efforts is particularly innovative. The scale at which Facebook operates has led it to invent hardware and software that are the envy of other companies trying to adapt to the world of "big data."
In a kind of passing of the technological baton, Facebook built its data storage system by expanding the power of open-source software called Hadoop, which was inspired by work at Google and built at Yahoo. Hadoop can tame seemingly impossible computational tasks—like working on all the data Facebook's users have entrusted to it—by spreading them across many machines inside a data center. But Hadoop wasn't built with data science in mind, and using it for that purpose requires specialized, unwieldy programming. Facebook's engineers solved that problem with the invention of Hive, open-source software that's now independent of Facebook and used by many other companies. Hive acts as a translation service, making it possible to query vast Hadoop data stores using relatively simple code. To cut down on computational demands, it can request random samples of an entire data set, a feature that's invaluable for companies swamped by data.
Much of Facebook's data resides in one Hadoop store more than 100 petabytes (a million gigabytes) in size, says Sameet Agarwal, a director of engineering at Facebook who works on data infrastructure, and the quantity is growing exponentially. "Over the last few years we have more than doubled in size every year," he says. That means his team must constantly build more efficient systems.
All this has given Facebook a unique level of expertise, says Jeff Hammerbacher, Marlow's predecessor at Facebook, who initiated the company's effort to develop its own data storage and analysis technology. (He left Facebook in 2008 to found Cloudera, which develops Hadoop-based systems to manage large collections of data.) Most large businesses have paid established software companies such as Oracle a lot of money for data analysis and storage. But now, big companies are trying to understand how Facebook handles its enormous information trove on open-source systems, says Hammerbacher. "I recently spent the day at Fidelity helping them understand how the 'data scientist' role at Facebook was conceived ... and I've had the same discussion at countless other firms," he says.
As executives in every industry try to exploit the opportunities in "big data," the intense interest in Facebook's data technology suggests that its ad business may be just an offshoot of something much more valuable. The tools and techniques the company has developed to handle large volumes of information could become a product in their own right.
Mining for Gold
Facebook needs new sources of income to meet investors' expectations. Even after its disappointing IPO, it has a staggeringly high price-to-earnings ratio that can't be justified by the barrage of cheap ads the site now displays. Facebook's new campus in Menlo Park, California, previously inhabited by Sun Microsystems, makes that pressure tangible. The company's 3,500 employees rattle around in enough space for 6,600. I walked past expanses of empty desks in one building; another, next door, was completely uninhabited. A vacant lot waited nearby, presumably until someone invents a use of our data that will justify the expense of developing the space.
One potential use would be simply to sell insights mined from the information. DJ Patil, data scientist in residence with the venture capital firm Greylock Partners and previously leader of LinkedIn's data science team, believes Facebook could take inspiration from Gil Elbaz, the inventor of Google's AdSense ad business, which provides over a quarter of Google's revenue. He has moved on from advertising and now runs a fast-growing startup, Factual, that charges businesses to access large, carefully curated collections of data ranging from restaurant locations to celebrity body-mass indexes, which the company collects from free public sources and by buying private data sets. Factual cleans up data and makes the result available over the Internet as an on-demand knowledge store to be tapped by software, not humans. Customers use it to fill in the gaps in their own data and make smarter apps or services; for example, Facebook itself uses Factual for information about business locations. Patil points out that Facebook could become a data source in its own right, selling access to information compiled from the actions of its users. Such information, he says, could be the basis for almost any kind of business, such as online dating or charts of popular music. Assuming Facebook can take this step without upsetting users and regulators, it could be lucrative. An online store wishing to target its promotions, for example, could pay to use Facebook as a source of knowledge about which brands are most popular in which places, or how the popularity of certain products changes through the year.
Hammerbacher agrees that Facebook could sell its data science and points to its currently free Insights service for advertisers and website owners, which shows how their content is being shared on Facebook. That could become much more useful to businesses if Facebook added data obtained when its "Like" button tracks activity all over the Web, or demographic data or information about what people read on the site. There's precedent for offering such analytics for a fee: at the end of 2011 Google started charging $150,000 annually for a premium version of a service that analyzes a business's Web traffic.
Back at Facebook, Marlow isn't the one who makes decisions about what the company charges for, even if his work will shape them. Whatever happens, he says, the primary goal of his team is to support the well-being of the people who provide Facebook with their data, using it to make the service smarter. Along the way, he says, he and his colleagues will advance humanity's understanding of itself. That echoes Zuckerberg's often doubted but seemingly genuine belief that Facebook's job is to improve how the world communicates. Just don't ask yet exactly what that will entail. "It's hard to predict where we'll go, because we're at the very early stages of this science," says Marlow. "The number of potential things that we could ask of Facebook's data is enormous."
If Facebook were a country, a conceit that founder Mark Zuckerberg has entertained in public, its 900 million members would make it the third largest in the world.
It would far outstrip any regime past or present in how intimately it records the lives of its citizens. Private conversations, family photos, and records of road trips, births, marriages, and deaths all stream into the company's servers and lodge there. Facebook has collected the most extensive data set ever assembled on human social behavior. Some of your personal information is probably part of it.
And yet, even as Facebook has embedded itself into modern life, it hasn't actually done that much with what it knows about us. Now that the company has gone public, the pressure to develop new sources of profit (see "The Facebook Fallacy") is likely to force it to do more with its hoard of information. That stash of data looms like an oversize shadow over what today is a modest online advertising business, worrying privacy-conscious Web users (see "Few Privacy Regulations Inhibit Facebook") and rivals such as Google. Everyone has a feeling that this unprecedented resource will yield something big, but nobody knows quite what.
Heading Facebook's effort to figure out what can be learned from all our data is Cameron Marlow, a tall 35-year-old who until recently sat a few feet away from Zuckerberg. The group Marlow runs has escaped the public attention that dogs Facebook's founders and the more headline-grabbing features of its business. Known internally as the Data Science Team, it is a kind of Bell Labs for the social-networking age. The group has 12 researchers—but is expected to double in size this year. They apply math, programming skills, and social science to mine our data for insights that they hope will advance Facebook's business and social science at large. Whereas other analysts at the company focus on information related to specific online activities, Marlow's team can swim in practically the entire ocean of personal data that Facebook maintains. Of all the people at Facebook, perhaps even including the company's leaders, these researchers have the best chance of discovering what can really be learned when so much personal information is compiled in one place.
Facebook has all this information because it has found ingenious ways to collect data as people socialize. Users fill out profiles with their age, gender, and e-mail address; some people also give additional details, such as their relationship status and mobile-phone number. A redesign last fall introduced profile pages in the form of time lines that invite people to add historical information such as places they have lived and worked. Messages and photos shared on the site are often tagged with a precise location, and in the last two years Facebook has begun to track activity elsewhere on the Internet, using an addictive invention called the "Like" button. It appears on apps and websites outside Facebook and allows people to indicate with a click that they are interested in a brand, product, or piece of digital content.
Since last fall, Facebook has also been able to collect data on users' online lives beyond its borders automatically: in certain apps or websites, when users listen to a song or read a news article, the information is passed along to Facebook, even if no one clicks "Like." Within the feature's first five months, Facebook catalogued more than five billion instances of people listening to songs online. Combine that kind of information with a map of the social connections Facebook's users make on the site, and you have an incredibly rich record of their lives and interactions.
"This is the first time the world has seen this scale and quality of data about human communication," Marlow says with a characteristically serious gaze before breaking into a smile at the thought of what he can do with the data. For one thing, Marlow is confident that exploring this resource will revolutionize the scientific understanding of why people behave as they do. His team can also help Facebook influence our social behavior for its own benefit and that of its advertisers. This work may even help Facebook invent entirely new ways to make money.
Contagious Information
Marlow eschews the collegiate programmer style of Zuckerberg and many others at Facebook, wearing a dress shirt with his jeans rather than a hoodie or T-shirt. Meeting me shortly before the company's initial public offering in May, in a conference room adorned with a six-foot caricature of his boss's dog spray-painted on its glass wall, he comes across more like a young professor than a student. He might have become one had he not realized early in his career that Web companies would yield the juiciest data about human interactions.
In 2001, undertaking a PhD at MIT's Media Lab, Marlow created a site called Blogdex that automatically listed the most "contagious" information spreading on weblogs. Although it was just a research project, it soon became so popular that Marlow's servers crashed. Launched just as blogs were exploding into the popular consciousness and becoming so numerous that Web users felt overwhelmed with information, it prefigured later aggregator sites such as Digg and Reddit. But Marlow didn't build it just to help Web users track what was popular online. Blogdex was intended as a scientific instrument to uncover the social networks forming on the Web and study how they spread ideas. Marlow went on to Yahoo's research labs to study online socializing for two years. In 2007 he joined Facebook, which he considers the world's most powerful instrument for studying human society. "For the first time," Marlow says, "we have a microscope that not only lets us examine social behavior at a very fine level that we've never been able to see before but allows us to run experiments that millions of users are exposed to."
Marlow's team works with managers across Facebook to find patterns that they might make use of. For instance, they study how a new feature spreads among the social network's users. They have helped Facebook identify users you may know but haven't "friended," and recognize those you may want to designate mere "acquaintances" in order to make their updates less prominent. Yet the group is an odd fit inside a company where software engineers are rock stars who live by the mantra "Move fast and break things." Lunch with the data team has the feel of a grad-student gathering at a top school; the typical member of the group joined fresh from a PhD or junior academic position and prefers to talk about advancing social science than about Facebook as a product or company. Several members of the team have training in sociology or social psychology, while others began in computer science and started using it to study human behavior. They are free to use some of their time, and Facebook's data, to probe the basic patterns and motivations of human behavior and to publish the results in academic journals—much as Bell Labs researchers advanced both AT&T's technologies and the study of fundamental physics.
It may seem strange that an eight-year-old company without a proven business model bothers to support a team with such an academic bent, but Marlow says it makes sense. "The biggest challenges Facebook has to solve are the same challenges that social science has," he says. Those challenges include understanding why some ideas or fashions spread from a few individuals to become universal and others don't, or to what extent a person's future actions are a product of past communication with friends. Publishing results and collaborating with university researchers will lead to findings that help Facebook improve its products, he adds.
For one example of how Facebook can serve as a proxy for examining society at large, consider a recent study of the notion that any person on the globe is just six degrees of separation from any other. The best-known real-world study, in 1967, involved a few hundred people trying to send postcards to a particular Boston stockholder. Facebook's version, conducted in collaboration with researchers from the University of Milan, involved the entire social network as of May 2011, which amounted to more than 10 percent of the world's population. Analyzing the 69 billion friend connections among those 721 million people showed that the world is smaller than we thought: four intermediary friends are usually enough to introduce anyone to a random stranger. "When considering another person in the world, a friend of your friend knows a friend of their friend, on average," the technical paper pithily concluded. That result may not extend to everyone on the planet, but there's good reason to believe that it and other findings from the Data Science Team are true to life outside Facebook. Last year the Pew Research Center's Internet & American Life Project found that 93 percent of Facebook friends had met in person. One of Marlow's researchers has developed a way to calculate a country's "gross national happiness" from its Facebook activity by logging the occurrence of words and phrases that signal positive or negative emotion. Gross national happiness fluctuates in a way that suggests the measure is accurate: it jumps during holidays and dips when popular public figures die. After a major earthquake in Chile in February 2010, the country's score plummeted and took many months to return to normal. That event seemed to make the country as a whole more sympathetic when Japan suffered its own big earthquake and subsequent tsunami in March 2011; while Chile's gross national happiness dipped, the figure didn't waver in any other countries tracked (Japan wasn't among them). Adam Kramer, who created the index, says he intended it to show that Facebook's data could provide cheap and accurate ways to track social trends—methods that could be useful to economists and other researchers.
Other work published by the group has more obvious utility for Facebook's basic strategy, which involves encouraging us to make the site central to our lives and then using what it learns to sell ads. An early study looked at what types of updates from friends encourage newcomers to the network to add their own contributions. Right before Valentine's Day this year a blog post from the Data Science Team listed the songs most popular with people who had recently signaled on Facebook that they had entered or left a relationship. It was a hint of the type of correlation that could help Facebook make useful predictions about users' behavior—knowledge that could help it make better guesses about which ads you might be more or less open to at any given time. Perhaps people who have just left a relationship might be interested in an album of ballads, or perhaps no company should associate its brand with the flood of emotion attending the death of a friend. The most valuable online ads today are those displayed alongside certain Web searches, because the searchers are expressing precisely what they want. This is one reason why Google's revenue is 10 times Facebook's. But Facebook might eventually be able to guess what people want or don't want even before they realize it.
Recently the Data Science Team has begun to use its unique position to experiment with the way Facebook works, tweaking the site—the way scientists might prod an ant's nest—to see how users react. Eytan Bakshy, who joined Facebook last year after collaborating with Marlow as a PhD student at the University of Michigan, wanted to learn whether our actions on Facebook are mainly influenced by those of our close friends, who are likely to have similar tastes. That would shed light on the theory that our Facebook friends create an "echo chamber" that amplifies news and opinions we have already heard about. So he messed with how Facebook operated for a quarter of a billion users. Over a seven-week period, the 76 million links that those users shared with each other were logged. Then, on 219 million randomly chosen occasions, Facebook prevented someone from seeing a link shared by a friend. Hiding links this way created a control group so that Bakshy could assess how often people end up promoting the same links because they have similar information sources and interests.
He found that our close friends strongly sway which information we share, but overall their impact is dwarfed by the collective influence of numerous more distant contacts—what sociologists call "weak ties." It is our diverse collection of weak ties that most powerfully determines what information we're exposed to.
That study provides strong evidence against the idea that social networking creates harmful "filter bubbles," to use activist Eli Pariser's term for the effects of tuning the information we receive to match our expectations. But the study also reveals the power Facebook has. "If [Facebook's] News Feed is the thing that everyone sees and it controls how information is disseminated, it's controlling how information is revealed to society, and it's something we need to pay very close attention to," Marlow says. He points out that his team helps Facebook understand what it is doing to society and publishes its findings to fulfill a public duty to transparency. Another recent study, which investigated which types of Facebook activity cause people to feel a greater sense of support from their friends, falls into the same category.
But Marlow speaks as an employee of a company that will prosper largely by catering to advertisers who want to control the flow of information between its users. And indeed, Bakshy is working with managers outside the Data Science Team to extract advertising-related findings from the results of experiments on social influence. "Advertisers and brands are a part of this network as well, so giving them some insight into how people are sharing the content they are producing is a very core part of the business model," says Marlow.
Facebook told prospective investors before its IPO that people are 50 percent more likely to remember ads on the site if they're visibly endorsed by a friend. Figuring out how influence works could make ads even more memorable or help Facebook find ways to induce more people to share or click on its ads.
Social Engineering
Marlow says his team wants to divine the rules of online social life to understand what's going on inside Facebook, not to develop ways to manipulate it. "Our goal is not to change the pattern of communication in society," he says. "Our goal is to understand it so we can adapt our platform to give people the experience that they want." But some of his team's work and the attitudes of Facebook's leaders show that the company is not above using its platform to tweak users' behavior. Unlike academic social scientists, Facebook's employees have a short path from an idea to an experiment on hundreds of millions of people.
In April, influenced in part by conversations over dinner with his med-student girlfriend (now his wife), Zuckerberg decided that he should use social influence within Facebook to increase organ donor registrations. Users were given an opportunity to click a box on their Timeline pages to signal that they were registered donors, which triggered a notification to their friends. The new feature started a cascade of social pressure, and organ donor enrollment increased by a factor of 23 across 44 states.
Marlow's team is in the process of publishing results from the last U.S. midterm election that show another striking example of Facebook's potential to direct its users' influence on one another. Since 2008, the company has offered a way for users to signal that they have voted; Facebook promotes that to their friends with a note to say that they should be sure to vote, too. Marlow says that in the 2010 election his group matched voter registration logs with the data to see which of the Facebook users who got nudges actually went to the polls. (He stresses that the researchers worked with cryptographically "anonymized" data and could not match specific users with their voting records.)
This is just the beginning. By learning more about how small changes on Facebook can alter users' behavior outside the site, the company eventually "could allow others to make use of Facebook in the same way," says Marlow. If the American Heart Association wanted to encourage healthy eating, for example, it might be able to refer to a playbook of Facebook social engineering. "We want to be a platform that others can use to initiate change," he says.
Advertisers, too, would be eager to know in greater detail what could make a campaign on Facebook affect people's actions in the outside world, even though they realize there are limits to how firmly human beings can be steered. "It's not clear to me that social science will ever be an engineering science in a way that building bridges is," says Duncan Watts, who works on computational social science at Microsoft's recently opened New York research lab and previously worked alongside Marlow at Yahoo's labs. "Nevertheless, if you have enough data, you can make predictions that are better than simply random guessing, and that's really lucrative."
Doubling Data
Like other social-Web companies, such as Twitter, Facebook has never attained the reputation for technical innovation enjoyed by such Internet pioneers as Google. If Silicon Valley were a high school, the search company would be the quiet math genius who didn't excel socially but invented something indispensable. Facebook would be the annoying kid who started a club with such social momentum that people had to join whether they wanted to or not. In reality, Facebook employs hordes of talented software engineers (many poached from Google and other math-genius companies) to build and maintain its irresistible club. The technology built to support the Data Science Team's efforts is particularly innovative. The scale at which Facebook operates has led it to invent hardware and software that are the envy of other companies trying to adapt to the world of "big data."
In a kind of passing of the technological baton, Facebook built its data storage system by expanding the power of open-source software called Hadoop, which was inspired by work at Google and built at Yahoo. Hadoop can tame seemingly impossible computational tasks—like working on all the data Facebook's users have entrusted to it—by spreading them across many machines inside a data center. But Hadoop wasn't built with data science in mind, and using it for that purpose requires specialized, unwieldy programming. Facebook's engineers solved that problem with the invention of Hive, open-source software that's now independent of Facebook and used by many other companies. Hive acts as a translation service, making it possible to query vast Hadoop data stores using relatively simple code. To cut down on computational demands, it can request random samples of an entire data set, a feature that's invaluable for companies swamped by data.
Much of Facebook's data resides in one Hadoop store more than 100 petabytes (a million gigabytes) in size, says Sameet Agarwal, a director of engineering at Facebook who works on data infrastructure, and the quantity is growing exponentially. "Over the last few years we have more than doubled in size every year," he says. That means his team must constantly build more efficient systems.
All this has given Facebook a unique level of expertise, says Jeff Hammerbacher, Marlow's predecessor at Facebook, who initiated the company's effort to develop its own data storage and analysis technology. (He left Facebook in 2008 to found Cloudera, which develops Hadoop-based systems to manage large collections of data.) Most large businesses have paid established software companies such as Oracle a lot of money for data analysis and storage. But now, big companies are trying to understand how Facebook handles its enormous information trove on open-source systems, says Hammerbacher. "I recently spent the day at Fidelity helping them understand how the 'data scientist' role at Facebook was conceived ... and I've had the same discussion at countless other firms," he says.
As executives in every industry try to exploit the opportunities in "big data," the intense interest in Facebook's data technology suggests that its ad business may be just an offshoot of something much more valuable. The tools and techniques the company has developed to handle large volumes of information could become a product in their own right.
Mining for Gold
Facebook needs new sources of income to meet investors' expectations. Even after its disappointing IPO, it has a staggeringly high price-to-earnings ratio that can't be justified by the barrage of cheap ads the site now displays. Facebook's new campus in Menlo Park, California, previously inhabited by Sun Microsystems, makes that pressure tangible. The company's 3,500 employees rattle around in enough space for 6,600. I walked past expanses of empty desks in one building; another, next door, was completely uninhabited. A vacant lot waited nearby, presumably until someone invents a use of our data that will justify the expense of developing the space.
One potential use would be simply to sell insights mined from the information. DJ Patil, data scientist in residence with the venture capital firm Greylock Partners and previously leader of LinkedIn's data science team, believes Facebook could take inspiration from Gil Elbaz, the inventor of Google's AdSense ad business, which provides over a quarter of Google's revenue. He has moved on from advertising and now runs a fast-growing startup, Factual, that charges businesses to access large, carefully curated collections of data ranging from restaurant locations to celebrity body-mass indexes, which the company collects from free public sources and by buying private data sets. Factual cleans up data and makes the result available over the Internet as an on-demand knowledge store to be tapped by software, not humans. Customers use it to fill in the gaps in their own data and make smarter apps or services; for example, Facebook itself uses Factual for information about business locations. Patil points out that Facebook could become a data source in its own right, selling access to information compiled from the actions of its users. Such information, he says, could be the basis for almost any kind of business, such as online dating or charts of popular music. Assuming Facebook can take this step without upsetting users and regulators, it could be lucrative. An online store wishing to target its promotions, for example, could pay to use Facebook as a source of knowledge about which brands are most popular in which places, or how the popularity of certain products changes through the year.
Hammerbacher agrees that Facebook could sell its data science and points to its currently free Insights service for advertisers and website owners, which shows how their content is being shared on Facebook. That could become much more useful to businesses if Facebook added data obtained when its "Like" button tracks activity all over the Web, or demographic data or information about what people read on the site. There's precedent for offering such analytics for a fee: at the end of 2011 Google started charging $150,000 annually for a premium version of a service that analyzes a business's Web traffic.
Back at Facebook, Marlow isn't the one who makes decisions about what the company charges for, even if his work will shape them. Whatever happens, he says, the primary goal of his team is to support the well-being of the people who provide Facebook with their data, using it to make the service smarter. Along the way, he says, he and his colleagues will advance humanity's understanding of itself. That echoes Zuckerberg's often doubted but seemingly genuine belief that Facebook's job is to improve how the world communicates. Just don't ask yet exactly what that will entail. "It's hard to predict where we'll go, because we're at the very early stages of this science," says Marlow. "The number of potential things that we could ask of Facebook's data is enormous."
Subscribe to:
Posts (Atom)