Friday, February 16, 2018
FBI Was Too Busy Policing Politics To "Protect and Serve" Citizens...,
By CNu at February 16, 2018 0 comments
Labels: accountability , Deeze Heaux... , just-us , not a good look , Rule of Law , The Hardline , you used to be the man
Tuesday, January 23, 2018
Black Nixon Meme Older Than Mose's Toes...,
By CNu at January 23, 2018 0 comments
Saturday, January 13, 2018
Fifty Shades of Gov. Smackahoe Greitens...,
By CNu at January 13, 2018 0 comments
Labels: #YouToo? , Ass Clownery , Deeze Heaux... , shameless , you used to be the man
Wednesday, November 29, 2017
20 Years In Your Face Daily, And It All Comes Down To This!
By CNu at November 29, 2017 0 comments
Labels: #YouToo? , Ass Clownery , unintended consequences , you used to be the man
Tuesday, November 14, 2017
CIA False-Flagging and Impersonating Kaspersky
By CNu at November 14, 2017 0 comments
Labels: count zero , Deep State , disinformation , predatory militarism , tricknology , you used to be the man
Saturday, November 11, 2017
Is MBS Tryna Drain the Broke Bush-Bandar-CIA Swamp?
Tuesday, November 07, 2017
"Acting White" for White People...,
By CNu at November 07, 2017 0 comments
Labels: American Original , fixyt , identity politics , normotic illness , propaganda , you used to be the man
Sunday, November 05, 2017
White Anger or White Stupor (Don't Forget the 2-Piece/Biscuit Opioid Crisis)
By CNu at November 05, 2017 0 comments
Labels: American Original , fixyt , Living Memory , you used to be the man
Wednesday, October 11, 2017
Trump Trains Elite Monkey Brains How to Perform and Mainstream Dominance
By CNu at October 11, 2017 0 comments
Labels: .45 , as above-so below , global system of 1% supremacy , Naked Emperor , wikileaks wednesday , you used to be the man
Tuesday, October 10, 2017
U.S. Justice System Ignores Elite Criminality
By CNu at October 10, 2017 0 comments
Labels: as above-so below , civil war , deceiver , elite , ethics , you used to be the man
Harvey Weinstein: Give Me A Second Chance To Get It Up Again Together...,
By CNu at October 10, 2017 0 comments
Labels: Degenerate , doesn't end well , FAIL , not a good look , Toxic Culture? , you used to be the man
Black Identity Extremist Stripper Blows Up Miami Dolphins Offensive Line...,
By CNu at October 10, 2017 0 comments
Labels: A Kneegrow Said It , addiction , bad apples , comedy gold , Degenerate , doesn't end well , domestic terrorism , not a good look , you used to be the man
Wednesday, September 13, 2017
Can The Anglo-Zionist Empire Continue to Enforce Its "Truth"?
By CNu at September 13, 2017 0 comments
Labels: hegemony , information anarchy , Noo/Nano/Geno/Thermo , wikileaks wednesday , you used to be the man
Wednesday, August 30, 2017
The Weaponization of Information
Most important from the U.S. perspective, Russian IO techniques, tactics and procedures are developing constantly and rapidly, as continually measuring effectiveness and rapidly evolving techniques are very cheap compared to the costs of any kinetic weapon system—and they could potentially be a lot more effective.
At this point, Russian IO operators use relatively unsophisticated techniques systematically and on a large scale. This relative lack of sophistication leaves them open to detection. For example, existing technology can identify paid troll operations, bots, etc. Another key element of Russian IO strategy is to target audiences with multiple, conflicting narratives to sow seeds of distrust of and doubt about the European Union (EU) as well as national governments. These can also be detected. The current apparent lack of technical sophistication of Russian IO techniques could derive from the fact that, so far, Russian IO has met with minimal resistance. However, if and when target forces start to counter these efforts and/or expose them on a large scale, the Russians are likely to accelerate the improvement of their techniques, leading to a cycle of counter-responses. In other words, an information warfare arms race is likely to ensue.
A Strategy to Counter the Russian Threat
Because the culture and history of each country is unique and because the success of any IO defense strategy must be tailored to local institutions and populations, the most effective strategies are likely to be those that are developed and managed on a country-by-country basis. An information defense strategy framework for countering Russian IO offensives should be “whole-of-nation” in character. A whole-of-nation approach is a coordinated effort between national government organizations, military, intelligence community, industry, media, research organizations, academia and citizen organized groups. A discreet US Special Operations Force could provide individual country support as well as cross country coordination.
Just as in the physical world, good maps are critical to any IO strategy. In the case of IO, maps show information flows. Information maps must show connectivity in the information environment and help navigate that environment. They exist as computer software and databases. Information cartography for IO is the art of creating, maintaining, and using such maps. An important feature of information maps is that they are constantly changing to reflect the dynamic nature of the information environment. Because they are artificially intelligent computer programs, they can answer questions; provide situation awareness dynamically; and help to plan, monitor, and appropriately modify operations. Information maps are technically possible today and already exist in forms that can be adapted to support the design and execution IO strategy.
As an example, most of the North Atlantic Treaty Organization (NATO) states, as well as several non-NATO partners, are already subject to concentrated Russian IO and they illustrate ongoing Russian IO techniques. Using information cartography, it is possible to map key Russian sources as part of Russian IO operations against a target state. These sources might include:
• Russian and target country think tanks
• foundations (e.g., Russkiy Mir)
• authorities (e.g., Rossotrudnichestvo)
• television stations (e.g. RT)
• pseudo-news agencies and multimedia services (e.g., Sputnik)
• cross-border social and religious groups
• social media and Internet trolls to challenge democratic values, divide Europe, gather domestic support, and create the perception of failed states in the EU’s eastern neighborhood
• Russian regime–controlled companies and organizations
• Russian regime–funded political parties and other organizations in target country in
particular and within the EU in general intended to undermine political cohesion
• Russian propaganda directly targeting journalists, politicians, and individuals in target
countries in particular and the EU in general.
might include:
• national government organizations
• military
• intelligence community
• industry
• media
• independent think tanks
• academia
• citizen-organized groups.
Christopher Paul and Miriam Matthews of the RAND Corporation observe: “Experimental research in psychology suggests that the features of the contemporary Russian propaganda model have the potential to be highly effective.”14 They present a careful and concise analysis of relevant psychological research results that should inform any information defensive strategy. For example, they describe how propaganda can be used to distort perceptions of reality:
• People are poor judges of true versus false information—and they do not necessarily remember that particular information was false.
• Information overload leads people to take shortcuts in determining the trustworthiness of messages.
• Familiar themes or messages can be appealing even if they are false.
• Statements are more likely to be accepted if backed by evidence, even if that evidence is false.
• Peripheral cues—such as an appearance of objectivity—can increase the credibility of propaganda.15
1. Take the population and break it down into communities, based on any number of criteria
(e.g. hobbies, interests, politics, needs, concerns, etc.).
2. Determine who in each community is most susceptible to given types of messages.
3. Determine the social dynamics of communication and flow of ideas within each community.
4. Determine what narratives of different types dominate the conversation in each community.
5. Use all of the above to design and push a narrative likely to succeed in displacing a narrative unfavorable to you with one that is more favorable.
6. Use continual monitoring and interaction to determine the success of your effort and adjust in real time.
These same technologies can be used for defensive purposes. For example, you could use the techniques for breaking down communities described above to detect adversary efforts to push a narrative and examine that narrative’s content. The technology can help researchers focus while searching through massive amounts of social media data.
By CNu at August 30, 2017 0 comments
Labels: American Original , cognitive infiltration , information anarchy , wikileaks wednesday , you used to be the man
Tuesday, August 22, 2017
Bannon: Alt-White Clowns, Losers, and Useful Idiots
By CNu at August 22, 2017 0 comments
Labels: .45 , political theatre , relationship management , Strict Father , The Hardline , theoconservatism , you used to be the man
Wednesday, August 16, 2017
More Authoritah And Respeck For My Two-Piece and a Biscuit Wymyn
By CNu at August 16, 2017 0 comments
Labels: American Original , identity politics , niggerization , wikileaks wednesday , you used to be the man
Monday, August 14, 2017
Why Unite the White Was a Neckbeard Sausage Festival
By CNu at August 14, 2017 0 comments
Labels: cultural darwinism , Degenerate , fixyt , Gender , identity politics , peasants , What Now? , you used to be the man
Sunday, August 13, 2017
What Are These White Men Fighting For?
By CNu at August 13, 2017 0 comments
Labels: .45 , American Original , Ass Clownery , fixyt , identity politics , po thang... , status-seeking , you used to be the man
Tuesday, June 13, 2017
You May Not Know It But This Man's a Spy - An Undercover Agent For the FBI...,
By CNu at June 13, 2017 0 comments
Labels: Ass Clownery , partisan , propaganda , you used to be the man
Friday, June 09, 2017
Comey and Mueller: Pretty Much Just Head Snowflakes in Charge
By CNu at June 09, 2017 0 comments
Labels: Ass Clownery , professional and managerial frauds , you used to be the man
The Tik Tok Ban Is Exclusively Intended To Censor And Control Information Available To You
Mises | HR 7521 , called the Protecting Americans from Foreign Adversary Controlled Applications Act, is a recent development in Americ...
-
theatlantic | The Ku Klux Klan, Ronald Reagan, and, for most of its history, the NRA all worked to control guns. The Founding Fathers...
-
Video - John Marco Allegro in an interview with Van Kooten & De Bie. TSMATC | Describing the growth of the mushroom ( boletos), P...
-
Farmer Scrub | We've just completed one full year of weighing and recording everything we harvest from the yard. I've uploaded a s...