U.S. Gov. software creates fake people on social networks

Deborah K

Member
Joined
Jul 27, 2007
Messages
17,997
This article is from last February, but I bring it up because of this:


The US government is offering private intelligence companies contracts to create software to manage "fake people" on social media sites. Private security firms employeed by the government have used the accounts to create the illusion of consensus on controversial issues.

I think we all need to be conscious of the fact that this is going on, and it's contributing to the battle we're fighting with people who have been led to believe that Ron's foreign policy is dangerous - that is what is being spread. Here's the rest of the article:

The contract calls for the development of "Persona Management Software" which would help the user create and manage a variety of distinct fake profiles online. The job listing was discussed in recently leaked emails from the private security firm HBGary after an attack by internet activist last week.

Click here to view the government contract (PDF) (original)
(UPDATE 3/5/11: The official web listing seems to have been removed. PDF copy is still available though)

According to the contract, the software would "protect the identity of government agencies" by employing a number of false signals to convince users that the poster is in fact a real person. A single user could manage unique background information and status updates for up to 10 fake people from a single computer.

The software enables the government to shield its identity through a number of different methods including the ability to assign unique IP addresses to each persona and the ability to make it appear as though the user is posting from other locations around the world.

Included in HBGary's leaked emails was a government proposal for the government contract. The document describes how they would 'friend' real people on Facebook as a way to convey government messages. The document reads:

"Those names can be cross-referenced across Facebook, twitter, MySpace, and other social media services to collect information on each individual. Once enough information is collected this information can be used to gain access to these individuals social circles. Even the most restrictive and security conscious of persons can be exploited. Through the targeting and information reconnaissance phase, a person’s hometown and high school will be revealed. An adversary can create a classmates.com account at the same high school and year and find out people you went to high school with that do not have Facebook accounts, then create the account and send a friend request. Under the mutual friend decision, which is where most people can be exploited, an adversary can look at a targets friend list if it is exposed and find a targets most socially promiscuous friends, the ones that have over 300-500 friends, friend them to develop mutual friends before sending a friend request to the target. To that end friend’s accounts can be compromised and used to post malicious material to a targets wall. When choosing to participate in social media an individual is only as protected as his/her weakest friend."

Other documents in the leaked emails include quotes from HBGary CEO Aaron Barr saying, "There are a variety of social media tricks we can use to add a level of realness to all fictitious personas... Using hashtags and gaming some location based check-in services we can make it appear as if a persona was actually at a conference and introduce himself/herself to key individuals as part of the exercise, as one example."

Additional emails between HBGary employees, usually originating from Barr, discuss the vulnerability social networking causes.

One employee wrote, "and now social networks are closing the gap between attacker and victim, to the point I just found (via linked-in) 112 females, wives of service men, all stationed at Hurlbert Field FL - in case you don't know this is where the CIA flies all their "private" airlines out of. What a damn joke - the U.S. is no longer the super power in cyber, and probably won't be in other areas soon."

Barr also predicted a steady rise in clandestine or secret government operations to stem the flow of sensitive information. "I would say there is going to be a resurgence of black ops in the coming year as decision makers settle with our inadequacies... Critical infrastructure, finance, defense industrial base, and government have rivers of unauthorized communications flowing from them and there are no real efforts to stop it."

The creation of internet propoganda software is only one of HBGary's controversial activities. According to Wikileaks competetor and occasional collaborator Cryptome.org, several other progressive organizations were intended to be targeted including anti-war activist, anti-torture organizations and groups opposed to the US Chamber of Commerce.

The emails also include a number of other embarrasing entries including the purchase of the book "The Multi-Orgasmic Man: Sexual Secrets Every Man Should Know" from Amazon for $6.76.

Continue reading on Examiner.com US Gov. Software Creates 'Fake People' on Social Networks - National Social Media | Examiner.com http://www.examiner.com/social-medi...-networks-to-promote-propoganda#ixzz1igokf1m5
 
Yep, it`s pretty interesting info. The Chinese gov is doing this for years.

There is an interesting Hillary video where she hints something along these lines.

Check at minute 5:20. She`s saying "we have this group of young techno-experts engaging on websites...". Wtf is that supposed to mean ?:)

 
Last edited:
fire11 was version 1.0. that's why it had a lot of odd nuances. :D

j/k... but sometimes i feel like my "friends" on facebook-- actual people i know-- are bots.
 
as a mod for another forum I see lots of bot accounts coming from russia, china, and now from the US. Military accounts are especially challenging as they frequently use the same systems (shared systems/gateways/proxies) for web access. So you may get a DOD/Military IP used by multiple forum members, who's to say which one is legit.

Its bad news folks
 
I kind of like JDA's idea:

Really, were there any doubts? The government is in the business of staying in business, which means needing a project to feel useful, such as hoarding the tweets of known dissidents and incendiaries. I honestly and truly hope they enjoy tracking my cat pictures and traffic complaints.

The only way to combat this invasion of privacy (as private as what you say to the entire Internet can be, that is) is to have every American man, woman and child with a Twitter account tweet the offending words. Repeatedly. Until the DHS Mother Brain is so overwhelmed with information, it shorts out and collapses on itself.

From the link in the quote above:

The answer to the question "why does the government need software to create a bunch of fake Internet "people?" is probably quite simple, and while Daily Kos seems to feel it has to do with attacking progressives, I'm afraid the aim of the purchase is far more subversive and far-reaching. Leave it to libtards to take it personally and ignore the fact that there is an ongoing war against Americans, waged by their own government, that has so far claimed our privacy, freedom and now our economic well-being.
[...]
we are once again losing the battle by fighting amongst ourselves over semantics instead of attacking the true enemy.
[...]
It's happening, people, the question is whether you'll be standing there arguing with a fake sockpuppet of the establishment or shoving your foot up his or her fictitious ass when it happens to you.
 
Um, maybe what your witnessing is Network Address Translations. Gateway routers can't use private addressing schemes on the Internet. Nevertheless, we need to start hosting our social networks from our own private property instead of The Facebook's and by utilizing asymmetric encryption with digital signatures so everyone knows that you are who you say you are.
as a mod for another forum I see lots of bot accounts coming from russia, china, and now from the US. Military accounts are especially challenging as they frequently use the same systems (shared systems/gateways/proxies) for web access. So you may get a DOD/Military IP used by multiple forum members, who's to say which one is legit.

Its bad news folks
 
Last edited:
But there are no government conspiracies to manipulate the public......:rolleyes:
 
Um, maybe what your witnessing is Network Address Translations. Gateway routers can't use private addressing schemes on the Internet. Nevertheless, we need to start hosting our social networks from our own private property instead of The Facebook's and by utilizing asymmetric encryption with digital signatures so everyone knows that you are who you say you are.

Ah, you get my point though, right? The NAT makes it difficult to differentiate the enlisted fella, who wants to participate in the forum, and the automated monitoring software.
 
Absolutely. However, my guess would be that American government bot users would originate from the NSA systems, and proxy through seemingly "normal" domains.
Ah, you get my point though, right? The NAT makes it difficult to differentiate the enlisted fella, who wants to participate in the forum, and the automated monitoring software.
 
Great! Instead of all of us trying to fit on John Galt's Island, we can just ignore Washington and let them lord it over all these little Second Life Avatars they've created. We'll be better off, and they can abuse these figments of their imagination and feel mighty powerful and proud of themselves for micromanaging the hell out of some ones and zeros.

And when they figure out that all the money they created for these avatars to pay in taxes is worthless, well, we just keep ignoring them.
 
Back
Top