News reportage and analysis, criminal conspiracy investigations, general threat assessments and Information extractions from the memory hole. As well as insights and commentaries on the captive existence that we all experience currently as life under siege.


21 February, 2011

Virtual Flash Mobbing & Strategically Poisoned Consensus

The JDIF logo, now where
have I seen that design before?
  
The MOSSAD logo,
oh yes of course... that's where!
















In a recent turn of events, Israel's IDF has decided to step up their failed info cyber-wars. In a their latest Goebbels-like attempt to turn the tide of public opinion, the IDF is currently enlisting 120 more 'media fighters' using the Internet as a battlefield. With this sudden desperate move to amp up their propaganda front, it exposes one thing with utter certainty, that Israel has lost the ability to deceive the public. Just another futile attempt to shut the sack well after the cat has clearly escaped. 

During a Herzliya Conference panel discussion on the subject of "The Digital Medium as Strategic Weapon", IDF spokesman Avi Benayahu stated the army was scouting to recruit "little hackers who were born and raised online". He continued, "We screen them with special care and train them to serve the state," the spokesman told the panel, which was part of the Herzliya Conference. He added that Prime Minister Benjamin Netanyahu was personally supporting the venture, and that he had supplied a budget of NIS 6 million ($1.63 million US) for the enlistment of 120 soldiers. This is of course the military component of this psychological operations warfare strategy, the other is the civilian counterpart known as Hasbara. The term literally translated from Hebrew is defined as "explanation" and is a campaign by Zionists and Israel supporters to propagate pro-Israel advocacy and justification for any and all of it's egregiously criminal actions and enterprises. They have operatives infiltrating every aspect of the media whose mission is to sanitise any negative or damaging stories that come out on Israel and Zionism. To publicly bad-jacket websites, blogs and progressive anti-Zionist writers as "anti-Semitic", create strategic disinformation, and to virulently challenge or provoke divisive conflicts in Internet forums, blogs and other venues accommodating public commentary. For a full listing of their paid disinformation Sayanim, you can go here: http://www.gilad.co.uk/storage/Aaronovich_Hasbara.pdf

Benayahu then let slip "We cannot but be impressed at how Western technology harms regimes at the other end of the spectrum, such as Iran, or at how one cell phone camera can harm a regime more than any intelligence agency's operations…" What Benayahu is intimating  is just how these cell phones were used against the IDF during their usual, vicious and unprovoked attacks. So much so that during the aftermath of the Mavi Mamara onslaught, the IDF cowards had stolen every cellphone they could. They knew the power of this technology in advance and used confiscation to destroy evidence of their illegal invasion, murders and unmitigated brutality. 

The IDF propagandist said he also plans to establish blogs for other spokesmen and commanders as a PR tool. "We are at this front and proceeding slowly," he said, and recommended that the government appoint a "new media minister". "The army is too involved with internal public relations. The army must not fill a space left by the state – it should be taking care of this." What they mean by this is that this level of agit-prop should be under the aegis of Israeli intelligence. Which leaves no doubt that these operations will utilise the combined efforts of Israeli intelligence, such as Talpiot, MAMRAM, 8-200 run out of the Division of Military Intelligence located in the Negev desert near Kibbutz Urim, and MAMDAS.

US native Lt. Aliza Landes, of the IDF Spokesperson Unit, explained about the new unit at the IDF Spokesperson's Office. "We began to work with new media during Operation Cast Lead. Bloggers are very important and very influential," she said, “[Bloggers] have an enormous amount of influence and ignoring that we do at our own peril”. The point on the success of the bloggers, is a very solid point that we should pay very close attention to. For it displays just how we are beating the Zionists just through the simple and concerted broadcasting of the truth. Landes went on, "This is about the democratization of information, and about the fact that you cannot stuff information down people's throats but you can make it more palatable." Aliza said the office's YouTube channel is currently its most successful venture. "Photos catch the eye and constitute visual proof that is better than words," she said, adding that IDF footage from the flotilla raid became the most-watched videos online and affected "media reports in the world as well as online debates". However, Aliza admitted, "we are still learning and we have a long way to go".

In a seemingly related story, the US Air Force Air (USAF) Mobility Command as of June of last year, is seeking to implement software called the Online Persona Management Service (solicitation number RTB220610). What this is, is software that will allow 10 personas per user, replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent. In other words, the software mimics fake users from diverse parts of the world, complete with backgrounds, histories and everything necessary to create fraudulent internet users. Pay attention to this next paragraph: Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information. The goal? Create a virtual army of faux users to generate a fraudulent consensus of commentary. In other words virtualised tactical opposition strategically deployed to drown out reason, truth and facts in forums, blogs, and anywhere there's public commentary on current or events of mass interest. It can more accurately be described as Pseudo Flash Mobbing. 
In addition to this, the USAF is also pursuing at least five more supporting logistics. 

1) Secure Virtual Private Network (VPN) - These are requested for users to daily and automatically obtain randomly selected IP addresses through which they can access the internet. The daily rotation of the user's IP address prevents compromise during observation of likely or targeted web sites or services, while hiding the existence of the operation. In addition, it may provide traffic mixing, blending the user's traffic with traffic from multitudes of users from outside the organization. This traffic blending provides excellent cover and powerful deniability. The acquisition request specifically lists use of Anonymizer Enterprise Chameleon or equal. For your edification, Enterprise Chameleon is a plug-n-play network appliance that allows all Web surfers in the enterprise environment to benefit from the anonymous surfing capabilities made possible by the vendor. In a nutshell, Enterprise Chameleon allows enterprise surfers to access external sites and resources without revealing their actual identities (their IP addresses or domain names). According to the vendor, sample uses and users of such technology include competitive and/or covert intelligence gathering, law enforcement agencies, and law firms (i.e. mergers and acquisitions).

2) Static IP Address Management - Licence protects the identity of government agencies and enterprise organizations. Enables organizations to manage their persistent online personas by assigning static IP addresses to each persona. Individuals can perform static impersonations, which allow them to look like the same person over time. Also allows organizations that frequent same site/service often to easily switch IP addresses to look like ordinary users as opposed to one organization. The acquisition request specifically lists use of Anonymizer IP Mapper License or equal.

3) Virtual Private Servers, CONUS - Provides CONUS (Continental United States, and as the 48 Contiguous States) or OCONUS (Outside of Contiguous United States) points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. The acquisition request specifically lists use of Anonymizer Annual Dedicated CONUS Light Geosite or equal.

4) - Virtual Private Servers, OCONUS - Provides CONUS (Continental United States, and as the 48 Contiguous States) or OCONUS (Outside of Contiguous United States) points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. The acquisition request specifically lists use of Anonymizer Annual Dedicated OCONUS Light Geosite or equal.

5) Remote Access Secure Virtual Private Network - Secure Operating Environment provides a reliable and protected computing environment from which to stage and conduct operations. Every session uses a clean Virtual Machine (VM) image. The solution is accessed through sets of Virtual Private Network (VPN) devices located at each Customer facility. The fully-managed VDI (Virtual Desktop Infrastructure) is an environment that allows users remote access from their desktop into a VM. Upon session termination, the VM is deleted and any virus, worm, or malicious software that the user inadvertently downloaded is destroyed. The acquisition request specifically lists use of Anonymizer Virtual Desktop Infrastructure (VDI) Solution or equal.
So, between the IDF and the US Air Force moves, it can safely be determined that there is a rebooted campaign by the IDF to run repetitive and subversive military propaganda psychological operations via the Internet. This escalation is being deployed to address the wide-spread awakening to Israel's crimes and the Zionist agenda. For the first time in history and thanks to information technology, the world is seeing the true face of Israel and the means and methodologies it has always implemented using Judaism as a false-front and cover for it's operations. Not only are they being exposed, but also the Rothschild family who manifested a criminal empire the size of the state of New Jersey in the US. People now are realising the true history of Zionism and it's global aims to manipulate and conquer the world using deceit, murder and rapacious theft. Conscientious Jews are even stepping up more and more to join the ranks of humanity in rebuking and exposing this global crime cartel. Since the US has been co-opted and is basically a proxy-state of Israel, one can surmise with relative confidence that this request for Online Persona Management software by the USAF is to be used in joint-operations with Israel. The truth is causing no end of trouble to the machinations and activities of both Israel and the global criminal predators. So much so that they are now escalating their methods to suppress progressive consensus, subvert and manipulate it on-line.

According to Redacted News, which ran a great piece on this matter here: Why Is the Government Creating an Army of Fake People on the Internet? We Know., the following vendors have expressed interest in this USAF contract request: HBGary subsidiary HBGary Federal, Global Business Solutions and Associates LLC, Uk Plus Logistics, Ltd., NevinTelecom, Bunker Communications and Planmatrix LLC. The request was originally for 50 licenses of the Online Persona Management, which means the Air Force hoped to create up to 500 fake Internet people. The request was filled in June, which means these fake people could be very well roaming the Internet right now.

Stay focused, close ranks; stay unified to commonality of purpose and by all means be vigilant, for the infiltrated virtual personas. Stay the course of truth, and victory will be forever in your path, the sure way to fail is to remain apathetic and compliantly abused slaves.

Sources:




2 comments:

  1. Excellent HHQ!!!
    They are such sleazebags..
    I just don't know what to say.
    It makes me want to blog more, research more, and try to understand this "bent" world we are living in.
    They make me sick, these creatures..
    We need to be onto them.
    and Stay onto them.
    Great Post
    Cheers A13

    ReplyDelete
  2. Indeed A13, that level of subterfuge incriminates them further, as moves like these are nothing except tacit admissions of guilt for the filth they engage in. Innocent and righteous individuals do not go running about hosting and creating faux Internet users to generate counterfeit consensus. Nor do they send in paid operatives to incite, inflame, antagonise, obfuscate and instigate divisions online. Nor do they propagate scrubbed up histories, crimes and criminal evidence of the Zio-Nazi state of Israel an its legion of sociopathic supporters.

    ReplyDelete

Civil discourse, sincere inquiries, and additions of relevant information are always welcome. Obnoxious commentary and rubbish of a Hasbaric, trollish or JTRIG operative nature will not be tolerated.