0 votes

Cyber-Herding: Exploiting Our Use of the Internet

I found this great paper on Septemberclues.info a media fakery website (one of my favorite websites).. I thought this was great. As the poster of the thread on that website explains:
'To appreciate and understand the research paper below simply replace Islamic extremists with us.'

NAVAL POSTGRADUATE SCHOOL
MONTEREY, CALIFORNIA

Cyber-Herding: Exploiting Islamic Extremists Use of the Internet

David B. Moon, Capt, USAF
Joint Information Operations Student
Department of Defense Analysis

http://www.dtic.mil/ndia/2007solic/moon_paper.pdf

Defining Cyber-herding:

Cyber-herding is the action by which an individual, group, or organization drives individuals, groups, or organizations to a desired location within the electronic realm. Why implement cyber-herding versus engaging in an all out war on extremist websites? The answer to that question lies in the realm of intelligence gathering and in the freedom of the internet. While the threat from Islamic extremists’ use of the internet is high, intelligence agencies have successfully harvested information from these sites. Thus, an all-out denial-of service attack on extremists’ websites would limit intelligence agencies capability to gather information. Indeed, some extremists’ websites have been actively targeted and shut down. However, the problem that emerges from this tactic is the freedom of the internet allows extremists to restore or relocate their websites in a matter of hours to days. Thus, these attacks could embolden the extremists by reinforcing the fact that they can set up a new site within a short period. Simply stated, the attacks and subsequent re-emergence could provide them with a simple affirmation: The powerful United States tries to keep us off the internet but they cannot! On the other hand, cyber-herding has the potential to covertly neutralize undesirable websites, mine data from controlled websites, map virtual social networks, manipulate extremist messages, and modify the extremists’ story. To implement a cyber-herding program effectively, a minimum of four nodes are required.

Objectives of the Cyber-herding Nodes:

user posted image (http://www.septemberclues.info/)

The Gatherer Node:
The gatherer node’s objective is to compile and maintain an up to date list for all extremists related uses of the internet.

The Network Node:

The members of the network node have two objectives. The first objective is to insert themselves into the extremists’ virtual social network. The second objective is to identify major “hubs” and “links” within the extremists’ virtual social network.

The Construction Node:

The members of the construction node have two objectives. The first objective is to create realistic doppelganger extremists websites and chat rooms. A doppelganger refers to a ghostly double or a look alike. In some traditions, it is an omen of death to see your own doppelganger. The second objective is to create several content rich Darknet environments that offer e-mail, file sharing, chat, instant messenger, and streaming video services. A Darknet is a private virtual network where users connect only to people they trust.

The Demolition Node:

The demolition node’s objective is to remotely destroy or disable all extremists’ websites, chat rooms, Darknets, etc.

The Cyber-herding Process:
Phase One:

The gatherer node begins the cyber-herding process by tracking down extremists’ websites and chat rooms. To facilitate this process, the node seeks public help by placing web-based advertisements asking people to submit Uniform Resource Locators (URL) for any suspected extremist website. The node seeks out help from private groups such as the Rand Corporation, the Search for International Terrorist (SITE) Institute, and the Middle East Media Research Institute (MEMRI) and academic terrorism research groups. The node compiles a list of extremist website URLs. This list becomes a living document that the node constantly updates with identified extremists’ sites. In addition, a program constantly checks identified URLs to verify the sites are still active and automatically deletes dead sites. During this process, the network node makes a copy of the list, and begin phase two.

Phase Two:

Upon accessing a site on the list, the members of the network node pose as Islamic extremist sympathizers and/or supporters and begin interacting with members of the site. In chat rooms, the node members start or join conversations supporting extremists themes. The objective is to develop trust relationships with Islamic extremists. Node members contact extremists’ websites to see what they can do to support the cause. If needed, the network node would have the authority to make small donations to extremists websites to help build trust. During this phase, the network node maps the extremists’ chat rooms. Mapping a chat room involves creating a social network diagram of who is talking to whom within the chat room.
The members of the network node are looking for “hubs” using the sites. These hubs are people who have more connections then anyone else. Malcolm Gladwell in his book, “The Tipping Point,” refers to these people as “connectors.” The members of the network node develop virtual fictitious identities. They keep detailed records of their conversations for each identity. This way any member of the network node can be that virtual person. All they have to do is pick a character, and read up on his or her history before chatting. If the network node discovers any websites not identified on the list, they will update the master list with the new URLs and forward these sites to the gatherer node. The members of network node mark the list to identify sites they are currently working, this ensures the demolition node does not destroy a site the network node is currently operating in. Subsequently, the network node forwards the list to the construction node.

Phase Three:

After the members of construction node receive the list from the network node, they start accessing the sites. They copy the websites content, format, graphics, files, and links. Using this information, the construction node builds doppelganger extremists’ websites. All website created should be independent sites, with only passing similarities with other existing websites. At no time will the construction node hijack an existing extremist website as this could cause distrust in the target audience. The construction node forwarded all created sites to the network node. The members of the network node endorse these new websites with their contacts. The members of construction node remove all websites the network node marked and any sites they created from the list. Afterwards, the construction node forwards the list to the demolition node.

Phase Four:

After receiving the list from the construction node, the demolition node systematically begins a process of attacking every site on the list. These attacks can be simple such as contacting the sites service provider to protest the site to try to get the site removed. They can also use more sophisticated attacks such as denial of service attacks, hijacking a website, Structured Query Language (SQL) injections, Cross Site Scripting cookie stealing, JavaScript injections, and other hacking methods. Depending on where the host server is located, it may not be politically feasible to attack some sites directly. In these cases, the demolition node could post the extremists’ URLs on internet chat rooms and blogs in the hope that private citizens and/or groups can bring down the sites...

user posted image (http://www.septemberclues.info/)

Phase Five:

The purpose of phase five is to change the message....

Phase Six:

Going back to math modeling, by day 1,032 virtually all of the extremists’ websites could potentially be eliminated. At this time, the construction node would stop making new websites. The demolition node will continue to attack any identified Islamic extremists’ sites. Additionally, the demolition node will start to shut down construction node sites at the same rate they were attacking the extremists websites...The demolition node will continue to attack any extremists’ website that makes it on the list.

Phase Seven:

During this phase, the construction node will develop content rich Darknet environments. As stated earlier, a Darknet is a virtual private network where users connect only to people they trust. These Darknet environments will offers e-mail, file sharing, chat, instant messenger, and streaming video services. Once a Darknet is created, the construction node will send the URL to the network node.
The members of network node will pick a connector with which they have developed a strong trust relationship, and invite that connector to become a member of the Darknet...If the connector likes the website, then he may chose to invite others. On the other hand, if he does not like the website, then the network node will have to start over with a new connector. Anyone invited to join the network will go through the same process as the connector. Using small-world theory, the network node can have extremists build a detailed map of their virtual social network...
As people join the Darknet, a computer program constructs a social network map showing the connections between the individuals and people that invited them to
join the network. The program also updates the map whenever users send e-mails from their Darknet e-mail account, and chat with other Darknet users. Additionally, the Darknet runs IP and e-mail tracking software against all users. This software provides geographical locations for the users IP addresses and e-mail. In addition, the software provides contact information on the person that owns the IP address, and contact information on the person’s host service provider. The social network map incorporates all of this information. The map can be used to identify geographical clusters within the network, links between clusters, and vital network hubs that can be targeted for human intelligence surveillance.

user posted image (http://www.septemberclues.info/)
--------------------------------------------------------
Who doesn't think this is already going on?

So which sites do you think the Daily Paulers are being cyber-herded to?




Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

this is interesting.

thanks

No problem...

People should keep this in mind to stay a step ahead...

9-11 Media Fakery: Did anyone die on 9-11?
http://www.cluesforum.info/

http://www.septemberclues.info/

9-11 Actors:
http://www.youtube.com/watch?v=6aPvJSQtmoE

Pysops.. media.. actors.. propagandists... disinfo agents.. fake videos.. fake photos

You can see cyber herding on the Safari browser

and on new TVs.

Safari starts off with several sites already programmed into your splash screen (sort of like favorites). The sites are CNN, youtube, facebook, etc.

That will cyber herd lots of mainstream users into those sites and pretty much only those sites.

When television sets and the internet integrate, they will certainly come with favorites built in.

Further, the vast majority of people use the same search engines...engines that are ran by companies with government direction. Thus, there will be cyber censorship.

So we definately need an alternative to google/yahoo/etc. search engines.

Likewise, we need an alternative to YouTube...which too is censoring certain material.

Yes I agree.

I think that's more of a natural cyber-herding going on though. Websites want to get people hooked on their content so they get deals with all the browser companies. The original content is all mainstream so people end up with the same propaganda on the internet as they do on TV. The establishment just has to control the content from AP/Reuters/NY Times/WaPo etc and that will be relayed through Yahoo/Google etc.

I agree with needing alternative websites, but this paper suggests you have to be careful of who creates it because it may just be a doppelganger website. I think cyber-herding has been used to a tee on the 9-11 topic. Again most 9-11 truthers still think planes melted into the WTC buildings. The trend is shifting in awareness though so that is positive.

Pysops.. media.. actors.. propagandists... disinfo agents.... fake videos.. fake photos... psyops....

9-11 Media Fakery: Did anyone die on 9-11?
http://www.cluesforum.info/

http://www.septemberclues.info/

9-11 Actors:
http://www.youtube.com/watch?v=6aPvJSQtmoE

Pysops.. media.. actors.. propagandists... disinfo agents.. fake videos.. fake photos

To be honest

The info sounds right, but those videos they fabricated haves\ been debunked, which makes me ask for links, which everyone on the internet should do.

"None are more hopelessly enslaved than those who falsely believe they are free." Johann Wolfgang von Goethe

As the Palaces Burn(click below video)
http://www.youtube.com/watchv=wfj2OWBocAc&feature=related