TOKYO MASTER BANNER

MINISTRY OF TOKYO
US-ANGLO CAPITALISMEU-NATO IMPERIALISM
Illegitimate Transfer of Inalienable European Rights via Convention(s) & Supranational Bodies
Establishment of Sovereignty-Usurping Supranational Body Dictatorships
Enduring Program of DEMOGRAPHICS WAR on Europeans
Enduring Program of PSYCHOLOGICAL WAR on Europeans
Enduring Program of European Displacement, Dismemberment, Dispossession, & Dissolution
No wars or conditions abroad (& no domestic or global economic pretexts) justify government policy facilitating the invasion of ancestral European homelands, the rape of European women, the destruction of European societies, & the genocide of Europeans.
U.S. RULING OLIGARCHY WAGES HYBRID WAR TO SALVAGE HEGEMONY
[LINK | Article]

*U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR*

Who's preaching world democracy, democracy, democracy? —Who wants to make free people free?
[info from Craig Murray video appearance, follows]  US-Anglo Alliance DELIBERATELY STOKING ANTI-RUSSIAN FEELING & RAMPING UP TENSION BETWEEN EASTERN EUROPE & RUSSIA.  British military/government feeding media PROPAGANDA.  Media choosing to PUBLISH government PROPAGANDA.  US naval aggression against Russia:  Baltic Sea — US naval aggression against China:  South China Sea.  Continued NATO pressure on Russia:  US missile systems moving into Eastern Europe.     [info from John Pilger interview follows]  War Hawk:  Hillary Clinton — embodiment of seamless aggressive American imperialist post-WWII system.  USA in frenzy of preparation for a conflict.  Greatest US-led build-up of forces since WWII gathered in Eastern Europe and in Baltic states.  US expansion & military preparation HAS NOT BEEN REPORTED IN THE WEST.  Since US paid for & controlled US coup, UKRAINE has become an American preserve and CIA Theme Park, on Russia's borderland, through which Germans invaded in the 1940s, costing 27 million Russian lives.  Imagine equivalent occurring on US borders in Canada or Mexico.  US military preparations against RUSSIA and against CHINA have NOT been reported by MEDIA.  US has sent guided missile ships to diputed zone in South China Sea.  DANGER OF US PRE-EMPTIVE NUCLEAR STRIKES.  China is on HIGH NUCLEAR ALERT.  US spy plane intercepted by Chinese fighter jets.  Public is primed to accept so-called 'aggressive' moves by China, when these are in fact defensive moves:  US 400 major bases encircling China; Okinawa has 32 American military installations; Japan has 130 American military bases in all.  WARNING PENTAGON MILITARY THINKING DOMINATES WASHINGTON. ⟴  
Showing posts with label Twitter. Show all posts
Showing posts with label Twitter. Show all posts

September 17, 2015

i ❤ twitter - Ukraine - Arseniy Yatsenyuk


i twitter



Yatsy
Ukraine dictator ... 
Arseniy Yatsenyuk, PM




ꕤ COPYRIGHT DISCLAIMER
Copyright Disclaimer under section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education and research.

---------------------- ꕤ ----------------------

Best to see this as a GIF | here



i ❤ twitter - Please, please ... Help Mutti Merkel!


i twitter



Mutti
Germany
Angela Merkel
Open Borders



ꕤ COPYRIGHT DISCLAIMER
Copyright Disclaimer under section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education and research.




Following explains Mutti Merkel's predicament ...

Assange
Transnational Security Elite,
Carving Up the World Using Your Tax Money

London 
OCT8 Antiwar Mass Assembly (2011)
Link  |  here




Someone's hilarious photoshop image.

Sent it to the German Foreign Office Twitter account, pleading for help on behalf of Mutti Merkel ...  lol

If I'm not on Twitter for a while, it's cos the Stasi had me banned ... lol

Very topical at the moment. 

Tear gas, water canons, etc. against refugees on Hungarian border.  


Chaos in Europe.



UPDATE
Unable to follow-back those that have followed me on TwitterStasi, at the moment.

All TwitterStasi gives me is this ridiculous 'unable to follow more people' notice and a link to their mysterious 'rules':



So either:

a) 

I've maybe breached the TwitterStasi's mysterious 'rules.'
And, no, I could not be screwed reading their rules to scour for possibilities ...
Like:
Thou shalt not seek assistance from German Foreign Office TwitterStasi account re Mutti Merkel's Migrant Crisis.  lol

The obligation ought to be on TwitterStasi to notify users exactly which rule has been violated, rather than be left guessing from possibilities -- that may not even apply (eg if the follow limit has been reached).
Judging by zero feedback from TwitterStasi to date, where there's been technical issues I've tweeted about, I wouldn't hold my breath tackling any rule-related issues with the TwitterStasi -- who clearly block legitimate political comment ... & political humour.

b)

If it's not TwitterStasi censored political humour/comment related, I've reached TwitterStasi's follow limit. 
However, I note I'm on 2,002 followed -- so it may not be this issue at all (as TwitterStasi follow limit is bang on 2,000).
 c)
Perhaps Twitter didn't like me pointing out to other users that TwitterStasi censor unfairly:



That a user can be blocked from performing given functions & be left to guess why (from multiple possibilities), says a lot about how crap TwitterStasi is in terms of customer service principles.

Yes, I realise this is a free service.  But I add value to their sh*tty platform, by inputting into it for free, for the enjoyment and information of other users on their platform, and the least they can do send a direct automated notification, indicating specifically what is at issue.

UPDATE


TwitterStasi
issue with their lame 2000 follow limit programming, I'd say.





Following explains Mutti Merkel's predicament ...


Assange
Transnational Security Elite,
Carving Up the World Using Your Tax Money

London 
OCT8 Antiwar Mass Assembly (2011)
Link  |  here




September 15, 2015

Latest CyberSec News & Related

Article
SOURCE
as indicated





Universal Music
abusing the DMCA
ie #Copyright Act
rightsholders MUST consider FAIR USE
prior take-down issues
http://boingboing.net/2015/09/14/eff-scores-a-giant-victory-for.html


#India IT security
1.2 billion in 2016
http://www.consultancy.uk/news/2591/indian-IT-security-market-reaches-12-billion-next-year

#Microsoft
signs landmark agreement with #NATO
re govt #cybersecurity
/ solidification relationship
http://www.neowin.net/news/microsoft-signs-agreement-with-nato-to-bolster-government-cybersecurity

Intel in #cybersecurity - auto-mobiles
auto security board set up:
Automotive Security Review Board (ASRB)
Intel Security (formerly McAfee)
published a whitepaper
re automotive security best practices
http://forexreportdaily.com/2015/09/14/6873-intel-in-cyber-security-driving-seat-sets-up-connected-auto-security-board/


NSA Recruiting / Scholarships
USA Colleges
vie to entice w. NSA cyber program
scholarship stipulation
= NSA job on degree
http://fedscoop.com/colleges-vie-to-entice-students-with-nsa-cyber-program


USA + China
meet re #cybersecurity - White House
Kerry, Rice + Homeland Sec. Jeh Johnson
> comm. competition blocks

USA whining that the following
 stop US competing on level playing field in China:
  • fines
  • opaque regulatory system
http://www.lidtime.com/u-s-chinese-officials-meet-on-cyber-security-issues-white-house-5652/

University of Texas at San Antonio
grant puts city on centre #cybersecurity stage
emerging cybersecurity + tech hub
/ expressnews (subscipt)


#cybersecurity #hacker
Millennial Gen / Gen Y
born post 1980
social media over-sharing / lax security
http://www.afr.com/technology/a-third-of-millennials-warned-by-employers-over-social-media-posts-norton-20150914-gjlw1h

Cybersecurity Bill  |  CISA   |  USA
Cybersecurity Information Sharing Act (CISA)
Light on Security
legal immunity for sharing cyber-intel with govt
PRIVACY implications
/ poised to pass

http://foreignpolicy.com/2015/09/14/a-cybersecurity-bill-light-on-security-heavy-on-corporate-

Jeb Bush
wants USA Internet gov.
against transfer of  ICANN oversight to multistakeholders

Following Presidential candidates also get a mention re cybersec:
  • Rubio - Marco Rubio
  • Fiorina - Carly Fiorina
http://fedscoop.com/jeb-bush-unveils-cybersecurity-plan


Clinton appears to be 
the CYBERSEC & MILLENNIAL candidate

#Clinton2016
'Best Choice' Cybercrime
Wakefield Research poll - 42%
over half millennials Dems better
http://www.inc.com/will-yakowicz/poll-hillary-clinton-most-qualified-presidential-candidate-for-cyberattack.html


Hackers hit the Kremlin  #Russia
target: election commission website
sounds like DDoS
http://thehill.com/policy/cybersecurity/253609-hackers-hit-the-kremlin


#cybersecurity #banking #cloud
x4 US banks
agreement w/ regulators
re 'guaranteed data deletion' issues

Symphony
= service created thru consortium
of 14 financial instutions
  1. Goldman Sachs
  2. Deutsche Bank
  3. Credit Suisse
  4. Bank of New York Mellon
= guaranteed data deletion
/ hinder regulators + prosecutors to investigate misconduct?
Does use of Symphony re communications
= regulators avoidance?
[ I'm not clear on that]

http://www.stockhouse.com/news/newswire/2015/09/14/four-us-banks-reach-agreement-with-regulators-on-guaranteed-data-deletion-issues

#Russia
Yuri Ushakov
fmr career diplomat
fmr deputy Foreign Minister
PhD:  history
2008 appointment Putin deputy chief staff
foreign-policy + international economics
[various sources - incl. Foreign Policy]

#cybersecurity
DECEPTION SOFTWARE 
/ HONEYPOT SOFTWARE

Deception to Catch #hacker
fake network component, server or database
to study their behaviour

DECEPTION cybersecurity aims:
1. ID intruders / share info
2. drains hacker resources until aware duped
3. study hackers
Deception
has long been part of the art of war
WWII, USA & British armies
set up fake camps
to dupe Germans
/ Penny Crosman {cybersec}

Honeypot software
= fake system
= sits on network
= exposes fake or real services to the attacker

new gen. honeypot software
= called 'deception software'
centrally managed, integrated w/ other security software

deception software
popular with:  financial services

x4 layers  (ie "deception stack"):
  1. network
  2. endpoint
  3. application
  4. data

each layer of x4 deception software
= has deception capabilities

deception layers:
eg. fake credentials in browser caches
of decoy workstations, phony files & data sets.

deception layers:
eg. endpoint set up to look like it runs eg Windows,
when is a Linux machine.

deception layers:
eg. fake OS = deceive malware into attacking
vulnerabilities OS does not have.

deception strategy:
once intruder detected
/ continue to 'entertain'
*find out what intruder knows re system

decoy documents
eg fake 'new product designs'
= embedded w/ tracking element
= knowing when & where opened
deception software
hidden tech in documents
= beacon calling 'home'
= info re intruder

DECEPTION software providers:
  • Attivo Networks
  • TrapX Security
  • Allure Security Technology
  • CyberTrap
  • Cymmetria
  • ForeScout
  • GuardiCore
  • Hexis Cyber Solutions
  • LogRhythm
  • Percipient Networks
  • Rapid7
  • Shape Security
  • Specter
  • TopSpin Security

DECEPTION software LIMITATIONS
If the hacker:
1) obtained correct credentials re system
2) knows where to look
ie ... if not rummaging, knows where to go & where to get it, deception software ineffective
Deception software
= not foolproof
= but significantly raises odds of detection & lowers false positives

http://www.americanbanker.com/news/bank-technology/deception-may-be-the-best-way-to-catch-cybercriminals-1076667-1.html

#cybersecurity
US Dept Commerce
rethinking proposed rule controlling 
EXPORT of hacking TOOLS / intrusion software
b/c stifles research
source (subscription)
http://www.law360.com/articles/702478/commerce-to-revise-cyber-rule-said-to-hamper-research

#cybersecurity #hacker
Cisco routers vulnerable to new attack
attacks replace OS used in network Cisco equip.

Cisco router attacks
= x14 instances of router implants found in:
  • India
  • Mexico
  • Philippines
  • Ukraine
http://www.reuters.com/article/2015/09/15/us-cybersecurity-routers-cisco-systems-idUSKCN0RF0N420150915


Malvertising
#cybersecurity #hacker

Malvertising Campaign Rages Undetected For 3 Weeks
/ manipulate ad networks' chain of trust
Malvertising
= number of new tactics to make attackers harder to track down
eg use domain names registered years ago w/ BBB

#Hacker
= look like legit bus. using real-time bidding
= ads clean
= ads redirected to point for download malicious code

ads  thru
encrypted HTTPS channel
= lets third party directly serve up content
+ encrypt comm.
/ no inspect.

Malvertising
attackers used Google URL shortener in redirects
Malwarebytes + Google working to solve

Malvertising hits, incl: http://ebay.co.uk  http://drudgereport.com  http://answers.com

Malvertising
compromised various small ad networks
+ major ad networks, incl DoubleClick, AppNexus + ExoClick

Malvertising hits, adult, incl:
nuvid.com
upornia.com
eroprofile.com

very low-cost intro packages
= attacker opportunity for short campaigns w/ small investments
http://www.darkreading.com/attacks-breaches/malvertising-campaign-rages-undetected-for-3-weeks/d/d-id/1322169

#cybersecurity
National Cyber Security Hall of Fame
2015 INDUCTEES
Thu 29th Sept
x5 - listed
http://news.sys-con.com/node/3456101

#cybersecurity - REPORT - Insurance
PWC
Insurance 2020 & beyond: Reaping the dividends of cyber resilience
http://www.pwc.com/gx/en/industries/financial-services/insurance/publications/insurance-2020-cyber.html

#cybersecurity #insurance
market to reach $7.5 billion annual premiums by end 2020
& min.  $5 billion by 2018
insurance co's may MITIGATE risks by
partnering w/ technology co's
+ data sharing b/w insurance co's

Insurer mitigation also by:
conditional regular risk assessments
of client ops & required remedies re reviews
http://www.pymnts.com/in-depth/2015/cyber-insurance-market-to-thrive-triple-by-2020/

#military
DOD - Overhaul of Military Ground Systems
in favour of single UNIFIED system for satellite networks

Satellite networks
multiple siloed ground systems
aka “stove-piped”
=  inhibits security, resiliency, agility & affordability

stovepiped / single ununified systems
=  op systems each functioning w/ unique proprietary software from contractors

#military ground systems
- USG wants to move away from reliance original contractor
/ own tech baseline
/ free up competition

DOD overhaul aim:
  • *control interfaces + standards
  • *no limits interface / proprietary s/w
  • *no contractor control architecture

DOD overhaul of military ground systems goals
 *agility
 *automation
 *security
 *resilience
 Cost savings = inherent result

cybersecurity
= too many interfaces + incongruous software:
*multiple cyber attack surfaces
*must be defended individually
Enterprise Ground System (EGS)
/ DOD interested in using #cloud tech for EGS
/ type undecided
/ Airforce favours private (b/c physically reside w/in operation centres)
http://www.satellitetoday.com/regional/2015/09/14/dod-prepares-for-overhaul-of-military-ground-systems/


NYSE
STUDY by Veracode
2015 Survey
#cybersecurity in the Boardroom - 8pg PDF
https://www.veracode.com/sites/default/files/Resources/Whitepapers/cybersecurity-in-the-boardroom-whitepaper.pdf

Associated article:
Boardrooms and cyber security http://thetandd.com/news/boardrooms-and-cyber-security/article_5edccb5b-aed1-5e88-b2e4-0dd396d5540d.html


Twitter
hired a trio of firms
/ first outside lobbyists to work DC
spent $160K / first-half
http://www.odwyerpr.com/story/public/5332/2015-09-14/twitter-enters-dc-lobbying-fray.html


quantum encryption
quantum random number 
generator | Entropy Engine
/ 200 million random Nos.
http://www.santafenewmexican.com/news/health_and_science/science-on-the-hill-for-cybersecurity-in-quantum-encryption-we/article_2ce4c8bb-78fa-5dbc-826f-ffdd33501ae3.html

WEBINAR - cybersecurity
Former NSA Tech. Dir.
Jim Penrose
cyber ops expert
subtle traces compromise detection
http://www.bankinfosecurity.com/webinars/view-from-inside-intelligence-driven-approaches-to-cyber-detection-w-764

#Germany #cybersecurity
new IT Security Law
July 24, 2015
foresees admin fines
4-yr evaluation
*overview & links
http://www.natlawreview.com/article/what-you-need-to-know-about-germany-s-cybersecurity-law

#cybersecurity #hacker
9 FBI Warnings
/ risks posed by Internet of Things ('IoT')
x10 device examples
http://www.defenseone.com/threats/2015/09/fbi-department-homeland-security-warnings-internet-connected-everyday-objects/120905/

IronNet
fmr  NSA Director Keith Alexander
raised $7.5 million in equity
re IronNet #Cybersecurity
pt  $25-m Trident Capital financing

IronNet Cybersecurity
funds to go to:
*cybersecurity products
*building the company’s workforce
http://www.bizjournals.com/baltimore/blog/cyberbizblog/2015/09/keith-alexander-led-ironnet-cybersecurity-raises-7.html

#cybersecurity
digital tax fraud 
skyrocketed over last year
/ data breaches
PROPOSED bill re notices ID theft

almost half USA states
= reported spikes in electronic filing fraud
= Minnesota stopped accepting some electronic returns

http://thehill.com/policy/cybersecurity/253542-senate-committee-will-mark-up-digital-tax-fraud-bill


#cybersecurity
new chip developed by Xerox
= self-destruct on command
Gorilla Glass / shattering chip

Potential use:   storage device for encryption keys

https://www.siliconrepublic.com/enterprise/2015/09/14/self-destructing-chip-xerox

Korean-based SK Telecom
+ Greenville USA co.
to develop vehicle cybersecurity
/  Quantum Cryptography

... securely distributes a secret key to legitimate parties. Here, a key is a table of random numbers shared by legitimate users in such a way that the information is known only to them, and secure means secure against any possible eavesdropping, which is the highest level of security. The system is expected to enhance security of critical network infrastructure.

Currently, most systems, including the connected vehicle ecosystems, use software-based pseudo-random number generators for encryption, meaning that they can fall vulnerable to hackers who decrypt the sequence of digits. Once developed for commercial use, SK Telecom’s technology will eliminate such concerns for security as it generates true random numbers based on hardware.
http://gsabusiness.com/news/55654-greenville-center-korean-firm-to-develop-vehicle-cybersecurity

#cybersecurity
E-ZPass
vulnerable to hackers, ID thieves + govt spying
/ not using encryption
E‑ZPass
= electronic toll-collection system
=  tolled roads, bridges, & tunnels USA
http://www.whdh.com/story/30022568/report-e-zpass-vulnerable-to-hackers-identify-thieves

#SouthAfrica #law
proposed bill too broad
consequences beyond remit
/ state cyberwarfare
/ warrantless seizure

#SouthAfrica
/  penalties - to 25 years in prison
/  has until Nov 30 to submit comment on proposed bill.

http://www.zdnet.com/article/south-africa-gets-first-look-at-cybercrime-bill-that-comes-with-25-year-jail-terms/

#Tor
.onion domain
= formal recognition granted
security certificates available to site admins
http://www.cbronline.com/news/cybersecurity/business/regulators-give-tors-onion-domain-name-special-use-status-4669709

USA Dept Energy
DOE REPORT linked
US #Energy Tech
Exports
= cybersecurity risks - b/c rely on digital tech
http://www.theepochtimes.com/n3/1751096-global-energy-growth-could-disrupt-americas-grid-security-doe-report-says/

---------------------- ꕤ ----------------------
COMMENT

Bunch of random stuff I looked at.

It all seemed very exciting ... at the time.  Now, I'm not so sure.  lol

The onion domain news and the self-destructing chip is exciting, I guess.

I'm no techie, so the 'internet of things' doesn't bother me.  I like everything manual, if I can help it.  lol

Twitter hiring Washington lobbyists is kind of exciting.  Wonder why?

The US military proposed overhaul of ground satellite communications (if I understand correctly), is pretty cool.

Surprise that it has taken them until 2015 to come up with those ideas, when they're in the business and should know what they're doing when it comes to multiple contracts and software applications etc.

It doesn't sound too efficient at the DOD.

Digital tax fraud sounds boring.  I don't even know what the point of it is.  lol  People pretend to be someone else ... but then what?

Oh, the best news it the Ninth Circuit Court ruling regarding copyright!

Take that, Universal Music a#@!@#s!


March 18, 2015

TWITTER CENSORSHIP - CABLEDRUM / WIKILEAKS




TWITTER CENSORSHIP








COPYRIGHT DISCLAIMER
Copyright Disclaimer under section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education and research.







CABLEDRUM







“The WikiLeaks Supporters Forum” at wikileaks-forum.com website, the pseudo forum:












August 27, 2014

TWITTER Lobbying


Tend to do things on the fly rather than after careful consideration and extensive research, so my attempt at the odd bit of Twitter campaigning is rather lame to say the least!

Is it best to selectively target an 'audience' or is getting the word out broadly and maybe stirring a little interest and debate a worthwhile pursuit, irrespective of the values or ideologies of the target 'audience'?

The problem with not being selective is perhaps coming across as aligned with or open to groups, causes, beliefs etc that aren't necessarily in keeping with one's own values -- as well as potentially alienating more suited 'audiences'.

Hmmmm ....

August 16, 2014

US Center for Strategic Counterterrorism Communications - Out-tweeted by Jihadists


Can the U.S. out-tweet the terrorists?



Published: 15 August 2014 02:45 PM

Updated: 15 August 2014 02:58 PM


[...]

The American effort appeared to amuse some of the Islamist tweeps who were engaged in the battle. “Your boss is going to fire you soon if these tweets don’t improve,” joked someone named Abu Ottoman.

This exchange wasn’t accidental or uncommon. It’s part of a State Department program to change how the United States deals with extremist communications online. For years, the government vacillated over how to respond to al-Qaeda’s online broadcasts, from its martyrdom videos to Inspire, the terrorist group’s slick English-language digital magazine. Fighting back was considered beneath the office — we don’t negotiate with terrorists and all that.

Under the George W. Bush administration, the government also believed it was fighting such a vast, communist-like ideological threat that there were simply too many jihadists to try to dissuade them one by one on social media. The better approach, the previous administration thought, was to campaign broadly for freedom. “For the longest time, there was total resistance in the State Department to badmouthing al-Qaeda — as a job that the State Department should be engaged in — and that the real solution should be to sell America, to tell America’s story,” says Will McCants, who helped set up the CSCC when he served as a senior adviser for countering violent extremism at the State Department.

That has changed under Bush’s successor, Barack Obama, who took a much narrower view of terrorism, confining his focus to al-Qaeda and seeking to make it less a war than a law-enforcement and intelligence problem. Under Secretary of State Hillary Clinton, the State Department began to a pursue a policy of what she called “21st-century statecraft,” a broad designation that included anything from using social media to speak directly to people in the developing world to helping foreign dissidents set up secure communications networks.

Now, the government is trying to go on offense, challenging terrorist propaganda all across the new digital battleground and seeking to wean would-be terrorists from the cause, recruit by recruit, using the hashtag #ThinkAgainTurnAway. The CSCC wants to “contest the space” that, in the words of State Department senior official Alberto Fernandez, who oversees the program, “had previously been conceded to the enemy.”

In practice, this means that the center, with its $5 million budget, verbally jousts with jihadists on social media all day long. Not a bad idea, according to experts like McCants. The problem is that it appears to be losing — at least when it comes to showing the quick thinking and verbal dexterity that so characterizes the big winners in the social-media universe. In an arena in which people are largely inured to the frequent intrusions of advertising, the center is conducting itself like it’s the only propaganda operation in town.

The way the program works is fairly simple: The State Department’s analysts follow online chatter about the latest ISIL victory or news of a recent al-Shabaab massacre in Kenya, and then they try to insert themselves into the conversation. The idea is less to sway committed terrorists than to persuade fence-sitters not to join up or provide material support.

But State’s messages usually arrive with all the grace of someone’s dad showing up at a college party. The posts tend to be blunt, adversarial and plagued by poor Photoshop work. Typically, “Think Again Turn Away,” as the CSCC’s English-language Twitter account calls itself, delivers hectoring messages written in the schoolmarmish tone of Reagan-era “Just Say No” commercials — only this time it is terrorism, not drugs, they’re trying to scare everyone away from.

And because the government’s tweeting is so flat and self-serious, few people — even those most sympathetic to its messaging — are motivated to share the CSCC’s posts. As anyone bidding for attention on social media knows, that’s a serious problem.

Islamic State supporters, by contrast, can be playful and droll, though sometimes the humor is exceedingly macabre and only appeals to a certain sensibility. Many of the photos being circulated — such as one of a dead Shiite man floating in a body of water, alongside a joke about him being taught to scuba dive — are horrific, but they also make for popular jihadist memes. (That particular picture was retweeted nine times and favorited 15.)

The plain fact is that, for now, groups like the Islamic State are far more sophisticated than the State Department in their messaging.



The rise of social media has transformed how jihadist propaganda is disseminated, news is spread and recruits are gathered. Extremist groups have proved themselves to be rather adept at utilizing new forms of digital communication. Knowing that Western intelligence agencies are likely watching, the Islamic State and its sympathizers have taken to hopscotching among various social networks, using each for different tasks: Twitter and YouTube for propagandizing and making initial contacts; Ask.fm for establishing a closer rapport; and private messaging apps like Kik and Surespot for disseminating instructions about how to find an Islamic State-associated imam, or where to cross the porous Turkey-Syria border.

At the same time, open-source intelligence — the gathering of intelligence from public forums — has become an essential tool for analyzing the opinions of large populations, tracking terrorist activities and seeing how radicalization plays out online. Yet despite this glut of new information sources, there had been reluctance about using the State Department as a bully pulpit until fairly recently.

In the past, the American government preferred to respond to jihadist activity online with covert means — monitoring chatrooms, shutting down password-protected forums or making them difficult to access. Sometimes intelligence analysts would let members of a jihadist forum know that they were watching. “It’s like inserting an informant into a prison to sow distrust,” says William Braniff, the executive director of START, a terrorism research center at the University of Maryland. “People no longer trust their cellmate.”

But those efforts also had the effect of making forums “much less vibrant places,” Braniff says. Jihadists began to retreat from communicating in spaces where they once felt they could speak freely, and intelligence gathering suffered.

[...]  ** EXTRACTS ONLY - FULL @ SOURCE **


http://www.dallasnews.com/opinion/sunday-commentary/20140815-can-the-u.s.-out-tweet-the-terrorists.ece


Thought this was an interesting article.

CSCC is Center for Strategic Counterterrorism Communications

August 04, 2014

TWITTER - Obama

TWITTER







LOL

TWITTER - Who knew?

Haven't got the hang of this twitter stuff yet.

For some reason, my tweet froze and I couldn't shake it.

Tried exiting and calling up a new page.  But no go.

Rebooted the computer.

Still no go.

Who knew twitter could disappear?

Then I started with the clearing of browser history and clearing of Google history.

Still no joy.

Searching 'how-to' info, I stumble on this:

Twitter account suspension stuff (here) and I'm thinking NOOOOOO, I've been suspended or something.

WTF?  What did I do?

Well, for starters, who knew that you can't respond to tweets out there?

Hey, if there's a 'reply' button, it's fair to assume one can reply to tweets that are floating about in cyberspace.

Nope. 

Mental note:  do not reply to tweets unless hooked up.  LOL.

Anyway, that wasn't the problem.  But it's good to know. 

Up and running now, so I've no idea what happened.

Really creepy tho.

Maybe twitter were out to lunch?

Don't know.

August 03, 2014

Twitter - Deaths




Just checked out twitter posts on conflicts in the Middle East and it isn't pretty.

Watched tanks being blown up and dead people lying around covered in dust.


The individual deaths seem pointless.

Bang.  Gone.  Snuffed out.  No more.


July 18, 2014

TWITTER - Tweet Responsibly & Combat Russian Propaganda Now!

TWITTER




A handbook for responsibly tweeting breaking news, 
via @onthemedia

** Verified account

**
When I die, bury me inside the Mars Cheese Castle. I write for @NationalJournal. Past: @Slate, @NPR, @Chronicle, @JournalSentinel. **@nationaljournal.com
Washington, DC 


* Some Twitter post above *   
-------------------------------------

COMMENT

It looks useful.

  • #1 - So don't go to news outlets?  LOL.

  • #2 - Hey, don't knock anonymous.  Not everyone will put their necks on the chopping block to get information out.  But that doesn't make the information any less valuable.  Just handle with caution.  LOL.

  •   #3 - Are you kidding?  
Many legitimate and reliable sources quote other sources.  But if unsure of the source, I guess you go to  the original and check it out.

... Yeah, whatev-- for the rest.

Buyer Beware
The mainstream media impart what they wish to impart, on behalf owners, on behalf of corporations, on behalf of government & on behalf of buddy politicians -- so handle with care.

Far better to read widely -- and that includes Twitter.

Close to incident isn't always the best place to read.  

There's nothing out of the Ukraine that I would bother reading (and most definitely not about the Malaysian Airlines MH17 incident).

So you take the risk and occasionally get it wrong?  Big deal.  

Twitter's not held up to some journalistic benchmark; it's a means of communicating information informally and rapidly.   

By all means, scrutinise Twitter but don't expect to hold Twitter to same benchmarks as mainstream media ... it's not that kind of beast.

By the same token, don't dismiss Twitter offhand ... there's some fantastic material on there.  And if there's the risk of the occasional hoax, well that makes it so much more fun.  LOL.

Mainstream media deliberately get it 'wrong' most of the time. What you get in mainstream media is impression creation and 'party line' propaganda -- or whatever agenda they themselves wish to push.

Read mainstream, but read it with a critical eye -- and check out what the *other side* is saying.  

As for Twitter ... don't be shy.  Check out whatever you damned well want &, never fear, tweet away to your little heart's content (it's not journalism ... LOL).

Take what you will and enjoy it for what it is.  LOL.

The Twitter poster who put up the above guidelines writes for:  National Journal (Washington):

National Journal
The Watergate
600 New Hampshire Ave, NW
Washington, DC 20037 

NationalJournal.com
NationalJournal.com covers politics and policy in Washington, including the following issue areas: White House, Congress, politics, energy, health care, defense, and technology. 
Owner:  Atlantic Media Company

David G. Bradley ... is the owner of the Atlantic Media Company, which publishes several prominent news magazines and services including The Atlantic, National Journal, The Hotline and Government Executive.
Before his career as a publisher, Bradley founded the Advisory Board Company [Global research & technology] and Corporate Executive Board [CEB is a publicly traded company that provides advisory services to businesses worldwide], two Washington-based consulting companies.
Politics

Politically, Bradley considers himself a centrist, although he has also described himself as "a neocon guy" who was "dead certain about the rightness" of invading Iraq.
[wikipedia]

Well, thanks for the guidelines nice corporate people ...

P.S.

'A handbook for responsible tweeting' sounds like something out of Communist China.  LOL.

Hey, is this the first shot of the fight against Russian and Palestinian  'propaganda'?!!

Quick, someone tweet Rasmussen and the gang!