COP Ep 10 – Conspiracy Otter vs Operation Mockingbird

Conspiracy Otter Ep 10

 Conspiracy Otter vs Operation Mockingbird

If you go to Google and type in ‘Climate Change is”…. You’ll get different results that follow/prompt that term in the search bar depending on where you live and the particular things Google knows about your interests. That is not an accident, it is a design technique. What you should know is everything you do on-line is being watched, every action you take is carefully monitored and recorded. And if you are listening to this podcast….. They now know that YOU know. 

There is an interesting movie/documentary I recently watched called The Social Dilemma | Official Trailer | Netflix – that sheds some light on this, but also gets into the phycology, tactics and algorithms behind tracking your actions and keeping you on-line longer so they can gather more data and guide your choices if not lead you in specific directions you may not know where know were not your own ideas to go down until they prompted you. But let’s rewind for a moment and go back a little further in history from where we are now and talk about how we got here.  

Operation Mockingbird wiki page is an alleged large-scale program of the CIA that began in the early years of the Cold War and attempted to manipulate news media for propaganda purposes. It funded student and cultural organizations and magazines as front organizations. Both the United States and the Soviet Union use mass media to influence public opinion internationally. 

-Autocue and other companies provide news anchor scripts

-Bush makes propaganda legal https://www.nytimes.com/2005/03/13/politics/under-bush-a-new-age-of-prepackaged-tv-news.html

-Bush admits news is pre packaged https://www.youtube.com/watch?v=5bcohDkDHKw 

After the Watergate scandal in 1972–1974, Congress became concerned over possible presidential abuse of the CIA. This concern reached its height when reporter Seymour Hersh published an exposé of CIA domestic surveillance in 1975. Congress authorized a series of Congressional investigations into Agency activities from 1975 to 1976. A wide range of CIA operations were examined in these investigations, including CIA ties with journalists and numerous private voluntary organizations. The report covered CIA ties with both foreign and domestic news media.

For foreign news media, The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. For the U.S.-based media, Approximately 50 of the [Agency] assets are individual American journalists or employees of U.S. media organizations. Of these, fewer than half are “accredited” by U.S. media organizations … The remaining individuals are non-accredited freelance contributors and media representatives abroad … More than a dozen United States news organizations and commercial publishing houses formerly provided cover for CIA agents abroad. A few of these organizations were unaware that they provided this cover.

Flash forward to more recent times and new methods of communication… 

DARPA LifeLog wiki page LifeLog aimed to compile a massive electronic database of every activity and relationship a person engages in. This was to include credit card purchases, web sites visited, the content of telephone calls and e-mails sent and received, scans of faxes and postal mail sent and received, instant messages sent and received, books and magazines read, television and radio selections, physical location recorded via wearable GPS sensors, biomedical data captured through wearable sensors. The high level goal of this data logging was to identify “preferences, plans, goals, and other markers of intentionality”

Another of DARPA’s goals for LifeLog had a predictive function. It sought to “find meaningful patterns in the timeline, to infer the user’s routines, habits, and relationships with other people, organizations, places, and objects, and to exploit these patterns to ease its task” The DARPA program was canceled on February 4th 2004 the very day Facebook is founded

Qanon March 9, 2019 – Facebook Equals Lifelog (using your dopamine against you)

Why pay for data mining of personal information through a military project when you can open a social networking app where the users give their information for “FREE”.

Also, the other two members of Facebook’s Board of Directors in addition to Zuckerberg (Peter Thiel and James Beyer) have ties to data mining and DARPA as well.

The Government & Social Media

Social Media Is a Tool of the CIA. Seriously

In-Q-Tel wiki page  IQT through the years from their website

  • KH-11_Kennen aka Key Hole reconnaissance satellite first launched in Dec 1976. The capabilities of the KH-11 are highly classified, as are images they produce. The satellites are believed to have been the source of some imagery of the Soviet Union and China made public in 1997; images of Sudan and Afghanistan made public in 1998 related to the response to the 1998 U.S. embassy bombings and a 2019 photo, revealed by President Donald Trump, of a failed Iranian rocket launch.
  • Keyhole became the foundational platform for Google Earth
  • On Keyhole’s board of directors is George Tenet is a former Director of Central Intelligence (DCI) for the United States Central Intelligence Agency 
    • He played a key role in overseeing intelligence regarding weapons of mass destruction in advance of the Iraq War. A 2005 Inspector General’s report found that Tenet bears “ultimate responsibility” for the United States intelligence community’s failure to develop a plan to control al Qaeda in the lead-up to 9/11. Tenet has been criticized for personally authorizing the CIA’s use of brutal and ineffective torture techniques during his tenure, in contravention of international law.
  • InQ-Tel and Magnet Forensics In-Q-Tel Invests in Magnet Forensics for Digital Evidence Analysis Tech The Intelligence Community’s venture capital arm In-Q-Tel has invested in digital forensics software developer Magnet Forensics and established a strategic partnership that seeks to support national security and law enforcement agencies. Claim to be able to Retrieve Evidence from Encrypted Devices 

THE CIA IS INVESTING IN FIRMS THAT MINE YOUR TWEETS AND INSTAGRAM PHOTOS 4 years ago in this article, it stated that among 38 previously undisclosed companies receiving CIA venture capital funding, several are developing tools to mine social media.

The latest round of In-Q-Tel investments comes as the CIA has revamped its outreach to Silicon Valley, establishing a new wing, the Directorate of Digital Innovation, which is tasked with developing and deploying cutting-edge solutions by directly engaging the private sector. The directorate is working closely with In-Q-Tel to integrate the latest technology into agency-wide intelligence capabilities.

  • Dataminr directly licenses a stream of data from Twitter to visualize and quickly spot trends on behalf of law enforcement agencies and hedge funds, among other clients.
  • Geofeedia specializes in collecting geotagged social media messages, from platforms such as Twitter and Instagram, to monitor breaking news events in real time. The company, which counts dozens of local law enforcement agencies as clients, markets its ability to track activist protests on behalf of both corporate interests and police departments.
  • PATHAR’s product, Dunami, is used by the Federal Bureau of Investigation to “mine Twitter, Facebook, Instagram and other social media to determine networks of association, centers of influence and potential signs of radicalization,”
  • TransVoyant, founded by former Lockheed Martin Vice President Dennis Groseclose, provides a similar service by analyzing multiple data points for so-called decision-makers. The firm touts its ability to monitor Twitter to spot “gang incidents” and threats to journalists. A team from TransVoyant has worked with the U.S. military in Afghanistan to integrate data from satellites, radar, reconnaissance aircraft, and drones.
  • Google photos facial tagging

Over the last decade, In-Q-Tel has made a number of public investments in companies that specialize in scanning large sets of online data. In 2009, the fund partnered with Visible Technologies, which specializes in reputation management over the internet by identifying the influence of “positive” and “negative” authors on a range of platforms for a given subject. And six years ago, In-Q-Tel formed partnerships with NetBase, another social media analysis firm that touts its ability to scan “billions of sources in public and private online information,” and Recorded Future, a firm that monitors the web to predict events in the future.

  • They already know who you are. Jetblue using facial recognition during check-in 
  • Hunter Biden’s firm funded by the Chinese government invested in a company called Face++  a military surveillance technology company that the Chinese government would use to monitor and control the population (Muslim) in their own country.  Here are some of the tech that Face++ advertises on their website. 
    • Facial Recognition, Human Body Recognition, Skeleton Detection, Dense Facial Landmarks, Face Compare, etc. 

Machine Learning Fairness – Algorithms used to make decisions for us so that they are ‘fair’. 

A range of U.S. law forbids discrimination against protected classes in a variety of contexts, such as employment, credit, housing, public accommodation, public education, jury selection, use of genetic information, and health care and health insurance. Protected classes include: racial, ethnic, religious, and national minorities; women; seniors; and people with genetic vulnerabilities, disabilities, or pre-existing medical conditions. As we lean on technology to help us adhere to standards, adding algorithms for fairness can cause huge problems, what is fair?

  • Department of Housing and Urban Development this year brought a case against Facebook alleging that it violated the prohibition on housing discrimination because its machine learning algorithms selected the housing advertiser’s audience in a way that excluded certain minority 
  • Congress is also considering legislation to mandate company consideration of algorithmic fairness. The Algorithmic Accountability Act of 2019 requires companies to assess their automatic decision systems for risks of “inaccurate, unfair, biased, or discriminatory decisions.” 
  • It should not be a surprise to a company that its decision-making systems produce an adverse outcome for protected classes. Furthermore, it should not be left to the public to discover these effects through random personal experiences, as allegedly happened in the case of Apple’s venture into the credit card business with Goldman Sachs.
  • These fairness algorithms are also being used for a risk score used to determine criminal sentencing and assist in parole decisions. But have found that it is twice as likely to commit errors with Black individuals than white. In addition, Upturn demonstrated that Facebook’s machine learning ad targeting practices are disproportionately skewed along gender and racial lines for employment and housing ads.
  • One algorithm assigned patients to risk categories based on their average health care costs. But because of racial disparities in access to health care, equally sick Black patients do not receive as much care as white patients, and the algorithm unintentionally exacerbated this racial disparity. Using the algorithm, Black patients accounted for only 17.7% of patients recommended for extra care, but using an unbiased algorithm, 46.5% of patients assigned extra care would have been Black.
  • Amazon tried this approach in its attempt to develop a hiring algorithm for software engineers. It experimented with using historical data to train an automated method of selecting promising applicants, did disparate impact analyses, and found that these algorithmic results disproportionately rejected women. While the company fixed the factors that were leading to this disparate impact, it encountered others it could not fix. Ultimately, Amazon abandoned its attempt at recruitment automation.

Recorded Future  In-Q-Tel doesn’t make investments in firms without an “end customer” ready to test out that company’s products. Both In-Q-Tel and Google Ventures have seats on Recorded Future’s board. Ahlberg says those board members have been “very helpful,” providing business and technology advice, as well as introducing him to potential customers. Both organizations, it’s safe to say, will profit handsomely if Recorded Future is ever sold or taken public. Ahlberg’s last company, the corporate intelligence firm Spotfire, was acquired in 2007 for $195 million in cash.

Google “likely” breached a U.S. federal criminal statute in connection with its accidental Wi-Fi sniffing – but not for siphoning private data from internet surfers using unsecured networks, a former federal prosecutor said Tuesday.

Google pledges not to misuse the information still ring true to many. But unease has been growing. Thirty seven state Attorneys General are demanding answers from the company after Google hoovered up 600 gigabytes of data from open Wi-Fi networks as it snapped pictures for its Street View project. (The company swears the incident was an accident.) Ironically, says former prosecutor Paul Ohm, it’s likely Google did not violate wiretap regulations, but instead might have breached the Pen Register and Trap and Traces Device Act for intercepting the metadata and address information alongside the content.

Just because Google and In-Q-Tel have both invested in Recorded Future doesn’t mean Google is suddenly in bed with the government. Of course, to Google’s critics – including conservative legal groups, and Republican congressmen – the Obama Administration and the Mountain View, California, company slipped between the sheets a long time ago.

“Secret information isn’t always the brass ring in our profession,” then CIA-director General Michael Hayden told a conference in 2008. “In fact, there’s a real satisfaction in solving a problem or answering a tough question with information that someone was dumb enough to leave out in the open.”

iarpa.gov research-programs 

WPP Names Visible Technologies as Its Preferred Provider in Social Listening and Analytics-Technologies-Preferred-Provider-Social the CIA and the world’s largest ad agency network, WPP (WPPGY), have been in bed together on a social media data-mining venture since at least January 2009. WPP currently claims to own the world’s largest database of unique individual profiles — including demographic, financial, purchase and geographic histories. WPP’s Visible Technologies unit took an investment from In-Q-Tel in fall of 2009. Visible Technologies develops tools that can scan social media networks such as Twitter and Facebook.

The company employs over 158,000 people (including associates) in 2,500 offices in 107 countries. For more information, visit www.wpp.com.

WPP named most creative communications company of the Decade – Cannes Lion Festival of Creativity 

There are many companies with very similar databases on you, one we talked about last episode: Conspiracy Otter Ep 9 – Conspiracy Otter vs Cover-ups and Conspiracy Updates

  • https://clearforce.com/ The ClearForce Resolve™ platform protects organizations and employees through the continuous evaluation of risky behavior. It delivers real-time, event-based alerts of external employee misconduct and high-risk behavior that may present a level of risk to the organization, its employees, or its customers.
  • Dynology (which just removed their executive page since our last podcast)

and guess what? They are hiring! And many jobs are in Fort Belvoir, VA 

  • Psy Group (Isralie company) Israel Seeks to Erase Archives of Intel Firm Psy-Grouprchives  – its brief four-year existence, dealt in online perception management, social media influencing/manipulation campaigns and opposition research often employing fake users and websites.
  • The Analysis Corporation – TAC was instrumental in providing pattern recognition and data mining software applications that served as the basis for the US Government’s original terrorist watch list database called TIPOFF. In early 2008 TAC found itself in the midst of a scandal when a State Department spokesman revealed that a TAC contractor, formerly a retired State Department employee, gained unauthorized access on March 14 to the passport records for Barack Obama and John McCain.
  • Global Strategy Group Specifically, we understand and reach audiences. We change minds and influence public opinion. We champion issues and leaders. We advance legislative, regulatory, and political goals. And we build and protect reputations.
    • Survey Research, Qualitative Research, Predictive Analytics, Social Media Analytics, Competitive Intelligence, Influencer and Stakeholder Mapping 
  • https://www.cgi.com/en/advanced-analytics Organizations are looking to exploit the power of data using advanced analytics…  includes using data science techniques such as machine learning, data mining, predictive analytics and location intelligence.

Family Jewels (Central Intelligence Agency)Family Jewels” is the name of a set of reports that detail sensitive activities conducted by the United States Central Intelligence Agency. Considered illegal or inappropriate, these actions were conducted from 1959 to 1973

The Central Intelligence Agency violated its charter for 25 years until revelations of illegal wiretapping, domestic surveillance, assassination plots, and human experimentation led to official investigations and reforms in the 1970s. (a statement from the Analysis Group)

  • One of the examples was  Wiretapping of two syndicated columnists, Robert Allen and Paul Scott (see also Project Mockingbird)
  • Another item was funding of behavior modification research on unwitting US citizens, including unscientific, non-consensual human experiments (see also Project MKULTRA concerning LSD experiments)

How to win friends and influence people:

The Gulf War – wiki page (A great read on how the war started) but go to the section for “Public relations campaign targeting the public”

Although the Iraqi military committed human rights abuses during the invasion, the alleged incidents that received the most publicity in the US were fabrications of the public relations firm hired by the government of Kuwait to persuade Americans to support military intervention. Shortly after Iraq’s invasion of Kuwait, the organization Citizens for a Free Kuwait was formed in the US. It hired the public relations firm Hill + Knowlton Strategies for about $11 million, paid by Kuwait’s government. (Iraqi soldiers pulling babies out of incubators and letting them die on the floor) Fake nurse was actually Kuwait ambassador daughter

https://en.wikipedia.org/wiki/Nayirah_testimony

  • Basically the manipulation of someone’s likes/dislikes can be done effectively by a PR firm by falsehoods (fake news)
  • Fake news to lock us down. Hong Kong and Taiwan protests
Play
weighted blanket amazon