PsyOps and Socialbots
September 3, 2013
Introduction
Social media are the principal aggregation “places” in cyberspace; billions of connected people are using it for a wide variety of purposes from gaming to socialization.
The high penetration level of social media makes these platforms privileged targets for cybercriminal activities and intelligence analysis. In many cases, both aspects come together and operate in a manner similar to the pursuit of the same objectives.
As described in my previous article “Social Media Use in the Military Sector,” social media are actively attended by state-sponsored actors and governments to support military operations such as:
- Psychological operations (PsyOps)
- OSInt
- Cyber espionage
- Offensive purposes
Psychological Operations (PsyOps)
Military doctrine includes the possibility of exploiting the wide audiences of social media to conduct psychological operations (PsyOps) in a context of information warfare with the primary intent to influence the “sentiment” of large masses (e.g., emotions, motives, objective reasoning).
PsyOps is defined by the U.S. military as “planned operations to convey selected truthful information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately, the behavior of their governments, organizations, groups, and individuals.”
“Psychological operations” is not a new concept. In the past, on many occasions and in different periods, the military has used the diffusion of information to interfere with opponents divulging artifact information or propaganda messages. Governments have used secret agents infiltrated behind the enemy lines or launched leaflets with a plane over enemy territories; today, social networks have the advantage over these types of missions.
The terms “psychological operations” and “psychological warfare” are often used interchangeably; “psychological warfare” was first used in 1920 and “psychological operations” in 1945. Distinguished theorists like Sun Tzu have highlighted the importance of waging psychological warfare:
“One need not destroy one’s enemy. One only needs to destroy his willingness to engage…”
“For to win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the supreme excellence.” – Sun Tzu
Governments consider PsyOps a crucial option for diplomatic, military, and economic activities, the use of new-generation media and large-diffusion platforms such as the mobile and social media gives governments a powerful instrument to reach critical masses instantly.
PsyOps consist in conveying messages to selected groups, known as target audiences, to promote particular themes that result in desired attitudes and behavior that affect the achievement of political and military objectives. NATO promoted a doctrine for psychological operations defining target audience as “an individual or group selected for influence or attack by means of psychological operations.”
In the document, “Allied Joint Doctrine for Psychological Operations AJP-3.10.1(A),” NATO has highlighted the possibility of supporting military operations with PsyOps following three basic objectives:
- Weaken the will of the adversary or potential adversary target audiences.
- Reinforce the commitment of friendly target audiences.
- Gain the support and cooperation of uncommitted or undecided audiences.
The military sector is investing largely in PsyOps professionals; it is exploring these technologies to influence individuals to support their cause or the sentiment of an entire population.
To influence common sentiment on specific topics, intelligence agencies arrange political and geopolitical campaigns using impressive amounts of data to induce specifically crafted information, fake or not, on the masses. Intelligence agencies use social media networks as a vector of the information flow; dedicated content is created to raise the attention of topics of interest and various discussions are carried on to involve an increasing number of users. Just the dynamicity of discussions represents the primary element of innovation in modern PsyOps: These discussions are structured with ad hoc comments and posts and they are used to sensitize and influence the user’s perception of events.
The principal advantages of using social media for PsyOps operations are:
- Social media can reach a wide audience instantly and speed is an essential factor in PSYOPs.
- Social media can reach individuals difficult to reach in other ways, thanks to the high penetration level of the Internet technology.
- The information being presented can be easily modified and changed in the cyber domain to address the target audience.
- Flexible and persuasive technologies are interactive and make it possible for an attacker to tailor operations for highly dynamic situations.
- Cyber and persuasive technologies can grant anonymity.
- Automated PsyOps on social media are more persistent and efficient than humans.
- PsyOps is a cheap means of dissemination.
- Impossibility of limiting the availability of information published to selected audiences, unless it is sent directly to the target audience as e-mail. This causes a further effort to minimize the negative impact of operations on unintended target audiences.
- Target audience has to be able to access the Internet.
- The PsyOps messages have to appeal to the target audiences much more than in most other media; this requires a great effort by the attackers.
One of the principal factors for the success of PsyOps operation is the possibility of automating the processes for information diffusion and management of the sources. To do it, entities that conduct psychological operations start from the assumption that the Internet, and in particular a social network, lacks proper management of users’ digital identities; this means that it is possible to adopt various techniques to pursue the above goals.
The U.S. military is considered one of the most active entities in developing automated software that can manipulate social media sites by using fake identities to influence internet conversations and discussions, and to spread pro-American propaganda. The Guardian reported that a Californian corporation, Ntrepid, has been awarded a contract ($2.76m contract) with United States Central Command (Centcom), which oversees U.S. armed operations in the Middle East and Central Asia, to design an “online persona management service” that will allow one U.S. serviceman to control up to 10 separate identities based all over the world.
“0001- Online Persona Management Service. 50 User Licenses, 10 Personas per user.
“Software will allow 10 personas per user, replete with background, history, supporting details, and cyber presences that are technically, culturally, and geographically consistent. Individual applications will enable an operator to exercise a number of different online personas from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user-friendly application environment to maximize the user’s situational awareness by displaying real-time local information. ”
The Centcom contract stipulates that each fake online persona must have a convincing background, history, and supporting details, and that up to 50 U.S.-based controllers should be able to operate false identities from their workstations “without fear of being discovered by sophisticated adversaries.”
The intent of the U.S. military was to influence global sentiment to create a false consensus in online discussion. A Centcom spokesman, Commander Bill Speaks, clarified that the software will not address U.S. audiences; the system is able to produce activities in different languages, including Arabic, Farsi, Urdu, and Pashto.
“The technology supports classified blogging activities on foreign-language websites to enable Centcom to counter violent extremist and enemy propaganda outside the U.S.”
Office Centcom was not interested in U.S.-based web sites, in English, or any other language, and it declared that isn’t analyzing Facebook or Twitter, but recent revelations on PRISM and other surveillance programs raise numerous doubts of the official declarations.
“Once developed, the software could allow U.S. service personnel, working around the clock in one location, to respond to emerging online conversations with any number of coordinated messages, blog posts, chatroom posts, and other interventions. Details of the contract suggest this location would be MacDill air force base near Tampa, Florida, home of U.S. Special Operations Command,” posted The Guardian.
The contract appears to be part of the program dubbed Operation Earnest Voice (OEV), which was first developed in Iraq by U.S. military with the purpose of conducting psychological warfare operations against al-Qaida on-line supporters. The program is reported to have expanded into a $200m program and, according to intelligence experts, it has been used against jihadists across Pakistan, Afghanistan, and the Middle East.
Gen Mattis said: “OEV seeks to disrupt recruitment and training of suicide bombers; deny safe havens for our adversaries; and counter extremist ideology and propaganda.” He added that Centcom was working with “our coalition partners” to develop new techniques and tactics the U.S. could use “to counter the adversary in the cyber domain.”
On February 5, 2011, Anonymous compromised the HBGary website, disclosing tens of thousands of documents from both HBGary Federal and HBGary, Inc., including company emails. The hack revealed that Bank of America approached the Department of Justice over concerns about information that WikiLeaks had about it. According an article published by The New York Times, the Department of Justice in turn referred Bank of America to the lobbying firm Hunton and Williams, which connected the financial institution with a group of information security firms collectively known as Team Themis that includes HBGary, Palantir Technologies, Berico Technologies and Endgame Systems.
Their mission was to undermine the credibility of WikiLeaks and the journalist Glenn Greenwald; the hack also revealed that Team Themis was developing a “persona management” system for the United States Air Force that allowed one user to control multiple online identities (“sock puppets”) for commenting in social media spaces. It is the same system we have already introduced.
Socialbots and Persona Management Software
Socialbots are considered the most efficient way to control social media in an automated way, trying to influence the common sentiment about specific topics. Scientists believe that socialbots are already expanding their presence in social media. During 2012, the number of Twitter accounts topped 500 million, but according some researchers nearly 35 % of the average Twitter user’s followers are real people. The Internet traffic generated by nonhuman sources is more than 50%, mainly produced by bots or M2M systems.
On occasion of the Russian parliamentary election in 2011, thousands of Twitter bots operated for several months to create specifically crafted content. Every day the principal social networks were flooded by messages targeting the political opponents and the anti-Kremlin activists, aiming to drown them out. Researchers say similar tactics have been used more recently by the government in Syria. Same tactic has been followed by officials from Mexico’s governing Institutional Revolutionary Party that used bots to sabotage the party’s critics.
Botnets are a primary choice for the attackers, who could use these malicious architectures for the following purposes:
- By replacing the identity of targeted individuals, hackers could infect victims’ systems, using spear phishing attacks to acquire their complete control. State-sponsored hackers could use zero-day exploits to hide their campaign; once they have acquired control of victims, they could impersonate another user for various purposes, from intelligence to social engineering. These kinds of operation are considerably high risk and therefore are not common for ordinary PsyOps; it is, in fact, very easy to detect an attack on a specific legitimate account that is used to spread specific information.
- More feasible is the use of botnets for identity spoofing. Attackers could create a network of fake profiles which do not correspond to any existing individual to operate conditioning on a large scale. The botnet could be designed to simulate the dialogue between those individuals on specific topic within popular forums and social networks; in this way it is possible to raise the level of attention on various issues.
Security researchers are convinced that socialbots could be used to sway elections, to attack governments, or to influence the stock market, and probably many recent events have been already influenced by the use of such malicious architecture.
Recently computer scientists from the Federal University of Ouro Preto in Brazil announced that the popular journalist on Twitter, Carina Santos, was not a real person but a botnet that they had created. What is very surprising is that, based on the circulation of her tweets, a commonly used ranking site, Twitalyzer, ranked this account as having more online “influence” than Oprah Winfrey profile.
Early in 2013, Microsoft detected a malware called Trojan:AutoIt/Kilim.A., a Trojan specifically designed to target the Google Chrome browser.
“The Trojan may be installed when an unsuspecting user clicks on a shortened hyperlink that redirects to a malicious website. The website masquerades as a download site for legitimate software, and tricks the user into downloading and executing Kilim. Upon successful execution, Kilim disables user account controls (UAC) and adds an auto-start entry in the system registry to survive the reboot. It then proceeds to download two malicious Chrome browser extensions,” Microsoft revealed.
The installed extensions are able to gain access to the victim’s social networking sites and perform actions in place of legitimate users. It’s clear that a similar behavior could be exploited to build a network of agents that promote specific topics in an automated way, using existing and legitimate user accounts.
A Zeus Trojan variant has also recently been used to hit social media. Using this popular malware, attackers could increase the rate of specific posts and spread a series of links to which the bots add thousands of likes. These variants are able to automatically post content, such as photos and comments, and to increase the number of followers influencing the attacked social media on specific topics. Using the Zeus Trojan, hackers could conduct the essential operations for a psychological operation by creating various fake profiles having a specific role in the fake network. Some nodes, in fact, will post contents simulating a discussion and thousands of others will post an unlimited amount of likes and followers for the first group of profiles, fueling the interest in a particular discussion by using comments and images.
This use of malicious code is also increasing in popularity in the cyber ecosystem; the generation of these fake items on social media to increase visibility is becoming a profitable business. On average, 1000 Instagram followers can be bought for $15 while likes go for $30. Social media customers are willingly paying thousands of dollars on similar issues and it is normal to expect that, as the rise of social media continues, the demand will rise.
“The current version of Zeus is a modified one which attacks all infected computer running on a network and forces them to like or follow pages. Furthermore, it also calls the users to install spammy apps and plug-ins.”
Usually socialbots can be more or less complex: They are able to query an internal DB that is constantly updated and containing the latest news on current events and on facts of major importance for the topic that will be addressed. The botnet structure is the optimal solution, the last generation of P2P botnets and Tor-based botnets are practically impossible to track. The botmaster could control hundreds of thousands of infected machines that could concur to promote a series of discussions on various social media. Almost any social medium could be compromised by the psychological operations conducted through these architectures; to the untrained eye, it would appear that a plethora of users are confronted on issues of various kinds when, in fact, intelligence services are working to disseminate content that will influence global sentiment.
Paradoxically, the main problem for the conduct of these operations is not the control of thousands of bots around the planet to compromise as many systems as possible, but state-sponsored actors use to exploit zero-day vulnerabilities to do this dirty work.
Also, the cybercrime industry is interested in the capabilities of socialbots, mainly for the possibility of selling Twitter followers for a price or to involve victims in fraudulent activities, such as stealing passwords or spreading other malware for a price.
The “Infiltration”—a Socialbot Experiment
Researchers Aviad Elishar, Michael Fire, Dima Kagan, and Yuval Elovic published an interesting paper, titled “Homing Socialbots: Intrusion on a specific organization’s employee using Socialbots,” that presents a method for infiltrating specific users in targeted organizations by using organizational social network topologies and socialbots. To measure the efficiency of the method, the researchers decided to target technology-oriented organizations, for which employees should be more aware of the dangers of exposing private information on social media. The scope of the experiment is to induce social network users to accept a socialbot’s friend; the acceptance is also called infiltration.
The infiltration exposes users’ information, including their workplace data. The researchers used socialbots in two phases:
- Information-gathering phase, the reconnaissance of Facebook users who work in targeted organizations.
- Target identification, the random choice of 10 Facebook users from every targeted organization. The 10 users were chosen to be the specific users from targeted organizations that the attackers would like to infiltrate.
The results were surprising: The method was successful in from 50% to 70% of the cases. The infiltration could be conducted simply to allow the attacker to gather access to personal and valuable information or to establish a first link to exploit for further psychological operation. The infiltration could be considered a strategic part of the conduction of PsyOps.
The Opinion of an Expert
To better understand the phenomenon of socialbots and the real diffusion of such malicious architecture, I decided to interview my colleague Andrei Komarov. He is a CERT-GIB CTO, the head of international projects for Group-IB, a leading company in fraud prevention, cybercrime and hi-tech crime investigations.
Mr. Komarov, based on your experience, is the use of botnets for psychological operation a common practice?
Definitely, it is one of the key parts of modern cyber warfare without any doubts. And it is important to say, that it is not related to public or military sector only. It has great impact on business and it is widely used by private companies and corporations in the competitive struggle, sometimes between brands, similar technologies, or exact personalities and top management. It terms of technologies, it is also important to mention that during 2010-2012, lots of tools of software products for social networks were appeared, most of it is targeted at mass-posting, tweeting, geotagging and etc. In terms of botnets, we found some botnets which use C&C on Twitter and Facebook, which confirms that it is really useful and sometimes it is quite difficult to find it and to take down without fast incident response from the social network.
Which are the most active countries in this field?
It is really hard to figure out the exact countries, as most of such operations are very non-transparent and, in order to detect who is behind the operation is not possible, sometimes due to the various levels of anonymization, and additional software adopted to spoof the identity of the end operators.
Has Group-IB form found evidence of working sailboat used for PsyOps?
From my side, I can mention some facts of PsyOps in social networks before important political events, such as elections of national leaders, periods of rallies and demonstrations, when it is important to increase the attention to the problem of the society and mass media. One of the brightest facts is the use of social media and PSYOPs before the important legislative changes in some countries, when social network users and specially prepared groups begin to agitate to send letters to high court or politicians and etc., which sometimes really works. Most of the accounts of fake users are ordering through online-services, such as https://buyaccs.com/, which makes this field really cost-effective. The end impact is dependent only on operators and its ideas for PR.
PsyOps Mitigation
Mitigation of automated psychological operation is a very complex mission. The technologies have provided an impressive boost for these types of operation; the instantaneity of messages, anonymity, and a wide audience are the primary keys to their success.
DARPA (Defense Advanced Research Projects Agency) has started the social media in strategic communication (SMISC) program to develop a new science of social networks built on an emerging technology base.
The general goal of the SMISC program is to develop a new science of social networks built on an emerging technology base. DARPA is working for the development of a new generation of tools to support the efforts of human operators to counter misinformation or deception campaigns with truthful information. The program has been sustained to detect any action induced by external agents to shape global sentiment or opinion in information generated and spread through social media. For the scope, security and media researchers are joining their effort to recognize specific patterns that could reveal the operation of automated botnets.
“If successful, they should be able to model emergent communities and analyze narratives and their participants, as well as characterize generation of automated content, such as by bots, in social media and crowd sourcing.”
To detect ongoing PsyOps, it is necessary to analyze large amounts of data from social media networks. Security researchers could work on two distinct fronts, detecting the flow of information aimed at influencing the global sentiment on a specific set of topics and trying to discover evidence of automated software (e.g., bot agents) that work to poison conversations on principal social media. Both paths are very hard to follow. It requires a meaningful computational capability and the definition of adaptive models able to detect the various phases of a psychological operation such as the “infiltration.”
Probably one of the most precious contributions to the definition of defensive models is provided by the offensive approach to social media: The same cyber units responsible for the detection of PSYOPs operated by foreign actors are in charge to define a new generation of software able to elude actual automated systems for the detection of the operation.
Conclusions
Psychological operations have been always considered a crucial option for the military. The large diffusion of social media gives to governments the possibility of using a new powerful platform for the spread of the news and propaganda in a context of information warfare.
The aggressor may exploit social media to destabilize a company or any other aspect of modern society: Diffusing fake news of an attack on the White House, the hacktivist group Syrian Electronic Army caused a serious temporary problem with the New York Stock exchange. It’s clear that someone could benefit from this event.
The principal change introduced with automated PsyOps is that potentially every actor could control information diffusion on media: Cyber criminals, private intelligence contractors, terrorists, and hacktivists could influence global sentiment with artifacts documenting and disseminating information with convincing and persuasive data. This aspect is crucial and represents a serious menace to contemporary information society.
It is easy to forecast an increase of PsyOps based on social media in the next year, the information war was begun many years ago and governments must address this menace with a proper cyber strategy to avoid serious risks and crisis.
PsyOps need not be conducted by nation states; they can be undertaken by anyone with the capabilities and the incentive to conduct them and, in the case of private intelligence contractors, there are both incentives (billions of dollars in contracts) and capabilities.
In 1956 the FBI established a special counter intelligence program called COINTELPRO to "neutralize political dissindents." One of the purposes of the program was to "expose, disrupt, misdirect, discredit, or otherwise neutralize."
What the heck happened to this sub??
By mrsuncensored, MakingaMurderer
February 10, 2018
Is there something I don’t know? I took a long (over a year!) hiatus from reddit and only recently came back and a lot of the subs are different now...but I think I might have to unsub from r/makingamurderer because the only things I ever see posted are saying Steven Avery is guilty and anyone who says otherwise is wrong...the whole point of "Making a Murderer" (to me, and it used to be to others when this sub was new) wasn’t even about Steven Avery and Teresa Halbach at the core, it was all about how messed up our legal system is and how regardless whether Avery is guilty he did NOT have a fair trial and he should have been innocent until proven guilty.
You do realize that a lot of innocent people have been put in jail, right? I don’t know if Steven Avery is innocent or guilty, but I do believe he didn’t deserve to be treated the way he was in the public eye before his trial ever started.
[–]angieb15
Everyone moved over to another sub because about a year ago we got taken over by some of the worst mods on reddit, they didn't know anything about the MAM and used the sub as their personal power trip/ego booster. Most of the people left are the ones who take advantage of the absence of dissenting opinion. So that's your summary. We have better mods now, but the people haven't come back.
[–]TheAngryBird03
I don’t know the history of this sub and I can’t post for the history of the other sub. However I’ve been on this sub for about a year and it is exactly as described above.
If you have a dissenting opinion in this sub you are downvoted and basically bullied out the sub. This is why you have no dissenting opinion in this sub and so many lurkers because people don’t dare to raise a subject for discussion because at some point they will be aggressively taunted and rebuked. There are people in this sub who track usernames and immediately comment with vile responses because in the past they have said they weren’t sure of SA guilt.
This is an opinion piece but please everyone who reads have a 30 second think about what you’ve posted and if it helps discussion or turns people away.
This and other subs should be about 1. establishing the truth (for either side) and 2. hopefully having a tiny bit of influence on the future of the justice system.
[–]SilkyBeesKnees
You nailed it! You don't have to spend a lot of time reading past comments and OPs on this sub before it becomes clear that there is no interest in finding the truth here. You can see what happens when someone tries... bullying, insults and rudeness. They try to spin it as though they are not to blame, but spend a bit of time reading and it will become clear... even though they say both sides are guilty of this, the proof is here in black and white for anyone who cares to look.
[–]7-pairs-of-panties
So let me get this straight...you let a shrill take over MAM before the implosion removing and deleting all kinds of post and comments and people left in droves over to TTM to carry on the conversation. Your mad cause they didn’t let the guilters follow, but only the innocent comments were ones being preyed upon in the implosion. Now many many moths later your upset because the truthers haven’t “come back home?”
No one has forgiven or forgotten what happened. Newbies are lucky to find TTM if they even do because this is the first site they’ll find. You can’t have it both ways. TTM is never going to change its mind cause it’s working. U don’t need us and we don’t need u.
[–]southpaw72
Hos_gotta_eat_too [the founder of TickTockManitowoc] got banned for posting a public doc that he didn't redact some personal info out of, it was up for about 2 minutes before it was spotted and edited, unfortunately in those 2 minutes somebody spotted it and reported him, he was demoted from being a mod which he took exception to and refuses to reddit ever since.
Needless was occasionally dropping the odd hit an run post over at ttm but I am not sure if that's still the case as I don't spend much time there
[–]MaMStats
I have a script that computes total word counts and most common words for users in a subreddit. I'm not allowed to post the results due to all the extra rules in these subreddits. What I can say is that the top 5 posters by word count in the last 3 months are all people arguing that Avery is guilty. The very top poster (who you will quickly discover if spend more than a day on this subreddit) has a word count that is 4 times higher than the next most prolific poster. Some of this posters top 25 frequent words by volume include: absurd, nonsense, bogus, irrational, idiocy, wild.
Avery's current lawyer, Zellner, filed a 1000+ page (including exhibits) motion for post conviction relief that folks on this sub like to talk about. Just for comparison, the top poster on this sub has vastly surpassed the number of words in that motion in the last 3 months.
[–]MaMStats
Here's the script if you want to run it yourself. You can adjust things like the number of pages to process if you want to change how far back the stats go.
I'm glad to hear that you also find the top poster's extreme verbosity surpsing. Also happy to see you actually doing some checking on the numbers. Your estimates are a little high though. The word count for the first 221 pages of the brief, which is the actual motion (rather than exhibits) is more like 68,000 words. So that's an average of around 308 words per page. The exhibits are a little more sparse since they often contain partially blank pages. It's also worth noting that Zellner didn't write a lot of these. They are things like phone records, work dispatch records, terms of service, etc. Also, there is a ton of boilerplate. The motion itself has 16 pages of tables of contents and such that were automatically generated. Still, I did include all that. With all that noise, the overall words per page is just over 300 words. That puts the total in the 360,000 range.
The top poster on this site absolutely did write more words than that in the last 3 months. I posted the script in many places here. Please verify for yourself.
[–]maliciousgnome
Are they paid by the word or something?
[–]MaMStats
Here's the script so you can run it yourself.
https://pastebin.com/ffpCJxZX
[–]MaMStats
Motion is around 360K words. Top poster is around 500K words. Obviously changes depending on which day you run the script. Note also that I try to exclude boilerplate from the reddit posts, like places where one user quotes another. I didn't do that same thing for the motion, so it is definitely exaggerated.
[–]MaMStats
So... the OP's question was what happened in this sub recently. These stats tell the story of what's happening.
[–]MaMStats
This account is about stats. The top 5 posters are people arguing that Avery is guilty. The very top poster writes 4 times more than the next highest poster (which would be you). This top poster also has 4x the number of posts as the next highest poster (also you). This poster also leads 2nd place in raw number of comments by a wide margin (nearly 2x). The top 5 posters combined have written 15x more than the top posting person arguing for Avery's innocence.
There is a point at which writing a lot becomes spamming. This is especially problematic in this sub where the comment downvote button is hidden by CSS. The noise is nearly impossible to filter out.
You'll obviously disagree, so I'll just save some time for you - absurd, nonsense, bogus, irrational, idiocy, wild
[–]MaMStats
It's not just word count, it's also posts. The top poster leads the next highest poster in posts (4x) and comments (nearly 2x). It's more than a 15-to-1 flood of words, posts, and comments from one side.
For those that seem to be suffering from verbal diarrhea, let me suggest the advice of many historical figures. Take more time to think about what you're writing so that we don't all have to suffer through the noise.
https://quoteinvestigator.com/2012/04/28/shorter-letter/
[–]MaMStats
This trend started almost exactly when this top poster started flooding the subreddit 6 months ago. The top poster has written the equivalent of a 1500 page book (just in this subreddit) in the last 3 months.
Your explanation might be feasible if the amount of content on one side had stayed constant. But that is not what happened. The posts on one side have vastly ramped up. This is quantifiable with stats.
[–]baking_bad
Look at the users who comment on here the most. They post here literally 100 times a day and only post in this sub. They not only act like SA is without a doubt guilty but that you're a moron if you don't 100% trust the state's story. I honestly believe it's organized astroturfing and I wish someone had the time and energy to look into where it's originating.
[–]ThatKiwiBloke
This sub isnt worth visiting unless you want to see drama. People from both sides just sling mud at each other and the "guilty" side of the sub simply attack anyone who disagrees with them in numbers to make people belive they outnumber the innocent side.
[–]SilkyBeesKnees
SAIG anyone can come and debate. Try it.
Sure they can but many of their comments are either deleted by the mods or they're shadow banned. All while saying that they don't. They do.
[–]idunno_why
Can't help the fact that most Truthers that go over there will post insults in the thread title and move on and those will most likely get removed.
Why aren't the posts that insult truthers in the title removed on this sub? It's the same mods here. It happens daily on this sub.
[–]hilandhall
Ha. I was thinking this morning. Why the hell am I still subscribed to that? Glad it’s not only me. Unsubscribing now.
[–]Jfdelman
Yeah, the guilters over run all the subs and then get buthurt that TTM is pro Avery.
[–]JJacks61
I haven't and will not read all of the comments. But simply said, a current MoD in this sub brought in an outside MoD friend of hers. That MoD began deleting Topics that were pro Avery and Dassey. (This is what I refer to as the Rogue MoD, with an agenda.)
Then Rogue MoD LIED about it. It got so bad, Admins were contacted. More lies were told. MoDs getting into open arguments when they were caught, then going back and deleting THEIR OWN COMMENTS.
Spez got involved, and the Rogue MoD that was brought in LIED to him, then went back and deleted those comments. But it was too late.
Of course, there is much more to this saga. But the damage was done. TTM was created so that people that believed that SA and BD got shafted by the State could have a place to discuss, speculate, debate without fear of their posts being deleted by some Rogue MoD that is biased. Or being verbally attacked with vile comments.
It is true that redditors that believe these guys are guilty are not welcome on TTM. This has been tried before and it simply will not work. Two groups with different outlooks can not work together. Look at what happened here. Happened on SMAM too.
It is interesting that considering the basis of the series, what is actually happened (and is continuing to happen) in this sub. But this is Reddit. Your rights mean nothing here.
BTW- At one time, there were almost 66k subscribed. 10k have left. That speaks volumes.
[–]JJacks61
"Wait, the totally annoying mod with the maturity of a 12-year-old that basically killed the old MAM sub is/was a friend of cucumbers-in-brine? (Wow. If so, that explains so much.) Or did you mean someone else?"
No, not a friend of that MoD. At this point, the names are pretty much meaningless. Nothing can or will be done. Also to note, several of the original MoDs that were here hauled ass when all this went sideways. They damn well knew what was going on and did nothing to stop it.
The Rogue Mod left after being caught red-handed. Many of us learned a valuable Reddit lesson as well. Don't expect Admin to make things right in these subs. If they get involved, it's going to suck the life out of the room.
This trainwreck could have been stopped, but was allowed to derail. Many redditors just left after many of their posts were deleted without warning.
"Nothing has happened, people have seen that SA is guilty and moved on. They were taken in by a TV drama and seen it for what it is."
You weren't even around when this sub was set on fire. Shows what little you really know about what really happened.
I'm at a loss as to why you are saying SA is guilty. His trial was over coming up on 11 years ago and he was found guilty. Is he guilty again?
MANY people believe he and Brendan aren't guilty, and MANY more know that neither one received fair trials. Due process were just words without meaning.
Also, with your reply, it is hard to fathom why YOU are here? Except to troll. These guys are in jail, their Lawyers are trying to right this wrong.. but still, they are in prison. These constant meaningless replies reek of desperation.
MaM was a catalyst, that's all. The editing is meaningless, and it had NO impact on any legal proceeding. Except that Kratz tried to steal their footage. In reality, the filmmakers were very kind towards the State players.
The legal docs tell us part of the story. We don't have everything yet.
Still, I reply to various topics here when I feel so inclined. The OP had been gone, so I filled in a few of the blanks about what has happened in this sub. And these events DID HAPPEN. He could see the drastic change in everything after being away.
I will continue to reply here on various issues or questions from time to time. Rarely doesn't mean ever in my world. I think you didn't like my comments and are slyly trying to get me to leave. I believe that's clear.
I'll answer a few of your questions, but first a comment.
I'm not living in the past. The OP asked what happened in this sub. I answered, filling in a few of the details. It's really that simple. Still, I believe it's important for current Redditors to know and understand that their posts may "disappear" without warning. To be fair, AFAIK this hasn't happened in a while. But given the history here, there is always that chance.
**
I'm glad you were a lurker here, you indicated nothing happened. I also lurked starting in 2008 before I registered. I've seen other subs go sideways. Seeing it firsthand and watching the time you've spent get deleted is frustrating. But this is Reddit, your rights mean nothing.
**
There are thousands of pages in the DCI reports that we cannot get. Hopefully at some point soon, those will become available, but who knows.
**
I cannot begin to relly know why the filmmakers included Kratz personal problems. But, understanding who he is, his character, his actions as Prosecutor in these cases should be included. After his marriage imploded in 2009 or 2010, even more outlandish behavior was uncovered. While I understand some people think this should be off limits, I and many others feel his character traits will tell us what he is willing to do as a person and as a Prosecutor.
In the years afterwards, Kratz has hitched his belt to Avery and Dassey for profit. I've had many discussions with people in this very sub that say, oh he's not like what you see and read about. But honestly, I haven't seen anything different than what I saw and read 10-12 years ago.
It's too bad really. He's clearly intelligent. But I believe he made some critical errors in these cases. I believe evidence has been buried or destroyed because to date, it hasn't been turned over. This is as serious as it gets. No matter how much it's debated, this evidence is missing, and it shouldn't be.
But I speculate, bottom line, they wanted his character and his actions to be included. They are integral to this saga, continuing to this day.
I have read that someone here has read the DCI reports, but I'm not convinced of that. Maybe I'm wrong. Skipp tried twice to get these records through FOIA requests. Denied, being not specific enough as I recall. Idk about you, but I believe if these reports further shown guilt, Kratz would have used them at trial. That's why I suspect they show something different.
My response to the OP wasn't totally meant to be a negative view of the sub, but I can understand it could be seen that way. Yes, I'm still pretty angry about how everything was handled, but with time it's not as bad. I believe this sub and the other related subs are difficult to MoD at times. I also know for a fact they cannot be modded the same way many other subs are. It really takes true fence sitters, that know the cases. Having your posts or comments deleted because a mod doesn't like them is maddening lol.
I believe the information about Kratz would have became viral no matter what. I don't know, they were probably not happy with him. Was it retaliatory on their part? It's possible, I just don't know. Andrea Canning (SP) did an in depth report on him when she worked for ABC in 2010 I believe, so it really was already out.
Still, given his actions that we know happened, shouldn't we understand his character as a Prosecutor? I guess it depends how one views his actions in the scandal - i.e. if he's willing to do this kind of thinking, what else would he do? I understand this is very subjective. Personally, I feel like he did things in these cases he wouldn't otherwise do.
I'll list a few critical things that we don't have, that we should. At least I don't understand why they are missing:
Timestamps removed from the dispatch logs.
Timestamps removed from the MTSO/CASO audio calls.
Edited flyover video footage from Nov 4th and 5th .
Missing Dassey PC Forensics CD.
I believe the system is only as good as the people running it. I don't know what he was doing during the trial time period, but I have a difficult time believing he went off the rails a couple years after these trials were over.
Anyway, thanks again for your thoughts and being very civil even though we don't agree about some things. I believe that's the underlying issue here in the sub now. We need more civility. Proof right here, that it's possible. I'm sure I'll be around :D
[–]heelspider
I posted a piece on the problems with forensic evidence in the US and even included a submission statement pointing out what it has to do with MaM specifically. The post was removed without explanation, even when I asked for it.
Meanwhile I had a guy from this sub decide his bullying wasn't working good enough and started following me to subs that had nothing to do with MaM and calling me an irrational lying idiot on everything I post everywhere and not just here. Mods told me they would do nothing about it at all.
I know modding is hard and often thankless...but I hope you can understand how it feels like posts that question the justice system get removed arbitrarily while Guilters are allowed to harass people without limits.
[–]BohemianSeekRhapsody
There is nothing wrong with a good passionate debate but no need for the smart-ass remarks, superior attitudes, and downright nastiness. Why so many hours are invested online doing this is bewildering when SA & BD are both in prison. Doesn't seem to be enough. Why is that? Let them continue to talk among themselves in their own toxic environment. I expect sub to die out completely soon. Reasonable people have no interest in engaging with jerks. And that's the truth!
The Gentleman's Guide To Forum Spies -- How to Spot a Spy (Cointelpro Agent)
By nomdeguerre
July 29, 2012
How to Spot a Spy (Cointelpro Agent)
One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?
1) The message doesn't get out
One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?
1) The message doesn't get out
2) A lot of time is wasted
3) The activist is frustrated and discouraged
4) Nothing good is accomplished
FBI and Police Informers and Infiltrators will infest any group and they have phoney activist organizations established.
Their purpose is to prevent any real movement for justice or eco-peace from developing in this country.
Agents come in small, medium or large. They can be of any ethnic background. They can be male or female.
The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs.
This booklet lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists.
It is the agent's job to keep the activist from quitting such a group, thus keeping him/her under control.
In some situations, to get control, the agent will tell the activist:
"You're dividing the movement."
[Here, I have added the psychological reasons as to WHY this maneuver works to control people]
This invites guilty feelings. Many people can be controlled by guilt. The agents begin relationships with activists behind a well-developed mask of "dedication to the cause." Because of their often declared dedication, (and actions designed to prove this), when they criticize the activist, he or she - being truly dedicated to the movement - becomes convinced that somehow, any issues are THEIR fault. This is because a truly dedicated person tends to believe that everyone has a conscience and that nobody would dissimulate and lie like that "on purpose." It's amazing how far agents can go in manipulating an activist because the activist will constantly make excuses for the agent who regularly declares their dedication to the cause. Even if they do, occasionally, suspect the agent, they will pull the wool over their own eyes by rationalizing: "they did that unconsciously... they didn't really mean it... I can help them by being forgiving and accepting " and so on and so forth.
The agent will tell the activist:
"You're a leader!"
This is designed to enhance the activist's self-esteem. His or her narcissistic admiration of his/her own activist/altruistic intentions increase as he or she identifies with and consciously admires the altruistic declarations of the agent which are deliberately set up to mirror those of the activist.
This is "malignant pseudoidentification." It is the process by which the agent consciously imitates or simulates a certain behavior to foster the activist's identification with him/her, thus increasing the activist's vulnerability to exploitation. The agent will simulate the more subtle self-concepts of the activist.
Activists and those who have altruistic self-concepts are most vulnerable to malignant pseudoidentification especially during work with the agent when the interaction includes matter relating to their competency, autonomy, or knowledge.
The goal of the agent is to increase the activist's general empathy for the agent through pseudo-identification with the activist's self-concepts.
The most common example of this is the agent who will compliment the activist for his competency or knowledge or value to the movement. On a more subtle level, the agent will simulate affects and mannerisms of the activist which promotes identification via mirroring and feelings of "twinship". It is not unheard of for activists, enamored by the perceived helpfulness and competence of a good agent, to find themselves considering ethical violations and perhaps, even illegal behavior, in the service of their agent/handler.
The activist's "felt quality of perfection" [self-concept] is enhanced, and a strong empathic bond is developed with the agent through his/her imitation and simulation of the victim's own narcissistic investments. [self-concepts] That is, if the activist knows, deep inside, their own dedication to the cause, they will project that onto the agent who is "mirroring" them.
The activist will be deluded into thinking that the agent shares this feeling of identification and bonding. In an activist/social movement setting, the adversarial roles that activists naturally play vis a vis the establishment/government, fosters ongoing processes of intrapsychic splitting so that "twinship alliances" between activist and agent may render whole sectors or reality testing unavailable to the activist. They literally "lose touch with reality."
Activists who deny their own narcissistic investments [do not have a good idea of their own self-concepts and that they ARE concepts] and consciously perceive themselves (accurately, as it were) to be "helpers" endowed with a special amount of altruism are exceedingly vulnerable to the affective (emotional) simulation of the accomplished agent.
Empathy is fostered in the activist through the expression of quite visible affects. The presentation of tearfulness, sadness, longing, fear, remorse, and guilt, may induce in the helper-oriented activist a strong sense of compassion, while unconsciously enhancing the activist's narcissistic investment in self as the embodiment of goodness.
The agent's expresssion of such simulated affects may be quite compelling to the observer and difficult to distinguish from deep emotion.
It can usually be identified by two events, however:
First, the activist who has analyzed his/her own narcissistic roots and is aware of his/her own potential for being "emotionally hooked," will be able to remain cool and unaffected by such emotional outpourings by the agent.
As a result of this unaffected, cool, attitude, the Second event will occur: The agent will recompensate much too quickly following such an affective expression leaving the activist with the impression that "the play has ended, the curtain has fallen," and the imposture, for the moment, has finished. The agent will then move quickly to another activist/victim.
The fact is, the movement doesn't need leaders, it needs MOVERS. "Follow the leader" is a waste of time.
A good agent will want to meet as often as possible. He or she will talk a lot and say little. One can expect an onslaught of long, unresolved discussions.
Some agents take on a pushy, arrogant, or defensive manner:
1) To disrupt the agenda 2) To side-track the discussion 3) To interrupt repeatedly 4) To feign ignorance 5) To make an unfounded accusation against a person.
Calling someone a racist, for example. This tactic is used to discredit a person in the eyes of all other group members.
Saboteurs
Some saboteurs pretend to be activists. She or he will ....
1) Write encyclopedic flyers (in the present day, websites) 2) Print flyers in English only. 3) Have demonstrations in places where no one cares. 4) Solicit funding from rich people instead of grass roots support 5) Display banners with too many words that are confusing. 6) Confuse issues. 7) Make the wrong demands. Cool Compromise the goal. 9) Have endless discussions that waste everyone's time. The agent may accompany the endless discussions with drinking, pot smoking or other amusement to slow down the activist's work.
Provocateurs
1) Want to establish "leaders" to set them up for a fall in order to stop the movement. 2) Suggest doing foolish, illegal things to get the activists in trouble. 3) Encourage militancy. 4) Want to taunt the authorities. 5) Attempt to make the activist compromise their values. 6) Attempt to instigate violence. Activisim ought to always be non-violent. 7) Attempt to provoke revolt among people who are ill-prepared to deal with the reaction of the authorities to such violence.
Informants
1) Want everyone to sign up and sing in and sign everything. 2) Ask a lot of questions (gathering data). 3) Want to know what events the activist is planning to attend. 4) Attempt to make the activist defend him or herself to identify his or her beliefs, goals, and level of committment.
Recruiting
Legitimate activists do not subject people to hours of persuasive dialog. Their actions, beliefs, and goals speak for themselves.
Groups that DO recruit are missionaries, military, and fake political parties or movements set up by agents.
Surveillance
ALWAYS assume that you are under surveillance.
At this point, if you are NOT under surveillance, you are not a very good activist!
Scare Tactics
They use them.
Such tactics include slander, defamation, threats, getting close to disaffected or minimally committed fellow activists to persuade them (via psychological tactics described above) to turn against the movement and give false testimony against their former compatriots. They will plant illegal substances on the activist and set up an arrest; they will plant false information and set up "exposure," they will send incriminating letters [emails] in the name of the activist; and more; they will do whatever society will allow.
This booklet in no way covers all the ways agents use to sabotage the lives of sincere an dedicated activists.
If an agent is "exposed," he or she will be transferred or replaced.
COINTELPRO is still in operation today under a different code name. It is no longer placed on paper where it can be discovered through the freedom of information act.
The FBI counterintelligence program's stated purpose: To expose, disrupt, misdirect, discredit, and otherwise neutralize individuals who the FBI categorize as opposed to the National Interests. "National Security" means the FBI's security from the people ever finding out the vicious things it does in violation of people's civil liberties.
http://pastebin.com/irj4Fyd5
FBI and Police Informers and Infiltrators will infest any group and they have phoney activist organizations established.
Their purpose is to prevent any real movement for justice or eco-peace from developing in this country.
Agents come in small, medium or large. They can be of any ethnic background. They can be male or female.
The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs.
This booklet lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists.
It is the agent's job to keep the activist from quitting such a group, thus keeping him/her under control.
In some situations, to get control, the agent will tell the activist:
"You're dividing the movement."
[Here, I have added the psychological reasons as to WHY this maneuver works to control people]
This invites guilty feelings. Many people can be controlled by guilt. The agents begin relationships with activists behind a well-developed mask of "dedication to the cause." Because of their often declared dedication, (and actions designed to prove this), when they criticize the activist, he or she - being truly dedicated to the movement - becomes convinced that somehow, any issues are THEIR fault. This is because a truly dedicated person tends to believe that everyone has a conscience and that nobody would dissimulate and lie like that "on purpose." It's amazing how far agents can go in manipulating an activist because the activist will constantly make excuses for the agent who regularly declares their dedication to the cause. Even if they do, occasionally, suspect the agent, they will pull the wool over their own eyes by rationalizing: "they did that unconsciously... they didn't really mean it... I can help them by being forgiving and accepting " and so on and so forth.
The agent will tell the activist:
"You're a leader!"
This is designed to enhance the activist's self-esteem. His or her narcissistic admiration of his/her own activist/altruistic intentions increase as he or she identifies with and consciously admires the altruistic declarations of the agent which are deliberately set up to mirror those of the activist.
This is "malignant pseudoidentification." It is the process by which the agent consciously imitates or simulates a certain behavior to foster the activist's identification with him/her, thus increasing the activist's vulnerability to exploitation. The agent will simulate the more subtle self-concepts of the activist.
Activists and those who have altruistic self-concepts are most vulnerable to malignant pseudoidentification especially during work with the agent when the interaction includes matter relating to their competency, autonomy, or knowledge.
The goal of the agent is to increase the activist's general empathy for the agent through pseudo-identification with the activist's self-concepts.
The most common example of this is the agent who will compliment the activist for his competency or knowledge or value to the movement. On a more subtle level, the agent will simulate affects and mannerisms of the activist which promotes identification via mirroring and feelings of "twinship". It is not unheard of for activists, enamored by the perceived helpfulness and competence of a good agent, to find themselves considering ethical violations and perhaps, even illegal behavior, in the service of their agent/handler.
The activist's "felt quality of perfection" [self-concept] is enhanced, and a strong empathic bond is developed with the agent through his/her imitation and simulation of the victim's own narcissistic investments. [self-concepts] That is, if the activist knows, deep inside, their own dedication to the cause, they will project that onto the agent who is "mirroring" them.
The activist will be deluded into thinking that the agent shares this feeling of identification and bonding. In an activist/social movement setting, the adversarial roles that activists naturally play vis a vis the establishment/government, fosters ongoing processes of intrapsychic splitting so that "twinship alliances" between activist and agent may render whole sectors or reality testing unavailable to the activist. They literally "lose touch with reality."
Activists who deny their own narcissistic investments [do not have a good idea of their own self-concepts and that they ARE concepts] and consciously perceive themselves (accurately, as it were) to be "helpers" endowed with a special amount of altruism are exceedingly vulnerable to the affective (emotional) simulation of the accomplished agent.
Empathy is fostered in the activist through the expression of quite visible affects. The presentation of tearfulness, sadness, longing, fear, remorse, and guilt, may induce in the helper-oriented activist a strong sense of compassion, while unconsciously enhancing the activist's narcissistic investment in self as the embodiment of goodness.
The agent's expresssion of such simulated affects may be quite compelling to the observer and difficult to distinguish from deep emotion.
It can usually be identified by two events, however:
First, the activist who has analyzed his/her own narcissistic roots and is aware of his/her own potential for being "emotionally hooked," will be able to remain cool and unaffected by such emotional outpourings by the agent.
As a result of this unaffected, cool, attitude, the Second event will occur: The agent will recompensate much too quickly following such an affective expression leaving the activist with the impression that "the play has ended, the curtain has fallen," and the imposture, for the moment, has finished. The agent will then move quickly to another activist/victim.
The fact is, the movement doesn't need leaders, it needs MOVERS. "Follow the leader" is a waste of time.
A good agent will want to meet as often as possible. He or she will talk a lot and say little. One can expect an onslaught of long, unresolved discussions.
Some agents take on a pushy, arrogant, or defensive manner:
1) To disrupt the agenda 2) To side-track the discussion 3) To interrupt repeatedly 4) To feign ignorance 5) To make an unfounded accusation against a person.
Calling someone a racist, for example. This tactic is used to discredit a person in the eyes of all other group members.
Saboteurs
Some saboteurs pretend to be activists. She or he will ....
1) Write encyclopedic flyers (in the present day, websites) 2) Print flyers in English only. 3) Have demonstrations in places where no one cares. 4) Solicit funding from rich people instead of grass roots support 5) Display banners with too many words that are confusing. 6) Confuse issues. 7) Make the wrong demands. Cool Compromise the goal. 9) Have endless discussions that waste everyone's time. The agent may accompany the endless discussions with drinking, pot smoking or other amusement to slow down the activist's work.
Provocateurs
1) Want to establish "leaders" to set them up for a fall in order to stop the movement. 2) Suggest doing foolish, illegal things to get the activists in trouble. 3) Encourage militancy. 4) Want to taunt the authorities. 5) Attempt to make the activist compromise their values. 6) Attempt to instigate violence. Activisim ought to always be non-violent. 7) Attempt to provoke revolt among people who are ill-prepared to deal with the reaction of the authorities to such violence.
Informants
1) Want everyone to sign up and sing in and sign everything. 2) Ask a lot of questions (gathering data). 3) Want to know what events the activist is planning to attend. 4) Attempt to make the activist defend him or herself to identify his or her beliefs, goals, and level of committment.
Recruiting
Legitimate activists do not subject people to hours of persuasive dialog. Their actions, beliefs, and goals speak for themselves.
Groups that DO recruit are missionaries, military, and fake political parties or movements set up by agents.
Surveillance
ALWAYS assume that you are under surveillance.
At this point, if you are NOT under surveillance, you are not a very good activist!
Scare Tactics
They use them.
Such tactics include slander, defamation, threats, getting close to disaffected or minimally committed fellow activists to persuade them (via psychological tactics described above) to turn against the movement and give false testimony against their former compatriots. They will plant illegal substances on the activist and set up an arrest; they will plant false information and set up "exposure," they will send incriminating letters [emails] in the name of the activist; and more; they will do whatever society will allow.
This booklet in no way covers all the ways agents use to sabotage the lives of sincere an dedicated activists.
If an agent is "exposed," he or she will be transferred or replaced.
COINTELPRO is still in operation today under a different code name. It is no longer placed on paper where it can be discovered through the freedom of information act.
The FBI counterintelligence program's stated purpose: To expose, disrupt, misdirect, discredit, and otherwise neutralize individuals who the FBI categorize as opposed to the National Interests. "National Security" means the FBI's security from the people ever finding out the vicious things it does in violation of people's civil liberties.
http://pastebin.com/irj4Fyd5
Sock puppet accounts unmasked by the way they write and post
By Edd Gent
April 6, 2017
Multiple accounts used by the same person are harmful and can propagate fake news
“Sock puppets” are the scourge of online discussion . Multiple accounts controlled by the same user can dominate comment forums and spread fake news. But now there’s a way to unmask the puppeteers.
A study of nine websites that use comment service Disqus to let readers post responses to articles found that sock puppets can be identified based on their writing style, posting activity and relationship with other users.
In the era of fake news, detecting sock puppets is important, says Srijan Kumar at the University of Maryland. “Whenever multiple accounts are used by the same party it is harmful and it skews the discussion and fake news can be propagated very confidently,” he says.
Kumar and his colleagues at the University of Maryland and Stanford University in California analysed commenter accounts on news websites including CNN, NPR, Breitbart and Fox News. They identified the sock puppets by finding accounts that posted from the same IP address in the same discussion at similar times. This approach isn’t always possible, so they wanted to develop a tool that automatically detects sock puppets based only on publicly accessible posting data.
They found that sock puppets contribute poorer quality content, writing shorter posts that are often downvoted or reported by other users. They post on more controversial topics, spend more time replying to other users and are more abusive. Worryingly, their posts are also more likely to be read and they are often central to their communities, generating a lot of activity.
Based on their findings, the researchers created a machine learning tool that can detect if two accounts belong to the same person 91 per cent of the time. Another tool can distinguish between a regular account and a sock puppet with 68 per cent accuracy. The research will be presented this week at the World Wide Web Conference in Perth, Australia.
This is the most comprehensive investigation of sock puppets in discussion forums, says Meng Jiang, who studies suspicious online behaviour at the University of Illinois at Urbana-Champaign.
But given that the group used sock puppets already identified by their IPs, it’s impossible to know if the tool could detect sock puppets the IP approach missed, he says. A real-world system would likely incorporate both approaches.
Kumar is confident the new tool could detect other sock puppets, and points out that IP addresses are not always available and can easily be spoofed.
The system could be useful to detect sock puppets on any forum that makes an account’s posting history available, such as social media site Reddit and most websites’ comment sections, he says. A person could then verify if an account breaches the site’s rules. “These tools always have a human in the loop,” he says. “It would flag suspicious accounts and a moderator would decide.”
Multiple accounts used by the same person are harmful and can propagate fake news
A study of nine websites that use comment service Disqus to let readers post responses to articles found that sock puppets can be identified based on their writing style, posting activity and relationship with other users.
In the era of fake news, detecting sock puppets is important, says Srijan Kumar at the University of Maryland. “Whenever multiple accounts are used by the same party it is harmful and it skews the discussion and fake news can be propagated very confidently,” he says.
Kumar and his colleagues at the University of Maryland and Stanford University in California analysed commenter accounts on news websites including CNN, NPR, Breitbart and Fox News. They identified the sock puppets by finding accounts that posted from the same IP address in the same discussion at similar times. This approach isn’t always possible, so they wanted to develop a tool that automatically detects sock puppets based only on publicly accessible posting data.
They found that sock puppets contribute poorer quality content, writing shorter posts that are often downvoted or reported by other users. They post on more controversial topics, spend more time replying to other users and are more abusive. Worryingly, their posts are also more likely to be read and they are often central to their communities, generating a lot of activity.
Based on their findings, the researchers created a machine learning tool that can detect if two accounts belong to the same person 91 per cent of the time. Another tool can distinguish between a regular account and a sock puppet with 68 per cent accuracy. The research will be presented this week at the World Wide Web Conference in Perth, Australia.
This is the most comprehensive investigation of sock puppets in discussion forums, says Meng Jiang, who studies suspicious online behaviour at the University of Illinois at Urbana-Champaign.
But given that the group used sock puppets already identified by their IPs, it’s impossible to know if the tool could detect sock puppets the IP approach missed, he says. A real-world system would likely incorporate both approaches.
Kumar is confident the new tool could detect other sock puppets, and points out that IP addresses are not always available and can easily be spoofed.
The system could be useful to detect sock puppets on any forum that makes an account’s posting history available, such as social media site Reddit and most websites’ comment sections, he says. A person could then verify if an account breaches the site’s rules. “These tools always have a human in the loop,” he says. “It would flag suspicious accounts and a moderator would decide.”
Techniques for Dilution, Misdirection and Control of an Internet Forum:
[–]sweetnumb [score hidden] 10 hours ago
ReplyDeleteHonestly it's very weird that there are "sides" on this matter. There are closed-minded people who wish investigating would stop, and will stop at nothing to make crazy arguments as long as they can convince people to stop using their brains.
Then there are the people who actually want to know the truth. If the guilters really thought he was guilty, they would side with the truthers. Most truthers would be fine, happy even, if Steven were shown to be guilty, but they're also not idiotic enough to believe that there's enough legit evidence to say he's guilty at this point.
EVERYONE should be for as much updated scientific/forensic testing as is possible, and then the truth would be validated. That's all that matters, but for some reason many people see truth as an ugly word. That should tell you something.
[–]puzzledbyitall [score hidden] 9 hours ago
Honestly it's very weird that there are "sides" on this matter.
What's weird? Some people believe he is innocent, some believe he is guilty. Both cannot possibly be true.
EVERYONE should be for as much updated scientific/forensic testing as is possible, and then the truth would be validated.
Why do you think Guilters are all opposed to this? Zellner filed a testing motion, never asked for a hearing, then entered into a stipulation with the State but filed a 974.06 motion and then an appeal which leaves the trial court with no jurisdiction to order anything right now.
It's really not that ridiculous to suggest otherwise when looking at the responses. With politics I get it, nobody wants the truth because it might shatter their entire reality and what they've placed their identity on, but I don't get why people get so crazy when it comes to pointing out how so much of this investigation was terrible at best, and purposefully deceitful at worst.
"This is not true. There are truthers who will straight up tell you that nothing short of a confession will make them believe Avery is guilty. Truthers are looking for the truth only if the truth is that Avery is innocent."
What I said is true, that most would indeed be plenty happy with the truth, regardless of what it is. But sure you can say "there are truthers who will" do xyz crazy thing, and you can say that about parts of any group. There will always be extremists, but I've never seen them to be worth focusing on.
"Honest question: How many threads have you seen over at TTM where truthers kick around the theory that Avery is guilty? If they're searching for the truth, isn't that one of the possibilities?"
That possibility is brought up more than you might think, but I'm sure much less than someone who thinks he's guilty would like. It does tend to get brought up less though mostly because it requires fewer assumptions to believe he's innocent than if he were to be guilty. Though of course anyone can come up with a selective list to support whatever narrative they want in terms of how likely one of the scenarios is, so what do I know?
Most of the arguing though is just a complete waste of time. If he legit committed this crime then why keep beating a dead horse? If he's guilty then it's already settled, case closed, done. If this is the case then any more evidence found would just point that way anyway and then we can all agree and move on. If he actually is innocent though, then this is an EXTREMELY big deal, specifically with this case.
[–]seekingtruthforgood [score hidden] 7 hours ago
To add, there are a number of problems with the case which raise eyebrows. Whether he is guilty or not can't even be addressed until he is provided due process. Because I believe there are no justifiable reasons to hide, alter, or tamper with real evidence, law enforcement and the state engaging in trickery for this case should be taken very seriously.
[–]southpaw72 [score hidden] 8 hours ago
ReplyDeleteWhy do you insist on derogatory labels to anybody who disagrees with you, the reason must be high on your priority list as you do it on a daily/hourly basis.
This forum would be a lot more friendly if this specific poster wasn't permitted to aggressively label all who disagree as "irrational liar pathetic apologist conspiracy theorist",
I have just read through your most recent posts and over 90% are littered with such examples.
[–]ThorsClawHammer [score hidden] 8 hours ago
Why do you insist on derogatory labels to anybody who disagrees with you
He's just following the handbook:
Sidetrack opponents with name calling and ridicule. This is also known as the primary attack the messenger ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as “kooks”, “right-wing”, “liberal”, “left-wing”, “terrorists”, “conspiracy buffs”, “radicals”, “militia”, “racists”, “religious fanatics”, “sexual deviates”, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.
[–]SilkyBeesKnees [score hidden] 7 hours ago
Did you see the stats someone posted a few days ago? NYJ has a word count that is 4 times higher than the next most prolific poster, puzzled. Some of NYJ's top 25 frequent words by volume include: absurd, nonsense, bogus, irrational, idiocy, wild.
In the last three months alone NYJ has written more words than Zellner's 1000+ pages PCR, including exhibits. This trend started almost exactly when NYJ started flooding MaM six months ago. Since then he's written the equivalent of a 1,500 page book (just in this sub).
[–]heelspider [score hidden] 7 hours ago
This case is simple. One cannot make a solid conclusion based on unreliable evidence.
Here, our evidence comes via a prosecutor of low ethical standing and from cops who acknowledged a conflict of interest, announced a recusal, then privately ignored it. We were told it took an investigation with 100 people working the case four days to look at the only suspect's fire pit and five days before they tried looking behind the only suspect's furniture. The most important lab result was changed after the test was completed to match instructions given to the lab from the police. Evidence was hidden from the defense. State witnesses told wildly different stories than their initial interviews. The cops were caught on tape feeding details to one potential witness, and used the details originated by the police to obtain a search warrant. And those are just a small handful of examples with egregious behavior by police and prosecutors.
As we cannot trust the reliability of the evidence against Steve Avery, we cannot make a reliable determination of his guilt either.
[–]heelspider [score hidden] 5 hours ago
The blood is the strongest evidence against him, but let's not forget it, the vehicle was discovered at a rapid speed by the only volunteer out of hundreds given a phone and a phone number, can't be seen in a flyover just the day before, was spotted being planted by a neighbor, appears to be about the worst place in the world for Avery to have put it, appears to have been found by Colburn previously, witnesses claim to have seen it elsewhere, was oddly not treated like the vehicle of a missing person when found, no one saw the blood when it was found, it had an unusual delay reaching the crime lab, and now the state won't let Avery's attorney examine it despite a court order to the contrary.
So, yeah even if you ignore all that, I would implore that you use common sense. If a source of information is unreliable about 19 things, you really comfortable depriving a person of their liberty on the sheer guess that the 20th thing they told you was reliable?
https://www.reddit.com/r/MakingaMurderer/comments/7xhuyw/meta_guilters_truthers/
"Guilters" are paid.
ReplyDeleteSeriously, they are not guilters -- it is MSCO's paid PR team trying to sway the un-informed.
Same PR team that Bush hired huh, so what really happened on 9/11. hahahaha you guys must hate that no one believes your non-sense.
A Former PR Worker Whose Job Was To Defend Fracking Online Describes How They Mislead The Public
By Sydney Robinson
April 25, 2016
With the news that a pro-Clinton SuperPAC has invested millions in paying for online shills to go around infiltrating anti-Clinton conversations and attempt to misinform and sway opinions anonymously, a discussion on Reddit prompted individuals who have been a part of these shilling campaigns to speak out, sharing how effective and calculated this sort of online infiltration is.
One such user posted anonymously, but then shortly after deleted their comment, no doubt in fear that his/her former employer would see and punish the person for their valuable insight.
The Reddit user said that they were a former employee of a PR firm who defended fracking online. What follows is an eye-opening description of what the fracking industry is willing to do to remove scrutiny and criticism of the industry. Without doubt, this is done by the oil and gas industry nationwide as well as the drug and tobacco industry and any other industry which receives a healthy amount of scrutiny online.
CONTINUED...
Read:
ReplyDelete“Former PR worker here, 99% of our job is to convince people that something that is fucking them over is actually good for them. The whole concept of ‘shills’ has somehow became a conspiracy theory when in reality it’s just PR workers who are paid by a company to defend their product/service. My last job was defending fracking.
Anytime a post containing keywords was submitted to a popular website we where notified and it was our job to just list off talking points and debate the most popular comments. Fracking was an easy one to defend because you could paint people as anti-science if they where against it. The science behind fracking is sound and if done properly is safe, so you just focus on this point. You willfully ignore the fact that fracking is done by people who almost never do it properly and are always looking to cut corners. Your talking points usually contain branching arguments if people try to debate back. For example my next point would be to bring up that these companies are regulated so they couldn’t cut corners or they would be fined, all the while knowing that these agencies are either underfunded or have been captured by the very industry they are trying to regulate.
The final talking point, if someone called you out on all your counterpoints, was to simply try to paint them as a wackjob. Suggest they are crazy for thinking agencies who are suppose to protect them have been bought and paid for. Bring up lizard people to muddy the waters. A lot of people will quickly distance themselves from something if it is accused of being a conspiracy theory, and a lot of them are stupid enough that you can convince them that believing businesses conspiring to break the law to gain profit is literally the same as believing in aliens and bigfoot.
Edit: Just to clarify I am not an expert in the field of fracking, I am just a PR worker who worked on a fracking campaign and used it as an example. I got into a few heated debates about fracking in replies to this comment and some things I said might be wrong because as I said I am not an expert. I don’t want this to take away from the actual point of this comment which is to make people aware of PR workers and how they try to sway online discussions.”
Reading this is terrifying, especially if you are the sort of person who spends a great deal of time online. The internet is full of terrible information, but being acutely aware that hired employees are online for the sole reason of misleading the public on a major issue like fracking should make one question anyone they speak with online.
That the Clinton campaign has hired employees to engage in similar practices that the oil and gas industry hire workers to do is worrying. Any political campaign should know that online discussion and debate is an extremely important part of the modern day political process. It is popular to talk online about an individual you disagree with being a paid “shill,” but now every online Clinton supporter will be identified as a paid corporate shill whether they are or not. It stinks of a certain level of dishonesty that many have come to expect from the Clinton campaign.
https://trofire.com/2016/04/25/former-pr-worker-whose-job-defend-fracking-online-describes-deceptive-forced/
Stirring things up..... (self.TickTockManitowoc)
ReplyDeleteby MMonroe54
Sometimes when this board is very quiet, I venture over to another, unnamed, site -- the lesser of two evils -- and comment on a post or two there. I almost always regret it, not because I get "shot down" but because of the pettiness and non-debate tactics I encounter there. On the other hand, it keeps my hand in, and it renews my conviction that many who post there -- and cannot post here -- cannot or will not answer the many questions and inconsistencies about this case in a cogent, rational, and reasonable manner.
I've noticed that, in almost every instance, if the discussion goes on long enough, they will deflect. Instead of addressing the subject or answering questions, they veer off into another realm, often completely unrelated.....and that may then degenerate into name calling and insults. Not all, but a select few use those tactics.
Another method is to denounce something you (I) question as "irrelevant", which seems to mean it is not important to them or that it weakens their argument.
I mention this here because it seems to me that those secure in their position and who post about this case, should be able and willing to discuss how they arrived at their convictions, what convinced them beyond a reasonable doubt. I'd think they would want to have answers to questions that nag at some of us, instead of dismissing them as unimportant or outside the scope. For instance, I just had a discussion about the quarry bones and the fallback position with the OP was that the bones were never identified as human or belonging to TH. But read Eisenberg's testimony. She is an obvious prosecution witness, and yet even she, apparently, believes the pelvic bones found in the quarry were human....even if she won't say so definitively. And if they were human, they almost certainly were part of the bones found in the burn pit, which the prosecution argued were those of TH. She even testified that the calcined condition of the quarry bones and the burn pit and barrel bones were the same. Even the prosecution did not try to get the quarry bones excluded as non-human or not belonging to TH.
The bones argument is just one example. There are many others, which make it frustrating -- actually, impossible -- to discuss this case elsewhere....or, especially, on the site to which I refer. The other, more radical site, is another matter; I never go there.
https://www.reddit.com/r/TickTockManitowoc/comments/87awhf/stirring_things_up/
Off The Record, the PR firm hired by the National Sheriff's Association after MaM became a huge hit. This PR firm specializes in utilizing the internet to manipulate public opinion.
ReplyDelete[–]thed0ngs0ng
Here is an article from the post crescent about the MTSO receiving PR help after the Avery documentary.
https://www.google.com/amp/s/amp.postcrescent.com/amp/83537512
Mark Pfeifle; President and CEO of Off The Record Strategies
This is from the websites about page https://www.otrstrategies.com/about3
Mark most recently served as Deputy National Security Advisor for Strategic Communications and Global Outreach at the White House.
Pfeifle led the successful communication effort to promote the president’s “surge” of U.S. forces into Iraq. In 2004, as director of communications for the 2004 Republican National Convention, Pfeifle was awarded the prestigious Pollie Award for Best Overall Internet Campaign and the Silver Award for best use of a website for persuasion.
[–]mickeytrtan
Is Wisconson a place where there is an underground culture of #MurderIfYouDontPlayBall ???
Wisconsin “John Doe” Whistleblower Michael Lutz dead, apparent suicide
http://legalinsurrection.com/2015/07/wisconsin-john-doe-whistleblower-michael-lutz-dead-apparent-suicide/
https://www.reddit.com/r/TickTockManitowoc/comments/87awhf/stirring_things_up/