Πρόσω ολοταχώς, για την ειρηνική αναβάθμιση του τύπου βιοκοινότητας |
![]() |
![]() |
![]() |
Συνεννόηση για Δράση - Απόψεις | |||
Συντάχθηκε απο τον/την Χρήστος Μπούμπουλης (Christos Boumpoulis) | |||
Δευτέρα, 05 Ιανουάριος 2015 15:56 | |||
Hubertus Knabe: The dark secrets of a surveillance state
Σήμερα, Δευτέρα 5 Ιανουαρίου 2015 και ώρα 12:12, τα δεδομένα, κατά τη γνώμη μου, έχουν ως εξής:
Για τους ανωτέρω λόγους:
Για την σύντομη και επιτυχή πραγματοποίηση αυτής της αναβάθμισης, νομίζω, ότι θα πρέπει:
Μακάρι να υπήρχε ευκολότερος δρόμος. Δυστυχώς, όμως, οι ξένοι μοιάζει να είναι αφοσιωμένοι στην προσπάθεια επίλυσης σημαντικών προβλημάτων των δικών τους εθνικών οικονομιών με αποτέλεσμα να μην διευκολύνονται, επί του παρόντος, να εξετάσουν το ενδεχόμενο αναβάθμισης της ποιότητας των διμερών σχέσεών τους, μαζί μας. Translated Stasi Directive on Zersetzung Richtlinie_1-76 Abstract of guideline (Richtlinie) 1/76 of the "Ministry for State Security" for processing operative procedures of decomposition, passed by Erich Mielke (Minister of State Security (Staatssicherheit: "STASI"): Berlin, January 1976 COUNCIL OF MINISTERS OF THE GERMAN DEMOCRATIC REPUBLIC (GDR) MINISTRY FOR STATE SECURITY THE MINISTER FOR STATE SECURITY Richtlinie (Guideline) Nr. 1/76 On the Development and Management of operative procedures 2.6. The application of decomposition measures 2.6.1. Aim and areas of application of measures Measures of decomposition are to be directed at evocation, as well as exploitation and reinforcement of such conflicts and differences between hostile-negative forces, through which they crack, get paralyzed, become disorganized and isolated and their hostile-negative plots, as well as their impacts, get precautionary prevented, essentially constrained or altogether prevented. In dependence to the precise situation among hostile-negative forces the attitude of certain people, who have relevant links, is to be influenced in such way that they give up their hostile-negative position and additional positive influence is possible. Decomposition measures can be directed at groups, assemblies and organizations as well as individuals and should be used as an independent way to end operative procedures or in correlation with other ways of termination. The leader of the operative units have to ensure that in political-operative necessity decomposition measures must be an indispensable part of offensive tactics. Decomposition measures are to be applied in particular:
2.6.2. Forms, devices and methods of decomposition The choice of decomposition measures to be performed dependent on the individual subject, the aim and the exact assessment of achieved results in the respective operational process. Approved methods of decomposition are:
In the implementation of decomposition measures are primarily reliable and approved "unofficial personnel" to choose. [ see also "Inoffizielle Mitarbeiter (IM) ] Approved methods of decomposition are:
These measures and methods have to be adapted, differ, enhance, develop and used depending on the current operational status. 2.6.3 The approach of elaboration and execution of decomposition measures Requirement and basis for the elaboration of effective decomposition measures is the thorough analysis of the operative process, especially to carve out appropriate connections, such as existing contradictions, differences and accordingly of compromising material. The exact definition of the concrete goal of the decomposition measures need to be carried out on the basis of the analysis' results. According to the defined goal, the thorough preparation and planning of the decomposition measures have to be performed. In the preparation - insofar as necessary - ensuring the conspiracy, the deployed unofficial personnel of the respective operative process need to be included. The plans for execution of decomposition measures require the affirmation by the head of the main/autonomous division or district/main administration respectively. Plans for execution of decomposition measures against:
The execution of measures of decomposition must be consistent and strict. This includes the constantly unofficial check of the results and effects. The effects must be documented accurately. Depending on political-operational needs, further political-operative controlling measures have to be ordered and forced. [source] How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations By Glenn Greenwald One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents. Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.” By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself. Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today: DISRUPTION Operational Playbook
Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:
Discredit a target [source]
|
|||
Τελευταία Ενημέρωση στις Τρίτη, 06 Ιανουάριος 2015 14:11 |