tag:blogger.com,1999:blog-37179942.post577452285573541963..comments2023-10-22T05:51:58.898-04:00Comments on Soob: Imitative Communications Deception on Social NetworksJay@Soobhttp://www.blogger.com/profile/12208597218366281778noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-37179942.post-85822313286423827862008-02-23T09:02:00.000-05:002008-02-23T09:02:00.000-05:00This is interesting. I read about a girl who comm...This is interesting. <BR/><BR/>I read about a girl who committed suicide because neighborhood tormentors created a profile of a fake boy that befriended, then turned on her. Tragic. [<A HREF="http://www.newyorker.com/reporting/2008/01/21/080121fa_fact_collins" REL="nofollow">http://www.newyorker.com/reporting/2008/01/21/080121fa_fact_collins</A>]<BR/><BR/>Today I read that a Moroccan court sentenced a man to a 3-year prison sentence for creating a fake facebook profile of a Moroccan prince. [<A HREF="http://www.nytimes.com/2008/02/23/world/africa/23briefs-PRISONFORFAC_BRF.html" REL="nofollow">http://www.nytimes.com/2008/02/23/world/africa/23briefs-PRISONFORFAC_BRF.html</A>orthohttps://www.blogger.com/profile/01475048083814392914noreply@blogger.comtag:blogger.com,1999:blog-37179942.post-36325264390157115352008-02-20T23:07:00.000-05:002008-02-20T23:07:00.000-05:00Hey soob, I think anyone would be miffed if you ha...Hey soob, I think anyone would be miffed if you had a neighbour who kicked down your fence (then claimed they were leaning on it) and also would break glass on your cement outside your house so you could no longer wear shoes!<BR/><BR/>But yeah, they were real arseholes, shame too, because they were the type of arseholes that had I gone round there and beat them to a pulp they would have gone screaming to the police. I imagine you know the type I'm talking about. They are all talk and bullying up to a point. Anyway, I fought them on a level they couldn't fight at and won, so I'm pretty pleased about it.<BR/><BR/>Yeah, hopefully there will be more posts on the topic at GNUCitizen to make up for it.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-37179942.post-80855750994211919162008-02-20T18:22:00.000-05:002008-02-20T18:22:00.000-05:00But the aspect of creating enough "selves" to miti...But the aspect of creating enough "selves" to mitigate such a threat is arduous. <BR/><BR/>Arherring, good stuff, the effect of co-opting a target's network is very much akin to affecting the first "O" in the OODA. In essence, effect how the target observes as opposed to how they orient (4GW.)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-37179942.post-16892533881663248072008-02-20T18:13:00.000-05:002008-02-20T18:13:00.000-05:00Damn, but you're a conniving sort when miffed, eh ...Damn, but you're a conniving sort when miffed, eh Munz?! <BR/><BR/>Great discussion and the commentary at GNUCitizen was interesting. Too bad it rolled a bit off topic.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-37179942.post-81643664076937080592008-02-20T07:27:00.000-05:002008-02-20T07:27:00.000-05:00To the 5gw mobile!To the 5gw mobile!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-37179942.post-86690372999749313142008-02-19T14:14:00.000-05:002008-02-19T14:14:00.000-05:00Munz, I think you're right on.From a 5GW standpoin...Munz, I think you're right on.<BR/><BR/>From a 5GW standpoint, the theorists seem to mostly agree that it would be standard 5GW doctrine use proxies and other methods of concealmentso that your network would be effectively insulated and unobservable except by the results of your actions (hence appearing as conspiracy theories). On the flip side the organization's actions would be to co-opt a target's networks in order to use them against the target, either to manipulate them in order to affect a specific response or use them as vectors for memetic manipulation.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-37179942.post-31847505454684038232008-02-19T13:16:00.000-05:002008-02-19T13:16:00.000-05:00Hey arherring, it's early morning here, can't slee...Hey arherring, it's early morning here, can't sleep.<BR/><BR/>Anyway ... yeah it is very interesting. Something else I thought about a while back was for a generational shift in war to happen, in the dialectical sense, usually there is an undermining of the current generations strengths. The new generational outfit finds weaknesses in what were strengths. One example is the shift from 1gw to 2gw. 2gw exploited 1gw strengths (massed manpower) with massed firepower. <BR/><BR/>So, my point ... There is a lot of talk about connectivity and resilience, especially in terms of networks. I've always thought of netwar, and loss cells of networks as a facet of 4gw, so I think a *possible* generational shift towards 5gw would be undermining the strengths of networks like connectivity and resilience. One such facet that *may* undermine networks is the duplication of virtual networks with synthetic identity theft. <BR/><BR/>I would say one such defence is for there to be no network at all. Limit connectivity between your nodes, or if there is connectivity, come up with some deception plans to cover up the connections, or, create so many different nodes that are similar to yourself but different personalities (like create a gay munzenberg, or a famous explorer munzenberg, or a female munzenberg), that the attacker doesn't know which is the real one. <BR/><BR/>The copyright idea is probably a good one too. It'll be interesting to watch the battles between lawyers involved in copyright cases against anonymous hordes on the net to see if it stands up though.Ghttps://www.blogger.com/profile/10588546748297924666noreply@blogger.comtag:blogger.com,1999:blog-37179942.post-53019236816319184502008-02-19T11:45:00.000-05:002008-02-19T11:45:00.000-05:00Nice Post,A textbook lesson from the school of dir...Nice Post,<BR/><BR/>A textbook lesson from the school of dirty tricks that leans toward proto-5GW.<BR/><BR/>I wonder about the possible defenses against this. You would almost have to preempt this type of attack by controlling all possible potential appearances of your self/organization in any type of media or venue.<BR/><BR/>Basically you would have to copyright your self so you had some sort of recourse.<BR/><BR/>Very interesting.Anonymousnoreply@blogger.com