{"id":8502,"date":"2022-09-22T12:47:55","date_gmt":"2022-09-22T09:47:55","guid":{"rendered":"https:\/\/metacpc.org\/?p=8502"},"modified":"2022-09-22T13:30:27","modified_gmt":"2022-09-22T10:30:27","slug":"mas-piasane-sta-prasa","status":"publish","type":"post","link":"https:\/\/metacpc.org\/en\/mas-piasane-sta-prasa\/","title":{"rendered":"Pentagon opens sweeping review of clandestine psychological operations | The Washington Post"},"content":{"rendered":"\n<p class=\"has-text-align-center has-background-color has-accent-background-color has-text-color has-background\"><strong><a href=\"https:\/\/www.washingtonpost.com\/national-security\/2022\/09\/19\/pentagon-psychological-operations-facebook-twitter\/\" target=\"_blank\" rel=\"noopener\">Ellen Nakashima | The Washington Post<\/a><\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-accent-color has-text-color is-layout-flow wp-block-quote-is-layout-flow\"><p>Complaints about the U.S. military\u2019s influence operations using Facebook and Twitter have raised concern in the White House and federal agencies.<\/p><\/blockquote>\n\n\n\n<p>The Pentagon has ordered a sweeping audit of how it conducts clandestine information warfare after major social media companies identified and took offline fake accounts suspected of being run by the U.S. military in violation of the platforms\u2019 rules.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.defense.gov\/About\/Biographies\/Biography\/Article\/2591842\/dr-colin-h-kahl\/\" target=\"_blank\" rel=\"noreferrer noopener\">Colin Kahl<\/a>, the undersecretary of defense for policy, last weekinstructed the military commands that engage in psychological operations online to provide a full accounting of their activities by next month after the White House and somefederal agencies expressed mounting concerns over the Defense Department\u2019s attempted manipulation of audiences overseas, according to several defense and administration officials familiar with the matter.<\/p>\n\n\n\n<p>The takedowns in recent years by Twitter and Facebook of more than 150 bogus personas and media sites created in the United States was&nbsp;<a href=\"https:\/\/public-assets.graphika.com\/reports\/graphika_stanford_internet_observatory_report_unheard_voice.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">disclosed last month<\/a>&nbsp;by internet researchers Graphika and the Stanford Internet Observatory. While the researchers did not attribute the sham accounts to the U.S. military, two officials familiar with the matter said that&nbsp;<a href=\"https:\/\/www.centcom.mil\/ABOUT-US\/\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Central Command<\/a>&nbsp;is among those whose activities are facing scrutiny. Like others interviewed for this report, they spoke on the condition of anonymity to discuss sensitive military operations.<\/p>\n\n\n\n<p>The researchers did not specify when the takedowns occurred, but those familiar with the matter said they were within the pasttwo or three years. Some were recent, they said, and involved posts from the summer that advanced anti-Russia narratives citing the Kremlin\u2019s \u201cimperialist\u201d war in Ukraine and warning of the conflict\u2019s direct impact on Central Asian countries. Significantly, they found that the pretend personas \u2014 employing tactics used by countries such as Russia and China \u2014 did not gain much traction, and that overt accounts actually attracted more followers.<\/p>\n\n\n\n<p>Centcom, headquartered in Tampa, has purview over military operations across 21 countries in the Middle East, North Africa and Central and South Asia. A spokesman declined to comment.<\/p>\n\n\n\n<p>Air Force Brig. Gen. Patrick Ryder, the Pentagon press secretary, said in a statement that the military\u2019s information operations \u201csupport our national security priorities\u201d and must be conducted in compliance with relevant laws and policies. \u201cWe are committed to enforcing those safeguards,\u201d he said.<\/p>\n\n\n\n<p>Spokespersons for Facebook and Twitter declined to comment.<\/p>\n\n\n\n<p>According to the researchers\u2019 report, the accounts taken down included a made-up Persian-language media site that shared content reposted from the U.S.-funded Voice of America Farsi and Radio Free Europe. Another, it said, was linked to a Twitter handle that in the past had claimed to operate on behalf of Centcom.<\/p>\n\n\n\n<p>One fake account posted an inflammatory tweet claiming that relatives of deceased Afghan refugees had reported bodies being returned from Iran with missing organs, according to the report. The tweet linked to a video that was part of an article posted on a U.S.-military affiliated website.<\/p>\n\n\n\n<p>Centcom has not commented on whether these accounts were created by its personnel or contractors. If the organ-harvesting tweet is shown to be Centcom\u2019s, one defense official said, it would \u201cabsolutely be a violation of doctrine and training practices.\u201d<\/p>\n\n\n\n<p>Independent of the report, The Washington Post has learned that in 2020 Facebook disabled fictitious personas created by Centcom to counter disinformation spread by China suggesting the coronavirus responsible for covid-19 was created at a U.S. Army lab in Fort Detrick, Md., according to officials familiar with the matter. The pseudo profiles \u2014 active in Facebook groups that conversed in Arabic, Farsi and Urdu, the officials said \u2014 were used to amplify truthful information from the U.S. Centers for Disease Control and Prevention about the virus\u2019s origination in China.<\/p>\n\n\n\n<p>The U.S. government\u2019suse of ersatz social mediaaccounts, though authorized by law and policy, has stirred controversy inside the Biden administration, with the White House pressing the Pentagon to clarify and justify its policies. The White House, agencies such as the State Department and even some officials within the Defense Department have been concerned that the policies are too broad, allowing leeway for tactics that even if used to spread truthful information, risk eroding U.S. credibility, several U.S. officials said.<\/p>\n\n\n\n<p>\u201cOur adversaries are absolutely operating in the information domain,\u201d said a second senior defense official. \u201cThere are some who think we shouldn\u2019t do anything clandestine in that space. Ceding an entire domain to an adversary would be unwise. But we need stronger policy guardrails.\u201d<\/p>\n\n\n\n<p>A spokeswoman for the National Security Council, which is part of the White House, declined to comment.<\/p>\n\n\n\n<p>Kahl disclosed his review at a virtual meeting convened by the National Security Council on Tuesday, saying he wants to know what types of operations have been carried out, who they\u2019re targeting, what tools are being used and why military commanders have chosen those tactics, and how effective they have been, several officials said.<\/p>\n\n\n\n<p>The message was essentially, \u201cYou have to justify to me why you\u2019re doing these types of things,\u201d the first defense official said.<\/p>\n\n\n\n<p>Pentagon policy and doctrine discourage the military from peddling falsehoods, but there are no specific rules mandating the use of truthful information for psychological operations. For instance, the military sometimes employs fiction and satire for persuasion purposes, but generally the messages are supposed to stick to facts, officials said.<\/p>\n\n\n\n<p>In 2020, officers at Facebook and Twitter contacted the Pentagon to raise concerns about the phony accounts they were having to remove, suspicious they were associated with the military. That summer, David Agranovich, Facebook\u2019s director for global threat disruption, spoke to Christopher C. Miller, then assistant director for Special Operations\/Low Intensity Conflict, which oversees influence operations policy, warning him that if Facebook could sniff them out, so could U.S. adversaries, several people familiar with the conversation said.<\/p>\n\n\n\n<p>\u201cHis point\u201a\u201d one person said, \u201cwas \u2018Guys, you got caught. That\u2019s a problem.\u2019 \u201d<\/p>\n\n\n\n<p>Before Miller could take action, he was tapped to head a different agency \u2014 the National Counterterrorism Center. Then the November election happened and time ran out for the Trump administration to address the matter, although Miller did spend the last few weeks of Donald Trump\u2019s presidency serving as acting defense secretary.<\/p>\n\n\n\n<p>With the rise of Russia and China as strategic competitors, military commanders have wanted to fight back, including online. And Congress supported that. Frustrated with perceived legal obstacles to the Defense Department\u2019s ability to conduct clandestine activities in cyberspace, Congress in late 2019 passed a law affirming that the military could conduct operations in the \u201cinformation environment\u201d to defend the United States and to push back against foreign disinformation aimed at undermining its interests. The measure, known as Section 1631, allows the military to carry out clandestine psychological operations without crossing what the CIA has claimed as its covert authority, alleviating some of the friction that had hindered such operations previously.<\/p>\n\n\n\n<p>\u201cCombatant commanders got really excited,\u201d recalled the first defense official. \u201cThey were very eager to utilize these new authorities. The defense contractors were equally eager to land lucrative classified contracts to enable clandestine influence operations.\u201d<\/p>\n\n\n\n<p>At the same time, the official said, military leaders were not trained to oversee \u201ctechnically complex operations conducted by contractors\u201d or coordinate such activities with other stakeholders elsewhere in the U.S. government.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"916\" height=\"551\" src=\"https:\/\/metacpc.org\/wp-content\/uploads\/2022\/09\/imrs-1.jpg\" alt=\"\" class=\"wp-image-8506\" srcset=\"https:\/\/metacpc.org\/wp-content\/uploads\/2022\/09\/imrs-1.jpg 916w, https:\/\/metacpc.org\/wp-content\/uploads\/2022\/09\/imrs-1-300x180.jpg 300w, https:\/\/metacpc.org\/wp-content\/uploads\/2022\/09\/imrs-1-768x462.jpg 768w\" sizes=\"auto, (max-width: 916px) 100vw, 916px\" \/><figcaption>President Biden, right, Defense Secretary Lloyd Austin, left, and Chairman of the Joint Chiefs of Staff Gen. Mark A. Milley attend a Pentagon ceremony to remember the victims of 9\/11. (Leigh Vogel\/Bloomberg)<\/figcaption><\/figure>\n\n\n\n<p>Last year, with a new administration in place, Facebook\u2019s Agranovich tried again. This time he took his complaint to President Biden\u2019s deputy national security adviser for cyber, Anne Neuberger. Agranovich, who had worked at the NSC under Trump, told Neuberger that Facebook was taking down fake accounts because they violated the company\u2019s terms of service, according to people familiar with the exchange.<\/p>\n\n\n\n<p>The accounts were easily detected by Facebook, which since Russia\u2019s campaign to interfere in the 2016 presidential election has enhanced its ability to identify mock personas and sites. In some cases, the company had removed profiles, which appeared to be associated with the military, that promoted information deemed by fact-checkers to be false, said a person familiar with the matter.<\/p>\n\n\n\n<p>Agranovich alsospoke to officials at the Pentagon. His messagewas: \u201cWe know what DOD is doing. It violates our policies. We will enforce our policies\u201d and so \u201cDOD should knock it off,\u201d said aU.S. official briefed on the matter.<\/p>\n\n\n\n<p>In response to White House concerns, Kahl ordered a review of Military Information Support Operations, or MISO, the Pentagon\u2019s moniker for psychological operations. A draft concluded that policies, training and oversight all needed tightening, and that coordination with other agencies, such as the State Department and the CIA, needed strengthening, according to officials.<\/p>\n\n\n\n<p>The review also found that while there were cases in which fictitious information was pushed by the military, they were the result of inadequate oversight of contractors and personnel training \u2014 not systemic problems, officials said.<\/p>\n\n\n\n<p>Pentagon leadership did little with the review, two officials said, before Graphika and Stanford published their report on Aug. 24, which elicited a flurry of news coverage and questions for the military.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"916\" height=\"750\" src=\"https:\/\/metacpc.org\/wp-content\/uploads\/2022\/09\/imrs-2.jpg\" alt=\"\" class=\"wp-image-8508\" srcset=\"https:\/\/metacpc.org\/wp-content\/uploads\/2022\/09\/imrs-2.jpg 916w, https:\/\/metacpc.org\/wp-content\/uploads\/2022\/09\/imrs-2-300x246.jpg 300w, https:\/\/metacpc.org\/wp-content\/uploads\/2022\/09\/imrs-2-768x629.jpg 768w\" sizes=\"auto, (max-width: 916px) 100vw, 916px\" \/><figcaption>Army psyop graduates receive pins at the end of a field exercise reading \u201cPersuade, Change, Influence.\u201d (Cynthia McIntyre\/Fort Hunter Liggett Public Affairs)<\/figcaption><\/figure>\n\n\n\n<p>The State Department and CIA have been perturbed by the military\u2019s use of clandestine tactics. Officers at State have admonished the Defense Department, \u201cHey don\u2019t amplify our policies using fake personas, because we don\u2019t want to be seen as creating false grass roots efforts,\u201d the first defense official said.<\/p>\n\n\n\n<p>One diplomat put it this way: \u201cGenerally speaking, we shouldn\u2019t be employing the same kind of tactics that our adversaries are using because the bottom line is we have the moral high ground. We are a society that is built on a certain set of values. We promote those values around the world and when we use tactics like those, it just undermines our argument about who we are.\u201d<\/p>\n\n\n\n<p>Psychological operations to promote U.S. narratives overseas are nothing new in the military, but the popularity of western social media across the globehas led to an expansion of tactics, including the use of artificial personas and images&nbsp;<strong>\u2014&nbsp;<\/strong>sometimes called \u201cdeep fakes.\u201d The logic is that views expressed by what appears to be, say, an Afghan woman or an Iranian student might be more persuasive than if they were openly pushed by the U.S. government.<\/p>\n\n\n\n<p>The majority of the military\u2019s influence operations are overt, promoting U.S. policies in the Middle East, Asia and elsewhere under its own name, officials said. And there are valid reasons to use clandestine tactics, such as trying to infiltrate a closed terrorist chat group, they said.<\/p>\n\n\n\n<p>A key issue for senior policymakers now is determining whether the military\u2019s execution of clandestine influence operations is delivering results. \u201cIs the juice worth the squeeze? Does our approach really have the potential for the return on investment we hoped or is it just causing more challenges?\u201d one person familiar with the debate said.<\/p>\n\n\n\n<p>The report by Graphika and Stanford suggests that the clandestine activity did not have much impact. It noted that the \u201cvast majority of posts and tweets\u201d reviewed received \u201cno more than a handful of likes or retweets,\u201d and only 19 percent of the concocted accounts had more than 1,000 followers. \u201cTellingly,\u201d the report stated, \u201cthe two most-followed assets in the data provided by Twitter were overt accounts that publicly declared a connection to the U.S. military.\u201d<\/p>\n\n\n\n<p>Clandestine influence operations have a role in support of military operations, but it should be a narrow one with \u201cintrusive oversight\u201d by military and civilian leadership, said Michael Lumpkin, a former senior Pentagon official handling information operations policy and a former head of the State Department\u2019s Global Engagement Center. \u201cOtherwise, we risk making more enemies than friends.\u201d<\/p>\n\n\n\n<p><em>Alice Crites contributed to this report.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Complaints about the U.S. military\u2019s influence operations using Facebook and Twitter have raised concern in the White House and federal agencies.<\/p>\n","protected":false},"author":5,"featured_media":8503,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"template-parts\/content-blog.php","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","_EventAllDay":false,"_EventTimezone":"","_EventStartDate":"","_EventEndDate":"","_EventStartDateUTC":"","_EventEndDateUTC":"","_EventShowMap":false,"_EventShowMapLink":false,"_EventURL":"","_EventCost":"","_EventCostDescription":"","_EventCurrencySymbol":"","_EventCurrencyCode":"","_EventCurrencyPosition":"","_EventDateTimeSeparator":"","_EventTimeRangeSeparator":"","_EventOrganizerID":[],"_EventVenueID":[],"_OrganizerEmail":"","_OrganizerPhone":"","_OrganizerWebsite":"","_VenueAddress":"","_VenueCity":"","_VenueCountry":"","_VenueProvince":"","_VenueState":"","_VenueZip":"","_VenuePhone":"","_VenueURL":"","_VenueStateProvince":"","_VenueLat":"","_VenueLng":"","_VenueShowMap":false,"_VenueShowMapLink":false,"_tribe_events_control_status":"","_tribe_events_control_status_canceled_reason":"","_tribe_events_control_status_postponed_reason":"","_tribe_events_control_online":"","_tribe_events_control_online_url":"","footnotes":""},"categories":[61],"tags":[],"class_list":["post-8502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-what-we-like-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/metacpc.org\/en\/wp-json\/wp\/v2\/posts\/8502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/metacpc.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/metacpc.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/metacpc.org\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/metacpc.org\/en\/wp-json\/wp\/v2\/comments?post=8502"}],"version-history":[{"count":4,"href":"https:\/\/metacpc.org\/en\/wp-json\/wp\/v2\/posts\/8502\/revisions"}],"predecessor-version":[{"id":8523,"href":"https:\/\/metacpc.org\/en\/wp-json\/wp\/v2\/posts\/8502\/revisions\/8523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/metacpc.org\/en\/wp-json\/wp\/v2\/media\/8503"}],"wp:attachment":[{"href":"https:\/\/metacpc.org\/en\/wp-json\/wp\/v2\/media?parent=8502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/metacpc.org\/en\/wp-json\/wp\/v2\/categories?post=8502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/metacpc.org\/en\/wp-json\/wp\/v2\/tags?post=8502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}