Revealed: US Military Spy Operation that Manipulates Social Media

General David Petraeus has previously said US online psychological operations are aimed at ‘countering extremist ideology and propaganda’. Photograph: Cliff Owen/AP

Military’s ‘sock puppet’ software creates fake online identities to spread pro-American propaganda

The US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda.

A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an “online persona management service” that will allow one US serviceman or woman to control up to 10 separate identities based all over the world.

The project has been likened by web experts to China’s attempts to control and restrict free speech on the internet. Critics are likely to complain that it will allow the US military to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives.

The discovery that the US military is developing false online personalities – known to users of social media as “sock puppets” – could also encourage other governments, private companies and non-government organizations to do the same.

The Centcom contract stipulates that each fake online persona must have a convincing background, history and supporting details, and that up to 50 US-based controllers should be able to operate false identities from their workstations “without fear of being discovered by sophisticated adversaries”.

Centcom spokesman Commander Bill Speaks said: “The technology supports classified blogging activities on foreign-language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US.”

He said none of the interventions would be in English, as it would be unlawful to “address US audiences” with such technology, and any English-language use of social media by Centcom was always clearly attributed. The languages in which the interventions are conducted include Arabic, Farsi, Urdu and Pashto.

Centcom said it was not targeting any US-based web sites, in English or any other language, and specifically said it was not targeting Facebook or Twitter.

Once developed, the software could allow US service personnel, working around the clock in one location, to respond to emerging online conversations with any number of co-ordinated messages, blogposts, chatroom posts and other interventions. Details of the contract suggest this location would be MacDill air force base near Tampa, Florida, home of US Special Operations Command.


See also:  Trump Signs Law Allowing Mass Spying on Citizens


How the NWO/JWO will implement this plan and take American dissidents into custody, or just kill us:

Keep in mind, a survey of the US Military was conducted a few years ago.  A staggering 25% of the enlisted members of the US Armed Forces stated they would fire on American citizens on American soil.

The “JADE” In Jade Helm 15 Is An A.I. SOFTWARE Program

RISE OF THE MACHINE “JADE” is an A.I. quantum computing technology that produces holographic battlefield simulations and has the ability to use vast amounts of data being collected on the human domain to generate human terrain systems in geographic population centric locations to identify and eliminate targets, insurgents, rebels or whatever labels that can be flagged as targets in a Global Information Grid for Network Centric Warfare environments.

The JADE II battle field system is cognitive and intuitive. It can examine prior executed battle plans and and devise ‘new and better’ strategies to increase the ‘kill chain’. The II generation of JADE has the capability for two way communication with drones through the OCCOM technology which is one of the next generation integrations to this system.

In short, JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. It is a cognitive software program based on a Network Centric Warfare System at the HELM.

************************************************************************************** Please get this information out, share, re-post. It would seem the Jade Helm 15 exercise is actually a system roll out and more diabolical than we originally imagined.


The “JADE” In Jade Helm 15 Is An A.I. SOFTWARE Program


Published (mirrored) on May 16, 2015 courtesy of Level9News

Related videos: 

JADE HELM: “MASTERING THE HUMAN DOMAIN”-1033 Program & Exec Order 13684…

AZ Governor’s Response To Resident’s Concerns With Jade Helm15…

Robin Sage Is Jade Helm For Eastern US…

** Editors note:  All videos in this report have been mirrored.

Watch the videos on Vimeo:

JADE HELM – MASTERING THE HUMAN DOMAIN-1033 Program & Exec Order 13684

AZ Governor’s Response To Resident’s Concerns With Jade Helm15.mp4

Robin Sage Is Jade Helm For Eastern US

Is The Cloud an Integral Part of the NSA Data Center and Project Bumblehive

Research Links:

Official US Defense Department Science Blog…

DTIC News Wire 10 April 2015… (Scrubbed)

Raytheon BBN Technologies

JADE Program continuation paper – Tuesday Presentation Details…

Mega Data Collection – GWEN Towers… (Scrubbed)

NSA Decryption Multipurpose Research Facility… (Scrubbed)

Is “The Cloud” an Integral Part of the NSA Data Center and Project Bumblehive…??…

Recommended viewing on the subject: Jade Helm – An Expose-Part 2-Infiltration… The AFRL-IF-RS-TR-2001-171 ( Joint Assistant For Development and Execution (JADE) Final Technical Report can’t be opened in a browser, you have to download it and read it using Adobe or word/open office writer. You can find it by Google: AFRL-IF-RS-TR-2001-171


US Government to Authorize Drone Strikes on US Soil?


Be the first to comment

Leave a Reply

Your email address will not be published.