Israel is paying internet workers to manipulate online content.mp4
& not news to some yet there's always those that just never thought about it, and What of the U.S. Airfarse efforts & countless other 'influence operations ? & Soon enough along comes tweaked A.I. fake accounts on large enough scales to manipulate public opinion in automated ways that hopefully don't go full Autonomous / self Aware right ? This when folks are fully "ON TO" the concept that there' a 50% chance or higher you are not interacting with real world people / users should collapse the social media platforms by 90% or more so their business models implode :-) & they will deserve every bit of it, watch for clearance sales of Yachts & maybe Leer Jets if you've got the bribe money to pay off the carbon ban and black market fuel prices and skill to fly under radar most of a trip to get out of the Northern Hemisphere if everything implodes to Chaos with unmanned smoldering heaps of NUKE and other industrial stuff smoldering plumes of death. No war required.
Looks flattering but may be a autobot that creates a account just to dislike and comment Fake news ? THE JSOU Manuel is not fake either.
FROM THE JSOU manuel of 2006 Leaked by early 2010 ... " The initial reaction may be to take down the site, but this is problematic in that doing so does not guarantee that the site will remain down. As has been the case with many such sites, the offending site will likely move to a different host server, often in a third country. Moreover, such action will likely produce even more interest in the site and its contents. Also, taking down a site that is known to pass enemy EEIs (essential elements of information) and that gives us their key messages denies us a valuable information source. This is not to say that once the information passed becomes redundant or is superseded by a better source that the site should be taken down. At that point the enemy blog might be used covertly as a vehicle for friendly information operations. Hacking the site and subtly changing the messages and data—merely a few words or phrases—may be sufficient to begin destroying the blogger’s credibility with the audience. Better yet, if the blogger happens to be passing enemy communications and logistics data, the information content could be corrupted. If the messages are subtly tweaked and the data corrupted in the right way, the enemy may reason that the blogger in question has betrayed them and either take down the site (and the blogger) themselves, or by threatening such action, give the U.S. an opportunity to offer the individual amnesty in exchange for information.
There will also be times when it is thought to be necessary, in the context of an integrated information campaign, to pass false or erroneous information through the media, on all three layers, in support of military deception activities. Given the watchdog functions that many in the blogging community have assumed—not just in the U.S., but also around the world—doing so jeopardizes the entire U.S. information effort. Credibility is the heart and soul of influence operations. In these cases, extra care must be taken to ensure plausible deniability and nonattribution, as well as employing a wellthought-out deception operation that minimizes the risks of exposure. Because of the potential blowback effect, information strategy should avoid planting false information as much as possible.
https://femalefaust.blogspot.com/2010/07/what-some-bloggers-knew-all-along-many.html