Jump to content
The Education Forum

Net neutrality under fire

Recommended Posts

'' Network Centric Warfare . Developing and Leveraging Information Superiority '' - Sun Microsystems CCRP for the DoD may be of interest, while old (1999) it may provide a continuity perhaps as far back as U.B. Amoss's ''Leadership Resistance'' > ''Self Synchronisation''

also recent by F. Castro : ''

Cyber wars: mercenary activity

on the network

• Using New Information and Communications Technology (NICT) as part of its strategy of subversion in Cuba, the U.S. government is currently trying out a new version of its cyberwar

Deisy Francis Mexidor

FOR U.S. policy strategists it is evident that whoever dominates cyberspace at this point will have guaranteed hegemony in what has been described the new battlefield of the 21st century. ...''


Link to comment
Share on other sites

John, the assault on information is multifaceted. FOX news and even at the college level. (see below)



and self censorship,so before it becomes CYBER WARFARE,the battle is mostly lost,except for alternative outlets.


Edited by Steven Gaal
Link to comment
Share on other sites

  • 3 weeks later...

Obama thinks about internet FREEDOM using the Chinese Internet system.....no real freedom at all. SG see


and yes there is a decrease in freedom when you social network with a fake person,trying to mold your viewpoint.

== actually this is also a type of CYBER warfare. see below


U.S. Gov't Software Creates 'Fake People' to Spread Message via Social Networking

February 19, 2011, Fox News


The US government is offering private intelligence companies contracts to create software to manage "fake people" on social media sites. Private security firms employeed by the government have used the accounts to create the illusion of consensus on controversial issues. The contract calls for the development of "Persona Management Software" which would help the user create and manage a variety of distinct fake profiles online. According to the contract, the software would "protect the identity of government agencies" by employing a number of false signals to convince users that the poster is in fact a real person. A single user could manage unique background information and status updates for up to 10 fake people from a single computer. The software enables the government to shield its identity through a number of different methods including the ability to assign unique IP addresses to each persona and the ability to make it appear as though the user is posting from other locations around the world. The document describes how they would 'friend' real people on Facebook as a way to convey government messages.

Edited by Steven Gaal
Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in

Sign In Now
  • Create New...