- The Washington Times - Tuesday, March 1, 2011

The U.S. Central Command is stepping up psychological warfare operations using software that allows it to target social media websites used by terrorists.

The Tampa, Fla.-based military command that runs the wars in Iraq and Afghanistan recently bought a special computer program that troops use to create multiple fake identities on the Internet. The military uses the fictitious identities to infiltrate groups and in some cases spread disinformation among extremist organizations such as al Qaeda and the Taliban with the goal of disrupting their operations, according to documents and U.S. officials.

The program is aimed at helping troops create and maintain realistic online personalities that will persuade extremists to allow them into chat rooms and bulletin boards by creating the appearance that they are logging on and posting messages or other contributions from anywhere in the world.

Information operations generally are carried out by U.S. special-operations forces.

The software is used for what the military calls “information operations” that use “classified social media activities outside the United States to counter violent extremist ideology and enemy propaganda,” Centcom spokesman Cmdr. Bill Speaks told The Washington Times.

Information operations include activities designed “to influence, disrupt, corrupt or usurp adversarial human and automated decision-making while protecting our own,” according to Pentagon documents. Such activities include disinformation campaigns, or military deception; computer network operations, or hacking; and what used to be called psychological warfare operations or “psy-ops,” but is now referred to as “military information support operations.”

Defense Secretary Robert M. Gates issued a memo this year directing that military information support operations replace psychological warfare and transferring oversight and management of information operations from defense intelligence officials and to the Pentagon’s policymaking directorate. He said the change would enable better coordination of activities across the Pentagon and throughout the U.S. government.

Under Mr. Gates‘ order, U.S. Strategic Command, where the military’s new cyberwarfare arm is based, will concentrate on military computer hacking and cyberdefenses. The Joint Staffs will take responsibility for deception operations and Special Operations Command will take the lead in military information support operations. Deception operations can be strategic and tactical and can be aimed at supporting U.S. policies or small-scale operations.

Former CIA Director and retired Air Force Gen. Michael V. Hayden said in an interview that information operations like those at Centcom, using social media, are the cutting edge of U.S. military and intelligence activities that often require officials to rapidly determine how long-established rules and limits apply in the borderless world of the Internet.

“I think a good word would be developmental,” Mr. Hayden said. “Operationally developmental, technologically developmental and legally developmental.”

Centcom purchased the $2.7 million software from San Diego-based Ntrepid, the same company that markets “Anonymizer,” a popular online tool that lets users hide their identities and locations on the Web.

The company and its executives did not respond to several requests for comment.

According to military procurement documents, the software will “enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries.”

“Personas must be able to appear to originate in nearly any part of the world,” the documents stated.

Any computer that logs on to the Web generally does so from its unique Internet location, known as an Internet Protocol or IP address. The addresses often can be tracked back to specific corporations or agencies, and sometimes are pinpointed geographically.

Story Continues →