Operation Earnest Voice

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Operation Earnest Voice is an astroturfing campaign by the federal government of the United States.[1] The aim of the initiative is to use sockpuppets to spread pro-American propaganda on social networking services based outside of the United States.[1][2][3] The campaign is operated by the United States Central Command (CENTCOM), thought to have been directed at jihadists across Pakistan, Afghanistan and other countries in the Middle East.[1]

According to CENTCOM, the US-based Facebook and Twitter networks are not targeted by the program because US laws prohibit state agencies from spreading propaganda among US citizens as according to the Smith–Mundt Modernization Act of 2012.[4][failed verificationsee discussion] However, according to the Smith–Mundt Modernization Act of 2012, dissemination of foreign propaganda to domestic audiences is expressly allowed over the Internet including social media networks.[5][failed verification] Isaac R. Porche, a researcher at the RAND Corporation, claims it would not be easy to exclude US audiences when dealing with Internet communications.[6] CENTCOM's statements are cast further into doubt as both congressional and private media have discovered that US State propaganda is indeed targeting Americans on US soil.[7][8]

FBI and CIA computers have previously been used to rouse support for the Iraq War as well as to mitigate the measures used at the Guantanamo Bay detention camp, including on websites such as Wikipedia itself.[9]


In 2011, the US government signed a $2.8 million contract with the Ntrepid web-security company to develop a specialized software, allowing agents of the government to post propaganda on "foreign-language websites".[1]

Main characteristics of the software, as stated in the software development request, are:

  • Fifty user "operator" licenses, 10 sockpuppets controllable by each user.[2]
  • Sockpuppets are to be "replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent." Sockpuppets are to "be able to appear to originate in nearly any part of the world."[2]
  • A special secure VPN, allowing sockpuppets to appear to be posting from "randomly selected IP addresses," in order to "hide the existence of the operation."[10]
  • Fifty static IP addresses to enable government agencies to "manage their persistent online personas," with identities of government and enterprise organizations protected which will allow for different state agents to use the same sockpuppet, and easily switch between different sockpuppets to "look like ordinary users as opposed to one organization."[10]
  • Nine private servers, "based on the geographic area of operations the customer is operating within and which allow a customer's online persona(s) to appear to originate from." These servers should use commercial hosting centers around the world.[10]
  • Virtual machine environments, deleted after each session termination, to avoid interaction with "any virus, worm, or malicious software."[10]


USCC commander David Petraeus, in his congressional testimony, stated that Operation Earnest Voice would "reach [a country's] regional audiences through traditional media, as well as via Web sites and regional public-affairs blogging," as an effort to "counter extremist ideology and propaganda".[1] However, his successor, Jim Mattis, altered the program to have "regional blogging" fall under general USCC public-affairs activity. On how they would operate on these blogs, Petraeus explained: "We bring out the moderate voices. We amplify those. And in more detail, we detect and we flag if there is adversary, hostile, corrosive content in some open-source Web forum, [and] we engage with the Web administrators to show that this violates Web site provider policies."[11]

See also[edit]


  1. ^ a b c d e Fielding, Nick; Cobain, Ian (17 March 2011). "Revealed: US spy operation that manipulates social media". The Guardian. Retrieved 29 January 2017.
  2. ^ a b c Lee, Amy (17 March 2011). "U.S. Military Launches Spy Operation Using Fake Online Identities". The Huffington Post. Retrieved 29 January 2017.
  3. ^ Spillius, Alex (17 March 2011). "Pentagon buys social networking 'spy software'". The Daily Telegraph. Retrieved 22 June 2013.
  4. ^ Thornberry, Mac (10 May 2012). "The Smith–Mundt Modernization Act of 2012 (H.R. H. R. 5736)" (PDF). GovTrack. Retrieved 29 January 2017.
  5. ^ "Text of H.R. 5736 (112th): Smith–Mundt Modernization Act of 2012 (Introduced version)". GovTrack. Retrieved 2017-03-01.
  6. ^ Waterman, Shaun (1 March 2011). "U.S. Central Command 'friending' the enemy in psychological war". The Washington Times. Retrieved 29 January 2017.
  7. ^ https://bbgwatch.com/wp-content/uploads/2020/05/US-International-Broadcasting-in-the-Digital-Age-Getting-Advertising-Right.pdf
  8. ^ https://www.nytimes.com/2018/07/19/technology/facebook-ads-propaganda.html
  9. ^ Mikkelsen, Randall (17 August 2007). "CIA, FBI computers used for Wikipedia edits". reuters.com. Reuters. Retrieved 20 January 2021. WikiScanner revealed that CIA computers were used to edit an entry on the U.S.-led invasion of Iraq in 2003. A graphic on casualties was edited to add that many figures were estimated and were not broken down by class.
  10. ^ a b c d United States Air Force (22 June 2010). "Persona Management Software. Solicitation Number: RTB220610". FedBizOpps.gov. Archived from the original on 22 February 2011. Retrieved 1 February 2017.
  11. ^ Pincus, Walter (28 March 2011). "New and old information operations in Afghanistan: What works?". The Washington Post. Retrieved 29 January 2017.

External links[edit]