• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

 | 

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber warfare
  • Digital ID
  • Intelligence
  • Social Networks
  • Is the INSCOM (U.S. Army Intelligence & Security Command) working on a PSYOPS software?

Is the INSCOM (U.S. Army Intelligence & Security Command) working on a PSYOPS software?

Pierluigi Paganini January 12, 2018

The INSCOM (U.S. Army Intelligence & Security Command) is working on a software that could be used to monitor social media and influence the sentiment on specific topics.

We have a long discussed the possible use of social media for both intelligence gathering and PSYOPs operations. In 2013 I wrote an interesting post about Social Media use in the Military Sector, I also defined the term “Social Network Poisoning” on Wikipedia, but while the Italian translation was still online the English one was deleted and I was banned from Wikipedia because I was trying to explain the phenomena in the last yeas made the headlines. No matter.

In the past months, security experts have collected evidence that links the Russian Government to massive propaganda operations through social networks aimed to influence the sentiment of Americans on the 2016 Presidential elections.

I was analyzing requests for the submissions of White Papers for INSCOM (U.S. Army Intelligence & Security Command) Technology when I noticed a number of very interesting requests for a “Content Translation of PAI,” “Automated Sentiment Analysis (SA),” and “Content Generation Based off of PAI”

Let’s give a look at the requirements for each requets:

0001: Content Translation of PAI

A. Capability to translate foreign language content (message text, voice, images, etc.) from the social media environment into English. Required languages are Arabic, French, Pashtu, Farsi, Urdu, Russian, and Korean.

B. Identify specific audiences through reading and understanding of colloquial phrasing, spelling variations, social media brevity codes, and emojis.

1. Automated capability for machine learning of foreign language content with accuracy comparable to Google and Microsoft Bing Translate. Must be able to incrementally improve over time.

2. Recognize language dialect to ensure effectual communication.

0002: Automated Sentiment Analysis (SA)

A. Capability to derive sentiment from all social media content.

1. At minimum, distinguish negative, neutral, and positive sentiment based on collective, contextual understanding of the specific audience.

a) Capability to determine anger, pleasure, sadness, and excitement.

2. Capability to recognize local colloquial and/or slang terms and phrases, spelling variations, social media brevity codes, capitalization, and emojis will be included.

3. Automated machine learning of SA must be able to incrementally improve over time.

a) Software should allow for heuristic updates to improve overall capability; e.g., manually suggest updates based on personal knowledge and experience.

B. Capability to suggest whether specific audiences could be influenced based on derived sentiment.

0003: Content Generation Based off of PAI

A. Capability to translate English into Arabic, French, Pashtu, Farsi, Urdu, Russian, and Korean.

B. Automated capability to generate/create at least three, and up to 10, unique statements derived from one (1) original social media statement, while retaining the meaning and tone of the original.

1. Customize language in a dialect consistent with a specific audience including spelling variations, cultural variations, colloquial phrasing, and social media brevity codes and emojis.

Well, considering that the INSCOM executes mission command of operational intelligence and security forces, this software could be used for both monitoring social media (with a specific focus on Arabic, French, Pashtu, Farsi, Urdu, Russian, and Korean contents).

The requirements specifically address the need to create a system to influence the public sentiment on specific topics (i.e. Capability to determine anger, pleasure, sadness, and excitement.)

I have released this interview to explain my point of view on such kind of software:

What’s the need for such software?

Such kind of software could be used for social media monitoring. Not only, in this specific case, the project aims to build a machine learning system that is able to identify and influence the sentiment of a specific audience. No doubt, it is software that could be used in PSYchological OPerations (PSYOPs).

Would such software be a threat, or would it be just for snooping?

This kind of software could be used also to influence the sentiment on specific topics. This software represents a serious threat to the privacy of citizens, but the most disconcerting aspect is that IA based system could be involved in operations to destabilize a political context. Social media are a powerful instrument to make propaganda and to promote mass demonstration, we have all in mind what has happened in the case of the Arab Spring.

The United States Army Intelligence and Security Command – collects intelligence for combat operations… so how would this new software be useful?

It is an essential software for any Army and Command and Intelligence agency involved in intelligence mission. These systems are essential to gather information from social media and represent a privileged tool for SOCMINT, Social media intelligence.

SOCMINT could be used for several purposes, not only cyber-espionage but also for counterterrorism operations.

Clearly, the most disconcerting use is related to the influence of public sentiment on specific topics.

The U.S. has continually accused Russia of using bots and troll factories to influence U.S. social media… isn’t this an attempt to do the same. What’s your take on that?

I believe that almost any government is involved in social media monitoring, many states use social media as a military weapon. The answer is that the risk is concrete, but at the moment we have no evidence of this. The software could be used also as a defense mechanism against PSYOPs conducted by foreign goverments through social media.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs –  US Army,  PSYOPS)

[adrotate banner=”5″]

[adrotate banner=”13″]


facebook linkedin twitter

you might also like

Pierluigi Paganini July 11, 2025
U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog
Read more
Pierluigi Paganini July 10, 2025
UK NCA arrested four people over M&S, Co-op cyberattacks
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

    Uncategorized / July 11, 2025

    U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

    Hacking / July 11, 2025

    UK NCA arrested four people over M&S, Co-op cyberattacks

    Cyber Crime / July 10, 2025

    PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

    Hacking / July 10, 2025

    Qantas data breach impacted 5.7 million individuals

    Data Breach / July 10, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT