Discussion:
JTRIG, SIGDEV
(too old to reply)
Mok-Kong Shen
2015-08-07 07:48:45 UTC
Permalink
From an article of Glenn Greenwald
(https://firstlook.org/theintercept/20144/02/24/jtrig-manipulation)
I found the following interesting paragraph:

"Among the core self-identified purposes of JTRIG are two tactics: (1)
to inject all sorts of false material onto the internet in order to
destroy the reputation of its targets; and (2) to use social sciences
and other techniques to manipulate online discourse and activism to
generate outcomes it considers desirable. To see how extremist these
programs are, just consider the tactics they boast of using to achieve
those ends: “false flag operations” (posting material to the internet
and falsely attributing it to someone else), fake victim blog posts
(pretending to be a victim of the individual whose reputation they want
to destroy), and posting “negative information” on various forums."

M. K. Shen
Johannes Bauer
2015-08-07 07:57:01 UTC
Permalink
Post by Mok-Kong Shen
From an article of Glenn Greenwald
(https://firstlook.org/theintercept/20144/02/24/jtrig-manipulation)
Which has to with with programming exactly *what*?
Post by Mok-Kong Shen
"Among the core self-identified purposes of JTRIG are two tactics: (1)
to inject all sorts of false material onto the internet in order to
destroy the reputation of its targets;
Hmmm, so posting a clearly broken encryption algorithm, claiming it to
be secure and hoping for the "next Snowden" to use it would fall under
this strategy? Is this supposed to be a confession?

Cheers,
Johannes
--
Post by Mok-Kong Shen
Wo hattest Du das Beben nochmal GENAU vorhergesagt?
Zumindest nicht öffentlich!
Ah, der neueste und bis heute genialste Streich unsere großen
Kosmologen: Die Geheim-Vorhersage.
- Karl Kaos über Rüdiger Thomas in dsa <hidbv3$om2$***@speranza.aioe.org>
Mok-Kong Shen
2015-08-07 12:03:08 UTC
Permalink
Post by Johannes Bauer
Post by Mok-Kong Shen
From an article of Glenn Greenwald
(https://firstlook.org/theintercept/20144/02/24/jtrig-manipulation)
Which has to with with programming exactly *what*?
I just wanted to call attention to the phenomenon of defamation
which unfavorably affects the discussion atmosphere in many groups.

M. K. Shen
Post by Johannes Bauer
Post by Mok-Kong Shen
"Among the core self-identified purposes of JTRIG are two tactics: (1)
to inject all sorts of false material onto the internet in order to
destroy the reputation of its targets;
Hmmm, so posting a clearly broken encryption algorithm, claiming it to
be secure and hoping for the "next Snowden" to use it would fall under
this strategy? Is this supposed to be a confession?
Cheers,
Johannes
Kaz Kylheku
2015-08-07 15:05:23 UTC
Permalink
["Followup-To:" header set to comp.programming.]
Post by Mok-Kong Shen
Post by Johannes Bauer
Post by Mok-Kong Shen
From an article of Glenn Greenwald
(https://firstlook.org/theintercept/20144/02/24/jtrig-manipulation)
Which has to with with programming exactly *what*?
I just wanted to call attention to the phenomenon of defamation
which unfavorably affects the discussion atmosphere in many groups.
Why don't you pause to lookup up "defamation" in an English dictionary?
Now what you've used the word several times, it is high time to formally
introduce yourself to its definition.

Defamation means that someone utters or writes something false about you which
damages your public reputation. (Uttered defamation is "slander" and written
defamation is "libel".)

Defamation would occur if someone announces that, for instance, he has seen you
steal something from a store. Some members of the public believe it, and so
your reputation is tarnished. The announcement only defamation if it isn't true.

"You're an idiot" isn't defamation; it's clearly just an opinion. Such an
opinion can be a justified, evidence-based comment on someone's recent
output in a network forum.
Kaz Kylheku
2015-08-07 14:51:17 UTC
Permalink
Post by Mok-Kong Shen
"Among the core self-identified purposes of JTRIG are two tactics: (1)
to inject all sorts of false material onto the internet in order to
destroy the reputation of its targets.
This does not apply when the target is yourself and you believe the false
material that you're posting that is ruining your own reputation,
like "Python's PRNG is good enough for generating RSA keys and one-time pads"
and "if an academic paper doesn't explicitly spell out an assumption,
then such an assumption doesn't hold".

Wait, when did you have a good reputation around here?

At the time of the From: line in your first posting, it was slightly
positive. It took a downturn to neutral in Subject: and continued
to plummet in the body.
Mok-Kong Shen
2015-08-07 19:56:01 UTC
Permalink
Just want to mention that the two posts of Kaz Kyhlheku (07.08.2015
17:05 and 16:51), in which he set follow-ups to comp.programming,
have been duly answered by me in that group.

M. K. Shen

Loading...