Anonymous: Why does U.S. Central Command want to create phony online identities?

U.S. Central Command has social-media software to counter enemy propaganda

The international collective known as Anonymous is trying to figure out just what U.S. Central Command wants with software that can create and manage phony identities on Facebook, Twitter, LinkedIn and other social networks.

The international collective known as Anonymous is trying to figure out just what U.S. Central Command wants with software that can create and manage phony identities on social networks.

Called Operation Metal Gear, the effort is aimed at shining light on software that that has the potential to set up phony Facebook, Twitter and other social media accounts and could help operatives manage them so they seem like they were set up by real people, with the apparent object of influencing and gathering data about the actual real people they friend.

ADVICE: 7 ways to avoid getting hacked by Anonymous

Anonymous members say they think the software can be used as a tracking and infiltration mechanism on social media sites, both to build profiles of actual members and to influence discussions. It speculates that pro-U.S. Facebook postings in Iraq may actually be written by U.S. operatives using assumed names and dummy accounts.

U.S. Central Command says it's for use in "classified social media activities outside the U.S., intended to counter violent extremist ideology and enemy propaganda." Asked for more detail via e-mail, a spokesman for the Central Command declined, but reiterated that the software was for use outside the U.S.

According to the spokesman, the social media activities supported by the persona management software do not target U.S.-based Web sites or platforms such as Facebook, Twitter  or LinkedIn.

A request for bids to supply this software was part of the information contained in e-mails stolen from HBGary Federal by Anonymous, which posted them in response to the intent of HBGary's then-CEO Aaron Barr to expose the names of Anonymous members. The Central Command request for proposal was an attachment to one of the e-mails.

The software, referred to in a Central Command posting seeking the technology as a "persona management system," would create these false users "replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent."

The request also calls for VPN software to connect operatives to dispersed servers that would be used to launch messages from each persona, giving the impression that the persona was sending from a particular geographic location. Central Command is also seeking static IP address management to give personas a consistent profile, if that is deemed appropriate.

The software being sought would provide operatives with a dashboard that would help them keep the multiple personas separate and post clearly on the screen which persona is being used at the time. The request for bids says the software would be deployed at MacDill Air Force Base in Florida (where Central Command is located); Kabul, Afghanistan; and Baghdad, Iraq.

Anonymous members recorded on an audio file on  speculate that such software products already exist and can also track postings in multiple social media accounts, correlate data and figure out whether accounts under different names are really the same person.

They say the software could be used to create false public opinion, so if protests against governments friendly to the U.S. were being organized via Facebook, operatives could generate pro-government posts to counter those against.

This type of software could be used to do background checks on individuals using their social networking accounts, says John Pironti, president of IP Architects, a security consulting firm. It could be used to find information to discredit individuals as well, he says.

It could be used to friend the children of a person being investigated to find out personal information, such as when the family will be vacationing, he says. "This is why social networking is really bad," he says.

The software extends intelligence-gathering techniques that have been used for hundreds of years, Pironti says.

Whereas before a spy would wear a physical disguise, now they don false personas. "The techniques aren't new, just the platform is new," he says.

Learn more about this topic

Security researcher feels the wrath of Anonymous 

Stolen HBGary e-mails indicate it was planning a 'new breed of rootkit'

Anonymous forces HBGary Federal CEO to step down

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2011 IDG Communications, Inc.