{"id":446,"date":"2023-01-25T10:00:42","date_gmt":"2023-01-25T10:00:42","guid":{"rendered":"http:\/\/www.theblackvault.com\/documentarchive\/?p=446"},"modified":"2023-01-25T18:20:58","modified_gmt":"2023-01-25T18:20:58","slug":"operation-earnest-voice","status":"publish","type":"post","link":"https:\/\/www.theblackvault.com\/documentarchive\/operation-earnest-voice\/","title":{"rendered":"Operation Earnest Voice"},"content":{"rendered":"<p>In August of 2013, the report <a href=\"https:\/\/apps.dtic.mil\/sti\/pdfs\/ADA591984.pdf\" target=\"_blank\" rel=\"noopener\">Smart Power and U.S. National Strategy<\/a> from the Joint Special Operations University, stated the following about Operation Earnest Voice:<\/p>\n<p style=\"padding-left: 40px;\"><em>A recently disclosed U.S. classified operation seeks to develop software that allows the use of fake online identities or \u201csock puppets\u201d to influence Internet conversations and spread strategic communications. According to U.S. Central Command (CENTCOM) spokesman Navy Commander Bill Speaks, \u201cThe technology supports classified blogging activities on foreign language websites to enable CENTCOM to counter violent extremist and enemy propaganda outside the U.S. When completed, the software would allow the U.S. to \u201crespond to emerging online conversations with any number of coordinated messages, blogposts, chatroom posts and other interventions.\u201d According to the statement, the original operation had been revealed in 2010 during oversight testimony by General Petraeus, then commander of CENTCOM, before the U.S. Senate Armed Services Committee. It was part of a vital CT and counter-radicalization program called Operation Earnest Voice (OEV), a psychological operations program to counter the al-Qaeda online narrative presence. In testimony before the Senate committee, General James Mattis, then CENTCOM commander, further explained that OEV sought \u201cto disrupt recruitment and training of suicide bombers; deny safe havens for our adversaries; and counter extremist ideology.\u201d What remains undisclosed is what metrics are used to establish success or failure in these operations. As the existence of this type of sensitive technology and its intended uses go viral, it will amount to an invitation to our adversaries and rivals to engage in similar uses, and\/or adopt countermeasures, with unknown future consequences for us and the world at large.<\/em><\/p>\n<p>Credit to <a href=\"https:\/\/www.theguardian.com\/technology\/2011\/mar\/17\/us-spy-operation-social-networks\" target=\"_blank\" rel=\"noopener\">The Guardian<\/a> for breaking the story about the operation in 2011.<\/p>\n<p>The Black Vault requested information from CENTCOM regarding Operation Earnest Voice, and was informed that 100% of the information was classified in 2013. That denial is archived below for reference purposes, and stated that 13 pages were being withheld.<\/p>\n<p>In 2018, a Mandatory Declassification Review (MDR) request was filed by The Black Vault to get the 13 responsive pages that were originally denied, reviewed and released to the public.<\/p>\n<p>It would take until December of 2022 for the records to be partially released. That release is below.<\/p>\n<h3>Document Archive<\/h3>\n<h4>2023 Release under FOIA<\/h4>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/> <a href=\"https:\/\/documents2.theblackvault.com\/documents\/centcom\/23-0046.pdf\">Operation Earnest Voice<\/a> [145 Pages, 8MB]<\/p>\n<h4>2022 Partial Release under MDR<\/h4>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/> <a href=\"https:\/\/documents2.theblackvault.com\/documents\/centcom\/22-0091.pdf\">Operation Earnest Voice<\/a> [14 Pages, 1MB]<\/p>\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fdocuments2.theblackvault.com%2Fdocuments%2Fcentcom%2F22-0091.pdf&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading...<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/documents2.theblackvault.com\/documents\/centcom\/22-0091.pdf\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><p class=\"embed_download\"><a href=\"https:\/\/documents2.theblackvault.com\/documents\/centcom\/22-0091.pdf\" download>Download [1.08 MB] <\/a><\/p><\/div><h4>2013 Denial Letter<\/h4>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/defenseissues\/13-0320.pdf\">CENTCOM&#8217;s 2013 Denial of Records &#8211; Exemption (b)(1)<\/a> [ 2 Pages, 0.4MB ]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In August of 2013, the report Smart Power and U.S. National Strategy from the Joint Special Operations University, stated the following about Operation Earnest Voice: A recently disclosed U.S. classified operation seeks to develop software that allows the use of fake online identities or \u201csock puppets\u201d to influence Internet conversations and spread strategic communications. According<\/p>\n","protected":false},"author":1,"featured_media":447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"episode_type":"","audio_file":"","transcript_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[14,5],"tags":[234],"class_list":{"0":"post-446","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-defense-issues","8":"category-military-defense","9":"tag-propaganda"},"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/uploads\/2015\/02\/CentralCommandSeal.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/comments?post=446"}],"version-history":[{"count":6,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/446\/revisions"}],"predecessor-version":[{"id":17438,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/446\/revisions\/17438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media\/447"}],"wp:attachment":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media?parent=446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/categories?post=446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/tags?post=446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}