Facebook's Observations on Information Operations and the 2016 US Election

May 10, 2017 by Gabe | [mmd] | ℳ↫

Linked from Schneier.com. The PDF is well worth downloading and reading.

There is some public discussion of false amplifiers being solely driven by “social bots,” which suggests automation. In the case of Facebook, we have observed that most false amplification in the context of information operations is not driven by automated processes, but by coordinated people who are dedicated to operating inauthentic accounts. We have observed many actions by fake account operators that could only be performed by people with language skills and a basic knowledge of the political situation in the target countries, suggesting a higher level of coordination and forethought. Some of the lower-skilled actors may even provide content guidance and outlines to their false amplifiers, which can give the impression of automation.

The case study at the end specifically focused on the 2016 election. I think their statements seem week and ambiguous and rather than being a scientific study is a more of a party anecdote.

I do find it interesting that this is released as a PDF. Probably because it's a portable and universally accessible format that is not controlled by a single authority. Unlike Facebook.

Older articles

  1. The Intel Hijacking Flaw [Link]

    May 08, 2017 by Gabe | [mmd] | ℳ↫

    This Ars Technica seems very dire. It's a huge breach of trust for Intel hardware.

  2. VPNs and Data Collection in the Age of Surveillance

    May 02, 2017 by Gabe | [mmd] |

    Chris Duckett ZDNet article (A VPN will not save you from government surveillance) is informative, if a little hyperbolic:

    Under the laws that force telcos to store customers' call records, location information, IP addresses, billing information, and other data for two years, there is a small caveat for journalists that ...

  3. Data Privacy and Machine Learning [Link]

    April 18, 2017 by Gabe | [mmd] | ℳ↫

    From this extremely well written article by John Foreman article1:

    First, humans are bad at discerning the value of their data. Personal data just appears out of nowhere, exhaust out of life’s tailpipe, so why not trade it for something small? I’m personally willing to hand over ...

  4. VPN and Privacy

    April 13, 2017 by Gabe | [mmd] |

    In the United States we have few privacy protections. We now have fewer than we had 6 months ago. We represent little more than a pool of cash to be exploited. My personal strategy is to make the collection of my data cost as much as possible because I like ...

  5. Is Slack Secure Enough

    March 31, 2017 by Gabe | [mmd] |

    I sure do like Slack. It's a hugely convenient service that I actually pay for.1 Many of my best friends are on Slack and it's a continuous source of enjoyment and intelligent discussions for me. But I use it less now because I can't trust its ...

  6. Exploring an iCloud Phishing Server Ring [Link]

    March 16, 2017 by Gabe | [mmd] | ℳ↫

    This story by Brian Krebs is an amazing breakdown of an iCloud phishing ring. It not only provides a lot of detail about the thinking behind these phishing services (and all those phishing emails you get) but it's a study in human nature too:

    This is where the story ...

  7. Who Owns Your Email

    March 06, 2017 by Gabe | [mmd] |

    Email is more than just a communication tool for me. With unbelievably inexpensive storage options and incredible search and filtering my email is now a filing cabinet. I make the extra effort to organize my email archive because it improves my search experience, but even if I just moved everything ...

  8. Security for Living Under the American Regime

    February 23, 2017 by Gabe | [mmd] |

    Living in a country with the second best espionage infrastructure in the world, I like to think I'm prudent. Be that as it may, there's always more to consider and I've shared this site with many of my friends. It's a good primer on securing your ...

  9. How to Bury a Major Breach Notification [Link]

    February 22, 2017 by Gabe | [mmd] | ℳ↫

    From Brian Krebs:

    That’s because in addition to compromising the download page for this software package, the attackers also hacked the company’s software update server, meaning any company that already had the software installed prior to the site compromise would likely have automatically downloaded the compromised version when ...