Bestand wählen
Merken

Uncovering British spies’ web of sockpuppet social media personas

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
tree and the
end of the and a
lot of it the alright and it's my great pleasure to introduce to you a most of our but some he's going to talk about some uncovering bridges spider's web of sockpuppet social media personas I was of as a PhD student at the University College in London so I'm studying information security you and focusing on decentralized systems was the father was the cofounder of LulzSec owning hydro activist groups some of you might have heard of only and with that please give a warm applause to will of thank you so it seems that the
posterior had low in the media about this kind of idea that the people they interact with on Twitter and Facebook and other kinds of social media a of city they city they are and sometimes not even be in 1 the people the it might be what's and we've had about how this can might be used to manipulate people into believing sensing or ideas and this has become quite big topic recently and especially after the US this this election flies and 16 where it 1 according to 1 study up to 1 in 5 election tweets went action from real people and apology such as it is such a big problem but even the president is being manipulated but is about but this has been a kind of activity has been going on for a very long time and not just from Russia or China and the West also engages in these kind activities including the unit decay in US by and all kinds of in other regions the today and talking
about call what Britain doesn't regard so in UK our intent we have uh and it's a equivalent if there is a disease called gchq all Government Communications Headquarters the and their job is mystery like the his vision of the state to collect information as much information as possible the through wiretaps and massive assistance but they also have a subgroup or sub-team within gchq called the joint threat such intelligence group or J. trick for short and what these guys this do is is basically a fancy name for so for sitting on Twitter and Facebook will they and told online what they do is they conduct what they call human intelligence which is kind of like the acts of the interacting with humans online to try to make something happen in the real world and in their own words what the missions is to use dirty tricks to destroy deny the great and destruct enemies by discussing described in them I machine J. trick have been involved in various campaigns and operations including policy hacktivist groups like anonymous Norfolk and also protests in east and doing Arab Spring and also the Iranian protests plus 9 so a bit of a context to what led me to
up to uncover the stuff on the actually sections of so 2011 I was involved with the with it with exis people think and to refresh your memory loss like was a group that existed during the summer of 2011 Our Manhattan to a bunch of years um corporate and government organizations like the US Senate especially it's and also Sony and folks and year I was arrested and a year later I was officially invitees on the core indictment but the thing that struck me about this indictment was that there is actually animation in this court documents about how they managed do optimize the unlike unlike a defendant's or how they manage to actually linger on land use we often these the and a voice was suspicious because our US counterparts an action that that coined by France had a very lengthy and sections on how they were courts food sample when the FBI arrested journey Hammond His Cohen and Hi there have very detailed this mission about how this passage was made him and managed to track him exact address and the toward 1 not but then the fossil again there um edges that if leaking documents about NSA and assist you and then 2014 once this documents of softest across from the embassy that was showed that gchq was poverty and activist groups like anonymous and also sick and
nominal states in my head because if our as gchq was involved in this generalization process then they would want to have that in the core magnets because it would reveal the operational techniques and this is what is wanted and it is due talking about from the had this good to targets the 1 of the people a
cognitive um was someone who went by the nickname of Kirk who was chatting in Iess attend a public chats network and this is the type of the chapter general where if people from numbness and all those kinds activists consider Sanchez about various top it can also planned and operations and um this pokes was the saying this tunnel and boasted that they had a list of 700 if agents e-mails and phone numbers and names and then it turned out that a DCT agent was covered in the English Channel observing what people were saying the and then GC-AG agent
initiate a private message with this with this past to kind of get more information and had to try to build a relationship that is present and they can ask them what was the site as and then they follow they just did the information not and even are given a sample from of the information so it turns out
that actually just GHG was active in these Iousy networks an attack networks for months if not years and the OK so there is not too hot but several hundred songs outlined they were just sitting there idling there only saying much people actually come participating in conversations except that every few months you might that's and say hey well in the chat even though it might be of context position was going on presumably so they they wanted of network because some networks to key off arrival in African 41 and then also in what they would do is they would privately Mrs. people in groups to try and corroborate information about 50 so we're going on and being discussed with track we're trying to infect people biking and admits to things as we saw with Kirk they seem to be quite common
theme that these undeveloped fed from agents with 15 induced in tyrants In the Europol meeting and those 11 15 European countries were discussing uh what they were doing to tackle numbers small the power you know semi undercover cops in this channel in this town was that they had issue with undercover cops investigating the seller the the so this is the DC
she agents that was funny thing poke the um sent sent them a link to the Sultan BBC news article about activists and according to the the slide at this link enabled you to conduct and signal intelligence to discover Turks real name Facebook this exactly how do that but it's not that hard if they if they have your IP address and user agent Back then the 1st 11 most websites what used to be as should Facebook so the look your act addressed in this case quarrel or the fact that it's a syndicate easy should see while traffic uh was originally like address and wander acted as well as and physical consecrated up that digits for example but in this in this I live by NBC the URL was redacted but it wasn't very hard to actually to that you're because these were public channels such the situations with looking and have and people have been covered in themselves including myself and we were able to find out what the yield for the was I mean not that what that website
was but which tend to be a year or shorter so the website that was sent to pose the to take was and you are all but to me and according to your hydrology is a snapshot from the well that we wasn't setting but just before want of line that basically showed it was a URL shortening service that have a set of generic you're all you're shopping service all things and it's the axis of the domain name sound like running which is basically what
what they were doing because data trigger um had this internal wiki a listed all of their pixels and tools and techniques that are used in operations and 1 of the categories that they have is a is shaping honeypots and in that category to have a tool but the code dies code names pool which is described as neural from service and that's what the Albany was
a although mean was we 1st so that's interesting 90 with their meaning was this involves an online and almost immediately was the it was linked treats about their impetus and then it went offline into force of that in shortly after the 17th November but interesting if you look up all the instances of this you are also being used in social media and through her this Pubby about 100 100 instances of it being used and every single 1 of those instances where was used was associated with the possible activities related in the middle east Africa the to tip to process and the majority of them was come what coming from active defaulters recounts with no Avatara with very few treats and their account that active for only a few months between 2009 was 1 of the
techniques of techniques that they treat use in their own words about operations is includes uploading videos containing in messaging establishing online analysis with Facebook accounts blogs of for memberships for conducting human intelligence or encouraging discussion on specific issues sending the females and take cities as well as providing a proof of the following resources at something out proof traits sites and that is exactly what you see in the next few slides and it was examples of the use of uh operations is they actually targeted thing ties in population of Iran which is a pretty big hurry audience phase you may have people
according to them they had several goals around the 1st goal was to discredit the main innovation and severe program 2nd goal to delay and this distraught online access to materials using this program so was conducting union intelligence and the 4th goal was most just single my opinion conf censorship my seem my son grade myself like almost like CHQ is kind of alliance with the motives of the and every the community by helping the Syrian activists to sense but what I see is not really the case the main of you and they can
support their coffins valid Dietrich was running and during his campaign this was in line that was called the thousand year and this is my ear and free this was the most active to account they had and had to is in tweets and they also had I kind of like a bunch of all accounts that were less active that had full of metals probably just a kind of and kind of build of their social network that mostly retreated things we treated the same things as display count but slightly reworded or even which is there and what this historical essentially
it was in quick succession and over 4 like want 1 or 2 weeks create a bunch of links from the general shorter for various purposes for to various um articles on on uh books online and they also had actually a book sports websites with like 1 article that kind of um I can't expand network against was activities that
2009 and free and the um of some of the purpose of doing was they were kind of trying to spread the same IP addresses as proxies to Iranians he use as constants ship so for example you can see all that have a list like it is here that would have tiger election that they can use for process and they and they might sometimes be links to this this proxies using that we all know and I Ch this
is this is quite concerning because 1 0 1 of the tools used by the trick is also coat named molten magma which is basically HP proxy to with the ability to look all traffic perform hitched PS dynamical it
is again they would they was spreading exactly the same IP address all of these all of the stuff because with spreading exactly the accuracies and saying the links to to meanings to help them to an as help them to if a cost-sensitive and they were given training that these were the same proxies use by the Iranian government to get around that if I was so if they blow up only the books these proxies you put that on axis the outside world and is essentially
the wording here the In this kind of context issues have acting like the big bad wolf from Red Riding Hood we might seem like the helping me but they also causing you harm the process we and what this is this a list that contains a list of some of the techniques that use introduced as was also leaked documents the and this is actually kill the reservoir that's because what they did is uh this is what the is hosting part like annotations for collecting signal intelligence as we saw with Roque and which is why the Treaty things using neural short of civic and political intelligence on people who are interested is and taking these things and also providing axis answers materials I and since spending is the messages specific individuals giving them instructions for accessing a web sites 1 of the forums
that the structures were posted in the but that was why we process on that and someone actually kind of woman square eyes so 1 also why government use proxy servers that make any sense it was indeed any proxies and someone replied there in government allegedly has set up proxies to monitor connections with from neuron to be able to pinpoint the people who were trying to bypass the books the almost right because it was an Iranian government that was actually watering connections here and it was this issue the to it will also sell
and agreed basic websites catalyze RSS feeds uh to English websites at about the end of this year we've also also for competence ship reasons once the station they did was
may make government officials to for example they might person saying attention is users outside Iran you can call the president of this number elections and it has that that should not call this number if you are a neuron and they will also give and the images for the life President integer the this is also matches
up technique that district refuses again within the documents uh where they stand the females and think that is for a fake person or mimicking a real person to discredit promoters Troster dissuade deceived Teddlie obstruct whether that this
was a certainly managed to promote distrust because 1 of the Titans post was and convertases number because if you were to the 2nd the call will be answered by Iranian 36 services soldiers often days as presenting the cap at this point so that must activity that
we sort of those those wonderful alters recounts um with default eg uh full of also associated with these things you can find them if you search as although me with quisition marks people with sites have have the common and 2010 is absolutely no activity and they're all social media have associated with this you shorter then fighting 11 the social
activities this year for Use your sugar so similar in the the
purpose of conducting surface resistance in 0 and they were essentially doing the same thing same techniques and giving people at the addresses to connect to they've done that epubli MIT and but what they just think here result is that the just 3 stuff they also press the should be eventually major region with these interviews and to try to get people to watch initially tried very hard here because
if you actually the times on on on this account the it both the constants 0 uh and excessive you treated the country 95 pm UK time when the divided few I mean it I think I have nothing there was lazy or up there with this this is well the above its home with it about 1 of the limitations
that Institute has Dashiell what in the documents that they had was they had list of limitations that the staff have with combatants operations on 1 of them is that they have difficulty in maintaining more than a small number of of unique damaged active active aliases especially when was doing on intelligence which is we apply the only Seattle 1 nature's recounts fall for these events and the like a bunch of all work and the fault ixi counties like 5 of 6 we 180 about less than 10 because of did because this was back it was 9 11 they weren't doing it in made with and they also said that the lot of continuity in maintaining ideas communicating via an IS it's itself embers away and here I was discovered by others and also the other 1 was lack of photographs of visual images of employee analysis which is why you always unique eg would evolve evidence for the support account because they can't and establish forces Rafik seen all have faces of people born there and that it did become equal as evidence and they also point had lack of sufficient number and very cultural Langley advisors at EEG in Russian Arabic and fashion which is why we see here on the
cast based being the same thing over and over again with the variation of the same texts over and over again because the that have lost this that
and
and the all of the result was 11 was every time attack managing the bearing that has historical of coffee and for battering and this is a descent to tweets mentions teachers counts 14 that TV and 14 Feb revolution and this was 4 accounts that where like we kind of system that media outlets in the rain that covering and the persist already on the and the so called the dimensions of the kind that we saw with coke so this also here they're using that to you can but you don't urges discover who was lines warnings to recounts the In the wasn't all the
also said that song of activity associated with your phone therefore the thought of 15
I manage to find 1 tweet a related to Kenya to the Kenyan pose of national politics and this person is a decision support that this person is a research assistant by Human Rights Watch so this that because the question of how the action that is you know Publius similar message cheaper the public sentiment link through private message found that interesting and treated the only fight not only auditing and that is to those fucking poverty and years then further
13 all the infrastructure associated with your phone or which was Bush offline this was never thought effect in which was a few months after that this that makes so they had the after a of doing it but I must have been a real pain in also them to you have to renewal infrastructure by it did some digging into some of
all his things uh so hosted on this only all me several which 1st like for something most of the 1st name seems to be like random alphanumeric and domain names and some of them are using for public even Guinness providers like that in the in the so the units are yes I was unable to find any websites or higher for these domains the existing there's any websites there but if you have any ideas that no because 1 of things by suspected that could be it these might have been knowledge endpoints all my controls of is that the reason so if you have any and monitoring tools logs and maybe should have some of these names but 1 of the interesting domain names that I thought was interesting there was genes adventures on and this is the archive
of page for these adventures which was another website based in Kenya there after something can you and it claimed that they were having this was a very basic 1 page website that was a very poorly made and they claim that they were having sigh problems and apology have noticed problems double consistent this has been the Northland told up 6 final problem we apologize for intravenous but it was never any book system the facets is this was just be mushrooms to make it look like if you at the subsite and this to the company was so if you are an my name is about dinner beaches as well tell so if there's any decision agents in the room and packaging for years of and this
will have for today with 1 questions thank you and your new world of the it has passed into trusting you and clicking any form of influences you're right now I through the Facebook and so on how would give rise people to distinguish between a genuine identity and undercover agent the breaking question because it was just doesn't reach 2nd of if you really have to leave the room right now people please do so quietly we still have a lot going on than that it's really unrespectful if you make that much noise and interrupt the something few I know a lot of people are interested in the talk afterwards but we'll all get in so something other question because if you're converting to the activism online and again minus the honor made of people in class and then how do you know the people you can reason with or if you're like in a public grief where you put a sensor accept new members to exactly how people how do you know or has the same shape between use actually the Honourable activity and I think the answer that lies in the what you share don't share information like with anyone but with retains but your home even with people he trusts essentially they trust anyone is a basic obstacle and how journey hands and the staff and it's uh user because what we might call him because he was a little too much information about his life uh like where where each something that or um stevioside drug records and the labels use that to you kind of figure out who was and now the same mistake got poker made US European unfriendly to that agent for a reason so having a kind of the answer is to do your operations in a way where you have to trust people on the that all these methods are because we've seen the number of followers on Twitter and the number of views on YouTube were very low so how much people can is affected by this kind of operations this was also a slide of going there that's those leaks page for publication history that had a list of all the points on what they considered to be an operations and some of this bullet points including how many people click that link and how many people how many people watching too rigid excetera so scheme offers a way that you would measure it coming people view-specific message now in their specific use cases other thing they're very successful a large scale distributed around that's because that's the accounts that greatly followers and the each of it is only at a few hundred and use but they might have been the most their policy more successful in most of the cases where specific individuals but during a buffering case were the bookcase and or whatever is sure as registries if you were right and they would that the work of airing Gallagher she's done work to try to figure out kind of qualitatively anarchies visualizations try to figure out if a particular Twitter account for example is a pot or whether it's a person in a some you know rules of thumb regarding like you know the postures can interact with each other don't react to interact with people is curious what the L technique to may know of to to figure out of you know what is by what is not whether you're familiar with those particular lines of research uh most may with with their work but thank you alter gap that in terms of what kind of matrix A could use all uh to use the test to see if they're account if I mean I think I guess that it's we think of habits and when they read for example it could be indicative of example we saw this personally 395 all always that's quite easy to make is that in the case of and also I think 1 useful things might be might be just do is try to map the network of these accounts if you'd like build up like a uh web of of followers they might be able very easy because of the effects very obvious clusters of accounts of all each other to be the speed the the signal yeah for sure that the word those which are which are like 60 for the thank you for the great talk from how would you compare the former British activities to the current Russian activities maybe talk in itself but terms I hadn't been the need to give you details of floating too much about the Russian activities psycho income about the other not the circuits on a mission to prove briefly in the beginning of the slides because it was that some context so I'll have to research on the Washington of iPod things come through to continue from of the person who spoke on that would have been my questions questions questions so just to show and up onto the you stumble upon similar patterns coming from say I can be wrong or a Washington DC so these accounts rate with the fake it just to the k expressions therefore have aberration there with other countries within the 5 vise like the rest on failure the but I think they might have called a decision tree I think has already fallen at the districts the atom has a break before then a to him I say people's civil sample of we saw during an few years ago a lot here I think uh those addresses hacked someone was completely children the during the certain strike in Iraq users the nicest member the same I'm probably aware that he was generalized or how the way the funds location is that the US was that specifically how informant that was talking to this person and full that send them and send them a link that was generated by teachers you and that's exactly they're able to generalize them something as simple in there but it is mostly the activity of last question we're out of time that you're going to have me they what decision to
if you think about it and I my about the the the the back
Netzwerktopologie
Hypermedia
Benutzerbeteiligung
Spider <Programm>
Computersicherheit
Hypermedia
t-Test
Gruppenkeim
Bridge <Kommunikationstechnik>
Physikalisches System
Operations Research
Soziale Software
Quelle <Physik>
Telekommunikation
Facebook
Bit
Gruppenoperation
Gruppenkeim
Aggregatzustand
Twitter <Softwareplattform>
Untergruppe
Virtuelle Maschine
Einheit <Mathematik>
Reelle Zahl
Prozess <Informatik>
Notepad-Computer
Gasdruck
A-posteriori-Wahrscheinlichkeit
Operations Research
Maschinelles Sehen
Beobachtungsstudie
Nichtlinearer Operator
Benutzerschnittstellenverwaltungssystem
Ruhmasse
Systemaufruf
Kontextbezogenes System
Soziale Software
Dialekt
Gruppenkeim
Twitter <Softwareplattform>
Hypermedia
Ruhmasse
Trigonometrie
Wort <Informatik>
Information
Aggregatzustand
Cybersex
Einfügungsdämpfung
Prozess <Physik>
Selbst organisierendes System
Adressraum
Gruppenkeim
Identitätsverwaltung
Gruppentheorie
Festspeicher
Stichprobenumfang
Garbentheorie
Speicherabzug
Aggregatzustand
Nichtlinearer Operator
Message-Passing
POKE
Datennetz
Chatten <Kommunikation>
Datentyp
Zahlenbereich
Web Site
Mailing-Liste
Information
E-Mail
Instant Messaging
Datenhaltung
Offene Menge
Umsetzung <Informatik>
Datennetz
Ortsoperator
Gruppenkeim
Zahlenbereich
Aggregatzustand
Kontextbezogenes System
Information
Datenhaltung
Weg <Topologie>
Verbandstheorie
Gruppenkeim
Einheit <Mathematik>
Information
Leistung <Physik>
Systemidentifikation
Content Syndication
Facebook
Web Site
POKE
Kartesische Koordinaten
Marketinginformationssystem
Binder <Informatik>
Netzadresse
Rechenschieber
Generizität
Domain-Name
Dienst <Informatik>
Menge
Verschlingung
Reelle Zahl
Digitalisierer
URL
Gerade
URL
Nichtlinearer Operator
Impuls
Domain <Netzwerk>
Pixel
Prozess <Physik>
Kategorie <Mathematik>
Wiki
Soziale Software
Code
Arithmetisches Mittel
Dienst <Informatik>
Forcing
Verschlingung
Default
Instantiierung
Chipkarte
Web Site
Facebook
Web log
Soundverarbeitung
Element <Mathematik>
Videokonferenz
Gradient
Gruppentheorie
Computersicherheit
Nuklearer Raum
Gruppoid
Optimierung
Operations Research
Phasenumwandlung
Analysis
Umwandlungsenthalpie
Nichtlinearer Operator
Materialisation <Physik>
Rechenschieber
Spannweite <Stochastik>
Gruppenkeim
Beweistheorie
Programmiergerät
Ablöseblase
Wort <Informatik>
Stab
Innerer Punkt
Web Site
Datennetz
Twitter <Softwareplattform>
Datensichtgerät
Gebäude <Mathematik>
Validität
Benutzerfreundlichkeit
Binder <Informatik>
Zählen
Gerade
Proxy Server
Prozess <Physik>
Schmelze
Schmelze
Verkehrsformung
IRIS-T
Mailing-Liste
Binder <Informatik>
Extrempunkt
Netzadresse
Konstante
Spezialrechner
Ruhmasse
Gammafunktion
Proxy Server
Webforum
Web Site
Wellenpaket
Prozess <Physik>
Kontrollstruktur
YouTube
Kartesische Koordinaten
Twitter <Softwareplattform>
Netzadresse
Message-Passing
Umwandlungsenthalpie
Webforum
Gruppentheorie
Biprodukt
Hilfesystem
Umwandlungsenthalpie
Materialisation <Physik>
Mailing-Liste
Web Site
Binder <Informatik>
Kontextbezogenes System
Videokonferenz
Arithmetisches Mittel
Mereologie
Wort <Informatik>
Message-Passing
Einfach zusammenhängender Raum
Proxy Server
Web Site
Quadratzahl
Einheit <Mathematik>
Supersymmetrie
Arbeitsplatzcomputer
Datenstruktur
Ranking
Videospiel
Webforum
YouTube
Zahlenbereich
Computer
Web Site
Twitter <Softwareplattform>
E-Mail
Videokonferenz
Message-Passing
Ganze Zahl
Gruppentheorie
COM
PERM <Computer>
Biprodukt
Innerer Punkt
Bildgebendes Verfahren
PROM
Web Site
Dienst <Informatik>
Punkt
Dämon <Informatik>
Hypermedia
Ruhmasse
PASS <Programm>
Systemaufruf
Bildschirmfenster
Default
Kugelkappe
Resultante
Flächentheorie
Adressraum
Lie-Gruppe
Aliasing
Punkt
Natürliche Zahl
Stab
Zahlenbereich
Stetige Abbildung
Digitale Photographie
Kommunalität
Visualisierung
Inverser Limes
Gruppoid
Analytische Fortsetzung
Bildgebendes Verfahren
Analysis
Nichtlinearer Operator
Eindeutigkeit
Abelsche Kategorie
Magnetooptischer Speicher
Mailing-Liste
Vektorpotenzial
Programmierumgebung
Aliasing
Ereignishorizont
Konstante
Forcing
Formale Sprache
Innerer Punkt
Stab
Resultante
TVD-Verfahren
Spitze <Mathematik>
Multiplikation
Hausdorff-Dimension
Abelsche Kategorie
Magnetooptischer Speicher
Vektorpotenzial
Programmierumgebung
Physikalisches System
Aliasing
Auswahlverfahren
Spezialrechner
Stetige Abbildung
Twitter <Softwareplattform>
Formale Sprache
Kommunalität
TVD-Verfahren
Hypermedia
Rotationsfläche
Gradientenverfahren
Gruppoid
Innerer Punkt
Gerade
Stab
Gruppenoperation
Notepad-Computer
Entscheidungsunterstützungssystem
Walsh-Funktionensystem
Ähnlichkeitsgeometrie
Binder <Informatik>
Sichtenkonzept
Message-Passing
Instant Messaging
Notepad-Computer
Leck
Soundverarbeitung
Erneuerungstheorie
Server
Domain-Name
Web Site
Einheit <Mathematik>
XML
Gamecontroller
Login
Service provider
Packprogramm
Abenteuerspiel
Matrizenrechnung
Punkt
Gemeinsamer Speicher
Adressraum
Baumechanik
Twitter <Softwareplattform>
Homepage
Netzwerktopologie
Arithmetischer Ausdruck
Nichtunterscheidbarkeit
Mustersprache
Visualisierung
Kontrollstruktur
Figurierte Zahl
Gerade
Konfigurationsdatenbank
Umwandlungsenthalpie
Softwaretest
Nichtlinearer Operator
Zentrische Streckung
Shape <Informatik>
Sichtenkonzept
Datennetz
Nummerung
Bitrate
Kontextbezogenes System
Entscheidungstheorie
Teilmenge
Rechenschieber
Twitter <Softwareplattform>
Bildschirmsymbol
URL
Information
Message-Passing
Web Site
Facebook
Thumbnail
Stab
Klasse <Mathematik>
Zahlenbereich
E-Mail
Term
Abenteuerspiel
Physikalisches System
Leck
Datensatz
Bildschirmmaske
Benutzerbeteiligung
Stichprobenumfang
Delisches Problem
Cluster <Rechnernetz>
Soundverarbeitung
Videospiel
Schlussregel
Mailing-Liste
Physikalisches System
Binder <Informatik>
Digitaltechnik
Wort <Informatik>
YouTube
Hypermedia
Medianwert
Systemprogrammierung

Metadaten

Formale Metadaten

Titel Uncovering British spies’ web of sockpuppet social media personas
Serientitel 34th Chaos Communication Congress
Autor Al-Bassam, Mustafa
Lizenz CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34898
Herausgeber Chaos Computer Club e.V.
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract The Joint Threat Research Intelligence Group (JTRIG), a unit in one of Britain’s intelligence agencies, is tasked with creating sockpuppet accounts and fake content on social media, in order to use "dirty tricks" to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them. In this talk, we reveal some of that content, in relation to infiltrating activists groups around the world, including during the Arab spring and Iranian revolution.
Schlagwörter Ethics, Society & Politics

Zugehöriges Material

Ähnliche Filme

Loading...
Feedback