MisInformationCom and Election Security

Election security top priority for U.S.: DHS chief - newsR ...
So, Dana Perino of Fox News/Daily Briefing had Mary Anne Marsh on the show today to discuss voting security. Mary Ann went on and on about how the Trump administration is not doing enough to ensure foreign interference/election meddling is prevented in the 2018 mid-terms and all the way to the general election in 2020.
Clearly Mary Ann has not been a part of the countless sessions that DHS has hosted for the benefit of each state to protect and harden their respective systems. Frankly, I have participated in 2 conference calls and have watched congressional hearings as well as read documents provided as to the activities on behalf of DHS and the FBI.
Then while few people know, the Justice Department produced a lengthy document by the titled ‘The Cyber Digital Task Force that speaks to all foreign intrusion operations including the matter of the election infrastructure. Pass this on to Mary Ann please. Just one of hundreds of paragraphs is below:
Covert influence operations, including disinformation operations, to influence
public opinion and sow division.
Using false U.S. personas, adversaries could covertly create and operate social media pages and other forums designed to attract U.S. audiences and spread disinformation or divisive messages. This could happen in isolation or in combination with other operations, and could be intended to foster specific narratives that advance foreign political objectives, or could be intended simply to turn citizens against each other. These messages need not relate directly to political campaigns. They could seek to depress voter turnout among particular groups, encourage third-party voting, or convince the public of widespread voter fraud to undermine confidence in election results. These messages could target discrete U.S. populations based on their political
and demographic characteristics. They may mobilize Americans to sign online petitions
and join issue-related rallies and protests, or even to incite violence. For example, advertisements from at least 2015 to 2017 linked to a Russian organization called the Internet Research Agency focused on divisive issues, including illegal immigration and gun rights, among others, and targeted those messages to groups most likely to react.
Meanwhile, there is an external organization made up of subject matter experts collecting evidence and stories of which the Deputy Assistant Attorney General Adam S. Hickey for the National Security Division Delivered Remarks at Misinfo Con.
Thank you for the invitation to speak today, and for the important work you are doing: in organizing this conference devoted to the challenges of misinformation, and, by attending, bringing your experience and expertise to bear on the problem.

It’s a privilege to help kick off this first day of MisinfoCon, focused on state-sponsored misinformation. To do that, I am going to give you an overview of how the Department of Justice views the problem, where it fits in the context of related national security threats, and how we are addressing it.

As you probably know, the Justice Department recently obtained an indictment of 13 Russian individuals and three entities, including the Internet Research Agency (or IRA), for federal crimes in connection with an effort to interfere in the 2016 Presidential election. The defendants allegedly conducted what they called “information warfare against the United States,” with the stated goal of “spread[ing] distrust towards the candidates and the political system in general.”

According to the indictment, the IRA was a structured organization headed by a management group and arranged in departments. It had a “translator project,” designed to focus on the U.S. population, with more than 80 employees assigned by July 2016. They posed as politically and socially active Americans, advocating for and against particular political candidates. They established social media pages and groups to communicate with unwitting Americans. They also purchased political advertisements on social media.

One of the so-called trolls who worked for the IRA recently spoke to the Washington Post about his work in a different department, attempting to influence a domestic, Russian audience. He described it as “a place where you have to write that white is black and black is white.” Hundreds of people “were all writing absolute untruths.”

But as the indictment alleges it, what made the defendants’ conduct illegal in the United States was not the substance of their message, the “accuracy” of their opinions: it was their conspiracy to defraud by, among other ways, lying about who the messenger was.  They were not Americans expressing their own viewpoints; they were Russians on the payroll of a foreign company.

Now, the problem of covert foreign influence is not new. In 1938, a congressional committee found that the Nazi government had established an extensive, underground propaganda apparatus inside the United States using American firms and citizens. The response was to recommend a law that would (in the committee’s words) throw these activities under the “spotlight of pitiless publicity.”  The result is the Foreign Agents Registration Act (FARA), a disclosure statute that, notably, does not prohibit speech. Rather, FARA requires agents of foreign principals who engage in political activities within the United States to file periodic public disclosures with the Department.

The Act’s purpose is to ensure that the American public and our lawmakers know the source of information provided at the behest of a foreign principal, enhancing the public’s and the government’s ability to evaluate such information.

Transparency, not prohibition, has been the government’s response to misinformation. In the 1980s, the government established an interagency committee, the “Active Measures Working Group,” to counter Soviet disinformation. It did so by exposing forgeries and other propaganda, such as fake stories that the Pentagon developed the AIDS virus as part of a biological weapons research program.

Today, we confront misinformation as only one component of a broader, malign foreign influence effort.  As this framework from the Department’s recent Cyber-Digital Task Force report shows, those efforts can also include cyber operations that target election infrastructure or political parties’ networks; covert efforts to assist (or harm) candidates; and overt efforts to influence the American public (for example, through state-run media organizations).

Our responses to those efforts must likewise be multifaceted, from providing indicators and warnings that can help network owners protect themselves from hackers, to criminal investigations and prosecutions, and other measures, like sanctions and expulsions that raise the costs on the states that sponsor such malign activities.

This graphic, also from the Task Force report, depicts the Department’s strategy to counter each phase of a covert influence campaign cycle, from the identification of targets to the production and amplification of content.  The middle rows (in red) depict our adversaries’ activities in stages, while the bottom rows (in blue) suggest the means by which private actors and the government can disrupt and deter the activity.

One aspect of this strategy worth highlighting is that the content of a foreign influence campaign may be true or false.  Whether the message is accurate or not may not be the point: doxing a candidate or a corporation for political reasons might not involve misinformation, but it may nonetheless violate our laws, threaten our values and way of life, compromise privacy and, sometimes, retaliate against and chill free speech.

Covert foreign influence efforts can take many forms, but recently we have seen increased efforts to influence Americans through social media. To counter these efforts, a key component of our approach is sharing information with social media and other Internet service providers, which we do through the FBI’s Foreign Influence Task Force.  It is those providers who bear the primary responsibility for securing their own products and platforms.  By sharing information with them, especially about who certain users and account holders actually are, we can assist their own, voluntary initiatives to track foreign influence activity and to enforce their own terms of service.

As the Task Force report also recognizes, there may be circumstances when it is appropriate for the government itself to expose and attribute foreign influence operations as a means of rendering them less effective. But there are often compelling, countervailing considerations, however.

As a general rule, the Department does not confirm, deny, or comment on pending investigations, both to protect the investigation itself as well as the rights of any accused.

We are also constrained to protect the classified sources and methods that may inform our judgment of what foreign governments are doing.

And, most important of all, we must never act to confer any advantage or disadvantage on any political or social group, individual, or organization, and we must strive to avoid even the appearance of partiality. That could constrain the timing and nature of any disclosure we might make.

All of this is to say, and as the Department’s Policy on the Disclosure of Foreign Influence Operations recognizes, we might not be the best messenger to counter a particular piece of misinformation.

That’s why this conference is so important: what we call the private sector (but which includes a lot of people in public spaces, just like you) has a critical role – larger than the federal government’s – in countering covert foreign influence efforts, particularly misinformation, and ensuring that our democracy rests on the active engagement of an informed public.

The former Russian troll I mentioned at the beginning of my remarks, who worked for the IRA, said his work was “pointless” for Russian audiences, that it would not impact them.  But in America, that kind of trickery might have an impact, he said, because we “live in a society in which it’s accepted to answer for your words.” My challenge to us during this conference, if I may make one, is that we find ways to ensure we all continue to answer for our words, so that the trust we enjoy as an aspect of our free, democratic society can thrive.

*** Someone help out the democrats and Mary Ann….all discussions inside the Beltway include these multi-track discussions. Back in March, the U.S. spending bill provided $380 million for election cyber security. There was an amendment for an additional $250 million that the Senate Republicans on a floor vote rejected. Why? Because many of the states have either been slow to accept money inside that $380 million or not taken any at all.

As Facebook Continues to Stray From a Social Media Platform

Angry Emoticon Facebook | www.imgkid.com - The Image Kid ...

What the heck Facebook? Perhaps it is just time to terminate relationships with Facebook. Zuckerberg thought in his early conception and launch of Facebook it was a global means to connect people together, you know expand friendships so we can all like each other worldwide.

Ahem, that is hardly where he and Sheryl Sandberg have has take the company in recent years.

FACEBOOK ROLLS OUT REACTIONS | iNexxus

Let’s begin here:

The aggressive push by Democrats and left-wing activists for social media companies to combat Russian bots and trolls may have backfired, exposing potential foreign efforts to whip up political passions on their side.

Facebook announced last week that it had yanked 32 pages from Facebook and Instagram because they were “involved in coordinated inauthentic behavior,” potentially tied to Russia.

Facebook said that “inauthentic” administrators of a page called “Resisters” were connected with those from other, legitimate pages who worked to drum up support for the protest. “The most followed Facebook Pages were ‘Aztlan Warriors,’ ‘Black Elevation,’ ‘Mindful Being,’ and ‘Resisters.’ The remaining Pages had between zero and 10 followers, and the Instagram accounts had zero followers,” Facebook said. Read more here.

So, beyond selling access to the Facebook databases and user profiles to companies such as Cambridge Analytica, something else is afoot and it too is far beyond the scope of social media.

Ready?

Facebook in talks with banks to add your financial information to Messenger

  • Facebook is considering a Messenger feature that would incorporate a user’s bank information.
  • The feature, first reported by the Wall Street Journal, applies only to Messenger and not the larger Facebook platform.
  • It comes at a sensitive time for Facebook, as it continues to battle privacy concerns and adjust company policy regarding user data.

The feature, first reported by the Wall Street Journal, applies only to Messenger and not the larger Facebook platform. It comes at a sensitive time for Facebook, as it continues to battle privacy concerns and adjust company policy regarding user data.

Facebook’s stock was up about 2.5 percent Monday following the initial Wall Street Journal report.

“Like many online companies, we routinely talk to financial institutions about how we can improve people’s commerce experiences, like enabling better customer service. An essential part of these efforts is keeping people’s information safe and secure,” a Facebook spokesperson said in a statement to CNBC. “We don’t use purchase data from banks or credit card companies for ads.”

Incorporating a user’s financial information into Messenger would allow banks to offer customer service through the platform, as some credit card companies already do, Facebook said. The Wall Street Journal reported the feature could also offer fraud alerts and help users track their account balances.

Isn’t this getting a little creepy? Would Facebook sell banking data also to outside corporations without your knowledge, consent or compensation? Would your bank be part of this new feature and relationship also without your knowledge or consent?

As we are finding, Facebook is clearly in the business of censorship which often violates the First Amendment yet they claim their scrutiny and termination is in violation of terms of service where it has been proven more than once it is just selective censorship. Just ask Diamond and Silk.

Thanks to TechRepublic: In part –

What is the timeline of the Facebook data privacy scandal?

Facebook has more than a decade-long track record of incidents highlighting inadequate and insufficient measures to protect data privacy. While the severity of these individual cases varies, the sequence of repeated failures paints a larger picture of systemic problems.

In 2005, researchers at MIT created a script that downloaded publicly posted information of over 70,000 users from four schools. (Facebook only began to allow search engines to crawl profiles in September 2007.)

In 2007, activities that users engaged in on other websites was automatically added to Facebook user profiles as part of Beacon, one of Facebook’s first attempts to monetize user profiles. As an example, Beacon indicated on the Facebook News Feed the titles of videos that users rented from Blockbuster Video, which was a violation of the Video Privacy Protection Act. A class action suit was filed, for which Facebook paid $9.5 million to a fund for privacy and security as part of a settlement agreement.

In 2011, following an FTC investigation, the company entered into a consent decree, promising to address concerns about how user data was tracked and shared. That investigation was prompted by an incident in December 2009 in which information thought private by users was being shared publicly, according to contemporaneous reporting by The New York Times.

In 2013, Facebook disclosed details of a bug that exposed the personal details of six million accounts over approximately a year. When users downloaded their own Facebook history, that user would obtain in the same action not just their own address book, but also the email addresses and phone numbers of their friends that other people had stored in their address books. The data that Facebook exposed had not been given to Facebook by users to begin with—it had been vacuumed from the contact lists of other Facebook users who happen to know that person. This phenomenon has since been described as “shadow profiles.”

The Cambridge Analytica portion of the data privacy scandal starts in February 2014. A spate of reviews on the Turkopticon website—a third-party review website for users of Amazon’s Mechanical Turk—detail a task requested by Aleksandr Kogan asking users to complete a survey in exchange for money. The survey required users to add the thisisyourdigitiallife app to their Facebook account, which is in violation of Mechanical Turk’s terms of service. One review quotes the request as requiring users to “provide our app access to your Facebook so we can download some of your data—some demographic data, your likes, your friends list, whether your friends know one another, and some of your private messages.”

In December 2015, Facebook learned for the first time that the data set Kogan generated with the app was shared with Cambridge Analytica. Facebook founder and CEO Mark Zuckerberg claims “we immediately banned Kogan’s app from our platform, and demanded that Kogan and Cambridge Analytica formally certify that they had deleted all improperly acquired data. They provided these certifications.”

Racketeering and the Bloody Streets of Chicago

The news reports, the headlines and numbers are head-shaking. It has to be difficult to listen to the police radios calling due to emergencies all over the city. The reporters are tasked with getting names, ages, locations and getting interviews and responses from law enforcement.

Merely reading the article from the Chicago Tribune from a very bloody weekend in Chicago was hard to finish. Getting crime statistics from the Windy City is one thing, believing them is another.

Is crime just part of Chicago’s DNA, a permanent condition given those like Dillinger, Capone or Durkin? From the earliest days of the Bureau, it was clear that agents were permanently needed in two cities—New York and Chicago. By July 21, 1908, several days before the FBI’s official birthday, the Department of Justice had assigned four special agents to Chicago.

The FBI Chicago Field Office grew larger.

On August 27, 1964, the Chicago Division moved into new space located in the just completed E.M. Dirksen Federal Building and Courthouse. Located at 219 South Dearborn Street in Chicago’s “Loop,” the Chicago FBI occupied the entire ninth floor of the building. Marlin W. Johnson was the special agent in charge, and the office included 281 special agents and 185 support employees. The Dirksen building remained the home of the division for the next 42 years. During that time, the office expanded to occupy the entire eighth and 10th floors and part of the 11th floor.

In October 1969, violent members of a radical group known as the Students for a Democratic Society (SDS) bombed a Chicago police memorial and fomented the “Days of Rage” riot in Chicago. An offshoot of SDS called the Weathermen—later the Weather Underground Organization—which evolved into a domestic terrorist group that used bombings, robberies, arson, and other illegal acts to further its radical political agenda. Chicago agents, along with other field offices across the country, thoroughly investigated this organization and its activities. In 1974, the Chicago Division produced an extensive summary of the group’s motivations and activities.

The FALN (Fuerzas Armadas de Liberación National/Armed Forces of National Liberation)—which advocated Puerto Rican Independence—was another 1970s terrorist group subject to intense investigation by the Chicago Division. In the early morning hours of October 27, 1975, bombs exploded outside three Chicago Loop office buildings, including the Sears Tower. A fourth device was found outside the Standard Oil building, but was disarmed before detonating.

In the late 1970s, the division opened what ended up being the FBI’s longest-running domestic terrorism investigation. On May 28, 1978, a bomb exploded at the University of Illinois at Chicago, injuring one individual. In 1979, an FBI-led task force that included the Bureau of Alcohol, Tobacco, and Firearms and the U.S. Postal Inspection Service was formed to investigate the “UNABOM” case—code-named for the UNiversity and Airline BOMbing targets involved. Sixteen more bombings took place over the next 17 years, killing three and injuring more than 20 people. FBI Chicago, along with nearly all of the FBI’s 56 field offices, pursued this terrorist throughout the 1980s and into the 1990s. After an extensive investigation—and a tip from the bomber’s brother—the FBI arrested Theodore Kaczynski in April 1996. Kaczynski ultimately pled guilty and was sentenced to life in prison for his crimes.

Operation Family Secrets—began in 1999 and culminated in 2005 with the indictment and arrest of 14 known or suspected members of a Chicago organized crime group for 18 unsolved mob hits. A Chicago policeman and Cook County sheriff’s deputy were also charged. The defendants all either pled guilty, were convicted in court, or died prior to trial. Read more detail here.

So, now we have a sanctuary city where gangs and illegals own the streets. Mayor Rahm Emanuel either cant get control of the city or refuses to do so. So, the people of Chicago are protesting, demanding he resign. While there is clearly political corruption in the Mayor’s office, racketeering is nothing new in Chicago. Remember Tony Rezko? He was a former fundraiser for Obama and close friend. Then there was the mortgage scandal for the land slated to be part of the Olympic Park in 2009. Moving forward to 2018, there are shady operations going on with the Obama Presidential Library.

But is there corruption within the ranks of Chicago law enforcement? Appears so.

Just this part February, multiple members of a Chicago Police Department anti-gang unit have been stripped of their authority following a federal probe into allegations that they robbed drug dealers.

In 2016, 762 homicides last year and more than 4,000 people wounded—has been described as an epidemic. Primarily gang-related, the shootings are often spontaneous and unpredictable, and the toll on victims, families, and entire communities cannot be overstated. That’s why the FBI’s Chicago Division, working with the Chicago Police Department (CPD) and other agencies, has undertaken significant measures to address the problem.

Flowers, candles, and a t-shirt that says “Justice for Marc” mark the spot where an individual was killed in Chicago.  photo

The tasks appear to be too daunting for the FBI in Chicago as they work with law enforcement officials.

That effort involves three major areas:

  • The creation in 2016 of a homicide task force—in addition to the FBI’s existing violent crimes squad—in which agents work alongside CPD detectives and other law enforcement officers to assist in solving the city’s murder cases;
  • Increased intelligence-gathering efforts to identify shooters and “directors of violence,” which includes embedding FBI analysts at CPD headquarters; and
  • Stepping up community outreach efforts to gain the public’s trust and enlist their help in solving crimes and making communities safer.

U.S. is on the Offensive, Espionage and Cyber

In the last few weeks, there was the Aspen Security Forum, a 3 day event. Then there was a DNI report. Then came 2 separate nationwide conference calls hosted by CERT, the cyber division of DHS.

A remarkable White House press briefing included the heads of intelligence agencies explaining the condition of cyber/espionage and the countermeasures against Russia.

Then there is the military side, a division frankly not well known, the Defense Security Services.

 

See the whole 2 page release here.

 

 

 

 

 

 

 

 

 

 

And there is more:

FBI Releases Article on Securing the Internet of Things

The Federal Bureau of Investigation (FBI) has released an article on the risks associated with internet-connected devices, commonly referred to as the Internet of Things (IoT). FBI warns that cyber threat actors can use unsecured IoT devices as proxies to anonymously pursue malicious cyber activities.

As our reliance on IoT becomes an important part of everyday life, being aware of the associated risks is a key part of keeping your information and devices secure. NCCIC encourages users and administrators to review the FBI article for more information and refer to the NCCIC Tip Securing the Internet of Things.

*** IOT?

The internet of things, at its simplest level, is a network of smart devices – from refrigerators that warn you when you’re out of milk to industrial sensors – that are connected to the internet so they can share data, but IoT is far from a simple challenge for IT departments.

Related reading: Five IoT Predictions For 2019

For many companies, it represents a vast influx of new devices, many of which are difficult to secure and manage. It’s comparable to the advent of BYOD, except the new gizmos are potentially more difficult to secure, aren’t all running one of three or four basic operating systems, and there are already more of them.

A lot more, in fact – IDC research says that there are around 13 billion connected devices in use worldwide already, and that that number could expand to 30 billion within the next three years. (There were less than 4 billion smartphone subscriptions active around the world in Ericsson’s most recent Mobility Report.)

With a huge number of companies “doing IoT” – most big-name tech companies, including Google, Microsoft, Apple, Cisco, Intel, and IBM have various types of IoT play – all working to bring as many users as possible into their respective ecosystems, motivation to make sure IoT systems and devices from different companies all work with each other is sometimes lacking.

Internet of Things photo

The problem, of course, is that nobody’s willing to give up on the idea of their own ecosystem becoming a widely accepted standard – think of the benefits to the company whose system wins out! – and so the biggest players in the space focus on their own systems and development of more open technologies lags behind. More here.

Night Wolves, Putin’s Hells Angels

The Slovak foreign ministry says it is “disturbing” that the Night Wolves – a Russian nationalist biker gang close to President Vladimir Putin – now have a base in Slovakia.

The base has old military vehicles and lies in Dolna Krupa, a village 70km (44 miles) from the capital Bratislava.

The Russian government calls it the Night Wolves’ “European headquarters”.

The bikers are under US sanctions, accused of providing military help for the pro-Russian rebels in Ukraine.

Russian Nationalist biker gang Night Wolves set up base in ...  story/photo

 

So close in fact, Putin rode with them and endorses the group.

Earlier this year, the Night Wolves did a 9 day tour. Bosnia? Yes.  Members of the Night Wolves motorcycle gang visiting a monastery in Serbia. The gang’s tour, funded with a grant from the Kremlin, was billed as a “pilgrimage” meant to showcase the shared Orthodox faith of Russia and the region.CreditLaura Boushnak for The New York Times

Heck, the rode through the Balkins.

The Night Wolves billed their tour, funded with a $41,000 grant from the Kremlin, as a “pilgrimage” meant to showcase the shared Orthodox faith of Russia and the region, at least the bits of it inhabited by ethnic Serbs like Republika Srpska, which is legally part of Bosnia and Herzegovina.

***

Performances organized by the Russian hyper-patriotic biker club Night Wolves stand as prime examples of the Kremlin’s new take on old propaganda efforts. Their spectacles tend to display the full gamut of the Kremlin’s imagery and messaging, from the evil of the United States and Ukrainians to the glorification of the Russian Orthodox Church and the Russian military.

An analysis of Night Wolves spectacles reveals how the Kremlin’s agent provocateurs make use of the fuzzy lines between patriotism, pro-Putinism, Russian Orthodoxy, civic/national duty, and militarism. The purposes of these anti-American scripts are many, not least of which is to garner psychological and physical support for the motherland one way or the other, especially during the Euromaidan era, but also to create a sense of Russian identity, which has been vacuous since the early 1990s. The alarming aspect is that these types of fantastical attractions can transform patriotic attendees into actual networks of gun-toting Russian combatants, which may be part of the government’s objective. Read more here, chilling operation concocted by the Kremlin.

Rock videos supporting the Night Wolves? Yes, glad you asked.

 

Did they have some role in Crimea and Ukraine? Yup. In 2014:

As night fell on Friday , there were signs that the Ukrainian peninsula of Crimea was slipping beyond Kiev’s reach. The parliament remained under siege by pro-Russian protesters, armed men of unknown allegiance were guarding the airports and the Night Wolves, a biker gang with close ties to the Kremlin, blockaded the roads.

Three hundred men in military uniforms with no identifying insignia had entered the Sevastopol airport compound on Thursday night, witnesses said, in what Ukraine’s new interior minister, Arsen Avakov, described as a “military invasion and occupation”.

***

In 2014, the U.S. Treasury added the Night Wolves to the sanctions list due to Crimea and in violation of the Minsk Agreement.

The Night Wolves biker group had its members serve in the Crimean self-defense forces as early as February 2014, which supported local Crimeans against the Government of Ukraine. In March 2014, the Night Wolves conducted intimidation and criminal activities within Ukraine and also abducted and subsequently assaulted a Ukrainian Border Guard official. This biker group also participated in the storming of the gas distribution station in Strikolkove and the storming of the Ukrainian Naval Forces Headquarters in Sevastopol. In early-April 2014, the Night Wolves helped smuggle a former senior Ukrainian official out of Ukraine and also helped obtain Russian passports for another larger group of senior Ukrainian officials that they helped get into Russia. The Night Wolves have been closely connected to the Russian special services, have helped to recruit separatist fighters for Donetsk and Luhansk, Ukraine, and were deployed to the cities of Luhansk and Kharkiv. The Night Wolves group is being designated because it is an entity that is responsible for or complicit in, or has engaged in, directly or indirectly, actions or policies that threaten the peace, security, stability, sovereignty, or territorial integrity of Ukraine.

Aleksandr Zaldostanov, also known as “the Surgeon,” is the leader of the Night Wolves. Zaldostanov chairs the overall Night Wolves organization, and some of his responsibilities include the punishing of chapter groups and members for disloyalty to the Night Wolves organization. During the late-March storming of the Ukrainian Naval Forces Headquarters in Sevastopol, he coordinated the confiscation of Ukrainian weapons with the Russian forces. Zaldostanov is being designated for being a leader of a group, the Night Wolves, that is engaging in, directly or indirectly, actions or policies that threaten the peace, security, stability, sovereignty, or territorial integrity of Ukraine.