Facebook fakers get better at covering tracks, security experts say.

Social

ASHINGTON: Creators of fake accounts and news pages on Facebookare learning from their past mistakes and making themselves harder to track and identify, posing new challenges in preventing the platform from being used for political misinformation, cyber security experts say.

This was apparent as Facebook tried to determine who created pages it said were aimed at sowing dissension among U.S. voters ahead of congressional elections in November. The company said on Tuesday it had removed 32 fake pages and accounts from Facebook and Instagram involved in what it called “coordinated inauthentic behavior.”

While the United States improves its efforts to monitor and root out such intrusions, the intruders keep getting better at it, said cyber security experts interviewed over the past two days.

Ben Nimmo, a senior fellow at the Washington-based Digital Forensic Research Lab, said he had noticed the latest pages used less original language, rather cribbing from copy already on the internet.

“Linguistic mistakes would give them away before, between 2014 and 2017,” Nimmo told Reuters. “In some of these newer cases it seems they’ve caught on to that by writing less (original material) when posting things. With their longer posts sometimes it’s just pirated, copy and pasted from some American website. That makes them less suspicious.”

Facebook’s prior announcement on the topic of fake accounts, in April, directly connected a Russian group known as the Internet Research Agency to a myriad of posts, events and propaganda that were placed on Facebook leading up to the 2016 U.S. presidential election.

This time, Facebook did not identify the source of the misinformation.

“It’s clear that whoever set up these accounts went to much greater lengths to obscure their true identities than the Russian-based Internet Research Agency (IRA) has in the past,” the company said in a blog post https://newsroom.fb.com/news/2018/07/removing-bad-actors-on-facebook on Tuesday announcing the removal of the pages. “Our technical forensics are insufficient to provide high confidence attribution at this time.”

Facebook said it had shared evidence connected to the latest flagged posts with several private sector partners, including the Digital Forensic Research Lab, an organization founded by the Atlantic Council, a Washington think tank.

Facebook also said the use of virtual private networks, internet phone services, and domestic currency to pay for advertisements helped obfuscate the source of the accounts and pages. The perpetrators also used a third party, which Facebook declined to name, to post content.

Facebook declined to comment further, referring back to its blog post.

U.S. President Donald Trump‘s top national security aides said on Thursday that Russia is behind “pervasive” attempts to interfere in November’s elections and that they expect attempts by Russia, and others, will continue into the 2020 elections. [L1N1UT1EG]

They say they are concerned that attempts will be made to foment confusion and anger among various political groups in the United States and cause a distrust of the electoral process.

Two U.S. intelligence officials who requested anonymity told Reuters this week there was insufficient evidence to conclude that Russia was behind the latest Facebook campaign. However, one said “the similarities, aims and methodology relative to the 2016 Russian campaign are quite striking.”

‘Previous mistakes’

Experts who track online disinformation campaigns said the groups who launch such efforts have changed how they post content and create posts.

“These actors are learning from previous mistakes,” said John Kelly, chief executive of social media intelligence firm Graphika, adding they do not use the same internet addresses or pay in foreign currency.

“And as more players in the world learn these dark arts, it’s easier for them to hide among the multiple actors deploying the same playbook,” he said.

Philip Howard, an Oxford University professor of internet studies and director of the Oxford Internet Institute, said that suspicious social media accounts like those taken down this week were once more easily identifiable because they shared the same information from high-profile publications like RT, the Russian English-language news service, or Breitbart News Network.

 

But now, the content they often share is more diverse and less discernible, coming from lesser known sites, including internet forums that mix political news with other topics, he said.

 

“The junk news they’re sharing is using better quality images, for example, more believable domains, less-known websites, smaller blogs,” Howard added.

 

U.S. intelligence agencies have concluded that Russia meddled in the 2016 presidential campaign using tactics including fake Facebook accounts. The Internet Research Agency was one of three Russian companies charged in February by U.S. Special Counsel Robert Mueller with conspiracy to tamper with the 2016 election.

 

Moscow has denied any election interference.

How a stalker can track you through an image sent over WhatsApp.

News

Online stalking is a reality which not many citizens in India are aware about. This is mainly because people do not take their online privacy seriously. Stalking is a serious crime and is a punishable offence. However, due to lack of awareness, people easily fall prey to stalkers and have little clue about how to deal with them. The constant harassment, emotional blackmail and disturbing threats can be a nightmare for the victims.

A stalker mostly plans his/her actions in advance and follows the script. While you might be giving out information about yourself on social media platforms and feel that it is not risky, your stalker might collect these minor information to use them as pieces of a jigsaw puzzle to haunt you.

Even if you are not active on social media, a stalker can guess your exact location by just sending you a multimedia file like an image or GIF on WhatsApp. The bait can be anything that you may find interesting and eventually click on it.

Here’s how it works

You will receive a WhatsApp message (or SMS) from an unknown sender. The message will have an unsuspecting shortened link (will mostly look like a Google link) and the sender will lure you to click by saying– the latest image of a celebrity or click this to know about the latest government scam. On clicking the link, the victim will be shown a funny image or any random news clipping, which is totally harmless. In most occasions, you will either delete the message or will not bother at all. But what you will not realise is that you will have given away your exact location to the stalker by just clicking on the link.
Here’s what happens in the background

Your stalker creates a masked link of a multimedia file. The innocent link is actually created using an IP logger client. There are countless IP logger websites which pops out through a simple Google search. Now, the stalker will send this link to you over WhatsApp or SMS and grab your attention by composing an inquisitive message around the link–like any typical clickbait. The moment you click on it, your IP address gets logged and the staker gets to know about it. Then the stalker will simply have to use an IP tracker service to pinpoint your exact location. This location information could come handy if the stalker intends to harm you or harass you over calls.
The only relief is that there are few IP loggers and trackers that can give out exact locations. And it takes a bit of research to find the right tool. Having said that, any tracker can easily locate you around a district of a state and even the nearest telecom tower. The stalker can then visit that area and eventually get your exact location of your house or other place that you visit by simply following you.
So, before you click on any link sent by an unknown contact do think about this possibility. To be sure about what you click, you can use services like ‘Getlinkinfo.com’ or other to unmask the original link and whether it’s an IP logger or not.