Vulnerabilities / Threats

5/11/2018
12:45 PM
50%
50%

Newly Released Russian Facebook Ads Show Scale of Manipulation

House Democrats this week released 3,500 Facebook ads demonstrating the extent of Russia's influence on US citizens from 2015 to 2017.

Democrats on the House Intelligence Committee have shared more details of Russia's interference in the 2016 US Presidential Election with the release of 3,000 Facebook ads. The ads, purchased by Russia's Internet Research Agency (IRA), ran from 2015 to 2017.

Committee members this week released a total of 3,519 ads and stated more than 11.4 million Americans were exposed to them. The IRA also created 470 Facebook pages, which generated 80,000 pieces of organic content and were seen by more than 126 million Americans, the Committee reports. It plans to release this organic content at a later date.

Earlier this year, a federal grand jury indicted 13 Russian nationals and three Russian entities, including the IRA, for their participation in a scheme to interfere with the 2016 election. Special Counsel Robert Mueller alleges that they aimed to sow discord in the US political system. They posed as US citizens and businesses to buy political ads on social media and spread disinformation.

Now we have more details about what these ads included and who they targeted. While not all of them are pro-Trump, they depict controversial and high-profile issues -- the Second Amendment, Black Lives Matter movement, immigration, LGBT rights among them -- in a way designed to pit groups of Americans against each other.

In recent public statements, Facebook admits it was "too slow to spot this type of information operations interference" and the company says it plans to make changes with the intent of stopping threat actors from leveraging misinformation to change the democratic process. For example, Facebook is creating an archive so users can search back through issues and political ads for up to seven years and view ad impressions, spending, and demographic data like age, gender, and location. Advertisers will need to confirm their ID and location before running political ads in the US, and ads will say who paid for them.

Read more details here and view the ads here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SchemaCzar
50%
50%
SchemaCzar,
User Rank: Strategist
5/15/2018 | 1:01:02 PM
Re: A reminder that the internet can be divisive
I agree with your point that blaming the current administration is not useful.

However, I think that the problem with the ads is likely the lack of clear attribution and accountability, and the usual advertisements posted by acknowledged political organizations should not be prohibitive either in price or in ability to get through whatever screening is being proposed.
JasonTLouis
100%
0%
JasonTLouis,
User Rank: Apprentice
5/14/2018 | 11:36:53 AM
Re: A reminder that the internet can be divisive
I'm not sure this has much, if anything to do with the current administration. The burden is on Facebook and other social media companies to police their own site. These same individuals/companies took out ads that were in favor and opposing both candidates. They started events and groups that were for and against both candidates. We can quibble over who had more "pro" related material taken out on them, but the same actors seemed to have more of an agenda to cause chaos and cause overreactions from both political parties. In my eyes, they succeeeded.

Blaming one candidate or administration is being very disingenuous knowing what we know now. All the Russians involved did the same thing for both candidates. Facebook could have done more to look into who's taking out these ads, starting these groups and pages, creating these events, creating bot accounts, but did not. Only when they were dragged into the investigation did they come clean and decide to take further steps to mitigate this. In the future, it is probably going to be extremely hard to take out political ads unless you are a massive super pac or direct campaign taking out the ads (thinking 2020 campaign season). Who knows as we still don't know half of the information we probably should and I highly doubt Facebook is going to release any information they don't legally have to.

If you are going to blame the current administration, you ultimately must blame the previous as this happened under their watch. It works both ways and if you just blanket one side with the fault, the root of the problem will never get solved.
JasonTLouis
100%
0%
JasonTLouis,
User Rank: Apprentice
5/14/2018 | 9:59:36 AM
Indicted Russians and the current court case
If you are going to mention that 13 Russians were indicted, it would benefit the readers to know more about what's going on the courts as Mueller is not having a good time with those included in the indictments. One company was not even a company when Mueller is alleging they were. Mueller's team also requested a delay in the case and judge denied this. Then they have all plead not guilty but it's not surprising they would. There's more but there are a few good legal blogs that go into more detail. I'd try to avoid your typical news sites as they do not go into as much detail and what they include and don't include depends on which political ideology they lean. If nothing else, I think it would be good to link to a legal news site or blog that explains in a bit more detail what's currently playing out in the courts with this as it will become very important in the near future and the legality of who can take out ads and who cannot.
carlosPochote
0%
100%
carlosPochote,
User Rank: Apprentice
5/11/2018 | 2:58:13 PM
A reminder that the internet can be divisive
For many years, the Internet has been a great tool for technological advancements, enabling many applications to be accessible by many.  Web portals, SaaS, cloud services, IoT, etc. have made our life easier from a convenience perspective, but social tools such as Facebook, twitter, WhatsApp, G+, and any blog out there has opened a door that we never expected.  And I'm not talking simple annoying messages, this is material that can destroy a nation, lives and disrupt economies and political models.

It is up to those companies to responsibly manage and develop their products as well as to provide security controls to regular users like us to prevent this manipulation.  Our responsibility is to educate ourselves on the dangers that can come through these sources and resist biting the bait.

I does not help when the administration questions its own security agencies, or any other professional recommendation/opinion when talking about cybersecurity.  This is real.

 
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-8030
PUBLISHED: 2018-06-20
A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 7.0.0-7.0.4 when AMQP protocols 0-8, 0-9 or 0-91 are used to publish messages with size greater than allowed maximum message size limit (100MB by default). The broker crashes due to the defect. AMQP protocols 0-10 and 1.0 a...
CVE-2018-1117
PUBLISHED: 2018-06-20
ovirt-ansible-roles before version 1.0.6 has a vulnerability due to a missing no_log directive, resulting in the 'Add oVirt Provider to ManageIQ/CloudForms' playbook inadvertently disclosing admin passwords in the provisioning log. In an environment where logs are shared with other parties, this cou...
CVE-2018-11701
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x005cb509, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.
CVE-2018-11702
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x00578cb3, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.
CVE-2018-11703
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x00402d6a, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.