NEW: The FBI warns in a new alert issued today that the FBI assesses malicious actors will be using deepfakes to advance their foreign influence & cyber-operations in the coming weeks, & that they already use them in influence ops. Details @CyberScoopNewscyberscoop.com/fbi-foreign-ac…
The FBI alert notes: “Foreign actors are currently using synthetic content in their influence campaigns & the FBI anticipates it will be increasingly used by foreign & criminal cyber actors for spearphishing & social engineering in an evolution of cyber operational tradecraft."
Some examples FBI points out: A pro-Chinese gov influence op @Graphika_NYC tracks as “Spamouflage Dragon,” has used profile images generated with AI to lend authenticity to the campaign, via @jeffstone500: cyberscoop.com/graphika-spamo…
Keep an eye out for more in this space, because the FBI warned in Wednesday’s alert that it would investigate deepfakes that have been attributed to foreign malicious actors.
The FBI's warning comes as concerns mount that if manipulated media is allowed to spread unabated, conspiracies/maligned influence will become more mainstream, w/ experts warning digital literacy & efforts to tamp down on misinfo need to be prioritized. cyberscoop.com/trump-riot-dis…
To catch a deepfakes the FBI suggests be on alert for warping, distortions, blurring/syncing issues or other inconsistencies in images/videos: “Do not assume an online persona or individual is legitimate based on the existence of video, photographs, or audio on their profile."
• • •
Missing some Tweet in this thread? You can try to
force a refresh
After a long, hard year in 2020, excited to learn today the @CyberScoopNews team has been selected as a finalist for 7 Azbee awards — including for website of the year, as well as for several investigative, analytical/technical & breaking news stories. asbpe.org/news/2021/03/1…
To follow along with our coverage, here are the highlights, brought to you by Azbee: my look into the U.S. military issuing an alert that a little-known, Chinese-linked hacking group is behind some suspicious activity aimed at U.S. defense contractors: cyberscoop.com/dcsa-cybersecu…
.@jeffstone500's interview with TikTok's security chief, Roland Cloutier, who says he still doesn’t understand why the U.S. government has labeled TikTok as a national security threat: cyberscoop.com/tiktok-lawsuit…
A former Army Green Beret has been arrested for allegedly working w/ Russian intelligence and sharing info about his chemical and Special Forces units w/ the GRU, including team members so GRU could assess their interest in recruiting them, too, per DOJ. justice.gov/opa/press-rele…
The allegations against this man, Peter Rafael Dzibinski Debbins, span decades: December 1996 to January 2011 he allegedly conspired with Russian intelligence, per DOJ.
He filled out his SF-86 form in 2008 for his security clearance, did not mention his Russian contacts, and received top secret/sci clearance in 2010, per court documents.
DOJ is seeking temp restraining order/motion for preliminary injunction against Bolton's book publication and NSA Director Nakasone said in an affidavit publication some classified info in the manuscript “could result in the permanent loss of a valuable SIGINT source and..."
...cause irreparable damage to the U.S. SIGINT system." Nakasone adds, "exposure of this information could also cause considerable difficulties in U.S. and allied relations with specific nations...I have determined that the unauthorized disclosure of the classified info..."
...in the draft manuscript reasonably could be expected to result in exceptionally grave damage to the national security of the United States."
Nakasone says part of the manuscript has Top Secret/SCI information.
NEW: Per internal DOD memo, Cybercom worried the 2010 WikiLeaks dump gave adversaries opportunity to retool/better hide their cyber-ops after learning USG was tracking them. Memo suggests DOD was tracking Operation Aurora actors (Chinese) @CyberScoopNewsbit.ly/3cHa8Z3
The memo, shared by @NSArchive, suggests USG had been tracking the adversary in question for some time: “The [redacted] cables clearly state that [USG] entities have knowledge of specific adversary TTPs ... malware, toolsets, IP addresses, and domains used in intrusion activity"
(Operation Aurora, 1 of the first major industrial espionage campaigns, was first attributed to Chinese-based hackers by @Google, among the operation’s ~30 targets. WikiLeaks dump revealed the US Embassy in Beijing learned the operation was a Chinese gov-linked hacking group's)
Three women deputies at @CIA - deputy science/tech director, deputy support director, and chief diversity/inclusion - are talking about leadership at @CSIS@Smartwomen#CSISLive for women’s history month. (And there are more that couldn’t make it!) More of this!
“@GenMhayden sponsored me when it wasn’t the cool thing to do,” Deputy Director of CIA for Science and Technology Dawn Meyerriecks says of sponsorship in the workplace.
Dir. Meyerriecks on AI: “Based on what we’re seeing there’s a lot of hype right now. There will always be a need for expert analytics...The 1st step is tagging all of your data...tag it + tag it right,” noting this will take a lot of work. Says AI use is in a “crawl” stage.
New: Top Secret US gov documents show Cyber Command’s offensive cyber-operations against ISIS have struggled: issues w collecting data, the interagency, vetting targets, and, in at least one case, a close call with an adversary. Latest for @CyberScoopNewsbit.ly/2G8I3e9
US officials, including NSA Dir. Nakasone who previously ran this counter ISIS mission, have said the operation provides a road map for other offensive cyber missions, including the taskforce to counter the IRA, the Russian troll farm that has sought to interfere in US elections
But the docs show that technical issues such as data storage, or the speed by which other agencies weighed in on the mission, hindered the counter-ISIS mission, Glowing Symphony, as it was being carried out, raising questions about the Pentagon expanding these missions at scale