2/ The investigation behind this Russian political interference takedown is interesting.
First, the @FBI got account registration info for a slice of fake accounts on @X
They found a lot of email accounts registered on the same server.
So they went to the registrar...
@FBI @X 3/ While the domain registrar (Namecheap) had a bunch of account registration information for the @FBI, the info was a fake name and some alias information.
Strike out? No. The FBI began a subpoena cascade, starting with the Google account used to register the domain.
@FBI @X 4/ @FBI had a tasty find from first gmail subpoena: Moscow IP address.
That was just the beginning: ubpoena cascade led through 2 more emails to a phone number.
Which they say they found in widely-leaked Russian tax & mobile subscriber information.
And got the operator.
@FBI @X 5/ Simultaneously, a jointly issued* a technical advisory provided detail on identifying Russian AI-generated personas.
Likely reflects their conclusion that the Russians won't stop.
☑️ Foreign efforts to shape Americans' perceptions via bots continue on @X despite Musk claims.
☑️AI is now a key disinformation op. tool.
☑️ Total # of accounts is small vs. @X universe, BUT doesn't rule out outside impact when well targeted.
7/ Cont'd:
☑️Takedowns & accompanying advisory suggest that US & allies are trying various techniques like these disruptions and seizures... because the operators are currently beyond their direct reach.
Expect the operators to learn, evolve & come right back targeting the US.
8/ Russia is one of many countries now swamping @X with AI-driven bots to shape perceptions.
Even smaller countries operations flourish & aren't taken down after being identified.
Want proof? Check the accounts in this campaign for yourself.👇
IMPORTANT: has @Apple sent you a mercenary spyware threat notification?
Latest round just went out.
Take them seriously. Get expert help.
If you a journalist, activist, dissident etc. I suggest you ✅contact @accessnow's helpline. 1/ accessnow.org/help/
2/ In my experience, @Apple's mercenary spyware threat notifications do several things:
✅ Help users take action to secure themselves
✅ Impose cost on spyware companies & customers
✅ Keep us researchers busy investigating cases
They can also have a✅deterrent effect.
@Apple 3/ I never tire of saying that @apple threat notifications have helped to change the information balance between spyware victims & those that target them.
They have also kicked off waves of scandals & discoveries of spyware abuses. Like in #Poland👇
2/@X is awash with #AI/#LLM- enabled propaganda & bot activity.
Including government efforts to manipulate perceptions & attack state 'enemies.'
As long as Twitter/X continues to fail at addressing this automated manipulation, the scale will only grow.
3/ The devastating report by @ClemsonHub about #ChatGPT-powered #Rwandan propaganda needs to be read in context:
Whether #Pegasus spyware, or #AI-enhanced propaganda armies harassing journalists, the government of #Rwanda keeps acquiring cutting-edge technology to increase the global range of their authoritarianism.
Many other governments will follow their lead, and learn from the example.
I would be astonished if the pro-government propaganda operation outlined in the report doesn't show up in the replies to this thread with harassment and disinformation.
WHOA @USTreasury just sanctioned leadership at 🇷🇺Russian antivirus company @kaspersky.
Comes on heels of yesterday's @CommerceGov ban on sales of their antivirus to the US.
Huge-but-somewhat-anticipated blow to #Kaspersky whose fortunes in the US have been falling since the 2017 @DHSgov binding directive to remove their products from gov systems.
Will be fascinating to see if other governments echo some of these actions.
2/ The case of @Kaspersky is a good teachable moment to talk about some painful truths about antivirus software.
1- Massive marketing has instilled the instinctive and INCORRECT belief that in regular users that antivirus products are the most important security step.
This is massively out of step with expert security recommendations. Source: a consistent finding in surveys of expert vs regular user security perceptions.
People continue to get soaked by AV companies selling products that don't provide nearly as much protection as they think.
3/. It's not just that Antivirus products don't provide users the kind of security they think they do...
Antivirus products themselves must have, by design, a ridiculously invasive view into what you are doing on your computer.
How else could they check every file for badness, right?
And for the company to keep detecting new things, lots of information about your files are going to be headed up into their systems when you run scans.
And the access to files doesn't end there.
You can learn a lot and, potentially, do a lot with the kind of access users have to grant an antivirus for it to work.
This is an under-appreciated privacy and security concern for anyone with an antivirus installed.
It is a big reason why the US, and every other government, is worried by the possibility that an antivirus vendor might be untrustworthy.
Great. Just someone claiming to offer some #Pegasus spyware source code for sale.
True or scam, this reminds me of 2018, when an NSO employee stole code & did exactly that.
As I testified to Congress: the mercenary spyware industry continues to recklessly proliferate very sophisticated capabilities once limited to a handful of governments.
Given how many times the industry has gotten caught, I have a hard time believing that these companies can maintain enough control over all facets of their capabilities...
.... to prevent parts of their tech from inevitably leaking to criminals & other non-state actors, turbocharging cybercrime & disruptive ransomware attacks.
2/ Now for some grim good news in this case: even if the person is in fact offering some portion of Pegasus spyware source code, and not trying to scam people, they are not even claiming to have the working exploits used to infect phones.
Important distinction, since even if the spiciest & most-helpful-to-criminals aspects of NSO Group's codebase were leaked & incorporated into cyber criminal toolkits... criminals would still need to source the (expensive & complex) exploits required to actually infect phones. And then make them work reliably, etc etc.
3/ Here's the 2018 story of an employee stealing code.