Thursday, November 2, 2017

The Russians And Silly Conned Valley

Turns out the Russians who designed and paid for ads on Facebook that reached tens of millions of people in order to convince them to drop Hillary Clinton and support Donald Trump knew how to manipulate American voters better than either of the campaigns that were running.

Lawmakers on Wednesday released a trove of ads that Russian operatives bought on Facebook, providing the fullest picture yet of how foreign actors sought to promote Republican Donald Trump, denigrate Democrat Hillary Clinton and divide Americans over some of the nation’s most sensitive social issues.

The ads that emerged, a sampling of the 3,000 that Russians bought during the 2016 presidential campaign and its aftermath, demonstrated in words and images a striking ability to mimic American political discourse at its most fractious. The targeting information also showed a shrewd understanding of how best to use Facebook to find and influence voters most likely to respond to the pitches.

As a group, the ads made visceral appeals to voters concerned about illegal immigration, the declining economic fortunes of coal miners, gun rights, African American political activism, the rising prominence of Muslims in some U.S. communities and many other issues. Some of the ads, many of which were bought in Russian rubles, also explicitly called for people to attend political rallies amid a campaign season that already was among the most polarizing in recent U.S. history.

They were targeted to many types of Facebook users, including professed gun lovers, fans of Martin Luther King Jr., supporters of Trump, supporters of Clinton, residents of specific states, and Southerners who Facebook’s algorithms concluded were interested in “Dixie.”

One ad, from a phony group called Donald Trump America, touted a petition to remove Clinton from the presidential ballot, saying, “Disavow support for the Clinton political dynasty.”

Another ad, from a Russian-controlled group called Heart of Texas, announced a rally to take place May 21, 2016, under the banner of “Stop Islamization of Texas.” A separate Russian-controlled group, United Muslims of America, publicized a competing rally to “Save Islamic Knowledge” at the same place and time, prompting two groups to face off in competing demonstrations in Houston — a sign of how Russians hoped to turn divisions into open conflict.

This crossover of online influence to real-world consequences was among the issues raised in contentious Capitol Hill hearings Wednesday as lawmakers scolded attorneys for technology companies they said did not do enough to thwart Russian disinformation.

“I don’t think you get it,” said Sen. Dianne Feinstein (D-Calif.), whose home state includes the headquarters for Facebook, Google and Twitter. “What we’re talking about is a cataclysmic change. What we’re talking about is the beginning of cyberwarfare. What we’re talking about is a major foreign power with sophistication and ability to involve themselves in a presidential election and sow conflict and discontent all over this country. We are not going to go away, gentlemen. And this is a very big deal.”

Facebook in particular knew just what buttons to push and who to push those buttons on, admitting this week to Congress that their Russian ads reached well over a hundred million people during the 2016 campaign.

An estimated 126 million Americans, roughly one-third of the nation’s population, received Russian-backed content on Facebook during the 2016 campaign, according to prepared testimony the company submitted Monday to the Senate Judiciary Committee and obtained by NBC News.

Underscoring how widely content on the social media platform can spread, Facebook says in the testimony that while some 29 million Americans directly received material from 80,000 posts by 120 fake Russian-backed pages in their own news feeds, those posts were “shared, liked and followed by people on Facebook, and, as a result, three times more people may have been exposed to a story that originated from the Russian operation.”

And let's keep this in mind, this was a top-class Russian operation through both targeted ads and through fake posts with the express intent of electing Donald Trump.  It wasn't just Facebook, either.

Twitter also revealed Russian-backed entities played a larger role than previously disclosed. Two sources told NBC News Monday that the company found 36,746 automated accounts — or bots —that were linked to Russia between September 1 and November 15, 2016. The accounts tweeted 1.4 million times and were seen 288 million times.

According to prepared testimony, Twitter acting general counsel Sean Edgett plans to tell Congress these "Russian-linked, automated accounts constituted less than three quarters of a percent (0.74%) of the overall election-related tweets on Twitter at the time."

Twitter also found 2,752 accounts associated with the Russia-run Internet Research Agency, up from the 201 the company originally disclosed. The company has suspended all 2,752 accounts and is "proactively giving committee investigators the handles of these accounts."

Twitter and Facebook , along with Google's ad network, were so easy to use and manipulate for their purposes that it was literally criminal.  The reality is that US tech giants and social media aided and abetted the theft of a presidential election.

Now the question becomes how much of an active role did the Trump campaign play in knowingly spreading these fake messages.

Former White House National Security Adviser Michael Flynn followed five Twitter accounts based out of the Russian-backed “troll factory” in St. Petersburg—and pushed their messages at least three times in the month before the 2016 election.

Over 2,750 troll accounts based out of the Kremlin-backed Internet Research Agency were made public by House investigators on Wednesday. The accounts, some of which had previously been identified by The Daily Beast as Russian-generated, were pulled from Twitter due to their ties to the troll factory over the past three months.

The Daily Beast had previously discovered Flynn, Donald Trump Jr., Trump campaign manager Kellyanne Conway, and Trump campaign digital director Brad Parscale retweeted Ten_GOP several times in the month before the election.

And remember, the Russian operation wasn't just about ads, it was about active cyberwarfare and hacking of Democrats.  I

The Justice Department has identified more than six members of the Russian government involved in hacking the Democratic National Committee’s computers and swiping sensitive information that became public during the 2016 presidential election, according to people familiar with the investigation.


Prosecutors and agents have assembled evidence to charge the Russian officials and could bring a case next year, these people said. Discussions about the case are in the early stages, they said.

They had the Trump Organization digitally compromised for years and set him up as their agent.

In 2013, a hacker (or hackers) apparently obtained access to the Trump Organization’s domain registration account and created at least 250 website subdomains that cybersecurity experts refer to as “shadow” subdomains. Each one of these shadow Trump subdomains pointed to a Russian IP address, meaning that they were hosted at these Russian addresses. (Every website domain is associated with one or more IP addresses. These addresses allow the internet to find the server that hosts the website. Authentic Trump Organization domains point to IP addresses that are hosted in the United States or countries where the company operates.) The creation of these shadow subdomains within the Trump Organization network was visible in the publicly available records of the company’s domains. 
Here is a list of a Trump Organization shadow subdomains.

The subdomains and their associated Russian IP addresses have repeatedly been linked to possible malware campaigns, having been flagged in well-known research databases as potentially associated with malware. The vast majority of the shadow subdomains remained active until this week, indicating that the Trump Organization had taken no steps to disable them. This suggests that the company for the past four years was unaware of the breach. Had the infiltration been caught by the Trump Organization, the firm should have immediately decommissioned the shadow subdomains, according to cybersecurity experts contacted by Mother Jones. 
Two weeks ago, a computer security expert, who wishes to remain unidentified, contacted Mother Jones and provided the list of the shadow Trump Organization subdomains. He explained what he believed had happened. Some hacker—or group—had gained access to the Trump Organization’s GoDaddy domain registration account. Like many companies, the Trump Organization has registered a long list of domain names, many of which it has never put to use. Some examples: barrontrump.com, donaldtrump.org, chicagotrumptower.com, celebritypokerdealer.com, and donaldtrumppyramidscheme.com.The existence of these shadow subdomains suggests a possible security compromise within Trump’s business network that created the potential for unknown actors—using these Trump Organization subdomains—to launch attacks that could trick computer users anywhere into handing over sensitive information and unknowingly allow the attackers access to their computers and network. In fact, the IP addresses associated with the fake subdomains are linked to an IP address for at least one domain previously used by hackers to deploy malware known as an “exploit kit,” which can allow an attacker to gain a computer user’s passwords and logins or to take over another computer and gain access to the files within it.

The Russians didn't just hit "America".  They hit the Democrats, with the intent of helping Donald Trump win, and they helped Trump win because he was 100% compromised, if not willing, to help the Russians in return.

Period.

Never forget that.

No comments:

Related Posts with Thumbnails