David Agranovich  

585 Followers
161 Following
26 Posts
Fmr. Director, Intelligence @NSC | Director, Threat Disruption @meta | Rescue Dog Pilot | Flight Instructor | I post about bad actors in cyberspace, Russia, and the occasional pretty flying picture

Today we released our threat research into influence operations we disrupted. A few highlights:

1. Lookback on Russia’s IO since invasion of Ukraine began (both covert + overt)
2. Three new CIB takedowns in Bolivia, Cuba, and Serbia

First, we dive into the increase in RU-origin covert IO, which remained largely ineffective but increasingly relied on slapdash, unsophisticated techniques. In contrast, overt IO (eg from RU state media) declined significantly in popularity on platform after we took steps to limit their reach, per latest research from Graphika (http://graphika.com/lose-influence).

This new research shows that engagement with RU state media content on our services declined considerably (~80%) after we launched interventions to label content as state-controlled and to limit their reach on platform.

This shows what the impact of non-binary content moderation levers can be: our goal here is to make sure people have context about the origin of content they encounter before amplifying it. But it also raises important questions about when/how such levers should be applied.

It also follows on research from @BrookingsInst that found similar drops in engagement across RU SCME in LatAm after our interventions were applied https://www.brookings.edu/research/working-the-western-hemisphere/

Second, our report details three new CIB cases, all of which were linked in some way to governments/ruling parties and targeted people in each country.

We’ve called out this trend as particularly concerning: it combines the deceptive nature of IO with the powers of a state. And domestic ops (gov + non-gov) have been outpacing foreign ones. Of 200+ CIB operations we’ve disrupted since 2017, more than 2/3 are wholly or partially domestic.

Finally, we continue to see threat actors target multiple platforms. In this report, that included Facebook, Instagram, Telegram, Twitter, YouTube, TikTok, Spotify, Picta, and websites created by the threat actors posing as news outlets. This cross-platform behavior requires defenders across the industry to be alert to threats, to share information, and to take action where appropriate.

Some additional info on those CIB cases:

A short thread on two of the CIB operations in LatAm we detail in our new report today (https://about.fb.com/news/2023/02/metas-adversarial-threat-report-q4-2022/):
1. An operation linked to the current gov and the MAS party in Bolivia
2. A government-linked operation in Cuba

In Bolivia, we removed over 1600 accounts, Pages, and Groups for violating our policies against both coordinated inauthentic behavior and coordinated abusive reporting (aka mass reporting). This network originated in Bolivia and focused primarily on domestic audiences in that country.

Our internal investigation linked it to the current Bolivian government and Movimiento al Socialismo (MAS), including individuals claiming to be part of a group known as “Guerreros Digitales” (“digital warriors”). We banned this group from our services.

Like other operations we’ve disrupted in LatAm, the network was reported to be operating fake accounts from office buildings in Santa Cruz, Bolivia, and was active across many internet services, including Facebook, Instagram, Twitter, YouTube, TikTok, Spotify, Telegram, and their own websites.

This operation engaged in both coordinated inauthentic behavior and coordinated abusive reporting in support of the Bolivian government and to criticize and attempt to silence the opposition by submitting false reports to try to get them taken down.

In Cuba, we removed 900+ accounts, pages and groups for violating our policy against coordinated inauthentic behavior. This network originated in Cuba and primarily targeted domestic audiences in Cuba and also the Cuban diaspora abroad.

Our internal investigation linked the activity to the Cuban government, and the operation focused on promoting the govt and criticizing opposition in Cuba.

The operation pursued two main efforts across many platforms, including Facebook, Instagram, Telegram, Twitter, YouTube and Picta, a Cuban social network: (1) fake amplification and (2) fake personas and brands designed to deceive.

A few tactics that we’ve seen in other campaigns showed up here, including AI-generated profile photos and calls to report critics in hopes of getting their content taken down. Neither of these tactics appeared to be very effective.

Notably, after we removed this deceptive campaign, we saw them try aggressively to rebuild their operations. We expect threat actors to do this and we moved quickly to block these attempts. We saw the operation eventually shift elsewhere, including to Telegram.

After our initial takedown, they’ve had to spend their resources and effort trying to evade our enforcement rather than pursuing their goals, leaving them with little to show for their efforts. That is exactly what we want to see.

How to Lose Influence and Alienate People

Examining the Activities of Russian State-Controlled Media on Facebook and Instagram One Year After the Invasion of Ukraine

Graphika
@activemeasuresllc @jerry @malwaretech so this definitely happened, but it's not even the most ridiculous Russian aviation disaster. I'd argue this one, where the pilot tried to land with the windows covered as a bet https://en.wikipedia.org/wiki/Aeroflot_Flight_6502
Aeroflot Flight 6502 - Wikipedia

Which brings me to a warning.

Tempting as it can be, under no circumstances should you use the instructions I’ve provided here to assemble your own personal arm of crows to carry out acts of unspeakable evil—or even to wage justified campaigns of retribution against your enemies.

Crows are wise birds, and they will catch own quickly. Once your crow army realizes that your seeming friendship is merely an instrumental ploy to harness their power to your own ends, may God help you—for I cannot.

@aarondberman the whole vibe with the SOG lawyer is deeply relatable though
Proud to introduce my close friend Daniel Aragnovich, who worked at the National Security Office (NSC). Daniel is part of a team that works on adversarial threats, but nobody is sure what those are (Google was down at time of writing).
It’s a white Christmas in Denver as the last of the arctic blast moves Eastward. On final approach, KBJC.
The Best Alternatives to Twitter for OSINT Practitioners [2023]

This is pretty cool - I can freely link to Instagram here! https://www.instagram.com/p/ClOsyVOJGO6/?igshid=YmMyMTA2M2Y=

(Photo of the reflection on Fallen Leaf Lake a few weeks ago after Tahoe’s first snowfall)

David Agranovich on Instagram: "Weekend reflections heading home from Tahoe after a fun day of mountain flying instruction!"

David Agranovich shared a post on Instagram: "Weekend reflections heading home from Tahoe after a fun day of mountain flying instruction!". Follow their account to see 102 posts.

Instagram
I keep seeing that “first they came for the journalists” sign, and it pisses me off so much, because when they came for muslims, immigrants, and trans people, mainstream journalists normalized it and reported it as “both sides”. Somehow it didn’t count for them until it was happening to them personally, which is *exactly* what the fucking poem was warning against in the first place.

@JohnWhelan I built a Stratux kit - it’s been great, you just need a battery pack to power it (like an Anker power block). You can add sensors to it depending on what functionality you want, and it’s far cheaper than a Stratus, which has pretty much the same capabilities.

I have a Scout too, but it’s incredibly unreliable.