{"id":14627,"date":"2019-02-18T10:45:15","date_gmt":"2019-02-18T18:45:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/02\/18\/news-8376\/"},"modified":"2019-02-18T10:45:15","modified_gmt":"2019-02-18T18:45:15","slug":"news-8376","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/02\/18\/news-8376\/","title":{"rendered":"NATO Group Catfished Soldiers to Prove a Point About Privacy"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c6735e42cbde374dceb08a9\/master\/pass\/Security-NATO-Report-568541943-w.jpg\"\/><\/p>\n<p><strong>Credit to Author: Issie Lapowsky| Date: Mon, 18 Feb 2019 12:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">The phony Facebook <\/span>pages looked just like the real thing. They were designed to mimic pages that service members use to connect. One appeared to be geared toward a large-scale, military exercise in Europe and was populated by a handful of accounts that appeared to be real service members.<\/p>\n<p>In reality, both the pages and the accounts were created and operated by researchers at NATO\u2019s Strategic Communications Center of Excellence, a research group that&#x27;s affiliated with NATO. They were acting as a &quot;red team&quot; on behalf of the military to test just how much they could influence soldiers\u2019 real-world actions through social media manipulation.<\/p>\n<p class=\"paywall\">The group &quot;attempted to answer three questions,\u201d Nora Biteniece, a software engineer who helped design the project, told WIRED. \u201cThe first question is, What can we find out about a military exercise just from open source data? What can we find out about the participants from open source data? And, can we use all this data to influence the participants\u2019 behaviors against their given orders?\u201d<\/p>\n<p class=\"paywall\">The researchers discovered that you can find out a lot from open source data, including Facebook profiles and people-search websites. And yes, the data can be used to influence members of the armed forces. The total cost of the scheme? Sixty dollars, suggesting a frighteningly low bar for any malicious actor looking to manipulate people online.<\/p>\n<p class=\"paywall\">StratCom <a href=\"https:\/\/www.stratcomcoe.org\/responding-cognitive-security-challenges\" target=\"_blank\">published<\/a> its findings last week in a new report, which Biteniece, her coauthor Sebastian Bay, and their fellow StratCom researchers presented Thursday at an event on social media manipulation at the United States Senate. The experiment underscores just how much personal information is free for the taking on social media, and, perhaps even more troubling, exactly how it can be used against even those of us who are the best positioned to resist it.<\/p>\n<p class=\"paywall\">\u201cWe\u2019re talking professional soldiers that are supposed to be very prepared,\u201d says Janis Sarts, director of NATO StratCom. \u201cIf you compare that to an ordinary citizen \u2026 it would be so much easier.\u201d<\/p>\n<p class=\"paywall\">Many of the details about how the operation worked remain classified, including precisely where it took place and which Allied force was involved. The StratCom group ran the drill during an exercise with approval of the military, but service members weren&#x27;t aware of what was happening. Over four weeks, the researchers developed fake pages and closed groups on Facebook that looked like they were associated with the military exercise, as well as profiles impersonating service members both real and imagined.<\/p>\n<p class=\"paywall\">To recruit soldiers to the pages, they used targeted Facebook advertising. Those pages then promoted the closed groups the researchers had created. Inside the groups, the researchers used their phony accounts to ask the real service members questions about their battalions and their work. They also used these accounts to &quot;friend&quot; service members. According to the report, Facebook&#x27;s Suggested Friends feature proved helpful in surfacing additional targets.<\/p>\n<p class=\"paywall\">The researchers also tracked down service members&#x27; Instagram and Twitter accounts and searched for other information available online, some of which a bad actor might be able to exploit. \u201cWe managed to find quite a lot of data on individual people, which would include sensitive information,\u201d Biteniece says. \u201cLike a serviceman having a wife and also being on dating apps.\u201d<\/p>\n<p>\u201cEverybody has a button. The point is, what\u2019s openly available online is sufficient to know what that is.\u201d<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Janis Sarts, director of NATO StratCom<\/p>\n<p class=\"paywall\">By the end of the exercise, the researchers identified 150 soldiers, found the locations of several battalions, tracked troop movements, and compelled service members to engage in \u201cundesirable behavior,\u201d including leaving their positions against orders.<\/p>\n<p class=\"paywall\">\u201cEvery person has a button. For somebody there\u2019s a financial issue, for somebody it\u2019s a very appealing date, for somebody it\u2019s a family thing,\u201d Sarts says. \u201cIt\u2019s varied, but everybody has a button. The point is, what\u2019s openly available online is sufficient to know what that is.\u201d<\/p>\n<p class=\"paywall\">Members of the military happen to be particularly <a href=\"https:\/\/www.wired.com\/2013\/03\/air-force-sextortion\/\">high-profile targets<\/a> for scams like catfishing and <a href=\"https:\/\/www.wired.com\/story\/jeff-bezos-sextortion-allegation\/\">sextortion<\/a>. Recently, a group of inmates in South Carolina were busted for allegedly <a href=\"https:\/\/www.wspa.com\/news\/sc-inmates-take-catfishing-to-new-level-target-military-members-to-extort-money\/1625594953\" target=\"_blank\">blackmailing<\/a> 442 service members using fake personas on online dating services. Not only can these tactics hit service members&#x27; wallets, they may also represent a <a href=\"https:\/\/www.militarytimes.com\/news\/your-military\/2016\/12\/06\/sextortion-the-u-s-military-s-dirty-little-secret-is-a-growing-national-security-concern\/\" target=\"_blank\">security risk<\/a> if the victims have access to sensitive information.<\/p>\n<p class=\"paywall\">A Facebook spokesperson said the company &quot;welcome[s] researchers who inform social media and technology companies of their findings in a responsible manner.&quot;<\/p>\n<p class=\"paywall\">&quot;Social engineering and other scams continue to be a challenge for people using technology worldwide,&quot; the spokesperson said. &quot;We encourage people to not accept suspicious requests and to report suspicious messages, which try to trick people into sharing personal and sensitive business information.&quot;<\/p>\n<p class=\"paywall\">Facebook has taken a firm stance against networks of fake pages and accounts designed to manipulate the public, ever since the company discovered a widespread Russian propaganda campaign designed to influence the 2016 US election. Facebook prohibits what it calls &quot;coordinated inauthentic behavior&quot; and has suspended thousands of accounts, pages, and groups engaged in this kind of trickery all around the world. The company has scaled up its safety and security team to 30,000 people over the last year, and it also offers users guidance on dealing with <a href=\"https:\/\/www.facebook.com\/help\/phishing\" target=\"_blank\">phishing<\/a>.<\/p>\n<p class=\"paywall\">But the StratCom report shows that Facebook&#x27;s efforts to crack down on this activity are having only middling success. Of the three pages the group created, one was shut down within a matter of hours, while the other two were cut off two weeks later after being reported to Facebook. Two out of the five phony profiles they created were never suspended. Neither were the closed groups. And StratCom&#x27;s experiment was tiny in comparison to the scams that <a href=\"https:\/\/www.wired.com\/story\/facebook-uncovers-new-fake-accounts-ahead-of-midterm-elections\/\">some bad actors<\/a> run, using <a href=\"https:\/\/www.wired.com\/story\/facebook-twitter-eye-iran-fake-account-crackdown\/\">hundreds<\/a> of accounts, profiles, and pages.<\/p>\n<p class=\"paywall\">&quot;We did this to test social media companies\u2019 statements that they&#x27;re doing a lot to investigate and protect against malicious activity,&quot; Bay says. &quot;Obviously if it takes two people three weeks to find vulnerabilities within this context, they&#x27;re not doing enough.&quot;<\/p>\n<p class=\"paywall\">The researchers suggest some specific changes Facebook could make that would have made their experiment more difficult. For instance, they encourage the company to establish stricter control over its Suggested Friends feature, so it&#x27;s not so easy to map out members of a given group.<\/p>\n<p class=\"paywall\">For the military group that OK&#x27;d the research, the experiment effectively acted as a drill. But for the rest of us\u2014and certainly for the social media platforms implicated in the report\u2014the researchers hope it will serve as concrete evidence of why a fuzzy concept like privacy matters and what steps can be taken to protect it.<\/p>\n<p class=\"paywall\">&quot;We need to put more pressure on social media,&quot; Bay says, &quot;to address these vulnerabilities that can be used for the detriment of national security for individuals and for society as a whole.&quot;<\/p>\n<p class=\"related-cne-video-component__dek\">Thanks to an assist from Congress, your cable company has the legal right to sell your web-browsing data without your consent. This is how to protect your data from preying eyes.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/nato-stratcom-catfished-soldiers-social-media\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c6735e42cbde374dceb08a9\/master\/pass\/Security-NATO-Report-568541943-w.jpg\"\/><\/p>\n<p><strong>Credit to Author: Issie Lapowsky| Date: Mon, 18 Feb 2019 12:00:00 +0000<\/strong><\/p>\n<p>With $60 and a few fake Facebook accounts, researchers were able to identify service members in a military exercise, track their movement, and even persuade them to disobey orders.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-14627","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14627"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14627\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14627"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}