Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/11/2018
12:45 PM
50%
50%

Newly Released Russian Facebook Ads Show Scale of Manipulation

House Democrats this week released 3,500 Facebook ads demonstrating the extent of Russia's influence on US citizens from 2015 to 2017.

Democrats on the House Intelligence Committee have shared more details of Russia's interference in the 2016 US Presidential Election with the release of 3,000 Facebook ads. The ads, purchased by Russia's Internet Research Agency (IRA), ran from 2015 to 2017.

Committee members this week released a total of 3,519 ads and stated more than 11.4 million Americans were exposed to them. The IRA also created 470 Facebook pages, which generated 80,000 pieces of organic content and were seen by more than 126 million Americans, the Committee reports. It plans to release this organic content at a later date.

Earlier this year, a federal grand jury indicted 13 Russian nationals and three Russian entities, including the IRA, for their participation in a scheme to interfere with the 2016 election. Special Counsel Robert Mueller alleges that they aimed to sow discord in the US political system. They posed as US citizens and businesses to buy political ads on social media and spread disinformation.

Now we have more details about what these ads included and who they targeted. While not all of them are pro-Trump, they depict controversial and high-profile issues -- the Second Amendment, Black Lives Matter movement, immigration, LGBT rights among them -- in a way designed to pit groups of Americans against each other.

In recent public statements, Facebook admits it was "too slow to spot this type of information operations interference" and the company says it plans to make changes with the intent of stopping threat actors from leveraging misinformation to change the democratic process. For example, Facebook is creating an archive so users can search back through issues and political ads for up to seven years and view ad impressions, spending, and demographic data like age, gender, and location. Advertisers will need to confirm their ID and location before running political ads in the US, and ads will say who paid for them.

Read more details here and view the ads here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SchemaCzar
50%
50%
SchemaCzar,
User Rank: Strategist
5/15/2018 | 1:01:02 PM
Re: A reminder that the internet can be divisive
I agree with your point that blaming the current administration is not useful.

However, I think that the problem with the ads is likely the lack of clear attribution and accountability, and the usual advertisements posted by acknowledged political organizations should not be prohibitive either in price or in ability to get through whatever screening is being proposed.
JasonTLouis
100%
0%
JasonTLouis,
User Rank: Strategist
5/14/2018 | 11:36:53 AM
Re: A reminder that the internet can be divisive
I'm not sure this has much, if anything to do with the current administration. The burden is on Facebook and other social media companies to police their own site. These same individuals/companies took out ads that were in favor and opposing both candidates. They started events and groups that were for and against both candidates. We can quibble over who had more "pro" related material taken out on them, but the same actors seemed to have more of an agenda to cause chaos and cause overreactions from both political parties. In my eyes, they succeeeded.

Blaming one candidate or administration is being very disingenuous knowing what we know now. All the Russians involved did the same thing for both candidates. Facebook could have done more to look into who's taking out these ads, starting these groups and pages, creating these events, creating bot accounts, but did not. Only when they were dragged into the investigation did they come clean and decide to take further steps to mitigate this. In the future, it is probably going to be extremely hard to take out political ads unless you are a massive super pac or direct campaign taking out the ads (thinking 2020 campaign season). Who knows as we still don't know half of the information we probably should and I highly doubt Facebook is going to release any information they don't legally have to.

If you are going to blame the current administration, you ultimately must blame the previous as this happened under their watch. It works both ways and if you just blanket one side with the fault, the root of the problem will never get solved.
JasonTLouis
100%
0%
JasonTLouis,
User Rank: Strategist
5/14/2018 | 9:59:36 AM
Indicted Russians and the current court case
If you are going to mention that 13 Russians were indicted, it would benefit the readers to know more about what's going on the courts as Mueller is not having a good time with those included in the indictments. One company was not even a company when Mueller is alleging they were. Mueller's team also requested a delay in the case and judge denied this. Then they have all plead not guilty but it's not surprising they would. There's more but there are a few good legal blogs that go into more detail. I'd try to avoid your typical news sites as they do not go into as much detail and what they include and don't include depends on which political ideology they lean. If nothing else, I think it would be good to link to a legal news site or blog that explains in a bit more detail what's currently playing out in the courts with this as it will become very important in the near future and the legality of who can take out ads and who cannot.
carlosPochote
0%
100%
carlosPochote,
User Rank: Apprentice
5/11/2018 | 2:58:13 PM
A reminder that the internet can be divisive
For many years, the Internet has been a great tool for technological advancements, enabling many applications to be accessible by many.  Web portals, SaaS, cloud services, IoT, etc. have made our life easier from a convenience perspective, but social tools such as Facebook, twitter, WhatsApp, G+, and any blog out there has opened a door that we never expected.  And I'm not talking simple annoying messages, this is material that can destroy a nation, lives and disrupt economies and political models.

It is up to those companies to responsibly manage and develop their products as well as to provide security controls to regular users like us to prevent this manipulation.  Our responsibility is to educate ourselves on the dangers that can come through these sources and resist biting the bait.

I does not help when the administration questions its own security agencies, or any other professional recommendation/opinion when talking about cybersecurity.  This is real.

 
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
4 Security Tips as the July 15 Tax-Day Extension Draws Near
Shane Buckley, President & Chief Operating Officer, Gigamon,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...