[ cyb / tech / λ / layer ] [ zzz / drg / lit / diy / art ] [ w / rpg / r ] [ q ] [ / ] [ popular / ???? / rules / radio / $$ / news ] [ volafile / uboa / sushi / LainTV / lewd ]

cyb - cyberpunk

“There will come a time when it isn't "They're spying on me through my phone", anymore. Eventually, it will be, "My phone is spying on me.””
Name
Email
Subject
Comment
File
Password (For file deletion.)

BUY LAINCHAN STICKERS HERE

STREAM » LainTV « STREAM

[Return][Go to bottom]

File: 1447659218729.jpg (56.42 KB, 505x371, 2011June24_Figure2.jpg) ImgOps Exif iqdb

 No.19413

yo /cyb/ i've recently been cooking an idea in my brain about an entertaining project.

it would be to create a system that monitors and maps interactions of isis 'supporters' and such on twitter.

first, i need links to a few prominent (and authentic) extremist accounts. from there it's a matter of using my cpu cycles to trudge through the nodes between each follow/follower etc.

anyone have any info that could help in this?
>>

 No.19414

>it would be to create a system that monitors and maps interactions of isis 'supporters' and such on twitter.

what would be the point of this?


https://twitter.com/aboawwbeda32

https://twitter.com/DolRula

https://twitter.com/alharth_c4

I had more links but it looks like twitter suspended those accounts

>>

 No.19416

>>19413
The NSA has been doing this for years.

>>

 No.19417

>>19414

would be for fun! like watching an ant farm develop. i could cradle it in my arms and tell it i love her but she never did love me back.

why is that?

>>19416

this is obvious, thanks anon. i, however, am not a state-level actor and wish to pursue this for personal (finding; searching) reasons. i could learn a thing or two on how to properly do this from the NSA actually. thx4tip

>>

 No.19418

>>19417
>why is that?
because the government doesn't want ISIS to spread their so called propaganda on social media

>i, however, am not a state-level actor and wish to pursue this for personal (finding; searching) reasons. i could learn a thing or two on how to properly do this from the NSA actually.

it would be neat if you can keep this thread updated with your findings

>>

 No.19419

>>19413
I am 100% interested in this project. Keep us updated.

>>

 No.19420

>>19418

it would be smart of the government to condition twitter execs into allowing them full reign in their darling. the warm insides of a young woman are far less different than their software from first thought. i would be surprised if they hadn't gotten their rotten hands up inside of her

>>19418
>>19419

will do; should be fun. might just make a place on my GH for this if the thread dies in the datastream. would love to see other lainons work with this possibility like myself; is it morally corrupt to play god on someone else's data?

i say not for... what is god but merely both you and i?

>>

 No.19422

>>19416
Works well then...

>>

 No.19429

>>19422
Do you actually think plans can be leaked through twitter? top meme my friend

>>

 No.19430

>>19413
http://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/

Here's a really entertaining blog post that is very similar to what you're trying to do. (well, kind of similar)

>>

 No.19437

>>19429

I don't think that lain necessarily meant figuring out plans. It, however, is very good at creating interaction networks to gauge each person's relationships with one another.

This is not merely limited to twitter

>>

 No.19448

>>19420
> is it morally corrupt to play god on someone else's data
Usually I'd say without a doubt. But these people are the type who behead others and blow themselves up for no reason, so they don't exactly hold much value as people.

>>

 No.19450

>>19448
>>19420
> is it morally corrupt to play god on someone else's data
I don't think so, if some one leaves a trail it's their own fault. The moral problems occur when you are not given an option to hide your self.

>>

 No.19451

>>19450
>>19448
all the data is public anyway, right? what are the ethics of performing these operations (which twitter and the NSA are probably doing anyway) on public data?

>>

 No.19453

I can't see the interpretation of totally public data (such as twitter) as immoral. At the same time, for everyone's sake, people really need to learn to be more careful what they write.

The private data that is being similarly studied by intelligence agencies however is way off limits.

>>

 No.19460

Now this sounds like fun. Are you using Ruby or Haskell?

>>

 No.19476

How do you determine who is and isn't an isis supporter? Using machine learning techniques can only get you so far (think spam filters). That problem highlights one of the biggest moral objections I have about mass, indiscriminate surveillance, even if you have the best interests at heart. False positives are an unacceptable inevitability.

However, since the data is public, my objections are limited.

>>

 No.19478

>>19476
Oh that makes me realise something. Do not publish the data without removing all the names. It's just polite.

>>

 No.19480

>>19460

My largest experience is in Python for data analysis (because of my soul sucking day job). However, I do see a huge benefit to using a function language for an omnipotent HAL-like architecture such as this. I am not well versed as I ought to be in FLs tho, but I think picking one up for this project would be cool. What are your thoughts on OCaml?

>>19478

You raise a good point. But, what would a "normal person" be doing following ISIS members on Twitter anyway? I am not about to sweep everyone under the same rug but it does beg a few questions.

-~-~-

On a slightly related note, I'll be posting my GitHub username here in the coming days. That will be where I post the data-dumps and scripts so y'all could join in and learn and have fun with me.

>>

 No.19481

>>19480
> But, what would a "normal person" be doing following ISIS members on Twitter anyway? I

I follow a few of my ideological enemies. Know thy enemy and all that.

>>

 No.19484

You may find this arcticle interesting if you havnt seen it before. http://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/

>>

 No.19489

File: 1447742368072.jpg (61.25 KB, 500x396, ↻↿⇋⇂↺bin.‮.jpg‬) ImgOps Exif iqdb

>You're observing a scale-free network, so you'll want to save cycles by observing links between nodes (№ and type of interactions) in order to establish degrees of separation between nodes.

>Track № of Interactions by type such as: follows [followed or followed by], retweets, hashtags, similar message or content format [score for similarity]


>A high № of observable similar actions, behaviors or content format among different or seemingly disconnected nodes in a network could indicate a low degree of separation between individual node operators.


>The purposes of extremist twitter accounts, being public, are likely to serve as propaganda and recruitment platforms. It would be advisable to ID and profile recruiters in order to ID the most likely targets for recruitment.


>Recruiters are most likely to successfully recruit individuals who are similar to themselves (ie: similar socioeconomic background; shared social and cultural ties and identity can be used to establish or build rapport).


>Targets for recruitment may not be active on social media, and would be significantly less likely to be active on social media if they were being trained for or were conducting an active operation that is not involved with recruitment or propaganda.


>>19429

This is a dangerous line of thinking.

If data were encoded in a way that were unknown, misleading or not-obvious to observers it would actually be advantageous to use a high-volume, widely-used transmission medium where it is widely known and assumed that messages are under observation and being recorded.

In this way, it is possible to simultaneously deliver operational information undetected while disrupting observers with observable, misleading, or irrelevant information.

For example, an operator could create a twitter account that appears to exist as a supporter of a popular social cause, such as fighting cancer. The account would appear to transmit content relating only to that cause and followers of that cause. Encoded or hidden in the pictures, videos, or tweets would be operational data for the "true" intended recipients, who could also be following under accounts designed with the intent of misleading observers.

Only the intended recipients know when and where to look, and are thereby able to locate and decode the data which may have absolutely nothing at all to do with the stated intent or purpose of the original transmission.

For example, the choice of background music in a youtube video instructing someone "how to bake chicken in a solar oven" might be used to indicate an operational status, such as time of day.

>>

 No.19496

>>19413
Sounds like a guaranteed way to get on a watchlist lainon.

>>

 No.19497

File: 1447757008663.png (89.38 KB, 485x750, ‮ᛄᛇᛊᛋᛜᛡᛩᛪᛟᚻ.png‬) ImgOps iqdb

>>19496

Perhaps he's the type who feels safer under constant observation?

Those are the types most likely to be conducting it, after all.

>>

 No.19500

(I will ignore all the OT going on here)
>>19413
i wrote a twitter spambot in phantomjs in a few hours. Do it OP, it's a cool idea. Make a spider that polls a twitter account for followers etc. And then make it instantiate a new spider for all new ones and so on. Should be very low profile and performance if you don't do it agressively (poll every 5 minutes should be fine)

>>

 No.19501

>>19489
I was thinking about this some form of Steganography on twitter would be a great way to spread plans. only problem for the T's is if you have a load of arabs who only follow a variety of isis twitters and "granny smiths cute rabbit photos" it's not hard to work out where the messages are coming from.

>>

 No.19523

>>19413
How would you filter out actual supporters and people that just want to be informed pf what ISIS is doing?

>>

 No.19528

File: 1447812682941.jpg (305.37 KB, 642x1027, ∴∵‮‭∢∥∡‮.jpg‬‬‬) ImgOps Exif iqdb

>>19501

Anything more than observation could get OP into trouble. Given what you've said, it sounds like the messenger-nodes have a high signal to noise ratio.

What could be done:

>Observe messenger-node interactions until you can reliably imitate them.


>Decrease the signal to noise ratio by activating imitation messenger-nodes at irregular intervals, or when other nodes, such as T-nodes, interact with them.


Your objective could be to slowly increase the number of observable interactions between imitation messenger-nodes and observers which would decrease the visibility of "true" messenger-nodes.

>You could do this in real time, operating large numbers of automated imitation M-nodes.


If you had the resources, this could be applied to the point of disrupting the entire network. This could be problematic because you'd be attacking the communication medium itself, which is wasteful and ineffective. The primary objective of imitation is observation. Disruption or misdirection should be considered secondary objectives, and applied only when necessary. Diminishing returns and such.

>When you have a network of imitation M-nodes that can reliably ID T-nodes, you could re-apply the technique to imitate T-nodes as well.


>Over an extended time, one could selectively and slowly imitate the entire structure of "true" M-nodes and T-nodes by replacing them with a significantly larger number of imitation nodes, which do not all need to be actively operated at any given point in time. Given enough time to create and build an imitation recruit network, you could significantly restrict real human supply chains.


Careful imitation and strategic misdirection may be more effective than observation alone at disrupting extremist recruitment via social media, particularly when operators have been operating under the assumption that they are under observation. If applied imprecisely in a non-convincing manner it would be a huge waste of resources.

There are drawbacks. Increasing public perception that an extremist threat is "growing" and spreading extremist propaganda across social networks. Both may have unintended consequences, such as provoking a largely disproportionate or inappropriate response to a statistically insignificant but genuine threat. This wastes valuable resources dealing with "counter-extremists" and potentially increases the number of real recruits and sympathizers on both sides.

In this example, the disincentive to non-state actors performing this technique is that they may mislead various state-actors, becoming targets themselves, while "real" extremists may already be operating "in the clear", relatively safe from harm under supportive regimes and operating under the base assumption that they're already targets for observation or enforcement.

Observation is likely to fail as an effective deterrent to those individuals who are working in part to service their own ego or reputation. They may be seeking observation and recognition, which is why imitating them or otherwise stealing the show could be more effective than reactive censorship.

Strict, abundant, reactive censorship, even in small amounts, can amplify the signal to noise ratio of extremist messages or messengers; in systems of mass censorship and surveillance, observers of censored non-extremist content (such as copyrighted or morally objectionable content) can easily become accustomed to circumvention of censorship and surveillance technologies.

Non-extremists driven to unconventional communication techniques in order to preserve their basic human rights to free expression may be more likely to encounter and therefore find something in common with extremists.

>>

 No.19530

>>19528

That's a clever hypothesis. I do think some sort of involvement over merely mapping the social network is the end goal. However, you also brought up good criticism against the imitation path.

Both the result of disrupting state-actors ability to retrieve actionable information, and also bolstering a sense within the extremist group of continued propaganda success limits the effectiveness of the whole escapade.

Although it would be entirely a beautiful concoction that is almost too intriguing to resist pursuing. It would necessarily require a "watch the world burn" mindset as I think the negatives far outweight the positives if we were looking at this from an impact (in the limit-terrorist-influence) sense.

But hot damn it would be like a botnet that doesn't just wage slave $2 panties to old women.



Delete Post [ ]
[ cyb / tech / λ / layer ] [ zzz / drg / lit / diy / art ] [ w / rpg / r ] [ q ] [ / ] [ popular / ???? / rules / radio / $$ / news ] [ volafile / uboa / sushi / LainTV / lewd ]