Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label disinformation campaign. Show all posts

Hackers Spread Disinformation to undermine Taiwan’s Military


 

Foreign hackers are increasingly targeting Taiwan by hijacking social media accounts to spread disinformation aimed at undermining the country's military, according to a statement released by the Ministry of Justice Investigation Bureau (MJIB) yesterday.

The hackers, believed to be operating from abroad, are using compromised Internet-connected devices, including surveillance cameras and facial recognition systems, to gain unauthorised access to social media accounts on popular platforms like Dcard and PTT (Professional Technology Temple). By infiltrating these forums, they have been able to post false information that seeks to damage the reputation of Taiwan’s armed forces.

One of the key tactics employed by these cybercriminals is impersonating Taiwanese air force personnel. They have posted misleading content claiming that many military pilots are dissatisfied with their pay and working conditions. Some posts suggest that pilots would rather incur tremendous financial losses than renew their contracts, while others falsely claim that military members are leaving their posts to pursue civilian careers for better work-life balance.

On PTT, an account named “ss900287” further amplified these messages by sharing a link to a photograph that supposedly showed a list of retired military pilots applying for jobs with China Airlines. This, however, is another example of the misinformation being spread to create doubt and discontent among the public regarding Taiwan’s military.

Rise in False Posts Across Social Media

Despite the efforts of the Air Force Command to counteract these false narratives, there has been a noticeable increase in similar disinformation across more than 170 suspicious Facebook groups, including names such as “The Strait Today,” “Commentary by the Commander,” and “You Ban, Me Mad.” These groups are suspected of being part of the coordinated effort to spread misleading content.

Advanced Techniques to Evade Detection

According to the MJIB, the hackers have been able to maintain their disinformation campaign by exploiting vulnerabilities in facial recognition systems, digital cameras, and other networked devices. By stealing personal data and taking over social media accounts, they have managed to pose as legitimate users, making their disinformation appear more credible.

To avoid detection, the hackers have employed sophisticated methods such as data de-identification and rerouting their activities through multiple channels, which has made it difficult to trace their identities and locations. In response, the MJIB has notified social media platforms, requesting that they take action against the groups and users involved in these activities.

The MJIB is advising Taiwanese citizens to gear up the security of their Internet-connected devices. This includes setting strong, unique passwords and regularly updating them to minimise the risk of cyberattacks.

In a related development, fishermen in Penghu County have reported sightings of Chinese fishing boats using fake Taiwanese radar transponder codes in waters near Cimei Township. While these vessels initially appeared to be Taiwanese on radar, visual inspections confirmed their Chinese origin. The Coast Guard Administration has stated that any illegal vessels identified will be expelled from Taiwanese waters.

The reason behind the Chinese fishing boats disguising their transponder codes remains unclear, but it has raised concerns about the potential for further deceptive activities in the region.




Russian Disinformation Network Struggles to Survive Crackdown


 

The Russian disinformation network, known as Doppelgänger, is facing difficulties as it attempts to secure its operations in response to increased efforts to shut it down. According to a recent report by the Bavarian State Office for the Protection of the Constitution (BayLfV), the network has been scrambling to protect its systems and data after its activities were exposed.

Doppelgänger’s Activities and Challenges

Doppelgänger has been active in spreading false information across Europe since at least May 2022. The network has created numerous fake social media accounts, fraudulent websites posing as reputable news sources, and its own fake news platforms. These activities have primarily targeted Germany, France, the United States, Ukraine, and Israel, aiming to mislead the public and spread disinformation.

BayLfV’s report indicates that Doppelgänger’s operators were forced to take immediate action to back up their systems and secure their operations after it was revealed that European hosting companies were unknowingly providing services to the network. The German agency monitored the network closely and discovered details about the working patterns of those involved, noting that they operated during Russian office hours and took breaks on Russian holidays.

Connections to Russia

Further investigation by BayLfV uncovered clear links between Doppelgänger and Russia. The network used Russian IP addresses and the Cyrillic alphabet in its operations, reinforcing its connection to the Kremlin. The network's activities were timed with Moscow and St. Petersburg working hours, further suggesting coordination with Russian time zones.

This crackdown comes after a joint investigation by digital rights groups Qurium and EU DisinfoLab, which exposed Doppelgänger's infrastructure spread across at least ten European countries. Although German authorities were aware of the network’s activities, they had not taken proper action until recently.

Social Media Giant Meta's Response

Facebook’s parent company, Meta, has been actively working to combat Doppelgänger’s influence on its platforms. Meta reported that the network has been forced to change its tactics due to ongoing enforcement efforts. Since May, Meta has removed over 5,000 accounts and pages linked to Doppelgänger, disrupting its operations.

In an attempt to avoid detection, Doppelgänger has shifted its focus to spoofing websites of nonpolitical and entertainment news outlets, such as Cosmopolitan and The New Yorker. However, Meta noted that most of these efforts are being caught quickly, either before they go live or shortly afterward, indicating that the network is struggling to maintain its previous level of influence.

Impact on Doppelgänger’s Operations

The pressure from law enforcement and social media platforms is clearly affecting Doppelgänger’s ability to operate. Meta highlighted that the quality of the network’s disinformation campaigns has declined as it struggles to adapt to the persistent enforcement. The goal is to continue increasing the cost of these operations for Doppelgänger, making it more difficult for the network to continue spreading false information.

This ongoing crackdown on Doppelgänger demonstrates the challenges in combating disinformation and the importance of coordinated efforts to protect the integrity of information in today’s digital environment


Canada Reports Targeting of Trudeau and Others by Chinese Bots

 

Canada has revealed the detection of a disinformation campaign believed to be linked to China, targeting numerous politicians, including Prime Minister Justin Trudeau. 

This campaign, termed "spamouflage," utilized a barrage of online posts to discredit Canadian Members of Parliament, according to the country's foreign ministry. The objective appeared to be suppressing criticism of Beijing. China has consistently denied involvement in Canadian affairs.

Global Affairs Canada disclosed that its Rapid Response Mechanism, designed to monitor state-sponsored disinformation from foreign sources, identified a "spamouflage" campaign associated with Beijing in August. 

This effort, which intensified in early September, employed a bot network to inundate the social media accounts of various Canadian politicians with comments in both English and French. These comments alleged that a critic of the Chinese Communist Party in Canada had accused the politicians of legal and ethical transgressions.

The campaign also featured the likely use of "deep fake" videos, digitally altered by artificial intelligence, targeting individuals. This is the latest in a series of allegations from Canadian intelligence agencies and officials asserting Beijing's interference in Canada's elections.

A "spamouflage" campaign employs a network of new or commandeered social media accounts to disseminate propaganda messages across platforms like Facebook, Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn. The same accounts were also involved in spreading misinformation about the Hawaii wildfires in August, falsely attributing them to a covert US military "weather weapon."

In addition to the Prime Minister, the campaign targeted Conservative opposition leader Pierre Polievre and several members of Mr. Trudeau's cabinet. Global Affairs Canada has notified the affected social media platforms, leading to the removal of a significant portion of the activity and network. The department has also informed the affected politicians, providing guidance on safeguarding themselves and reporting any suspected foreign interference.

Officials suggest that the bot network behind this campaign may be linked to a broader, well-known Spamouflage network previously acknowledged by tech giants like Meta and Microsoft. This network has also been examined by the Australian Strategic Policy Institute, a non-partisan think tank based in Canberra, which assisted Canada in its assessments.

Earlier in September, Canada launched an inquiry into foreign interference, tasked with investigating potential meddling in its elections by China, Russia, and other actors. The BBC has sought comment from the Chinese embassy in Canada.