-
34c3 intro
-
Herald: All right, it's my great pleasure
to introduce to you Mustafa Al-Bassam.
-
He's gonna talk about uncovering British
spies' web of sockpuppet social media
-
personas. Mustafa is a PhD student at the
University College in London, studying
-
information security and focusing on
decentralized systems. Mustafa was a co-
-
founder of LulzSec, an hacker activist
group some of you might have heard of, and
-
with that, please give a warm applause to
Mustafa.
-
applause
-
Mustafa Al-Bassam: Hey. So it seems that
-
over the past year we've had a lot in the
media about this kind of idea that the
-
people that you interact with on Twitter
and Facebook and other kinds of social
-
media are not necessarily who they say
they are, and sometimes not even be, they
-
might not even be people at all. They
might be bots. And we've heard about how
-
this might be used to manipulate people
into believing certain things or certain
-
ideas. And this has become quite a big
topic recently, especially after the U.S.
-
presidential elections in 2016, where
according to one study, up to one in five
-
election related tweets weren't actually
from real people. And apparently it's
-
it's such a big problem that even the
president is being manipulated by, to say,
-
bots. But, this has been a kind of
activity that has been going on for a very
-
long time, and not just from Russia or
China.
-
The West also engages in these kind of
activities including the UK and the US,
-
but in other kinds, in other regions. So,
today I'm talking about what Britain does
-
in this regard. So, in the UK we have a
NSA-equivalent intelligence agency called
-
GCHQ or Government Communications
Headquarters. And their job is basically
-
like the UK's version of the NSA: to
collect as much information as possible
-
through wiretaps and mass surveillance
systems. But they also have a subgroup or
-
subteam within GCHQ called the Joint
Threat Research Intelligence Group or
-
JTRIG for short. And what these guys
basically do is, its basically a fancy
-
name for sitting on Twitter and Facebook
all day and trolling online. What they do is
-
they conduct what they call Human
Intelligence, which is kind of like the
-
act of interacting with humans online to
try to make something happen in the real
-
world. And in their own words one of their
missions is to use "dirty tricks" to
-
"destroy, deny, degrade and disrupt
enemies" by "discrediting" them. And we've
-
seen JTRIG has been involved in various
campaigns and operations, including
-
targeting hacktivist groups like Anonymous
and LulzSec, and also protests in the
-
Middle East, during the Arab Spring and
also the Iranian protest in 2009.
-
So, a bit of context to what led me to
uncover this stuff and to actually
-
research this stuff. So in 2011, I was
involved with the with the hacktivist
-
group LulzSec. And to refresh your memory,
LulzSec was a group that existed during
-
the summer of 2011 and hacked into a bunch
of US corporate and government
-
organizations, like the US Senate, their
affiliates and Sony and Fox. And in the
-
same year I was arrested, and a year later
I was officially indicted on a court
-
indictment. But the thing that struck me
about this indictment was that there was
-
absolutely no mention in this court
document about how they managed to
-
deanonymize me and my co-defendants. Or
how they managed to actually link our
-
online identities with offline identities.
And I thought it was suspicious because
-
our US counterparts, actually, their court
indictments had a very lengthy sections on
-
how they were caught. For example, when
the FBI arrested Jeremy Hammond, his court
-
indictment had a, had very detailed
information about how those guys social
-
engineered him and managed to track him
through his IP address and through Tor and
-
whatnot. But then, fast forward a year
later, Edward Snowden started leaking
-
documents about the NSA and GCHQ, and then
in 2014, one of those documents or some of
-
those documents were released on NBC that
showed that GCHQ was targeting hacktivist
-
groups like Anonymous and LulzSec. And
that makes the a lot of sense in my head.
-
Because if GCHQ was involved in this
denanonymization process, then they
-
wouldn't want to have that in the court
indictment, because it would reveal the
-
operational techniques.
And this is one of the leaked slides from
-
GCHQ talking about some of the activist
groups they target. One of the people
-
they targeted was someone who went by the
nickname of "p0ke", who was chatting in an
-
IRC channel, a public chat network. And
this was a public chatting channel where
-
people from Anonymous and other kinds of
hacktivists kind of sit and chat about
-
various topics and also plan operations.
And this person "p0ke" was chatting on
-
this channel and boasted that they had a
list of 700 FBI agents' emails and phone
-
numbers and names. And then it turned out
that a GCHQ agent was covertly in this
-
channel observing what people were saying.
And then the GCHQ agent initiated a
-
private message with this person to kind
of get more information and to try to
-
build a relationship with this person. And
the agent asked them what was the site and
-
then they just gave that information up
and they even gave them a sample of some
-
of the leaked information. So it turns out
that actually GCHQ was active in these IRC
-
networks and chat networks for months if
not years and they were in up to several
-
hundred channels at a time. They were just
sitting there idling. They weren't really
-
saying much or actually participating in
conversation, except that every few months
-
you might notice them say "hey" or "lol"
in the chat even though it might be out of
-
context of the conversation that was going
on, presumably so that they wouldn't get
-
kicked off the network because some
networks kick you off if you're idling
-
there for too long. And then often what
they would do is they would private
-
message people in rooms to try and
corroborate information about activities
-
that were going on and being discussed or
trying to entrap people by getting them to
-
admit to things as we saw with p0ke.
And he seemed to be quite a common theme
-
that these undercover feds and agents were
sitting in these chat rooms. In the
-
Europol meeting 2011, where 15 European
countries were discussing what they were
-
doing to tackle Anonymous and LulzSec,
apparently there were certainly undercover
-
cops in these channels that had an issue
with undercover cops investigating each
-
other.
laughter
-
So the GCHQ agent that was targeting p0ke
sent them a link to a BBC news article
-
about hacktivists. And, according to this
leaked slide, this link enabled GCHQ to
-
conduct signal intelligence to discover
p0ke's real name, Facebook and email
-
accounts etc. It doesn't say exactly how
they did that, but it's not that hard if
-
they have your IP address on user agent.
Back then, in 2011, most websites weren't
-
using HTTPS, including Facebook, so if
they look up your IP address in XKeyscore
-
or the dragnet surveillance system, they
can easily see what other traffic is
-
originating from that IP address, and what
Facebook accounts are connected to that IP
-
address for example. But in this in this
slide leaked by NBC the URL was redacted,
-
but it wasn't very hard to actually find
that URL, because these were public
-
channels that GCHQ agents were talking in,
and people haven't been targeted in
-
themselves including myself. We were able
to find out what that URL shortener was
-
I mean what that website was but
which turned out to be a URL shortener so
-
the website that was sent to p0ke to click
was "lurl.me" and according to
-
archive.org, here is a snapshot from
"lurl.me" in 2013, just before it went
-
offline, that basically showed it was a
URL shortening service, it looks like a
-
generic URL shortening service. One things
I noticed is, the domain name sounds
-
like "lure me" which is basically what
they were doing,
-
because JTRIG had this internal wiki
where they listed all the tech tools and
-
techniques that they use in the operations
and one of the categories that they have
-
is "shaping and honey pots" and in that
category they have a tool code named
-
Deadpool which is described as a URL
shortening service and that's what
-
"lurl.me" was. We first saw "lurl.me" in
2009 - the domain name was registered in
-
2009 - and almost immediately it was it
was linked tweets about Iranian protests,
-
and then it went offline in 2013, shortly
after (every sudden) leaks in November,
-
but interesting if you look up all of the
instances of this URL shortener being used
-
in social media and Twitter there's
probably about 100-200 instances of it
-
being used and every single one of those
instances where it was used it was
-
associated with political activities late
in the Middle East or Africa usually to
-
protests. And the majority of the most
common were coming from the default
-
Twitter accounts with no avatar, with very
few tweets and they're accounts that were
-
active for only a few months between 2009
and 2013.
-
One of the techniques, or some of the
techniques that JTRIG used, in their own
-
words to conduct their operations is
includes uploading YouTube videos
-
containing persuasive messaging,
establishing online aliases with Facebook
-
and Twitter accounts, blogs on foreign
memberships for conducting human
-
intelligence, or encouraging discussion on
specific issues, sending spoof emails and
-
text messages as well as providing spoof
online resources, and setting up spoof
-
trace sites and this is exactly what we're
going to see in the next few slides and in
-
most examples that they use for the
operations is they actually targeted the
-
entire general population of Iran which is
a pretty big target audience of 80 million
-
people. According to them,
they had several goals in Iran:
-
the first goal was to discredit the
Iranian leadership and its nuclear program
-
Second goal was to delay and disrupt on-
line access to materials used in the
-
nuclear program. Third Goal was
conducting online Human
-
Intelligence and the fourth goal was the most
-
interesting goal my opinion: Counter
censorship. It might seem might sound great
-
it might sound like almost like GCHQ is
kind of aligned with the motives of the
-
Internet freedom community by helping
these Iranian activists to evade
-
censorship.
But we're gonna see it's not really the
-
case. The main kind of Iran the main kind
of sock puppet accounts on Twitter that
-
JTRIG was running during this campaign in
2009 was called "2000 Iran
-
2009 Iran free".
This was the most kind of active Twitter
-
account that it had and it had 216 tweets
and they also had I kind of like a bunch
-
of other accounts that were less active
that had default avatars probably just to
-
kind of, kind of build up their social
network that mostly retweeted things,
-
retweeted the same things as a display
account but slightly rewarded or even with
-
them.
And what this Twitter account essentially
-
did was in quick succession, over a period
of like one or two weeks tweeted a bunch
-
of links from this URL shortener for
various purposes for to various articles
-
on blogs online and they also had actually
a blogspot website with like one article
-
to kind of expand their network I guess.
One of the activities that 2009 Iran free
-
and the other sock puppets were doing
was they were kind of trying to spread the
-
same IP addresses as proxies to Iranians
to use as a counter cencorship. So for
-
example you can see that they have a list
of IP addresses here that will hash like
-
Iran election that they can use for
protests and they and they might sometimes
-
feed links to that to to this proxy is
using that URL shortener and this is, this
-
is quite concerning because well one of
the tools used by JTRIG is also called
-
codenamed Molten Magma which is basically
HTTP proxy to with the ability to log all
-
traffic and perform HTTPS man-in-the-
middle because, again, they were they were
-
spreading exactly the same IP address all
of these all these sock puppet accounts
-
were spreading exactly the same IP
addresses and same links to Iranians to
-
help them to or to allegedly help them to
a evade common cencorship. And they were
-
even claiming that these for the same
proxies used by the Iranian government to
-
get around their own firewalls so if they,
apparently if they block these proxies
-
they will block their own access to the
outside world.
-
And this is essentially what they are
doing here. In this kind of context GCHQ
-
is kind of acting like the big bad wolf
from Red Riding Hood. We might seem like
-
they're helping me but they're also
causing you harm in the process.
-
And this is a, this is a list that
contains a list of some of the techniques
-
that JTRIG used. This was also a leaked
document and this essentially kills two
-
birds in one stone because what they do is
at the bottom it says one techniques is
-
hosting targets' online communications for
collecting signal intelligence as we saw
-
with p0ke and which is why they tweet
these links using URL shortener so they
-
can conduct signal intelligence on people
who are interested in clicking these
-
things and also providing online access
uncensored materials and sending instant
-
messages to specific individuals giving
them instructions for accessing uncensored
-
websites.
One of the forums that these proxies were
-
posted in was whyweprotest.net and someone
actually kind of almost got it right.
-
Someone asked: 'Why does the government use
proxies? That doesn't make any sense, they
-
wouldn't need any proxies." And then
someone replied: "The Iranian government
-
allegedly has set up proxies to monitor
connections with from within Iran to be
-
able to pinpoint the people who are trying
to bypass these blocks." So they're almost
-
right because it wasn't the Iranian
government that was actually monitoring
-
connections in Iran. It was GCHQ.
There were also set up, I agree, basic
-
websites, that basically acted as RSS
feeds to English websites about Iran to
-
presumably, but also for counter
censorship reasons. One of the same
-
things they did was mimic government
officials. So for example they might
-
post in a forum saying: "Attention users
outside Iran, you can call the president
-
at this number to discuss the elections
direct." And they were hesitant that you
-
should not call this number if you are in
Iran. And then they will also give an
-
email address for the vice president on
the Twitter.
-
This also matches up with another
technique that JTRIG uses, again according
-
to the leaked documents, where they send
spoof emails and text messages from a fake
-
person or mimicking a real person to
discredit, promote, distrust, dissuade,
-
deceive, deter, delay or disrupt. Whatever
the purpose was, they certainly managed to
-
promote distrust because one of the
replies to this post was: "This can't be
-
the president's number because if it were
the second call would be answered by
-
Iranian intelligence services. So these are
strange days. I suppose anything could
-
happen at this point."
So that was most of the activity that we
-
saw in 2009. There was a bunch of other
Twitter accounts with default egg, default
-
avatars associated with these links. You
can find them if you search lurl.me with
-
quotation marks and Google with sites
-twitter.com. In 2010 there was absolutely
-
no activity on Twitter or all social media
associated with this URL shorter. Then, in
-
2011, we saw some activity in Syria for
this URL shortener for a similar purpose
-
of conducting censorship resistance in
Syria. And they were essentially doing the
-
same thing, same techniques, giving people
IP addresses to connect to, that you
-
thought that they probably are MITM'd.
But one of the things they did here as
-
well was they didn't just tweet stuff they
also posted a YouTube video, like a very
-
poorly made YouTube video with only
300 views to try to get people to watch
-
that. They didn't really try very hard
here because if you actually look at the
-
times on when these accounts tweeted,
all the accounts in Syria actually should
-
have tweeted. The only tweet between 9 to
5 p.m. UK time Monday to Friday.
-
laughter, applause
I mean, I think, I don't know I think
-
they were lazy, or they were just, they
didn't really bother or weren't motivated.
-
But one of the limitations that JTRIG has,
they actually had one in the leaked
-
documents, that they had was they had a
list of limitations that the staff have
-
when conducting its operations. And one of
them is that they have difficulty in
-
maintaining more than a small number of
unique multi-dimension active aliases
-
especially with doing online human
intelligence. Which is why we only see
-
like one main twitter account for these
events and then like a bunch of other kind
-
of default expat accounts, usually like
five or six. We didn't tend to see
-
hundreds of them you only see about less
than 10, because this was back in 2009,
-
2011. They weren't doing it in an
automated way. And they also said the lack
-
of continuity in maintaining an alias or
communicating via an alias if a staff
-
member is away and his or her work is
covered by others and also the other one
-
was lack of photographs, visual images, of
aliases which is why we always see like
-
egg or default avatars for these
sock puppet accounts because they can't
-
unless they have like a full fledge
graphics team or have faces of people to
-
put in there and they can't really put
anything as avatar. They also apparently
-
had a lack of sufficient number and varied
cultural language advisors eg in Russian,
-
Arabic and Pashto which is why we see
here on these Twitter accounts they're
-
basically tweeting the same thing over and
over again with no variation. Here's the
-
same text over and over again because they
don't have lots of translators to
-
translate that.
The other thing we saw in 2011 was a very
-
targeted attack during the Bahrain
protests. They had a twitter account
-
called 'Freedom4Bahrain' and this, it just
sent two tweets, mentioning two accounts
-
"14FebTV" and "14FebRevolution", and
these were two accounts that were,
-
like,
really big kind of social media outlets in
-
Bahrain that were covering the protests
that were going on there. And these were
-
targeted mentions of the kind that we saw
with P0ke, so, presumably also here, they
-
were using that to conduct Signal
Intelligence,
-
to discover who was running these two
accounts. In 2012 you also saw no activity
-
associated with that URL shortener. During 2013 I managed
to find one tweet related to Kenya, to the
-
Kenyan imposed national politics and this
person isn't an education sock puppet, this
-
person is a research assistant at the
Human Rights Watch. So this, but that begs
-
the question of how did he actually get
this URL? Probably a similar message to
-
P0ke, they probably sent him a link
through a private message found that
-
interesting and tweeted it, so not only
are they targeting protesters, they are
-
also targeting NGOs. Then, in 2013,
all of the infrastructure associated with
-
URL-shortener was shot offline, this was
in 2013, which was a few months after the
-
Edward Snowden leaks, so they had a bit of
delay of doing it, but it must have been a
-
real pain in the arse for them to have to
renew all their infrastructure, but I did
-
do some digging into some of other host
names that were hosted on this lurl.me
-
server. Between 2009 and 2013, most of
these host names seem to be random
-
alphanumeric, the main names, and some of
them are using publicly the DNS providers
-
like DynDNS or DNSAlias, I wasn't able to
find any websites archived for these
-
domains, so it doesn't seem that there was
any websites there, but if you have any
-
ideas let me know, because one of the
things that I suspect is that these might
-
have been malware endpoints or command
control servers, that they were using, so
-
if you have any and monitoring tools or
logs then maybe you should look up some of
-
these host names. But one of the
interesting domain names that I thought
-
was interesting there was dunes
adventures.net and this is the archived
-
page for Dunesadventures
-
which was another
website based in Kenya. They were up to
-
something in Kenya and it claimed that
they were having this was a very basic one
-
page website that was kind of very poorly
made and they claimed that they were
-
having site problems and apparently "we
have noticed problems with our booking
-
system, this has been taken offline until
our techs find the problem - we apologize
-
for any inconvenience". but there was never
any booking system in the first place,
-
this was just pretty much a ruse to make
it look like if you go to this website, a
-
legitimate company was hosting there. So
if you mind anything about that, then I'd
-
be curious as well. I also if there's any
GCHQ agents in the room and then I'm
-
happy to get drink with you as well.
That's all I have for today, does anyone
-
have any questions?
applause
-
(Herald) asks for questions
(Mic Question): OK, IRC asks: Deceiving
-
a target into trusting you and leaking any form
of infos is used everywhere right now, IRC,
-
Twitter and Facebook and so on. How would you
advise people to distinguish between a
-
genuine identity and an undercover agent?
-
(Speaker): "I think that's a very good
question because-
-
(H.): So just just a quick second, if you
-
really have to leave the room right now,
people, please do so quietly, we still
-
have a talk going on and it's really
unrespectful if you make that much noise
-
and interrupt this whole thing.
applause
-
I know a lot of people are interested in
the talk afterwards but we'll all get you
-
in and sorry.
-
(S.): So I think I was very good question
because if you're conducting, if you're
-
doing activism online and you need to be
anonymous and you dont want to meet up
-
with people in person, then how do you
know that the people you communicating
-
with, or if you are like in a public group
where you personally accept new members
-
into that group, how can you put, how do
you know or kind of differentiate between
-
who's actually there to harm your group or
who's actually there to contribute? I
-
think the answer there lies in, what you
share. Don't share information that comes
-
with anyone that could potentially put you
at harm, even with people that you trust,
-
so essentially don't trust anyone and
this is a basic OP Sec rule. This is
-
how Jeremy Hammond messed up a few years
ago, because they caught him, because he
-
was revealing too much information about
his life, like where where he eats or
-
something like that or his previous drug
records and they were able to use that to
-
kind of figure out who he was and that was
the same mistake that P0ke made he, was
-
too open and friendly to that agent for no
reason. So I think the kind of answer is
-
to do your operations in a way where you
dont have to trust people.
-
(Mic Question): "How effective do you
-
think these methods are, because we've
seen the number of followers on Twitter
-
and the number of views on YouTube were
very low so, how much people can, is
-
affected by this kind of operations"
-
(S.): Yes, so there was also a slide I
meant to put in there, that was leaked page
-
another leaked page from GCHQ that had a
list of bullet points on what they
-
considered to be an effective operation
and some of those bullet points include
-
how many people click that link, how many
people, how many people watch the youtube
-
video, etc, so it's pretty much the same
ways that you would measure it how many
-
people viewed a specific message. Now in
their specific use cases I don't think
-
they were very successful on a large
scale, specifically in Iran protests
-
because the Twitter accounts had very few
followers and their YouTube videos only
-
had a few hundred views but they might
have been, obviously more succesful in
-
more target cases when targeting specific
individuals by doing the Bahrain case or
-
the p0ke case.
-
(H.): over there please.
-
(Mic Question): Sure, thank you, so I'm
just curious if you were familiar with the
-
work of Erin Gallagher, she's done work to
try to figure out, kind of quantitatively
-
and make these visualizations, to try to
figure out if a particular twitter account
-
for example is a bot or whether it's a
person and there's some you know rules of
-
thumb regarding like, you know if the bots
just kind of interact with each other and
-
don't react, don't interact with real
people
-
im just curious what, what techniques you
may know of to, to figure out you know
-
what is a bot and what is not and whether
you are familiar with those particular
-
lines of a research.
-
(S.): I'm not familiar with with their
work, but thank you all check out. In terms
-
of what kind of metrics that you could use
or to use to see if a account is valid or
-
not, I mean, I think, I guess they're,
their tweeting kind of, habits and when
-
they tweet for example could be
indicative, so for example we saw this
-
person only tweet at 9 to 5. Obviously
that's quite easy to make that it's on the
-
case and also I think one useful things
might be might be interesting to do, is
-
try to map the network of these accounts.
If you like build up like a web of
-
followers, that you might be able to very
easy for graphically detect, very obvious
-
clusters for accounts that are following
each other, to be to be very signal.
-
(Mic): Yeah for sure, thank you.
-
(H.) Lets switch over to mic 6 please
-
(Mic 6 question): Thank you for the-
-
thank you for the great talk, how would
you compare the former British activities
-
to the current Russian activities, maybe a
talk in itself, but...
-
(S.) To be honest, I haven't been digging
-
too deep in the details or following too
much about the Russian activities, so I
-
can't really comment about that, I don't
know how prolific it is, I only mentioned
-
it briefly in the beginning of the slides
because it was to give some context, so
-
I'll have to research more to the Russian
activities.
-
(H.) Go to mic 5 again
-
(Mic 5 Question): Thanks, to continue
-
from the person who spoke, that would have
been my question. So, just to add up onto
-
that, did you stumble upon similar
patterns coming from say Canberra or a
-
Washington DC?
-
(S.): So these accounts were very
specific to just to the UK expressions,
-
there was no kind of collaboration there
with other countries within the five eyes,
-
like the US or Australia, but I think they
might have,
-
GCHQ I think has collaborated with the NSA
-
JTRIG specifically I think has collaborated
before with the NSA to delegitimize
-
certain people. So for example
we saw during a few years ago or last year
-
I think there was a drone attack, someone
was illegally killed in a drone strike in
-
Iraq, he was a suspected to be an ISIS
member, Junaid Hussain, and apparently the
-
way that he was deanonymized or the way they
found this location is that the US, the
-
FBI specifically, had an informant that was
talking to this person and that informant
-
sent them and sent them a link that was
generated by GCHQ and then since that link
-
they were able to deanonymize them so I
think there's some collaboration there but
-
this is mostly UK activity.
-
(H.): Last question, we are out of time.
Thank you again, Mustafa. applause
-
subtitles created by c3subtitles.de
in the year 2019. Join, and help us!