Social media is no doubt a critical battlefield for threat actors to launch InfoOps, especially in a critical moment such as wartime or the election season. We have seen Bot-Driven Information Operations (InfoOps, aka influence campaign) have attempted to spread disinformation, incite protests in the physical world, and doxxing against journalists. China's Bots-Driven InfoOps, despite operating on a massive scale, are often considered to have low impact and very little organic engagement. In this talk, we will share our observations on these persistent Bots-Driven InfoOps and dissect their harmful disinformation campaigns circulated in cyberspace. In the past, most bots-driven operations simply parroted narratives of the Chinese propaganda machine, mechanically disseminating the same propaganda and disinformation artifacts made by Chinese state media. However, recently, we saw the newly created bots turn to post artifacts in a livelier manner. They utilized various tactics, including reposting screenshots of forum posts and disguised as members of “Milk Tea Alliance,” to create a false appearance that such content is being echoed across cyberspace. We particularly focus on an ongoing China's bots-driven InfoOps targeting Taiwan, which we dub "Operation ChinaRoot." Starting in mid-2021, the bots have been disseminating manipulated information about Taiwan's local politics and Covid-19 measures. Our further investigation has also identified the linkage between Operation ChinaRoot and other Chinese state-linked networks such as DRAGONBRIDGE and Spamouflage.
The document summarizes an IBM System x3550 M2 server. It is a 1U dual-socket rack server that provides highly available, energy efficient computing power for applications requiring physical or virtual intensive workloads. It features Intel Xeon 5500 series processors, up to 128GB of memory, hot-swap hard drives and solid state drives, redundant power and fans, and management tools for high availability at a lower cost of ownership compared to other servers. The high density and energy efficiency of the 1U design allows for many servers to be installed in a single rack to support large workloads.
Серцево-легенева реанімація: гайдлайни Європейської Ради Ресусцітації 2015 року.
Зміст: 1. Загальна характеристика патоморфологічних змін при інфекційних хворобах. 2. Патогенез та патоморфологічні зміни при сибірці. 3. Характеристика клостридіозів 3.1 Емфізематозний карбункул 3.2 Злоякісний набряк 3.3 Брадзот овець 3.4 Інфекційна ентеротоксемія овець 3.5 Анаеробна дизентерія новонароджених
Charles Mok looks at the impacts of emerging technologies like artificial intelligence, blockchain, and the metaverse. He discusses both benefits and concerns, such as privacy issues with facial recognition, mounting ethical concerns with the industrialization of AI, and debates around decentralization. He also examines implications of the Ukraine conflict, including hacker activity and big tech's response, as well as what the future internet may look like in regards to issues like social credit, censorship, and online freedom.
Opening talk at Singapore Symposium on Sentiment Analysis (S3A), February 6, 2015, Singapore. http://s3a.sentic.net/#s3a2015 Abstract With the rapid rise in the popularity of social media, and near ubiquitous mobile access, the sharing of observations and opinions has become common-place. This has given us an unprecedented access to the pulse of a populace and the ability to perform analytics on social data to support a variety of socially intelligent applications -- be it for brand tracking and management, crisis coordination, organizing revolutions or promoting social development in underdeveloped and developing countries. I will review: 1) understanding and analysis of informal text, esp. microblogs (e.g., issues of cultural entity extraction and role of semantic/background knowledge enhanced techniques), and 2) how we built Twitris, a comprehensive social media analytics (social intelligence) platform. I will describe the analysis capabilities along three dimensions: spatio-temporal-thematic, people-content-network, and sentiment-emption-intent. I will couple technical insights with identification of computational techniques and real-world examples using live demos of Twitris (http://twitris2.knoesis.org).
The document discusses social media analysis and summarizes key findings from analyzing tweets related to UK politicians. It finds that abuse towards politicians on Twitter was more common in 2017 than 2015, and that a small number of prominent MPs received most abuse in 2015. While men received more abuse than women in 2015, the targets of abuse changed in the 2017 analysis.
The document discusses several real-world advanced persistent threat (APT) attacks throughout history, including the first known cyber espionage incident called "The Cuckoo's Egg" in 1986, the Stuxnet cyber weapon used against Iran's nuclear facilities in 2010, and Operation Aurora which targeted major corporations like Google and Adobe in 2009. It defines APTs as targeted, advanced, persistent attacks usually carried out by well-funded nation-state groups, and outlines the common goals, phases, actors, and challenges of attributing APTs. The document concludes by providing further resources on APT reports, frameworks, and demonstrating attack techniques using Metasploit and Armitage.
This document discusses cyber operations carried out by the Syrian government from 2011 to present to target dissidents and opposition groups. It describes campaigns including fake YouTube and Facebook sites, Skype phishing, and use of remote access trojans to deliver malware. Specific groups involved are identified as the "alosh66" gang, known for predictable domain names and using Dark Comet and BlackShades RATs, and the "dot28" gang, leveraging the IP address 216.6.0.28 as a command and control server and using Dark Comet and Xtreme RATs. Cyber operations from Ethiopia and Vietnam targeting dissidents are also briefly mentioned.
The lecture provides an overview of the transformations of Chinese media from the early years of the PRC to the most recent development. Specifically, it pays attention to the changing market conditions and state policies in China. #China #mediaindustry #digitalcontent #GoingOut The lecture was delivered in April 2018 at Monash University
Presented at the International Communication Association Preconference, New Media and Citizenship in Asia: Social Media, Politics, and Community-Building on May 24, 2012, Phoenix, AZ, USA
This document discusses digital activism and hacktivism. It defines digital activism as using technology over large distances to effect political or social change through grassroots campaigns. Hacktivism is separated from digital activism by involving computer crimes like unauthorized access or impairment of computer systems. Early examples of hacktivism included attacks in 1989 promoting anti-nuclear messages. Anonymous emerged in the 2000s and became politicized through protests around Scientology in 2008. Major hacktivist operations since then have included Payback targeting copyright enforcement and Darknet targeting child pornography sites. Lessons from these events have led to guidance for underground communities on operational security.
講者簡介: Intel perceptual computing 研究員 李佳勳(Jackie) 美國麻省理工學院Media Lab 博士 。大學時期,打破舊有設計思維,以24項作品與自行研發產品獲得MIT全額獎學金。於2008年發明「情人杯」而聲名大噪,琉璃工坊後續協助將其產品化。曾舉辦夜市工作坊,與年輕學子一起腦力激盪,尋找夜市文化中的創意與設計靈感,希望以科技傳達台灣記趣,重新找回台灣文化精神並期許將台灣學生的創造力遞向國際舞台。 影音實錄可參考:http://goo.gl/9829W5
Keynote address for the National Conference of State Legislatures (NCSL) Luncheon for Legislative Information and Communications Staff and National Association of Legislative Information Technology professionals on October 10, 2012.
Trump, Brexit, Cambridge Analytica... In the last few years, we have had to confront the consequences of the use and misuse of data science algorithms in manipulating public opinion through social media. The use of private data to microtarget individuals is a daily practice (and a trillion-dollar industry), which has serious side-effects when the selling product is your political ideology. How can we cope with this new scenario?
Presentation at Concordia University October 2018 Dr Alexia Maddox, Lecturer in Communications, School of Communication and Creative Arts, Deakin University. Email: a.maddox@deakin.edu.au Keywords: Social media analysis; twitter; cryptocurrencies; social disruption; digital trace data. Abstract Cryptocurrencies represent emerging financial technologies engendered through overlapping community values of decentralised peer-to-peer exchange, encryption technologies and an overarching agenda towards the disruption of centralised banking within the fiat economy. This paper will trace the development and shifts in public discourse within social media surrounding cryptocurrencies. The last five years have seen cryptocurrencies move from technological emergence to a broadening range of applications and history potholed with disputes, divergence, hacks and scams within the community. The accompanying influence of speculation has shifted the focus from social adoption to value volatility and seen the incorporation of associated technologies within banking and other organisational processes. The emphasis within public discourse has also followed a shift from bitcoin to blockchain. The study is grounded through a Twitter analysis of cryptocurrency-related social media discourse within the Australian context. The social media analysis works with social media archives of the Australian Twittersphere captured between early 2012 to May 2017. Access to this curated archive is through TrISMA and the timeframe under analysis aligns with the most detailed available dataset. The analysis seeks to characterise the emergence of public dialogue surrounding cryptocurrency use and application over time, focusing on peak engagement events. The key concepts directing the focus and interpretation of the social media analysis include financial inclusion, socio-technical disruption and social change. The whimsical quest of the study is to learn where the digital frontier has shifted to within this community and point to possible future developments. From a community studies perspective the case study represents an initial foray into data analytics to explore whether it is possible to detect the shifting shape and form of digital community through its environmental imprint (Maddox 2016). This methodological aspect of the work speaks to an attempt to generate a data recognition practice that can be deployed to search for signatures of social disruption within digital trace data. Bio: Alexia Maddox is a digital sociologist with research interests are community studies, research methods and digital frontiers. Here recent book, Research Methods and Global Online Communities: a case study with Routledge, combines these areas and forms the basis of her study of emerging communities forming through the internet and cryptography.
The document provides an overview of cryptocurrency and its role in enabling free speech over the past 10 years. It discusses how in the early years, cryptocurrency was mainly used on darknet markets like Silk Road, but more recently it has provided an alternative payment rail for those who have been deplatformed by major corporations for their political views. The document argues that increased political polarization will likely continue this trend of cryptocurrency enabling free expression for those who have been denied other services. It maintains that until around 2017-2018, there was no real need for the average person to use cryptocurrency except in situations of capital controls or hyperinflation, but that has begun to change as more individuals and groups face censorship and denial of services from
Last i t talk. L t minute t lk about underground economy and cybercrime. The speaker discussed the evolution of hacking from curiosity to money motivated crimes and the rise of underground economies that facilitate cybercrimes like identity theft and banking fraud.
This document outlines an agenda for a meetup of the Hack Democracy SF group. It thanks presenters and attendees. It discusses the meaning of the term "hacker" and how hackers can work with public institutions to define the future of democracy. The agenda lists 5 presentations on projects using technology to increase transparency and civic participation, including Code for America, Circle Voting, ScraperWiki, VoteReports.org, and ShortStack. It notes the format will be 5-minute presentations plus Q&A and discusses plans to expand the group to other cities.
This document provides an overview of internet regulation and censorship in China. It discusses how the Chinese government controls and monitors the internet through mechanisms like the Great Firewall and by requiring service providers to comply with censorship directives. It also notes that censorship aims to control media, prohibit mass organization, protect senior leaders from scrutiny, and protect domestic markets. The document then gives examples of some major Chinese internet companies and platforms and provides sources for further information.
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation Talk at Rikkyo University, Tokyo Apr 3 2023