Twitter Adulting: Copyright and the President of the United States

July 21, 2020

Imagine. Twitter has procedures which automate a portion of its copyright vigilance. (DarkCyber is not so sure about Twitter’s hiring practices and the internal security of its system, but the copyright function may be working.)

Twitter Disables Trump Tweet over Copyright Complaint” presents as accurate and “real” news this statement:

Twitter removed the video, which Trump had retweeted from White House social media director Dan Scavino, after it received a Digital Millennium Copyright Act notice from Machine Shop Entertainment, according to a notice posted on the Lumen Database which collects requests for removal of online materials. Machine Shop is a management company owned by the rock band Linkin Park, according to its LinkedIn page.

DarkCyber hopes that Twitter will bring similar diligence to its security, management, and governance of a firm which occupies an interesting, if not secure, place in the pantheon of social media luminaries.

As Linkin Park sang:

Go, stop the show
Choppy words…

Indeed, but the DarkCyber team would substitute the word “tweety” for choppy. But we are not song writers or exceptional tweeters.

Stephen E Arnold, July 21, 2020

Twitter: Remediation or Yoga Babble?

July 20, 2020

I read “An Update on Our Security Incident.” The author is someone at Twitter. That’s reassuring to Mr. Obama, some bitcoin users, and maybe a friend from high school.

The “cause” was:

attackers targeted certain Twitter employees through a social engineering scheme.

Now remember this is an outfit which makes it possible to output information that can have an immediate and direct impact of individuals, organizations, and institutions. This is not a disgruntled student passing out mimeographed pages in the lunch room about the upcoming school dance in the aforementioned high school auditorium.

The cause was an organizational structure similar to a prom fund raising event at the Governor Dummer Academy.  Hence:

The attackers successfully manipulated a small number of employees and used their credentials to access Twitter’s internal systems, including getting through our two-factor protections.

And not to worry. Only 130 Twitter accounts were “accessed.” No problem, mom, Mr. Obama’s account was not improperly used by “the attackers.” Really, Mom. Honest.

Let’s stop.

What was the cause?

The cause was a large and influential company failed to recruit, train, and monitor employees. That company did not have in place sufficient safeguards for its core administrative tools. That company does not have a full time chief executive officer. That company does not have a mechanism to know what is going on when the core administrative tools are used in an anomalous manner by an outsider.

That’s why the company was attacked and there are a few other reasons which seem highly probable to the DarkCyber research team:

  1. The alleged individual attacker or his shadow supporters wanted to demonstrate how one of the more influential social media companies could be successfully compromised
  2. The alleged individual attacker was testing systems and methods which could be used against or again to obtain access to an important channel of unmonitored real time data
  3. The alleged individual attacker was just one of those lone wolf hackers who sit up at night and decide which barn to set on fire.

Once again we have a good example of high school science club management.

The explanation is not going to reassure some people, maybe the former president of the United States? The explanation dances around the core issue: Mismanagement and a failure of governance.

High tech “cuteness” has become a pink Hello, Kitty line of polyester hipster T shirts.

Hey, Twitter. A “dog ate my homework” explanation misses what the breach reveals about management expertise.

Stephen E Arnold, July 20, 2020

Arnold and Steele: Twitter Incident

July 17, 2020

Robert Steele, a former CIA professional, and I discuss the Twitter breach. Mr. Steele takes a broader view; I focus on specific operational actions by regulatory and enforcement entities. We disagreed on some points, but at the end of the 20 minute conversation, we agreed on a broad principle. Action is needed.

https://tinyurl.com/darkcybertwitter

You can view the program which has been viewed more than 7,000 times since July 16, 2020.

Stephen E Arnold, July 17, 2020

Digital Fire hoses: Destructive and Must Be Controlled by Gatekeepers

July 16, 2020

Let’s see how many individualistic thinkers I have offended with my headline. I apologize, but I am thinking about the blast of stories about the most recent Twitter “glitch”: “Apple, Biden, Musk and Other High-Profile Twitter Accounts Hacked in Crypto Scam.”

Are you among the individuals whom I am offending in this essay?

First, we have the individuals who did not believe my observations made in my ASIS Eagleton Lecture 40 years ago. Flows of digital information are destructive. The flows erode structures like societal norms, logical constructs, and organizational systems. Yep, these are things. Unfettered flows of information cut them down, efficiently and steadily. In some cases, the datum can set up something like this:

image

Those nuclear reactions are energetic in some cases.

Second, individuals who want to do any darn thing they want. These individuals form a cohort—either real or virtual—and have at it. I have characterized this behavior in my metaphor of the high school science club. The idea is that anyone “smart” thinks that his or her approach to a problem is an intelligent one. Sufficiently intelligent individuals will recognize the wisdom of the idea and jump aboard. High school science clubs can be a useful metaphor for understanding the cute and orthogonal behavior of some high technology firms. It also describes the behavior of a group of high school students who use social media to poke fun or “frame” a target. Some nation states direct their energies at buttons which will ignite social unrest or create confusion. Thus, successful small science clubs can grow larger and be governed — if that’s the right word — by high school science club management methods. That’s why students at MIT put weird objects on buildings or perform cool pranks. Really cool, right?

Third, individuals who do not want gatekeepers. I use the phrase “adulting” to refer to individuals able to act in an informed, responsible, and ethical manner when deciding what content becomes widely available and what does not. I used to work for an outfit which published newspapers, ran TV stations, and built commercial databases. The company at that time had the “adulting” approach well in hand. Individuals who decry informed human controls. It is time to put thumbs in digital dikes.

Read more

Twitter Tools

June 10, 2019

One of our readers spotted “5 Twitter Tools to Discover the Best and Funniest Tweets.” The article is a round up of software utilities which will provide a selected stream of information from Twitter “content creators.” Keep in mind that threads have been rendered almost useless by Twitter’s editorial procedures. Nevertheless, if you don’t have access to a system which provides the “firehose” content or a repository of indexed and parsed Twitter content, you may find one of these useful:

  • Funny Tweeter
  • Ketchup (an easy way to provide Google with information about Tweets)
  • Really Good Questions
  • Thread Reader (what about those disappeared tweets and the not available tweets
  • Twitter’s digest
  • Twubbler (not exactly a Palantir Gotham timeline, however)

Consult the source article for explanations of each and the links.

Stephen E Arnold, June 10, 2019

Excitement for Twitter Slurpers

February 6, 2019

TechTimes reported that Facebook now makes publicly available what the Zuck has had for some time. One can delete Facebook messages. The options are delete for everyone or just for the sender. The speed with which the messages disappear from the Facebook servers is murky. If you are a Twitter slurper, you may have to make certain that the slurps are taking place with alacrity. DarkCyber does not have a full count of the number of entities engaged in chugging down tweets, but there are more than some people may think. Tweets, like Facebook, provide a quite useful stream of data. Zippy analytics can make tweets turn cartwheels. Losing tweets from certain handles of interest is not good news.

Stephen E Arnold, February 6, 2019

Twitter Bans Accounts

August 22, 2018

i read “Facebook and Twitter Ban over 900 Accounts in Bid to Tackle Fake News.” Twitter was founded about 12 years ago. The company found itself in the midst of the 2016 election messaging flap. The article reports:

Facebook said it had identified and banned 652 accounts, groups and pages which were linked to Iran and to Russia for “co-ordinated inauthentic behavior”, including the sharing of political material.

One of the interesting items of information which surfaced when my team was doing the research for CyberOSINT and the Dark Web Notebook, both monographs designed for law enforcement and intelligence professionals, was the ease with which Twitter accounts can be obtained.

For a program we developed for a conference organizer in Washington, DC, in 2015, we illustrated Twitter messages with links to information designed to attract young men and women to movements which advocated some activities which broke US laws.

The challenge had in 2015 several dimensions. Let me run down the ones the other speakers and I mentioned; for example:

  • The ease with which an account could be created
  • The ease with which multiple accounts could be created
  • The ease with which messages could be generated with suitable index terms
  • The ease with which messages could be disseminated across multiple accounts via scripts
  • The lack of filtering to block weaponized content.

Back to the present.

Banning an account addresses one of these challenges.

The notion of low friction content dissemination, unrestricted indexing, and the ability to create accounts is one to ponder.

Killing an account or a group of accounts may not have the desired effect.

Compared to other social networks, Twitter has a strong following in certain socio economic sectors. That in itself adds a bit of spice to the sauce.

Stephen E Arnold, August 22, 2018

Challenges to High School Science Club Management Methods

August 17, 2018

High school science club management methods involve individuals who often perceive other students as less capable. The result is an “I know better” mindset. When applied on a canvas somewhat larger than a public high school, the consequences are often fascinating.

I am confident that high school science club management methods are indeed effective. But it is useful to look at two recent examples which suggest that the confidence of the deciders may be greater than the benefit to the non-deciders.

The first example concerns Google. The company has had some employee pushback about its work on US government projects. I learned when I read “Google Employees Protest Secret Work on Censored Search Engine for China.” The newspaper of record at least around 42nd Street and Park Avenue said:

Hundreds of Google employees, upset at the company’s decision to secretly build a censored version of its search engine for China, have signed a letter demanding more transparency to understand the ethical consequences of their work. In the letter, which was obtained by The New York Times, employees wrote that the project and Google’s apparent willingness to abide by China’s censorship requirements “raise urgent moral and ethical issues.” They added, “Currently we do not have the information required to make ethically-informed decisions about our work, our projects, and our employment.”

High school management methods have created an interesting workplace problem: Employees want to pick and choose what the company does to generate revenue. Publicly traded companies have to generate revenue and a profit.

How will Google’s management deal with the apparent desire of senior management to make revenue headway in China as its employees appear to want to tell management what’s okay and what’s not okay. I assume that high school science club management methods will rise to this challenge.

The second example is provided by the article “Twitter Company Email Addresses Why It’s #BreakingMyTwitter.” Twitter management is making decisions which seem to illustrate the power of “I know better than you” what’s an appropriate course of action. Twitter has made unilateral changes which appear to have put developers and users in a sticky patch of asphalt. Plus, management has taken an oddly parental approach to the Alex Jones content problem.

I learned from the article:

It’s hard to be a fan of Twitter right now. The company is sticking up for conspiracy theorist Alex Jones, when nearly all other platforms have given him the boot, it’s overrun with bots, and now it’s breaking users’ favorite third-party Twitter clients like Tweetbot and Twitterific by shutting off APIs these apps relied on. Worse still, is that Twitter isn’t taking full responsibility for its decisions.

My takeaway is that high school management methods are more interesting than the dry and dusty notions of Peter Drucker or the old school consultants at the once untarnished blue chip consulting firms like McKinsey & Company and Booz, Allen type operations.

Business school curricula may need an update.

Stephen E Arnold, August 17, 2018

Twitter Bots: Usefulness Questioned

July 27, 2018

Twitter Bots have become the junk mail of the digital era. We get harassed and prodded by these autonomous accounts. Whether you are a celebrity or an average joe, you have likely been confronted by artificially intelligent Tweets that are tough to determine validity. We learned about an interesting way to combat this phenomenon from a recent Zero Hedge story, “Researchers Unmask Anonymous Twitter Accounts with 97% Accuracy Using Machine Learning.”

According to the story:

“For users who occasionally engage in anonymous tweeting, this revelation shouldn’t go unacknowledged. In their study, the researchers discovered that their most basic algorithm could correctly identify an individual user in a group of 10,000 using just 14 pieces of metadata from their posts on twitter nearly 96.7% of the time. Furthermore, attempts to obscure the individuals’ identity by tampering with the data were remarkably ineffective.”

Finally, we are getting to a stage where human intelligence is outwitting the artificial brand. These researchers are not alone, as was made big news recently, Twitter purged millions of accounts linked to bots recently. This is good news for regular folks, but also for retailers who now can have a more legitimate pedestal to stand on. It might be optimistic, but life seems to be inching closer toward the old definition of “normal.”

Patrick Roland, July 27, 2018

Twitter: A Brief Guide

March 12, 2018

Twitter continues to be of interest to some of the professionals with whom the addled goose speaks. The ease with which social media can be manipulated is becoming better understood. (Note: Few ask why the algorithms used by some social media outfits are vulnerable, but that’s a question which will follow as understanding increases.)

Social media is constantly changing and just as soon as you are familiar with one search technique it is replaced with another. Twitter is not the most popular social media platform, but it continues to hold its own against Facebook, Instagram, and YouTube.

In some ways, Twitter is very much like other communication platforms. An “official handbook” has to be assembled by a persistent reader of blog posts, books on Amazon, and information presented in the comments to Hacker News or Reddit, however.

Now a content centric company like Espirian has drafted its own guides that share the in’s and out’s of social media, especially the best ways to search the social Web sites. Espirian wrote the, “Twitter Search: Advance Guide 2018” to help bloggers and other content curators become Twitter search experts.

Here is a short description of the guide:

“Whether you’re researching blog ideas, looking for work or just trying to find out what’s going on near you, the advanced features of Twitter search will help you find the content you need.

We noted that one useful way to to search Twitter is to access the Tweetdeck. The Tweetdeck, an app which allows its users to have a bird’s eye view of their Twitter accounts, their own tweets, others’ tweets, and their news feed. Another way to search Twitter is to access the advanced search option.

For some researchers the difficulty of performing advanced searches is frustrating. Twitter has resisted adding some metadata to its users’ accounts. Despite its quirks, Twitter can be useful for analysts, marketers, and some researchers.

Whitney Grace, March 12, 2018

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta