黑色脸谱

An online network on Facebook discovered by German media outlet Der Spiegel, which partnered with the DFRLab for its analysis, used hundreds of fake user accounts to craft full lifetimes of often breathless drama by deploying common tactics for creating such fake profiles.

Der Spiegel与DFRLab合作进行分析的德国媒体Der Spiegel在Facebook上建立了一个在线网络,该网络使用数百个虚假用户帐户,通过部署创建此类虚假个人资料的通用策略,来制作通常令人窒息的戏剧的完整版。

The network of accounts participated in what Facebook — in a statement provided to Der Spiegel and the DFRLab — referred to as “scamming behavior,” putting them out of the range of the company’s qualification as “coordinated inauthentic behavior” (CIB). The latter usually entails concentrated and targeted information manipulation, meant to persuade vulnerable audiences for political or financial purposes. In this case, given the real humans behind the accounts, their proclivity toward fabricating whole lives for fake people, and their private engagement with authentic Facebook users — as revealed by Der Spiegel — the accounts appeared to more closely fit the company’s idea of scams. Both CIB and scams lead to removal from the platform.

帐户网络参与了Facebook的活动-在提供给明镜和DFRLab的声明中 —称为“诈骗行为”,将其排除在公司的“ 协调不真实行为 ”(CIB)资格范围之外。 后者通常需要集中和有针对性的信息操纵,以说服弱势受众出于政治或经济目的。 在这种情况下,考虑到帐户背后的真实人物,他们倾向于为假人伪造一生,并且他们与真实的Facebook用户进行私人接触(如Der Spiegel所揭示的那样),这些帐户似乎更符合公司的诈骗观念。 CIB和欺诈都会导致从平台中删除。

A joint investigation between the DFRLab and German newspaper Der Spiegel identified at least 329 accounts engaged in this activity. While many of the accounts had cultivated mature user personas, they also exhibited numerous biographical inconsistencies, linguistic errors, and use of stolen content, all of which ultimately helped expose the network.

DFRLab与德国报纸Der Spiegel之间的联合调查确定了至少329个从事此活动的帐户。 尽管许多帐户已经培养了成熟的用户角色,但它们也表现出许多传记上的不一致之处,语言错误以及被盗内容的使用,所有这些最终都有助于揭露网络。

While the investigation did not result in a conclusive attribution, the DFRLab found some evidence, such as language use and the time zone of postings, to suggest that at least part of the network may have originated in Latin America. In addition, Der Spiegel discovered that some of the accounts made contact via private messages with real users, a finding the DFRLab was able to corroborate via open-source evidence.

尽管调查未得出结论性的归因,但DFRLab发现了一些证据,例如语言使用和张贴时区,表明该网络的至少一部分可能起源于拉丁美洲。 此外, Der Spiegel发现某些帐户通过私人消息与真实用户建立了联系,并发现DFRLab能够通过开放源证据来证实这一点。

This article outlines the main features of the network. Additional pieces by the DFRLab provide greater detail on the content, coordination, and fake nature of the accounts.

本文概述了网络的主要功能。 DFRLab的其他部分提供了有关帐户 内容 , 协调和虚假性质的更多详细信息。

成熟的用户角色 (Mature user personas)

Many of the accounts had cultivated mature user personas that presented a wealth of detailed biographical information, including work history and education.

许多帐户培养了成熟的用户角色,这些角色提供了大量详细的传记信息,包括工作经历和教育。

Meredith Kennedy/梅雷迪思·肯尼迪 / archive, left; 档案 ,左; Miguel Angel Singer/米格尔·安吉尔·辛格 / archive, middle; 档案 ,中间; Alice Bergmann/艾丽斯·伯格曼 / archive, right)档案 ,右)

Most of the user personas identified themselves as military or law enforcement personnel. Others listed jobs in the tourism, aviation, arts, and fashion industries.

大多数用户角色将自己标识为军事或执法人员。 其他人列出了旅游,航空,艺术和时装行业的工作。

@nikaaleksejeva/DFRLab)@nikaaleksejeva / DFRLab)

In terms of nationality, the accounts were diverse, claiming to hail from over 30 countries, including France, the United States, and Syria.

就国籍而言,这些账户的种类繁多,声称来自30多个国家,包括法国,美国和叙利亚。

@nikaaleksejeva/DFRLab)@nikaaleksejeva / DFRLab)

The accounts often listed one another as family members, tagged each other in photos, and engaged in dramatic exchanges in the comment sections of one other’s posts. These interactions suggested that the operators were aware of one another and coordinating to some extent.

这些账目经常彼此列为家庭成员,在照片中彼此打上标签,并在彼此帖子的评论部分进行戏剧性的交流。 这些互动表明,操作员彼此了解并进行了一定程度的协调。

Furthermore, both the DFRLab and Der Spiegel found evidence that the fake accounts had engaged authentic users via private messages.

此外,DFRLab和Der Spiegel都找到了证据,证明伪造帐户通过私人消息吸引了真实用户。

Helen Bergmann/Helen Bergmann / archive, left; 档案 ,左; Helen Bergmann/Helen Bergmann / archive, right)档案 ,右)

The care that went into crafting the accounts’ personas may have been an attempt to lend the accounts an air of authenticity so as to avoid arousing suspicion when they contacted real individuals.

精心制作帐户角色的做法可能是试图使帐户具有真实性,以避免在与真实个人联系时引起怀疑。

传记不一致 (Biographical inconsistencies)

Ironically, the high degree of biographical detail these accounts provided ultimately exposed them by creating greater room for error and inconsistencies in the personas. Some accounts had different names in their Facebook IDs than their screennames, as well as conflicting listed and presenting genders, suggesting that they may have changed identities at some point.

具有讽刺意味的是,这些陈述所提供的高度的传记细节最终通过在角色中增加错误和不一致的余地而最终暴露了它们。 一些帐户的Facebook ID名称与屏幕名称不同,并且列出的性别和显示的性别相抵触,这表明它们可能在某个时候改变了身份。

Majid Najm Al-din/Majid Najm Al-din / archive)档案 )

Many accounts from the network did not identify themselves as native English speakers, but those that did made language errors characteristic of non-native speakers.

网络中的许多帐户并没有将自己识别为说英语的人,但是那些确实造成了非母语者的语言错误的帐户。

Facebook/Facebook / archive)档案 )

While many accounts were connected to one another via family ties, there were inconsistencies in the accounts they listed as family members. In one case, for example, an account allegedly belonging to a father was clearly that for a woman.

虽然许多帐户是通过家庭纽带相互关联的,但它们列为家庭成员的帐户却存在不一致之处。 例如,在一个案例中,据称属于父亲的账户显然是针对女性的账户。

被盗内容 (Stolen content)

Many accounts from the network used images of “B-List” Latin American celebrities as profile pictures. Slight digital modifications, such as image mirroring and use of visual filters, suggested the accounts took steps to avoid detection via reverse image search.

网络中的许多帐户都使用“ B-List”拉丁美洲名人的图像作为个人资料图片。 轻微的数字修改(例如图像镜像和视觉过滤器的使用)建议帐户采取步骤,以避免通过反向图像搜索进行检测。

Facebook/Facebook / archive, left; 存档 ,左; YouTube/YouTube / archive, right)存档 ,右)

Some accounts copied and pasted text in their posts that originated on fringe media outlets from abroad.

一些帐户在其帖子中复制并粘贴了来自国外边缘媒体的文字。

Georg Schonfelder Rommer copied and pasted a list of people from a comment by a user “biersauer” on a post on fringe German blog Ein Parteibuch, a post that itself was taken from Russian fringe media site Southfront.org. (Source: Georg Schonfelder Rommer/archive, left; Ein Parteibuch/archive, right)
Georg Schonfelder Rommer 在边缘德国博客Ein Parteibuch上的帖子中复制并粘贴了用户“ biersauer”的评论中的人员列表,该帖子本身取自俄罗斯边缘媒体网站Southfront.org。 (来源: Georg Schonfelder Rommer / 档案 ,左; Ein Parteibuch / 档案 ,右)

发布收费的政治内容以吸引合适的人群 (Posting charged political content to draw the right crowd)

In addition to divulging details about their personal life in emotionally loaded posts, some of the accounts also posted charged political content. The exact nature of the content, however, was likely a superficial aspect of the network, as it was presumably targeting a highly engaged audience that the operators of the network felt might be most susceptible to their scam.

除了在充满感情的帖子中透露有关其个人生活的细节外,一些账户还发布了收费的政治内容。 但是,内容的确切性质可能是网络的一个肤浅的方面,因为它大概是针对网络运营商认为最容易受到骗局的高度参与的受众。

This, in part, explains why the network demonstrated no single or coherent ideological agenda; instead, the accounts seemed to be passionate about disparate political issues, from Kurdish autonomy to the refugee crisis in Europe. Different accounts often contradicted each other in political positioning.

这部分地解释了为什么网络没有表现出单一或连贯的意识形态议程; 相反,这些报道似乎对不同的政治问题充满热情,从库尔德自治到欧洲的难民危机。 不同的说法在政治立场上常常相互矛盾。

Vanessa Ferraro Vecchia/Vanessa Ferraro Vecchia / archive, top left; 档案 ,左上; George Wozniak/George Wozniak / archive, top right; 档案 ,右上; Milan Djokovic/Milan Djokovic / archive, bottom left; 档案 ,左下; Alfred Louis Carter/Alfred Louis Carter / archive, bottom right)档案 ,右下)

The one common thread was the likelihood of the content to provoke emotional reactions, a possible tactic to draw in highly engaged users as a part of the scam.

一个共同的话题是内容引发情绪React的可能性,这是吸引高参与度用户作为骗局的一种可能策略。

指向拉丁美洲的证据 (Evidence pointing to Latin America)

A few corroborating pieces of evidence suggested that the network might have been, at least in part, operated out of Latin America. Besides using images of Latin American celebrities, many of the accounts allegedly from other parts of the world frequently listed the languages they spoke in Spanish.

一些确凿的证据表明该网络可能至少部分在拉丁美洲以外运营。 除了使用拉丁美洲名人的图像外,据称来自世界其他地区的许多报道还经常列出他们用西班牙语说的语言。

Miroslav Overchenko/Miroslav Overchenko / archive, bottom left; 档案 ,左下; Mahir Sawiris/Mahir Sawiris / archive, bottom right)档案 ,右下)

Moreover, the time difference between the posting time and the time displayed on a researcher’s computer (in Central Europe) indicated a six-hour difference that matched with the time zone of eleven Latin American countries.

此外,发布时间与研究人员的计算机(在中欧)上显示的时间之间的时差表示与六个11个拉丁美洲国家的时区相匹配的六小时时差。

Robert Gautier/archive, left; 罗伯特·戈蒂埃 /存档,左; 24timezones.com/24timezones.com / archive, right)归档 ,右)

结论 (Conclusion)

This network was sprawling and longstanding. Some of the most prominent accounts, including Robert Gautier and Helena Bergmann, had been active since 2012–2013, having adopted fairly consistent and well-developed personas. Despite the conviction with which they played their parts, however, biographical inconsistencies and similar patterns of behavior revealed that these accounts were not who they claimed to be.

该网络庞大且长期存在。 自2012-2013年以来,包括Robert Gautier和Helena Bergmann在内的一些最著名的人物一直很活跃,他们采用了相当一致和完善的角色。 尽管他们坚定地发挥了自己的作用,但传记上的前后矛盾和类似的行为模式表明,这些说法并非他们声称的那样。

That the network was inauthentic and coordinated was clear, though the accounts — by Facebook’s own estimation to the DFRLab — were perpetrating “scamming behavior,” thus falling short of the company’s threshold for “coordinated inauthentic behavior.” Assuming the behavior was indeed intended to scam people in some form, it nevertheless remained unclear what the purpose of the scam was.

尽管由Facebook自己对DFRLab的估计,这些帐户确实存在“诈骗行为”,但仍低于该公司“协调的非真实行为”的门槛,但网络是真实的和协调的很明显。 假设该行为确实旨在以某种形式骗人,但仍不清楚骗局的目的是什么。

Some of the accounts posted innocuous special interest content, melodramatic stories, and flirtatious overtures; others were overtly political. The former behaviors are typical of audience-building attempts. On the other hand, the presence of political commentary on a host of divisive sociopolitical issues suggested that the network was deliberately targeting an audience of highly engaged real users it felt could be scammed.

一些帐目张贴了无害的特殊兴趣内容,叙事故事和挑逗性的提议; 其他人则公开地政治。 前者的行为是受众建立尝试中的典型行为。 另一方面,关于许多分裂性社会政治问题的政治评论的存在表明,该网络是故意针对那些可能被骗的高度参与的真实用户的。

Nika Aleksejeva is a Research Associate with the Digital Forensic Research Lab (@DFRLab) and is based in Latvia.

Nika Aleksejeva 是数字取证研究实验室(@DFRLab)的研究助理,总部位于拉脱维亚。

Zarine Kharazian is Assistant Editor with @DFRLab and is based in Washington, DC.

Zarine Kharazian @DFRLab 的助理编辑,总部位于华盛顿特区。

Follow along on Twitter for more in-depth analysis from our #DigitalSherlocks.

在Twitter上 关注 我们的#DigitalSherlocks,以进行更深入的分析。

翻译自: https://medium.com/dfrlab/top-takes-a-facebook-drama-in-three-acts-a275e037c8be

黑色脸谱


http://www.taodudu.cc/news/show-2386598.html

相关文章:

  • walden2
  • 恶魔奶爸语法7-9课
  • 潘赟九宫格写作总结(精简背诵版)
  • Ninth season eighth episode,Rachel‘s another sister,how is she???
  • 英语听力练习
  • 大学英语精读第三版(第四册)复习笔记——文章内容摘要
  • [渝粤教育] 许昌学院 英语公共演讲 参考 资料
  • 电脑能登录微信,但网页打不开
  • 麒麟操作系统V10登录微信报错
  • 电脑登录微信,手机退出微信,电脑端微信仍然在线(IOS)
  • 如何只用电脑登录微信
  • 解决能登录微信却登不上网页的问题
  • 在别人电脑登录微信会【泄露隐私】,登录微信后一定要删除这个文件
  • 如何在电脑上临时登录微信,快来看这里!怎样在电脑上登录微信
  • 微信红包,企业付款到零钱报错:此IP地址不允许调用接口,如有需要请登录微信支付商户平台更改配置 的原因
  • win10系统可以登录微信,但浏览器不能打开网页
  • 不能随便给他人登录微信小程序
  • 微信登录提示逻辑不正确_微信逻辑错误无法登录
  • wxpy 扫码登录微信报错 KeyError: pass_ticket(网页版微信登录失败)
  • 关于手机号不能登录微信解决办法
  • 微信小程序怎么登录?如何正确登录微信小程序后台?
  • 怎样登陆微信小程序?怎样登陆微信小程序后台?微信小程序成员如何登陆后台管理?微信小程序怎么登录,如何正确登录微信小程序后台?微信小程序如何登录页面?具体操作步骤如下
  • 安卓第三方登录之微信登录(图文详解)
  • 电脑只能登录微信?但却打不开网页?不能上网怎么办?ip地址和DNS出问题了无法上网怎么办?
  • iPhone4s(iOS 6.1.3 越狱) 登录微信(6.2.0.19)
  • 解决win10可以登录微信/QQ,浏览器无法访问网页的问题
  • 微信公众号授权登录重复登录不跳转
  • Android微信登录
  • 关于电脑登录微信会出现闪(跳)黑屏的处理办法
  • 电脑正常联网,提示无法登录微信

黑色脸谱_上演三幕的脸谱剧相关推荐

  1. 小学计算机京剧脸谱教案,第6课 走进戏曲(三)——画脸谱

    小学艺术学科教学设计常用表格 课题 走进戏曲(三)-画脸谱 课型或模块 综合课 教学课时 一课时 年级 五年级 教学目标 1.情感态度价值观目标:以艺术学科核心素养"艺术感知"为出 ...

  2. 程序员期末试卷_第三部分复习提纲.doc下载

    程序员期末试卷_第三部分复习提纲.doc下载 转载于:https://www.cnblogs.com/dtdnh520/archive/2007/01/20/625390.html

  3. Lync Server 2010的部署系列_第三章 证书、架构、DNS规划

    Lync Server 2010的部署系列_第三章 证书.架构.DNS规划 一.证书规划 组件 使用者名称 使用者备用名称条目/顺序 证书颁发机构 (CA) 备注 边缘外部接口 Sip.Giantha ...

  4. c语言中,x-y,'105',ab,7f8那个是正确的,C语言程序设计_第三章 数据.ppt

    C语言程序设计_第三章 数据 * 运算符功能 与运算量关系 要求运算量个数 要求运算量类型 运算符优先级别 结合方向 结果的类型 学习运算符应注意 * 基本算术运算符: + - * / % 结合方向: ...

  5. 管理系统中计算机应用课件,管理系统中计算机应用_第三章课件.ppt

    <管理系统中计算机应用_第三章课件.ppt>由会员分享,提供在线免费全文阅读可下载,此文档格式为ppt,更多相关<管理系统中计算机应用_第三章课件.ppt>文档请在天天文库搜索 ...

  6. OpenCV函数简记_第三章数字图像的滤波处理(方框,均值,高斯,中值和双边滤波)

    系列文章目录 OpenCV函数简记_第一章数字图像的基本概念(邻域,连通,色彩空间) OpenCV函数简记_第二章数字图像的基本操作(图像读写,图像像素获取,图像ROI获取,图像混合,图形绘制) Op ...

  7. python笔记_第三周

    python笔记_第三周 第十天 回调函数 回调函数就是一个被作为参数传递的函数把函数a当做一个值 赋值给函数b的形参, 在调用函数b的时候 在函数体内 适当的实际调用函数a, 这个函数a就是回调函数 ...

  8. 《精通数据仓库设计》中英对照_第三章

    <精通数据仓库设计>中英对照_第三章 第二部分 模型开发 数据仓库应该表示企业数据的各个方面,这些方面以主题域和业务数据模型开始.我们将在第3章使用一个假想的公司,指导一步一步地开发这两个 ...

  9. 开关电源测试规范和开关电源测试标准_第三部分

    开关电源测试规范和开关电源测试标准_第一部分 http://blog.21ic.com/user1/379/archives/2010/78553.html 开关电源测试规范和开关电源测试标准_第二部 ...

  10. ArcGIS for Desktop入门教程_第三章_Desktop软件安装 - ArcGIS知乎-新一代ArcGIS问答社区...

    原文:ArcGIS for Desktop入门教程_第三章_Desktop软件安装 - ArcGIS知乎-新一代ArcGIS问答社区 1 软件安装 1.1 安装前准备 请确认已经收到来自Esri中国( ...

最新文章

  1. Mac下Android studio 之NDK配置教程(一)
  2. C#零基础入门04:打老鼠初级之枚举、重构、事件处理器
  3. 如何查看spark消耗的内存_Spark优化(三)----数据本地化及内存调优
  4. 互联网架构:常用基础中间件介绍
  5. 任正非:再见,荣耀!从此以后便是对手!
  6. java name_Java枚举name()方法及示例
  7. Springboot token令牌验证解决方案 在SpringBoot实现基于Token的用户身份验证
  8. github上传文件 linux,第一次上传代码到github (Linux)
  9. js 打印数组_Node.js系列二 - Node基础知识
  10. 关于工作和人生观(转)
  11. Eviews10.0下载与安装
  12. 什么是串口协议转换器?串口转换器有哪些特点?
  13. AKG K66不算评测
  14. 蓝牙语音芯片模块数传音频BLE选型 支持mp3播放外挂spiflash双模
  15. 每日写题分享--包含min函数的栈/双栈实现
  16. 2020年中级数据库系统工程师考试笔记9—SQL语言
  17. 百度地图 web 开发 BMap.point格式
  18. 微信斑马系统:微信朋友圈广告背后的利器
  19. 微信小程序搜索框 回车搜索事件
  20. 纯CSS3实现常见的时间进度线(竖立方向)

热门文章

  1. 如何定义用户模型(persona)
  2. kettle日志解析_Kettle日志-基础篇
  3. ps人物换脸移花接木
  4. ASO优化含义篇:积分墙是什么?
  5. 【转】数据库一对一、一对多、多对多关系
  6. 智课雅思词汇---七、cur是什么意思
  7. 怎么禁用计算机的文件共享,怎么关闭掉电脑共享文件
  8. SAP结转方法:表结法、帐结法
  9. 百旺如何看是否清卡_​百旺如何看是否清卡
  10. 如何打造一个自动化的前端项目