{"id":13891,"date":"2023-08-29T12:35:03","date_gmt":"2023-08-29T12:35:03","guid":{"rendered":"http:\/\/scannn.com\/raising-online-defenses-through-transparency-and-collaboration\/"},"modified":"2023-08-29T12:35:03","modified_gmt":"2023-08-29T12:35:03","slug":"raising-online-defenses-through-transparency-and-collaboration","status":"publish","type":"post","link":"https:\/\/scannn.com\/lv\/raising-online-defenses-through-transparency-and-collaboration\/","title":{"rendered":"Raising Online Defenses Through Transparency and Collaboration"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span style=\"font-weight: 400;\">Rarely, if ever, do today\u2019s online threats target one single technology platform \u2013 instead, they follow people across the internet. <\/span><span style=\"font-weight: 400;\">We go to great lengths to keep our apps safe for people and help raise our collective defenses across the internet.<\/span><span style=\"font-weight: 400;\"> Today\u2019s <\/span><a href=\"https:\/\/transparency.fb.com\/\"><span style=\"font-weight: 400;\">security and integrity updates<\/span><\/a><span style=\"font-weight: 400;\"> provide an under-the-hood view into our defense strategy and the latest news on how we build it into products like our new app Threads and generative AI systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the decade since we <\/span><a href=\"https:\/\/about.fb.com\/news\/2013\/08\/global-government-requests-report\/\"><span style=\"font-weight: 400;\">first<\/span><\/a><span style=\"font-weight: 400;\"> began publishing transparency reports, technology companies and researchers have learned a great deal about how online public spaces can be abused by malicious actors. A key lesson for us has been that transparency across our industry has positive cascading effects on our collective ability to respond to new threats \u2013 from continuous pressure on malicious groups through takedowns and public exposure to government sanctions as well as stronger product defenses. Today\u2019s updates are a good window into how this works in practice.<\/span><\/p>\n<h2>Taking Down Two of the Largest Known Covert Influence Operations<\/h2>\n<p><b>China: <\/b><span style=\"font-weight: 400;\">We recently took down thousands of accounts and Pages that were part of the largest known cross-platform covert influence operation in the world. It targeted more than 50 apps, including Facebook, Instagram, X (formerly Twitter), YouTube, TikTok, Reddit, Pinterest, Medium, Blogspot, LiveJournal, VKontakte, Vimeo, and dozens of smaller platforms and forums. For the first time, we were able to tie this activity together to confirm it was part of one operation known in the security community as Spamouflage and link it to individuals associated with Chinese law enforcement. See details in our <a href=\"https:\/\/transparency.fb.com\/sr\/Q2-2023-Adversarial-threat-report\">Q2 Adversarial Threat report<\/a>.<\/span><\/p>\n<p><b>Russia: <\/b><span style=\"font-weight: 400;\">We also blocked thousands of malicious website domains as well as attempts to run fake accounts and Pages on our platforms connected to the Russian operation known as Doppelganger that we first <\/span><a href=\"https:\/\/about.fb.com\/wp-content\/uploads\/2022\/11\/CIB-Report_-China-Russia-Sept-2022.pdf\"><span style=\"font-weight: 400;\">disrupted<\/span><\/a><span style=\"font-weight: 400;\"> a year ago. This operation was focused on mimicking websites of mainstream news outlets and government entities to post fake articles aimed at weakening support for Ukraine. It has now expanded beyond initially targeting France, Germany and Ukraine to also include the US and Israel. This is the largest and the most aggressively-persistent Russian-origin operation we\u2019ve taken down since 2017. In addition to new threat research, we\u2019re also publishing our <a href=\"https:\/\/transparency.fb.com\/sr\/Q2-2023-Adversarial-threat-report\">enforcement and policy recommendations<\/a> for addressing the abuse of the global domain name registration system.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Examining Impact of Disrupting Hate Networks<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">We first began using what we call Strategic Network Disruptions in 2017 to tackle covert influence operations from Russia. As it proved to be an effective instrument in our toolbox, we expanded it to other issue areas, including hate networks, cyber espionage and mass reporting. But because we know that malicious groups keep evolving their tactics across the internet, we also continue to ask ourselves: do these strategies still work and how can we improve them?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our team of researchers recently published a <\/span><a href=\"https:\/\/www.pnas.org\/doi\/epdf\/10.1073\/pnas.2214080120\"><span style=\"font-weight: 400;\">study<\/span><\/a><span style=\"font-weight: 400;\"> of the effects of six network disruptions of banned hate-based organizations on Facebook. Their research found de-platforming these entities through network disruptions can help make the ecosystem less hospitable for designated dangerous organizations. While people closest to the core audience of these hate groups exhibit signs of backlash in the short-term, evidence suggests they reduce their engagement with the network and with hateful content over time. It also suggests that our strategies can reduce the ability of hate organizations to successfully operate online.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Building Threads and Generative AI Tools<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While these network takedowns are impactful, they are just one tool in our broader defense against adversarial groups targeting people across the internet. Our investigations and enforcements power what we call a virtuous cycle of defense \u2013 improving our scaled systems and how we build new products.\u00a0<\/span><\/p>\n<p><b>Threads: <\/b><span style=\"font-weight: 400;\">From the beginning, our integrity enforcement systems and policies developed for Instagram, and other apps, have been wired into how we built Threads. You can think of it as Threads being built on top of an established, global infrastructure powering multiple apps at once. This means that our security efforts, like tackling covert influence operations, apply to Threads just as they do to Facebook and Instagram. In fact, within 24 hours of Threads launching, we detected and blocked attempts to establish a presence on Threads by accounts linked to an influence operation we took down in the past.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ve also rolled out additional transparency features on Threads, including labeling state-controlled media and showing additional information about accounts so that people can know, for example, if accounts may have changed their names. We know that adversarial behaviors will keep evolving as the Threads app continues to mature, and so will we, to stay ahead of these threats.\u00a0<\/span><\/p>\n<p><b>Generative AI: <\/b><span style=\"font-weight: 400;\">Openness and cross-society collaboration are even more critical when it comes to rapidly evolving technologies like generative AI. In addition to extensive internal \u201cred teaming\u201d where our internal teams take on the role of adversaries to hunt for flaws, we recently brought our generative AI model to DEFCON \u2014 the largest hacker conference in the world. We joined our peers at Google, NVIDIA, OpenAI and others to stress test our different models as part of the first-ever public Generative Red Team Challenge.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Over 2,200 researchers, including hundreds of students and organizations traditionally left out of the early stages of technological change, came together to hunt for bugs and vulnerabilities in these systems. According to the organizers of this challenge, they engaged in over 17,000 conversations with generative AI systems to probe for unintended behaviors \u2013 from bad math calculations to misinformation to providing bad user security practices. This open red team challenge was supported by the White House Office of Science and Technology Policy, the National Science Foundation, and the Congressional AI Caucus. Our hope is that early focus on establishing best practices for this emerging generative AI space will result in safer systems in the long term.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We believe that openness is the key to tackling some of the biggest challenges we collectively face online. Transparency reports, academic research, and other measures to innovate openly and stress-test our systems help our industry to learn from each other, improve our respective systems, and keep people safe across the internet.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">\u00a0You can find our <\/span><\/i><a href=\"https:\/\/transparency.fb.com\/integrity-reports-q2-2023\/\"><i><span style=\"font-weight: 400;\">quarterly integrity reports<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> on <\/span><\/i><a href=\"https:\/\/transparency.fb.com\/reports\/\"><i><span style=\"font-weight: 400;\">Meta\u2019s Transparency Center<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<\/p><\/div>\n<p><script async defer crossorigin=\"anonymous\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&#038;version=v5.0\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/about.fb.com\/news\/2023\/08\/raising-online-defenses\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rarely, if ever, do today\u2019s online threats target one single technology platform \u2013 instead, they follow people across the internet. We go to great lengths to keep our apps safe for people and help raise our collective defenses across the internet. Today\u2019s security and integrity updates provide an under-the-hood view into our defense strategy and [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":13892,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123],"tags":[],"class_list":["post-13891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-facebook"],"_links":{"self":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/13891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/comments?post=13891"}],"version-history":[{"count":0,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/13891\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media\/13892"}],"wp:attachment":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media?parent=13891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/categories?post=13891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/tags?post=13891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}