Russia Is Leaking Data Like a Sieve


Matt Burgess at Wired: “Names, birthdays, passport numbers, job titles—the personal information goes on for pages and looks like any typical data breach. But this data set is very different. It allegedly contains the personal information of 1,600 Russian troops who served in Bucha, a Ukrainian city devastated during Russia’s war and the scene of multiple potential war crimes.

The data set is not the only one. Another allegedly contains the names and contact details of 620 Russian spies who are registered to work at the Moscow office of the FSB, the country’s main security agency. Neither set of information was published by hackers. Instead they were put online by Ukraine’s intelligence services, with all the names and details freely available to anyone online. “Every European should know their names,” Ukrainian officials wrote in a Facebook post as they published the data.

Since Russian troops crossed Ukraine’s borders at the end of February, colossal amounts of information about the Russian state and its activities have been made public. The data offers unparalleled glimpses into closed-off private institutions, and it may be a gold mine for investigators, from journalists to those tasked with investigating war crimes. Broadly, the data comes in two flavors: information published proactively by Ukranian authorities or their allies, and information obtained by hacktivists. Hundreds of gigabytes of files and millions of emails have been made public.

“Both sides in this conflict are very good at information operations,” says Philip Ingram, a former colonel in British military intelligence. “The Russians are quite blatant about the lies that they’ll tell,” he adds. Since the war started, Russian disinformation has been consistently debunked. Ingram says Ukraine has to be more tactical with the information it publishes. “They have to make sure that what they’re putting out is credible and they’re not caught out telling lies in a way that would embarrass them or embarrass their international partners.”

Both the lists of alleged FSB officers and Russian troops were published online by Ukraine’s Central Intelligence Agency at the end of March and start of April, respectively. While WIRED has not been able to verify the accuracy of the data—and Ukrainian cybersecurity officials did not respond to a request for comment—Aric Toler, from investigative outlet Bellingcat, tweeted that the FSB details appear to have been combined from previous leaks and open source information. It is unclear how up-to-date the information is…(More)”.

Facial Recognition Goes to War


Kashmir Hill at the New York Times: “In the weeks after Russia invaded Ukraine and images of the devastation wrought there flooded the news, Hoan Ton-That, the chief executive of the facial recognition company Clearview AI, began thinking about how he could get involved.

He believed his company’s technology could offer clarity in complex situations in the war.

“I remember seeing videos of captured Russian soldiers and Russia claiming they were actors,” Mr. Ton-That said. “I thought if Ukrainians could use Clearview, they could get more information to verify their identities.”

In early March, he reached out to people who might help him contact the Ukrainian government. One of Clearview’s advisory board members, Lee Wolosky, a lawyer who has worked for the Biden administration, was meeting with Ukrainian officials and offered to deliver a message.

Mr. Ton-That drafted a letter explaining that his app “can instantly identify someone just from a photo” and that the police and federal agencies in the United States used it to solve crimes. That feature has brought Clearview scrutiny over concerns about privacy and questions about racism and other biases within artificial-intelligence systems.

The tool, which can identify a suspect caught on surveillance video, could be valuable to a country under attack, Mr. Ton-That wrote. He said the tool could identify people who might be spies, as well as deceased people, by comparing their faces against Clearview’s database of 20 billion faces from the public web, including from “Russian social sites such as VKontakte.”

Mr. Ton-That decided to offer Clearview’s services to Ukraine for free, as reported earlier by Reuters. Now, less than a month later, the New York-based Clearview has created more than 200 accounts for users at five Ukrainian government agencies, which have conducted more than 5,000 searches. Clearview has also translated its app into Ukrainian.

“It’s been an honor to help Ukraine,” said Mr. Ton-That, who provided emails from officials from three agencies in Ukraine, confirming that they had used the tool. It has identified dead soldiers and prisoners of war, as well as travelers in the country, confirming the names on their official IDs. The fear of spies and saboteurs in the country has led to heightened paranoia.

According to one email, Ukraine’s national police obtained two photos of dead Russian soldiers, which have been viewed by The New York Times, on March 21. One dead man had identifying patches on his uniform, but the other did not, so the ministry ran his face through Clearview’s app…(More)”.

Researcher Helps Create Big Data ‘Early Alarm’ for Ukraine Abuses


Article by Chris Carroll: From searing images of civilians targeted by shelling to detailed accounts of sick children and their families fleeing nearby fighting to seek medical care, journalists have created a kaleidoscopic view of the suffering that has engulfed Ukraine since Russia invaded—but the news media can’t be everywhere.

Social media practically can be, however, and a University of Maryland researcher is part of a U.S.-Ukrainian multi-institutional team that’s harvesting data from Twitter and analyzing it with machine-learning algorithms. The result is a real-time system that provides a running account of what people in Ukraine are facing, constructed from their own accounts.

The project, Data for Ukraine, has been running for about three weeks, and has shown itself able to surface important events a few hours ahead of Western or even Ukrainian media sources. It focuses on four areas: humanitarian needs, displaced people, civilian resistance and human rights violations. In addition to simply showing spikes of credible tweets about certain subjects the team is tracking, the system also geolocates tweets—essentially mapping where events take place.

“It’s an early alarm system for human rights abuses,” said Ernesto Calvo, professor of government and politics and director of UMD’s Inter-Disciplinary Lab for Computational Social Science. “For it to work, we need to know two basic things: what is happening or being reported, and who is reporting those things.”

Calvo and his lab focus on the second of those two requirements, and constructed a “community detection” system to identify key nodes of Twitter users from which to use data. Other team members with expertise in Ukrainian society and politics spotted him a list of about 400 verified users who actively tweet on relevant topics. Then Calvo, who honed his approach analyzing social media from political and environmental crises in Latin America, and his team expanded and deepened the collection, drawing on connections and followers of the initial list so that millions of tweets per day now feed the system.

Nearly half of the captured tweets are in Ukrainian, 30% are in English and 20% are in Russian. Knowing who to exclude—accounts started the day before the invasion, for instance, or with few long-term connections—is key, Calvo said…(More)”.

Ukraine shows us the power of the 21st Century Citizen


Essay by Matt Leighninger: “This is a new kind of war, waged by a new kind of citizen.

The failure of the Russian forces to subdue Ukraine quickly has astonished experts, officials, and journalists worldwide. It shouldn’t. The Ukrainian resistance is just the latest example of the new attitudes and abilities of 21st century citizens.

While social media has been getting a lot of attention in this “TikTok War,” the real story is the growing determination and capacity of ordinary people. Around the world, ordinary people are fundamentally different from people of generations past. They have dramatically higher levels of education, far less deference to authority figures, and much greater facility with technology.

These trends have changed citizenship itself. We need to understand this shift so that societies, especially democratic ones, can figure out how to adapt, both in war and peace.

The war in Ukraine is instructive, in at least four ways.

First, citizens now have the ability to make their own media; Ukrainians, under attack, are mass-producing reality TV. Thanks to footage produced by thousands of people and viewed by millions, the war has a constantly unfolding cast of characters. Ukrainian farmers towing Russian vehicles, a soldier moonwalking in a field, people joyriding on a captured Russian tank, and a little girl singing “Let It Go” in a Kiev bomb shelter have become relatable, inspiring figures in the conflict. Seemingly every time Ukrainians have success on the battlefield, they upload videos of burned tanks and downed planes…(More)”.

How Do We End Wars? A Peace Researcher Puts Forward Some Innovative Approaches


Interview by Theodor Schaarschmidt: “Thania Paffenholz is an expert in international relations, based in Switzerland and Kenya, who conducts research on sustainable peace processes and advises institutions such as the United Nations, the European Union and the Organization for Security and Co-operation in Europe (OSCE). She is executive director of Inclusive Peace, a think tank that accompanies peace processes worldwide. Paffenholz talked with Spektrum der Wissenschaftthe German-language edition of Scientific American, about new ways to think about peacekeeping…

It is absurd that the fate of the country is mainly discussed by men older than 60, as is usual in this type of negotiation. Where is the rest of the population? What about women? What about younger people? Do they really want the same things as those in power? How can their perspectives be carried into the peace processes? There are now concepts for inclusive negotiation in which delegations from civil society discuss issues together with the leaders. In Eastern Europe, however, there are only a few examples of this….(More)”.

The New Fire: War, Peace, and Democracy in the Age of AI


Book by Ben Buchanan and Andrew Imbrie: “Artificial intelligence is revolutionizing the modern world. It is ubiquitous—in our homes and offices, in the present and most certainly in the future. Today, we encounter AI as our distant ancestors once encountered fire. If we manage AI well, it will become a force for good, lighting the way to many transformative inventions. If we deploy it thoughtlessly, it will advance beyond our control. If we wield it for destruction, it will fan the flames of a new kind of war, one that holds democracy in the balance. As AI policy experts Ben Buchanan and Andrew Imbrie show in The New Fire, few choices are more urgent—or more fascinating—than how we harness this technology and for what purpose.

The new fire has three sparks: data, algorithms, and computing power. These components fuel viral disinformation campaigns, new hacking tools, and military weapons that once seemed like science fiction. To autocrats, AI offers the prospect of centralized control at home and asymmetric advantages in combat. It is easy to assume that democracies, bound by ethical constraints and disjointed in their approach, will be unable to keep up. But such a dystopia is hardly preordained. Combining an incisive understanding of technology with shrewd geopolitical analysis, Buchanan and Imbrie show how AI can work for democracy. With the right approach, technology need not favor tyranny…(More)”.

Amateur open-source researchers went viral unpacking the war in Ukraine


Article by Meaghan Tobin: “Under the pseudonym Intel Crab, University of Alabama sophomore Justin Peden has become an unlikely source of information about the unfolding Ukraine-Russia war. From his dorm room, the 20-year-old sifts through satellite images, TikTok videos, and security feeds, sharing findings like troop movements and aircraft models with more than 220,000 followers on Twitter. Peden said that his posts have reached 20 million people and his follower count has increased by over 50,000 people over the past month, according to his Twitter analytics.

Today, Peden is one of the most prominent open-source intelligence (OSINT) figures on Twitter. 

According to analysts, OSINT researchers have existed on the fringes of conflicts since at least 2014, working collaboratively across the world to comb through freely available resources like Google Maps and the satellite imagery service Maxar Technologies. They publicly conduct the type of work that intelligence agencies do behind closed doors. 

As Russia continues its invasion of Ukraine, amateur OSINT researchers have gained a particular mainstream traction. Specialized social media accounts on Twitter, like Intel Crab, Calibre Obscura, and Aurora Intel, have transfixed an information-hungry public with an analysis of key movements in Russia’s invasion, using newly available technologies to provide real-time analysis of key activities, like the supposed withdrawal of Russian troops along the Ukrainian border or the 40-mile Russian convoy outside of Ukraine’s capital, Kyiv….(More)”.

Archivists Make Sure the Internet Doesn’t Forget Russia’s War on Ukraine


Karl Bode at VICE: “As the Russian invasion of Ukraine accelerates, professional and hobbyist archivists alike are rushing to preserve Ukraine’s online history, cataloging and storing everything from Ukrainian government and university websites, to the torrent of news and social media posts related to the accelerating conflict.

The Internet Archive has been archiving the broader conflict in Ukraine since 2014. But as Ukraine government websites face prolonged outages due to sustained cyber attack—as well as the looming risk of defacement or deletion—the organization has taken on another monumental task: backing up the entirety of the Ukrainian Internet.

Using the crowdsourced auto-archiving software running on a virtual machine they’ve dubbed Archive Team Warrior, the organization has leveraged volunteers around the world, many of whom have donated countless terabytes of storage capacity for the project. These volunteers have been steadily backing up the Ukrainian Internet since before the war began.

All told, 68 million items (web pages, documents, and other files) comprising more than 2.5 TB of data have already been hoovered up from various websites across the .ua top level Ukrainian domain. A second project dubbed Ukr-net aims to preserve tens of millions of additional items and terabytes of additional data across the Ukrainian Internet.

Elsewhere, organizations like the Center For Information Resilience have built a crowdsourced map attempting to document every single war-related post to social media made in the region, ranging from civilian photos of the movement of heavy Russian weaponry, to Ukranian government claims of alleged bombing raids on kindergardens…(More)”.

Ukraine prepares to remove data from Russia’s reach


Article by Eric Geller: “Ukraine’s government is preparing to wipe its computer servers and transfer its sensitive data out of Kyiv if Russian troops move to seize the capital, a senior Ukrainian cyber officialsaid Tuesday.

The worst-case contingency planning addresses an unintended consequence of a security measure the government took in 2014, when it began centralizing its computer systems after Russia and pro-Moscow separatists seized control of Crimea and the Donbas region.

That measure made it harder for Russian hackers to penetrate computers that store critical data and provide services such as pension benefits, or to use formerly government-run networks in the occupied territories to launch cyberattacks on Kyiv. But it’s also created a tempting target in the capital for Russia’s military, which has begun moving into separatist-controlled territories of eastern Ukraine.

Seizing Ukraine’s computer networks intact would give Moscow not only troves of classified documents but also detailed information about the population under its control. So Ukrainian President Volodymyr Zelenskyy’s administration says it isn’t taking any chances.

“We have plans and we have scenarios,” Victor Zhora, the deputy chief of Ukraine’s State Service of Special Communications and Information Protection, said in an interview from Kyiv. “We can move to new locations, we can save data and we can delete data and prevent capturing all this data,” even if Russian forces take control of the government’s offices….(More)”

Technology is revolutionizing how intelligence is gathered and analyzed – and opening a window onto Russian military activity around Ukraine


Craig Nazareth at The Conversation: “…Through information captured by commercial companies and individuals, the realities of Russia’s military posturing are accessible to anyone via internet search or news feed. Commercial imaging companies are posting up-to-the-minute, geographically precise images of Russia’s military forces. Several news agencies are regularly monitoring and reporting on the situation. TikTok users are posting video of Russian military equipment on rail cars allegedly on their way to augment forces already in position around Ukraine. And internet sleuths are tracking this flow of information.

This democratization of intelligence collection in most cases is a boon for intelligence professionals. Government analysts are filling the need for intelligence assessments using information sourced from across the internet instead of primarily relying on classified systems or expensive sensors high in the sky or arrayed on the planet.

However, sifting through terabytes of publicly available data for relevant information is difficult. Knowing that much of the data could be intentionally manipulated to deceive complicates the task.

Enter the practice of open-source intelligence. The U.S. director of national intelligence defines Open-Source Intelligence, or OSINT, as the collection, evaluation and analysis of publicly available information. The information sources include news reports, social media posts, YouTube videos and satellite imagery from commercial satellite operators.

OSINT communities and government agencies have developed best practices for OSINT, and there are numerous free tools. Analysts can use the tools to develop network charts of, for example, criminal organizations by scouring publicly available financial records for criminal activity.

Private investigators are using OSINT methods to support law enforcement, corporate and government needs. Armchair sleuths have used OSINT to expose corruption and criminal activity to authorities. In short, the majority of intelligence needs can be met through OSINT…

Even with OSINT best practices and tools, OSINT contributes to the information overload intelligence analysts have to contend with. The intelligence analyst is typically in a reactive mode trying to make sense of a constant stream of ambiguous raw data and information.

Machine learning, a set of techniques that allows computers to identify patterns in large amounts of data, is proving invaluable for processing OSINT information, particularly photos and videos. Computers are much faster at sifting through large datasets, so adopting machine learning tools and techniques to optimize the OSINT process is a necessity.

Identifying patterns makes it possible for computers to evaluate information for deception and credibility and predict future trends. For example, machine learning can be used to help determine whether information was produced by a human or by a bot or other computer program and whether a piece of data is authentic or fraudulent…(More)”.