The Social Media Crime Fighters at FireEye Are Helping Facebook Find Fake Accounts

FireEye helped Facebook identify fake accounts with subversive international agendas. Here’s how.

Above: These two accounts often tweet the same content. They were created the same month and are linked to Iranian phone numbers. “Roza’s” profile picture is from a hairstyle website.

POPULAR MECHANICS: When you’re looking for foreign influence campaigns, where do you start?

LEE FOSTER: Forensic indicators. There’s the content-related side, where we’ll see something like internet accounts pretending to be Americans who are heavily promoting the Russian TV news channel RT or news agency Sputnik articles to U.S. audiences. There’s subversive activity there. Once, we observed social media personas masquerading as American liberals supportive of Senator Bernie Sanders heavily promoting Quds Day, a holiday established in Iran in 1979 to express support for Palestinians and opposition to Israel.

PM: How do you know those aren’t just Americans with an affection for Iranian holidays?

LF: There are other indicators, including registration history overlaps between inauthentic new sites and previous websites that originated in Iran and use the Persian language. Some sites share email registration histories. One, Liberty Front Press, had a registration email that appeared on advertisements for website designers based in Tehran. A number of the Twitter accounts we found affiliated with the inauthentic news sites were registered using Iranian phone numbers. None of these things on their own would be particularly conclusive, but when you bring them all together, you start to whittle down the list of possible alternative explanations.


PM: What kind of steps do information campaigns use to cover their tracks?

LF: Operators use VPNs [virtual private networks] to mask their true locations, even to the point where it makes it look like it’s coming from another country, in a way that some observers might try to blame that innocent third party as being responsible. These fake accounts appropriate some real person’s picture online. If you do a simple reverse image search, you’ll find the original account that owns it. Some hackers slightly alter the image so that when you do a reverse image search, it can’t pick up the original picture.

PM: Are there any signs of these campaigns slowing as they’re discovered?

LF: It’s not going away. This is a type of activity that is appealing to multiple actors. It has relatively low barriers to entry to successfully implement. We know how quickly the field of artificially generated videos, deep fakes, and voice mimicking is progressing. And we could start seeing operations that incorporate fake videos, or fake audio leaks, that sound or look just like a politician saying something.

This appears in the November 2018 issue.


Leave a Reply

Your email address will not be published. Required fields are marked *