Monday, November 20, 2023

Recent Technological Developments Relevant to Espionage and Information Warfare

Introduction

In Qiao Liang and Wang Xiangsui’s “Unrestricted Warfare,” written in 1995, they describe how militarily and politically weak Communist China can triumph over a stronger power such as the United States. They do this by using an extremely broad concept of weaponry, to wit: "Everything that can benefit mankind can also harm him. This is to say that there is nothing in this world that cannot become a weapon.” They go on to give examples of these new types of weapons: stock-market crashes, computer viruses, and rumors or scandals on the Internet. They argue that four fundamental elements of war - soldiers, weapons, battlefield, and purpose – “have changed so that it is impossible to get a firm grip on them. When that day comes, is the war god’s face still distinct?” (Liang, Q. & Xiangsui, 2015).

This paper examines two examples of this expanded type of weapon: a Russian troll farm called the Internet Research Agency used to create dissent and conflict within the United States, and social network analysis and graph databases that could be used to track employees and recruit assets from inside Iran’s Natanz Uranium Enrichment Facility.

 

The Internet Research Agency

The Internet Research Agency was a Russian company operating from July 2013 to July 2023 that maintained social media accounts for the purpose of spreading propaganda, altering public opinion, and sowing dissent. It was owned and financed by Yevgeny Prigozhin of Wagner Company fame (Volchek, 2021) and was used to influence European public opinion of Ukraine and the upcoming invasions. In the United States, the IRA’s purpose was to influence social media with the goal of eroding trust in American media organizations, spreading distrust in American politicians and political parties, and generally to inflame tensions.

The IRA created user accounts and various Facebook groups with titles such as "Heart of Texas," "United Muslims of America," "Being Patriotic," "LGBT United," "Don't Shoot," "Blacktivist," "BlackMattersUS," and "SecuredBorders", among others. The IRA then used these groups to organize protests or even dueling protests/counterprotests including:

  • A Black Lives Matter protest (not organized by IRA) and a Blue Lives Matter counterprotest (that was organized using the "Heart of Texas" group) held in Dallas, Texas, on 10 July 2016.
  • A "Safe Space for Muslim Neighborhood" rally in Washington, D.C., on 3 September 2016 was organized using the "United Muslims of America" group.
  • As mentioned in Zegart (2022), the "Heart of Texas" and "United Muslims of America" Facebook groups were used to organize dueling protests on 21 May 2016 in Houston, Texas.
  • "BlackMattersUS" and "United Muslims of America" groups were used to organize anti-Trump protests.
  • The "Being Patriotic" group was used to organize multiple pro-Trump rallies throughout Florida.
  • "United Muslims of America" was used to organize the "Support Hillary, Save American Muslims" rally.
  • A vigil for the Pulse nightclub shooting victims was organized using the "LGBT United" group.
  • Etc.

The supposed ultimate goal of the IRA in the United States was to influence the 2016 election. While this may be true, supporters of this supposition make several assumptions that must be explicitly stated:

  • Social media platforms allow anyone to create groups and use them to organize meetings and protests.
  • For each group IRA created, numerous non-IRA groups with the same concerns existed.
  • It is likely that the IRA groups were used by Americans for our own purposes, e.g. to schedule our own rallies.
  • The influence of the IRA was small in comparison to the biases enforced by various social media companies.
  • The various problems the IRA supposedly tried to inflame were already concerns for multiple decades, including:
    • The growing influence of Islam and other foreign cultures.
    • Illegal immigration.
    • Fear of government overreach and doubts of its legitimacy.
    • Contempt of elected officials and other government employees.
    • Contempt that elected officials and other government employees have of their constituents.
    • Doubts about the intentions of US intelligence agencies.
    • Distrust of traditional and social media outlets.
  • For people concerned about those problems, the IRA was doing nothing but "preaching to the choir."

For those of us who already distrust mainstream media, it is not clear if the IRA had any influence on us, since we rely on other methods for gathering information and arriving at conclusions (multiple alternative news sources, discourse and debate, historical reference, plausibility, consistency, evidence of the senses, correspondence with reality). Further, the ultimate responsibility for an individual's beliefs and actions lies with himself, despite the "NPC" (non-player character) description that is often applied to those that continue to trust media and government.

This does not mean that the IRA did not have an impact: the Mueller Investigation lasted from May 2017 to March 2019, and though the final report of the Investigation "did not establish that members of the Trump campaign conspired or coordinated with the Russian government in its election interference activities" (Mueller, 2019), the pretext for the investigation was used by various politicians, government employees, and media outlets to foment dissent on their own. This wasn't obviously a part of the IRA's plan, but it was certainly an example of how certain politicians and news agencies are willing to create a tragedy so as not to let it go to waste. Was it an unintended consequence?

 

An Emerging Technology Useful for Espionage

An emerging technology that is useful for espionage is the field of social network analysis with the support of graph database technology.

Traditional relational databases store data in one or more tables, and each table consists of rows (records) and columns (fields). Graph databases store data in nodes (also called vertices) and edges (lines or arrows connecting nodes). (Robinson, et. al., 2015) This organization is perfect for storing data about social networks.

[Illustration comparing data organization in relational vs graph databases]

What the nodes and edges in a graph DB represent depend on the application. For example:

  • For navigation, the nodes can be cities and the edges can be roads.
  • For an e-commerce recommendation engine, the nodes can represent products and two products are connected by a directed edge if a customer who purchases one product is likely to purchase the other.
  • The nodes can be people and the edges can be various types of relationships (familial, coworker, etc.)

Nodes do not need to be all the same type: one type of node can represent people, and a second type can represent organizations, and an edge connects a person-node to an organization-node when that person is a member of that organization. Similarly, there can be different kinds of edges: besides the membership-edge, there can also be familial-relationship edges linking two people who are of the same family.

By itself, a graph database is useless without a source of data. For social network analysis, populating a graph DB usually involves manually entering specifically chosen people or organizations to seed the graph DB, then augmenting that with data pulled from social media sites.

The investigative applications include:

  • The process of “doxxing” was studied using graph DBs in (Lee, 2022).
  • Relationships between Antifa, journalists, and university professors were investigated in (Lenihan, 2022).
If Antifa were to be designated a criminal organization, graph databases would be immensely useful for investigating that organization. (Jaccourd, et. al., 2023).

 

The Definition of "Importance" in Graph Databases

For sake of discussion, suppose we are investigating terrorism, and the nodes in our graph DB represent individual terrorists or terrorist organizations, and edges between those two types of nodes represents membership. We also assume that terrorists can be linked with an edge if they are of the same family.

Once our database is populated with terrorists, organizations, and the relationships between them, how do we extract information from all that data? The most obvious approach is to pick a target (a known terrorist), and then investigate all the people related to that target and all the groups (terrorist organizations) to which that target belongs. There are situations where this approach is applicable (like should a terrorist be captured), but in general this approach begs the question: how is a target of interest chosen? This is not a trivial question since there may be tens of thousands of terrorists in our graph database.

This problem - determining which nodes (terrorists or organizations) are most important or influential - is solved in various ways through what are called "measures of centrality." There are numerous measures of centrality, the most basic one being "degree centrality" - the nodes with the most edges are most important, i.e. the terrorists with the most connections to other terrorists or terrorist organizations are most influential.

A different measure that is perhaps more useful is "betweenness centrality". This involves finding the shortest path between all distinct pairs of nodes and counting the number of these shortest paths that pass-through a given node. The nodes with the highest betweenness centrality can be thought as the ones through which the most information passes.

In terms of espionage, it would then make sense to prioritize intelligence-gathering on terrorists with the highest betweenness centrality, since the most information would pass through those terrorists. In terms of counterterrorism, eliminating a terrorist with a high betweenness centrality would cause the most disruption in information flow.

An example of this kind of social network analysis was performed independently by Kieran Healy (Healy, 2013) and Shin-Kap Han (Han, 2009) using data found in David Hackett Fischer's "Paul Revere's Ride" (Fischer, 1995). Fischer includes data on 254 individuals involved in the American Revolution (among them John Adams, Samuel Adams, and Paul Revere) and their memberships in seven Whig groups, including the Tea Party and the London Enemies. Using only this data, it is possible to determine:

  • the number of groups to which any pair of people both belonged (for example, John Adams and Sam Adams both belonged to two groups)
  • the number of people any pair of organizations have in common (the Tea Party and the London Enemies had 10 people in common).

Notice that the starting data (membership lists for the organizations) did not include data about which individuals knew each other, but a social network can be derived from the membership lists - two individuals are related if they share membership in an organization. (Breiger, 1974).

[Illustration from (Healy, 2013)]

Centrality measures can then be calculated on that social network. Healy and Shin-Kap Han found that Paul Revere has the highest betweenness centrality of the 254 individuals and ranks high in several other centrality measures. Shin-Kap Han describes Revere's role as a "broker" between not only the people in Fischer's analysis but also between the various classes - artisans and gentlemen, patricians and plebeians, and to make the American Revolution a success, for those people,

"both the identities and interests needed to be articulated and organized as in any effort at extensive, robust, and sustained mobilization. For that, the movement needed men whose socioeconomic status and cultural outlook allowed them to move among the various ranks of society. As a man whose contacts reached deep and wide into the social and political networks, Revere was one of the few who were comfortable in all of these places, each of which became an important part of Boston’s revolutionary movement." (Han, 2009).

 

Past, Present, and Emerging Technologies for Espionage

Past and current espionage-related methodologies and technologies could be used to recruit individuals working inside Iran's Natanz nuclear facility. For example, wiretapping could have been used to monitor the telephone calls of employees of that facility, and from the conversations, potential assets could be chosen. This would have worked before calls were encrypted. Combining satellite photographs with on-the-ground presence, individuals working in the facility can be identified, traced, appraised, and recruited. Realtime satellite imaging may not be needed, but considerable collaboration between satellite reconnaissance teams and in-person reconnaissance would be necessary.

Another current technology that is applicable are mobile applications such as TikTok, Facebook/Meta, etc. These applications track the user's location, the people the user interacts with, and can be used to build a psychological profile of the user. Further, by manipulating the popular trends displayed by those apps, the companies owning these applications can attempt to influence user opinions.

Can social network analysis be used to recruit an individual working inside a highly secure location, like the Natanz facility? Natanz employees may not be allowed to have applications such as TicTok on their phones. All hope is not lost, however... As described above, Kieran Healy and Shin-Kap Han were able to build a social network using only a list of names and membership lists for organizations – they built a social network using data that predated social network analysis by centuries! The same can be done today, and examples of the organizations that would be helpful in the case of the Natanz facility include:

  • Universities, for their graduation lists and list of faculty members
  • Mosques
  • Fraternal organizations

Additional sources of information include marriage announcements, graduation announcements, flight logs, and so on.

 

Conclusion

These two examples of contemporary espionage technology – troll farms and social network analysis – represent two examples of the new types of weapons envisioned by Liang and Xiangsui. The Internet Research Agency was effective (in some way) in spreading dissent in the U.S., though they were dwarfed by the attempts at manipulation and “nudging” used by social media companies. Social network analysis would certainly be useful for investigating the operations of criminal organizations and should also be relevant for identifying intelligence assets and evaluating the importance of individuals in facilities like the Natanz Uranium Enrichment Facility.

 

References

Breiger, R. (1974). The duality of persons and groups. Social Forces 53(2)
Retrieved from: https://pdodds.w3.uvm.edu/research/papers/others/1974/breiger1974a.pdf

Fischer, D. H. (1995). Paul Revere’s ride. Oxford University Press.

Han, S-K. (2009). The other ride of Paul Revere: The brokerage role in the making of the American Revolution. Mobilization: An International Quarterly 14(2): 143-162
Retrieved from: https://www.sscnet.ucla.edu/polisci/faculty/chwe/ps269/han.pdf

Healy, K. (2013). Using metadada to find Paul Revere.
Retrieved from: https://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/

Jaccourd, L., Molnar, L., & Abei, M. (2023) Antifa's political violence on Twitter: A grounded theory approach. European Journal on Criminal Policy and Research. 29, 495-513 (2023)
Retrieved from: https://link.springer.com/article/10.1007/s10610-023-09558-6

Lee, Carmen. (2022). Doxxing as discursive action in a social movement. Critical Discourse Studies, 19:3, 326-344, DOI: 10.1080/17405904.2020.1852093

Lenihan, E. (2022). A classification of Antifa Twitter accounts based on social network mapping and linguistic analysis. Social Network Analysis and Mining (2022) 12:12
https://doi.org/10.1007/s13278-021-00847-8
Retrieved from: https://link.springer.com/epdf/10.1007/s13278-021-00847-8

Liang, Q., Xiangsui, W. (tr. 2015). Unrestricted warfare. Echo Point Books & Media.

Mueller, R. S. (2019) Report on the investigation into Russian interference in the 2016 Presidential Election. U.S. Department of Justice.

Robinson, I., Webber, J., Eifrem, E. (2015). Graph databases: New opportunities for connected data. 2nd Edition. O'Reilly Media.
Retrieved from: https://web4.ensiie.fr/~stefania.dumbrava/OReilly_Graph_Databases.pdf

Volchek, D. (2021). Inside the ‘propaganda kitchen’ – A former Russian ‘troll factory’ employee speaks out. Radio Free Europe/RadioLiberty.
Retrieved from: https://www.rferl.org/a/russian-troll-factory-hacking/31076160.html

Zegart, A. (2022). Spies, lies, and algorithms: The history and future of American Intelligence. Princeton University Press.

Wednesday, November 8, 2023

Young Faucistein

Dr. Anthony Faucistein’s area of research was… strange. Some of his fellow researchers considered him to be a mad genius, but most thought he was just mad. He only just received his doctorate last year, late in 1993, and he was eager to blind, or stop, the world with his intellect.

His research focused on answering the following question: “can a person’s sexual orientation be changed by grafting-on a body part?”

“We’ll need a recently deceased gay man, and a straight man who has been dismembered,” his new assistant said. “But what idiots would fund it?”

“The idiots at the NIH, that’s who. We’ve been funded for 5 years!” Faucistein gushed in his thick Boston accent. His large glasses fogged over for a moment.

“How did you spin it, doc?”

“I had them classify it as ‘gain of function’ research! They really are idiots!”

“Gain of… function?”

“Yes - we’ll be taking a straight man and turning him bi, or maybe even gay. See? Gain of function!” The doctor and his assistant high-fived each other. Dr. Faucistein raised his noodle-thin arms triumphantly and shouted “I… AM… THE… SCIENCE™!!” pronouncing “science” as “SOYence.”

They didn’t have to wait long for the “source material.” A gay mass-murderer named Jeffrey Dahmer, while serving 16 terms of life imprisonment, was killed by his cell mate. “The body is being flown in from Wisconsin”, the doc told his assistant, pronouncing it “WisCONNsin.”

On almost the same day, a young bon vivant named Jay Gatsby lost his hand in a car accident. He was driving his dad’s DeLorean on the freeway when he crashed into the berm. The prostitute he had in the car was providing “personal service.” If it wasn’t for that prostitute - or more specifically that prostitute’s head - the steering column would have gone through his abdomen. Instead, the column took off his right hand, the hand he was using to keep the prostitute’s head in position.

“Perfect!” Dr Faucistein exclaimed on learning this. He quickly scheduled an operating theater. Dr. Faucistein loves theater.


In the operating room, Gatsby was under general anesthesia. All the doctors and technicians were wearing masks. Except for Dr. Faucistein, who wore two.

The assistant carried a large flask containing Dahmer’s right hand into the operating room.

“Are you sure you got the correct donor?” Faucistein asked.

“No, the hand came from somebody named ‘Abbey Normal.’” Faucistein rolled his eyes.

The operation went smooth. After it was finished, Faucistein and his assistant looked at the patient, still unconscious.

“He’s so light and thin, you’d think he would be gay if you didn’t know him,” Faucistein said.

“You’d think he’s gay even if you did know him!”

The anesthesia was wearing off, and Gatsby started to stir. Faucistein rushed from the patient’s room, and his assistant followed. “Don’t you want to talk to him?”

“Listen,” Faucistein told his assistant, “I must observe Mr. Gatsby to see how our experiment is proceeding, so he must never know I performed the operation. Check in with him on a weekly basis. Ask him about his overall health as well as any unusual dreams or urges he’s had.”

Following his release, Gatsby spent the next several weeks recuperating at his parents’ home, mostly lying in bed, mostly watching TV, or reading the newspaper.

Every few days, Gatsby would read a headline titled something like “Rent Boy Strangled” or “Gay Man Killed” or “Another Hate Crime”. Gatsby read the stories, mostly out of boredom. In each case, the victim’s own semen was found on his clothes. And in each story, the coroner was quoted as saying “he was strangled, but he died with a smile on his face.”


During one of the first calls, Gatsby told the assistant, “I decided to redecorate my house - the upholsterers will be here next Monday.”

In a later call, the assistant inquired if Gatsby was having any dreams.

Gatsby was quick to respond: “I had the most horrible nightmare - I dreamt that my new hand detached itself!”

“Dismemberment nightmares are common with patients who have lost a limb. I don’t think the dreams will ever go away, at least in your case, but you’ll find them less intrusive as time goes on.”

The following week, the assistant asked, “have you had any more of those dismemberment dreams?”

“Yes, almost every night. And you’re right, they’re not stressful anymore. In fact, I can even see my right hand crawling behind seedy restaurants. But that’s impossible!”

The evening news lead with a story about a gay man whose body was found behind a diner, strangled. According to the police report, the victim’s pants were covered with his own semen. The reporter concluded by looking solemnly at the camera and saying, “at least he died with a smile on his face.”


It was Friday afternoon at 4:30 PM. The phone next to his bed rang, just as it always did on that day and time. Gatsby answered it, knowing it would be the assistant.

“How are you feeling, Mr. Gatsby?”

“Well, I have this strange desire to go to the gym. I’ve never been to the gym in my life, but for some reason I think I’ll have a religious experience there! Isn’t that weird?”

“Not at all - many people think that the gym is the one true God. But why don’t you try something relaxing, like going to a bar? A new one just opened down the street from you, called ‘The White Swallow.’”

“Oh yea, it’s right between ‘Fudge Packers’ and ‘The Sausage Factory!’ I think I’ll do that!” Gatsby hung up the phone and examined his wardrobe - he knew he had too many sweaters, but where did all those leather jackets come from?

Meanwhile, the assistant called Dr. Faucistein and relayed Gatsby’s evening plans.

Gatsby arrived at The White Swallow at 8 PM. The bar was crowded, and he noticed that the patrons and bartenders were all men. He noticed, but he didn’t care. “How could it be any other way?” he thought.

Against one wall stood a water cooler filled with what looked like blue mouth wash. Gatsby was slightly confused by it, then he just shrugged.

Gatsby saw a short thin man sitting alone at the bar. He wore rather large glasses and was dressed in a lab coat. He was also wearing two blue paper masks. Gatsby noticed that Dr. Dress-Up was watching him, and when Faucistein realized he was caught, he switched all his attention to the open notebook and half-empty martini glass in front of him.

Gatsby didn’t have a medical fetish, but he realized that way too many people would tolerate or even enjoy being dominated by that little creep.

Gatsby continued to scan the crowd, and locked eyes with a pair of dark-haired muscular men. Both had identical handlebar mustaches and were wearing identical leather hats, leather harnesses, jock straps, and nothing else. All their leather was decorated with metal studs.

Gatsby approached them and introduced himself: “Hello, I’m Jay.”

“Hey, I’m Tom”. Tom looked Gatsby up and down.

“Hey, I’m Seth” Seth also looked Gatsby up and down.

“Are you two twins?”

“Na, why’d you ask” Tom replied.

“No reason.”

“Hey,” Seth said, “Tom and I are going to the bathroom. Want to join us?”

Tom explained: “there’s twelve open stalls. It’s hot.”

“It’s very hot,” Seth added.

“I’ve never done anything like that before!” Gatsby said, his voice breaking.

A waiter was walking close by, and Tom asked him for something. The waiter removed three small plastic vials from his waist apron pocket. “Don’t be a buzzkill. Here’s some poppers.” Tom passed out the vials. They all inhaled deeply and the three of them went into the men’s room.

Gatsby perceived the whole experience as if he were looking through a thick fog. In fact, he didn’t feel like he was all… together.

After leaving the bathroom, Gatsby understood the purpose of the mouth wash water cooler, and he used it.

Later that evening the police had to be called - a man was found dead in one of those stalls. He had red marks across his neck, a crusty white stain on his pants, and a big smile on his face.


The next weekend, Gatsby went back to the White Swallow, and decided to explore the basement, poppers in hand.

After spending some time there, Gatsby began to panic. He didn’t want to be a buzzkill, but it was all too much. He ran up the stairs, almost tripping over the mouth wash water cooler. He suppressed the urge to vomit, and pulled the oil covered, brown stained latex glove off his right hand, tossed it to the floor, and shuttered.

Gatsby looked at his right hand, aghast, and shouted: “How could you do that? I didn’t know a fist could go inside such a small hole?” He expected his right hand to answer him, but the hand was… just a hand. He unconsciously walked onto the dance floor and continued staring at his right hand.

Tom and Seth watched him. They were both wearing blue jeans, black leather jackets, with no shirts underneath.

Of course, Dr. Dress-Up was there, sitting at the bar, wearing his large glasses, his usual lab coat and two paper masks. This time, Faucistein made no effort to conceal the fact that he was closely observing Gatsby. He opened his notebook and began to quickly jot notes.

Gatsby continued to shout at his right hand: “We’re going to the hospital tomorrow, and I’m going to have you removed! I don’t need a right hand that bad!”

Gatsby suddenly lost control of his right arm, and his right hand grabbed his own throat and started squeezing, hard. He tried using his other hand to dislodge the mutinous appendage, but to no avail. He started gasping and was soon on his knees.

The dance music stopped, and the crowd stared at the choking man, standing 6 feet back.

Observing this, Tom said “autoerotic asphyxiation, that’s hot.”

Seth added, “that’s very hot.”

Gatsby soon collapsed on his side, dead.

His right hand casually detached itself from his arm and crawled in front of his face. The hand gave him the middle finger, then flicked Gatsby’s forehead with its index finger.

The hand then crawled across the dance floor and exited the building. It was almost as if the hand was strutting.

The patrons in The White Swallow watched all this in silence, slack jawed. After an awkward moment, the crowd gave a mighty “woo hoo!” Tom and Seth chest bumped like two drunk frat boys, and the loud dance music resumed.

Beneath his masks, Dr. Faucistein smiled. He neatly closed his notebook and put his pen in the lab coat’s breast pocket. He left the bar, wondering what other gain of function grants he could get.