Election manipulation
#4n6strider

Election manipulation

Introductory picture {Picture 0} below shows grouped website scan of Government of the Country.

Various websites, linked to each other as every department is linked to one big picture, right?

Stay tuned!

In study below I have crawled top 10 of seemingly unrelated websites, known as suspect from close cooperation to reach certain foreign political interests.

The purpose of their existence is to spread disinformation and manipulate opinion of the public.

It is more than 600 thousands of links, yet they are connected to the several red dots in the center. These red dots do not represent any individuals, only another internet Entity, not disclosed on purpose.

{Picture 1: Scan of manipulative website reveals that they are actually handled by one Entity.}

Below is example of semantic separation of two different political (website) parties. As they are not lead by the same Entity, they are separated.

The lonely nodes are just signs that websites are poor quality and a bit broken. This might give some space to the hacktivists.

{Picture 2: This scan shows, how website of parties from opposite sides of political spectra are separated, as expected. It is red vs white.}

As effect of this hoaxes, fake news and propaganda issued by the Entity, the possible centers of so called radicalization of citizens already occurred.

{Picture 3: Website of self inflicted homeland security group, residing in all districts of the Country.}


Goal of this study is to show examples, how exploratory data analysis and visualization can help with non IT – related topic as well.

In this particular case, this is regularly being analysed by any Country’ s Intelligence agency, which is obligated to report the issues to the Prime minister / Government.

I do not mean to trigger discussion as a conspirator. Thus I have not disclosed which Country this is about, or which website were scanned.

Jindrich Karasek

Cyber Threat & Defence Research, AI & Cognitive Security, DFIR, speaker, mentor, TI Associate, Views are my own.

7 年
回复

要查看或添加评论,请登录

Jindrich Karasek的更多文章

  • Enhancing Defenses Against Cognitive Warfare through Cyber Threat Hunting, OSINT, and Ethical Hacking

    Enhancing Defenses Against Cognitive Warfare through Cyber Threat Hunting, OSINT, and Ethical Hacking

    {Consider this text as my public research notes, that I am building on while doing presentations, case studies, spot…

    2 条评论
  • A phishing story

    A phishing story

    Phishing threat is still valid and it remains the most prevalent way how the attacker get into the enterprise…

  • RansomWare data mining

    RansomWare data mining

    Recently, I did small research regarding how many different ransomware is found in the wild. Point was to check, if…

  • Penetration test of Mobile devices WiFi

    Penetration test of Mobile devices WiFi

    Do you have a cellphone always connected to the internet? Do you connect to every public WiFi available? In article…

  • Let′s spy on malicious hackers!

    Let′s spy on malicious hackers!

    Lets spy on malicious hackers! On my website: https://4n6strider.it I reveal the hypothetical structure of a SIEM…

    3 条评论
  • Knowledge Management

    Knowledge Management

    The training is crucial part of every company' s security policy. There is an analysis below of a "Knowledge…

    1 条评论
  • Nmap on Twitter

    Nmap on Twitter

    This is only small post, an appetizer generated during processing, I will add more details in future on my website…

    2 条评论
  • A Botnet was using DNS tunneling for its C&C operations

    A Botnet was using DNS tunneling for its C&C operations

    Another great example of contribution of big data analysis to IT Security operations. Data were collected by using a…

    2 条评论
  • My own social network - hackers would love to do this.

    My own social network - hackers would love to do this.

    One of the good use cases for so called "big data" approach is modeling of private social network. Same of course…

  • IT Security meets Data Science

    IT Security meets Data Science

    Quote: The purpose of abstraction: “Is not to be vague but to create a new semantic level on which one can be…

社区洞察

其他会员也浏览了