The need to protect the internet from ‘astroturfing’ grows ever more urgent

Guardian
23.02.2011
By George Monbiot

The tobacco industry does it, the US Air Force clearly wants to … astroturfing – the use of sophisticated software to drown out real people on web forums – is on the rise. How do we stop it?

Every month more evidence piles up, suggesting that online comment threads and forums are being hijacked by people who aren’t what they seem.

After I wrote about online astroturfing in December, I was contacted by a whistleblower. He was part of a commercial team employed to infest internet forums and comment threads on behalf of corporate clients, promoting their causes and arguing with anyone who opposed them.

Like the other members of the team, he posed as a disinterested member of the public. Or, to be more accurate, as a crowd of disinterested members of the public: he used 70 personas, both to avoid detection and to create the impression there was widespread support for his pro-corporate arguments. I’ll reveal more about what he told me when I’ve finished the investigation I’m working on.

It now seems that these operations are more widespread, more sophisticated and more automated than most of us had guessed. Emails obtained by political hackers from a US cyber-security firm called HBGary Federal suggest that a remarkable technological armoury is being deployed to drown out the voices of real people.

As the Daily Kos has reported, the emails show that:

• Companies now use “persona management software”, which multiplies the efforts of each astroturfer, creating the impression that there’s major support for what a corporation or government is trying to do.

• This software creates all the online furniture a real person would possess: a name, email accounts, web pages and social media. In other words, it automatically generates what look like authentic profiles, making it hard to tell the difference between a virtual robot and a real commentator.

• Fake accounts can be kept updated by automatically reposting or linking to content generated elsewhere, reinforcing the impression that the account holders are real and active.

• Human astroturfers can then be assigned these “pre-aged” accounts to create a back story, suggesting that they’ve been busy linking and retweeting for months. No one would suspect that they came onto the scene for the first time a moment ago, for the sole purpose of attacking an article on climate science or arguing against new controls on salt in junk food.

• With some clever use of social media, astroturfers can, in the security firm’s words, “make it appear as if a persona was actually at a conference and introduce himself/herself to key individuals as part of the exercise … There are a variety of social media tricks we can use to add a level of realness to fictitious personas.”

Perhaps the most disturbing revelation is this. The US Air Force has been tendering for companies to supply it with persona management software, which will perform the following tasks:

a. Create “10 personas per user, replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent … Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms.”

b. Automatically provide its astroturfers with “randomly selected IP addresses through which they can access the internet” (an IP address is the number which identifies someone’s computer), and these are to be changed every day, “hiding the existence of the operation”. The software should also mix up the astroturfers’ web traffic with “traffic from multitudes of users from outside the organisation. This traffic blending provides excellent cover and powerful deniability.”

c. Create “static IP addresses” for each persona, enabling different astroturfers “to look like the same person over time”. It should also allow “organisations that frequent same site/service often to easily switch IP addresses to look like ordinary users as opposed to one organisation.”

Full article

Related:

Critics slam feds for ‘unprecedented’ domain seizure

Stuxnet: Cyber attack on Iran ‘was carried out by Western powers and Israel’

UN mulls internet regulation options

US studying Australian Internet security program

End of Nations - EU Takeover and the Lisbon Treaty