vimarsana.com
Home
Live Updates
Transcripts For CSPAN3 George Washington University Discussi
Transcripts For CSPAN3 George Washington University Discussi
CSPAN3 George Washington University Discussion On Encryption Technology And... July 14, 2024
Morning and thank you all for coming on behalf of the director i would like to welcome you to
George Washington
university. Today we want to launch a reported two years in the making titled extremism inside the englishspeaking
Islamic State
because chamber. In many ways like i said at the culmination of two years of research with a cooperation with the library and the
Technology Group
researchers to my left have been collecting and coding more than 600kilogram channels for about a year so today we are going to dive into those findings which are available on the website. We have three panelists here a
Research Fellow
with the program who will talk about the first half of the report and follow closely by the president ial followed the program to talk about the remaining parts of the report and to the director at the
Mccain Institute
at the counterterrorism. We will do about 30 minutes presentation and then move to the question and answer. Please feel free to reach out some things are in order and to start off, staff starting from the top down to support the project from the first day of its inception and help us out through the various components thereafter. The rest of the program especially but was instrumental in helping us design the report and collect the data from the report and helping out the finished product as well as other colleagues who gave their insights and for the rest of the report which we are grateful for the scholarly
Technology Group
at the library as well as helping out with the tool used for this report and without further ado a background behind this report and the project behind it as was the major findings and then i will turn to for over to my wonderful coauthor to start off with folks that are less familiar it is an online instant messenger if youve used other platforms its very similar there were three major differences that are important looking at white groups and specific make use of this and first there are a variety of communication options between a handful of accounts as well as groups that include as many as 200,000 members additionally there are channels that broadcast an unlimited number of followers and in addition to the communications of others also internal filesharing. You can post an unlimited number of photos, videos, documents, audio files and voice recordings of the 1. 5 gigabytes of memory which is twice that offered by some
Major Social Media Companies
as well as other
Application Companies
and third that is most commonly brought up each of those levels of communications each have a different level of encryption to them but potentially more importantly each channel or group can have a private auction being it can only be accessed and public auction that means it is searchable in telegram but not on the public web. Also it offers a pledge to not share any information related to the data including government. The
Current Assessment
is for the supporters and a lot of this came in the wake of the policies employed by social
Media Companies
and twitter, facebook, google and the like to sort of push
Islamic State
supporters and their accounts and content off of platforms its a question of the degree to the efforts which are concentrated on telegram. Most famously its been used in the guidance but most famously in brussels in 2016. Its a kilogram responded to these efforts come as i said before, they have a pledge to not share any user information with third parties including governments. Additionally, the decisions regarding content regulation are a little different than the providers. They will regulate any public content that they will not regulate in a private content including private channel groups or voice chats and secret calls. In august decision in response to the regulations we may disclose your address although they also note theyve not taken that enforcement action. Between june of 2017 in october of 2018 date of a team of
Program Research
assistance we classify content using a number of quantitative and qualitative variables working with the tool developed by the scholarly
Technology Group
they are used to access channels and groups and external links to the telegram. How do they view telegrams features to build
Online Networks
to the propaganda and guide authorization second, in which way do they balance the need for the broadest messaging and recruitment in the online and offline space spaces as a following section of the presentation to present the findings. At the firsthe first question wt is the basic essentially how and why our
Analysis Finds
generally speaking they can be classified into five major categories and throughout the sample a major tactics are used. The most important by far for
Distribution Channels
and groups. These represent a majority of the sample and these are used to distribute there is the distinctioadistinction made bete official and unofficial media directed by the central leadership in the
Distribution Channels
theres usually those type of sources it distributed only
Islamic State
media propaganda and excluded any propaganda that wasnt produced by the media division. As while there is well there ie category that is instructional material across agrees with the three major tactics in here illustrated days internal filesharing features. In addition to internal filesharing on the bottom left we have a joint link. The ones in blue are in between channels and groups and the ones leading to the sample demonstrates and maintains the degree of connection to which the groups and channels are all connected. On the bottom right and i know it is difficult to read this is the third major tactic that we see which is distributing a lot of information pertaining to operational cybersecurity and the links used to access them. Moving onto the next finding and this is sort of what we have termed the online extremist using
Digital Communication
technology. Islamic state supporters must vote and make sure they are reaching out to the public at bt at the same time they are trying to protect their network so everybody is using encryption and maximizing services in order to protect their network from infiltration and takedown. The problem we saw in the sample is they are a conflict with one another. On the one hand, the state supporters had a strong emphasis on privacy which the majority of the sample was comprised of climate channels as well as if you have the group features to that that is an additional 10 that comprises about 70 that isnt going to be regulated under its current policy. State supporters are deliberately choosing the groups to ensure the content and networks protect the viewers and using these groups hamstring is the ability to recruit. Our mls is over on the right is over 40,000 badly fixed destinations out of the telegram and these are sort of the efforts of
Islamic State
supporters are using to ensure that the message is broadcast to the mainstream social media but also a range of the filesharing platforms that are included as well. When supporters do that they release information the telegram accounts and online such as an ip address. Using some of this information is to be investigation to the state supporters this is how they are reacting to degree that was incurred in the time for code of the sample it covers the time. So in which they lost the major stronghold. We found that they are focusing on the
Islamic State
s military activities and assure the resilience of the networks, supplementing the
Islamic State
s official propaganda with the media that follows the branding guidelines and makeup without being directly produced by the apparatus. Then last developing new measures for the guidance of operations. We as a couple metrics to determine this first is the
Qualitative Analysis
content we found the topics within the same over the
Islamic State
s military activities and battles as well as the affiliates on some occasions ended in the second one was the hash tag that you can see on the right. Its shared within the sample and we found as you can see that most of them with the geographic marker are centered and all of these are registering as top 25 as well as others that are outside from the
Islamic State
affiliates. From the sample however any discussion of terrorist attacks on the west mirrors other studies have englishspeaking supporters that are fundamentally engaged i do have a couple of things to say for taking me on as a president ial followed in the
Fellowship Program
for the past few years ive been able to work as a
Program Research
for mobile doing my mastera whileduring myd its been a great opportunity. One of the things i think is most interesting about the project is wh while we do have n and observations while we are collecting data. They help us make a better picture of whats going on behind the screen looking at the criminal complaints to see how they did use telegrams first is the rising grassroots actors and second is a proliferation of unofficial or grade media and there is a distribution of operational structural material. First is the study representing the rise of grassroots actors arrested in the philippines the media kind of knows her as recruiting primarily books from india to come to battle to fight with the
Islamic State
but its talked about in a very different light. A lot of people with and i will get back into that. Karen was able to build a
Large International
network but im going to highlight a few. On the top left he successfully traveled and if you read the criminal complaint is connected to 17 individuals so these criminal complaints are quite interesting and so she built this network and was pretty aggressive in her tactics for the central node in the ecosystem and has a
Public Authority
and got careless. She wasnt following the typical norms that you would see in the space and people didnt always like that. They started a feud with her because she was within cybersecurity measures people began calling her a spy or trying to push her out of the space. It goes to show the second case study he embodied a proliferation of the media and was arrested in october and is known for are going to be on trial and the program would be best connected to the part of the
Anonymous Media
foundation which is a great media group. We observed quite a few of these but we could only make our best assessment of whats going on behind the scenes. Its one of the ones we did observe but fortunately the complaints were detailed in how the
Media Foundation
worked providing a vital window into how one specific example of the media group updated. The criminal complaint details how the intentionally replicated and duplicated content takes videos to make new videos and this is something we often see kind of replicating the previous content. Having had a whole structure of the hierarchy was different with test products through the different divisions before being published and translated into other more public spaces. It also shows how they use them to their advantage. Where they would plan on twitter to inject into the
Public Discourse
with decisions would be made without letting others groups know about things. The complaint shows that the media had a medium of connection this is demonstrated when the media tried to start a merger with another group and then they rescinded it when the we know hs sharing there are three categorielike so another interesting thing about this case was the fact that the moniker continued to post after his arrest. So, this may have indicated that there were other coconspirators working wit with him under that before or that other individuals pick up the moniker and began posting under that name after his arrest. Thats one of the main challenges we face trying to do research here is the anonymity that it provides is very strong so it is difficult to know if people are acting behind one user name or if one can have many more people taking up. So it can be a bit of a challenge when it comes to combating exploitation of programs with moving towards pat, what do we do about this . We have the critical considerations coming from the report in the past two years of research. First is a largescale shift away from the program at the moment we assessed it is unlikely. Its a great combined with unique elements of social media where they can have a public broadcasting element as well as encrypted messenger so this unique feature is useful for the states. They also tried to jump to other platforms but maybe more secure, but until there is a viable replacement that has a lot of these combinations of encryption with a lot of user friendliness, it is unlikely. Second is that the paradigm should shape our approach when dealing with extremist exploitation as telegram and online. So, the people that we have been observing our fast and adapting. So, instead of trying to take them from platform to platform, we think we should think a little smarter about how to limit and confine extremism. They should follow the marginalization paradigm which is set up in a paper by two other researchers in the field which comes to confine extremism where number one they cant inject into the
Public Discourse
and
Law Enforcement
can still monitor them which brings us to the third consideration, which supporters are currently marginalized so this is the
Current Assessment
. It is publicly accessible that it is still separated from the mainstream social media so you cant get to the program by google or facebook. There will always be a window in because it is continuously trying to conduct outreach so because of that window as well come on enforcement are able to monitor and if we can get them there pushing them off the platform may not be the best plan of action so instead of the consideration is that the government should encourage the programs to participate in the industry forms. They do monitor and take down content on the public channel and then they do this they see a lot of stuff going on so it would be great to have them share their insight to help other companies to their own moderation. For example if it identifies a new media group, they could alert other
Companies Like
facebook and twitter so they could identify on their own site. Another area of cooperation is alerting
Smaller Companies
when they try to exploit or jump through their platforms so if we are able to see where they are linking to they could give a headsup to other companies and say we are seeing a lot of supporters linked to your website and i would be another area of cooperation. These wouldnt force them to change their stance on privacy or even get the governments involved in the profit moderation that enhance the processes that are already in place by industry leaders. The last line is the heavyhanded approaches are effective and consequential so while it may be tempting to say why dont we shut down or ban encryption, there are two examples of when countries have tried to do this. And here are some takeaways from my perspective go but in the academic works to be academically rigorous. This is a select few institutions this is happening so i consider to work at tw in this area as a go to destination for road scholars of their field so kudos for creating that architecture over the last several years. And then to thank you for this study they have genuine policy relevance and in that vein to shape that informed policy and i dont say this lately and the
National Security
realm there are plenty of areas where the comparative advantage that government has the available information is simply too great and the work done on the outside is interesting and informative but thinking of those fish shoes on officials but in my mind to hit that mark and it does so of the comparative advantage in the direction of scholars because they have the time and the wherewithal in the resources to study the phenomenon and that delta between government in terms of data is nonexistent because they are looking at the same data of my colleagues would be looking at. This just underscores the degree of the genuine policy relevance because poe can do just as good of a job as anybody in government. The key tech away over that one take away is a continued operational significance this isnt a platform used to recruit or spread the word or perpetuate the narrative i would take it as a given but what struck me was that i continued operational relevance that they could be engaged in activity leading to operational outcomes with those case studies and to underscore that is in pretty stark detail. There are any number more that are buried so you can assume that scope and scale beyond the case studies. Those are important because it covers significant theaters with the
United States
and
United Kingdom
and
Southeast Asia
in that first case study but then isis continues to carry out or continues to represent global enterprise. Most scholars would understand the physical defeat from iraq and syria does not change that reality. Most scholars recognize that but its important to bring that home to the public and broader policy even in the midst of the success against isis. So the last tech away one take away is that the roadmap provides for government with private sector engagement. And working with the
Technology Sector
and that comes with mixed 661 success across the industry. So studies like this one will arm like
George Washington<\/a> university. Today we want to launch a reported two years in the making titled extremism inside the englishspeaking
Islamic State<\/a> because chamber. In many ways like i said at the culmination of two years of research with a cooperation with the library and the
Technology Group<\/a> researchers to my left have been collecting and coding more than 600kilogram channels for about a year so today we are going to dive into those findings which are available on the website. We have three panelists here a
Research Fellow<\/a> with the program who will talk about the first half of the report and follow closely by the president ial followed the program to talk about the remaining parts of the report and to the director at the
Mccain Institute<\/a> at the counterterrorism. We will do about 30 minutes presentation and then move to the question and answer. Please feel free to reach out some things are in order and to start off, staff starting from the top down to support the project from the first day of its inception and help us out through the various components thereafter. The rest of the program especially but was instrumental in helping us design the report and collect the data from the report and helping out the finished product as well as other colleagues who gave their insights and for the rest of the report which we are grateful for the scholarly
Technology Group<\/a> at the library as well as helping out with the tool used for this report and without further ado a background behind this report and the project behind it as was the major findings and then i will turn to for over to my wonderful coauthor to start off with folks that are less familiar it is an online instant messenger if youve used other platforms its very similar there were three major differences that are important looking at white groups and specific make use of this and first there are a variety of communication options between a handful of accounts as well as groups that include as many as 200,000 members additionally there are channels that broadcast an unlimited number of followers and in addition to the communications of others also internal filesharing. You can post an unlimited number of photos, videos, documents, audio files and voice recordings of the 1. 5 gigabytes of memory which is twice that offered by some
Major Social Media Companies<\/a> as well as other
Application Companies<\/a> and third that is most commonly brought up each of those levels of communications each have a different level of encryption to them but potentially more importantly each channel or group can have a private auction being it can only be accessed and public auction that means it is searchable in telegram but not on the public web. Also it offers a pledge to not share any information related to the data including government. The
Current Assessment<\/a> is for the supporters and a lot of this came in the wake of the policies employed by social
Media Companies<\/a> and twitter, facebook, google and the like to sort of push
Islamic State<\/a> supporters and their accounts and content off of platforms its a question of the degree to the efforts which are concentrated on telegram. Most famously its been used in the guidance but most famously in brussels in 2016. Its a kilogram responded to these efforts come as i said before, they have a pledge to not share any user information with third parties including governments. Additionally, the decisions regarding content regulation are a little different than the providers. They will regulate any public content that they will not regulate in a private content including private channel groups or voice chats and secret calls. In august decision in response to the regulations we may disclose your address although they also note theyve not taken that enforcement action. Between june of 2017 in october of 2018 date of a team of
Program Research<\/a> assistance we classify content using a number of quantitative and qualitative variables working with the tool developed by the scholarly
Technology Group<\/a> they are used to access channels and groups and external links to the telegram. How do they view telegrams features to build
Online Networks<\/a> to the propaganda and guide authorization second, in which way do they balance the need for the broadest messaging and recruitment in the online and offline space spaces as a following section of the presentation to present the findings. At the firsthe first question wt is the basic essentially how and why our
Analysis Finds<\/a> generally speaking they can be classified into five major categories and throughout the sample a major tactics are used. The most important by far for
Distribution Channels<\/a> and groups. These represent a majority of the sample and these are used to distribute there is the distinctioadistinction made bete official and unofficial media directed by the central leadership in the
Distribution Channels<\/a> theres usually those type of sources it distributed only
Islamic State<\/a> media propaganda and excluded any propaganda that wasnt produced by the media division. As while there is well there ie category that is instructional material across agrees with the three major tactics in here illustrated days internal filesharing features. In addition to internal filesharing on the bottom left we have a joint link. The ones in blue are in between channels and groups and the ones leading to the sample demonstrates and maintains the degree of connection to which the groups and channels are all connected. On the bottom right and i know it is difficult to read this is the third major tactic that we see which is distributing a lot of information pertaining to operational cybersecurity and the links used to access them. Moving onto the next finding and this is sort of what we have termed the online extremist using
Digital Communication<\/a> technology. Islamic state supporters must vote and make sure they are reaching out to the public at bt at the same time they are trying to protect their network so everybody is using encryption and maximizing services in order to protect their network from infiltration and takedown. The problem we saw in the sample is they are a conflict with one another. On the one hand, the state supporters had a strong emphasis on privacy which the majority of the sample was comprised of climate channels as well as if you have the group features to that that is an additional 10 that comprises about 70 that isnt going to be regulated under its current policy. State supporters are deliberately choosing the groups to ensure the content and networks protect the viewers and using these groups hamstring is the ability to recruit. Our mls is over on the right is over 40,000 badly fixed destinations out of the telegram and these are sort of the efforts of
Islamic State<\/a> supporters are using to ensure that the message is broadcast to the mainstream social media but also a range of the filesharing platforms that are included as well. When supporters do that they release information the telegram accounts and online such as an ip address. Using some of this information is to be investigation to the state supporters this is how they are reacting to degree that was incurred in the time for code of the sample it covers the time. So in which they lost the major stronghold. We found that they are focusing on the
Islamic State<\/a>s military activities and assure the resilience of the networks, supplementing the
Islamic State<\/a>s official propaganda with the media that follows the branding guidelines and makeup without being directly produced by the apparatus. Then last developing new measures for the guidance of operations. We as a couple metrics to determine this first is the
Qualitative Analysis<\/a> content we found the topics within the same over the
Islamic State<\/a>s military activities and battles as well as the affiliates on some occasions ended in the second one was the hash tag that you can see on the right. Its shared within the sample and we found as you can see that most of them with the geographic marker are centered and all of these are registering as top 25 as well as others that are outside from the
Islamic State<\/a> affiliates. From the sample however any discussion of terrorist attacks on the west mirrors other studies have englishspeaking supporters that are fundamentally engaged i do have a couple of things to say for taking me on as a president ial followed in the
Fellowship Program<\/a> for the past few years ive been able to work as a
Program Research<\/a> for mobile doing my mastera whileduring myd its been a great opportunity. One of the things i think is most interesting about the project is wh while we do have n and observations while we are collecting data. They help us make a better picture of whats going on behind the screen looking at the criminal complaints to see how they did use telegrams first is the rising grassroots actors and second is a proliferation of unofficial or grade media and there is a distribution of operational structural material. First is the study representing the rise of grassroots actors arrested in the philippines the media kind of knows her as recruiting primarily books from india to come to battle to fight with the
Islamic State<\/a> but its talked about in a very different light. A lot of people with and i will get back into that. Karen was able to build a
Large International<\/a> network but im going to highlight a few. On the top left he successfully traveled and if you read the criminal complaint is connected to 17 individuals so these criminal complaints are quite interesting and so she built this network and was pretty aggressive in her tactics for the central node in the ecosystem and has a
Public Authority<\/a> and got careless. She wasnt following the typical norms that you would see in the space and people didnt always like that. They started a feud with her because she was within cybersecurity measures people began calling her a spy or trying to push her out of the space. It goes to show the second case study he embodied a proliferation of the media and was arrested in october and is known for are going to be on trial and the program would be best connected to the part of the
Anonymous Media<\/a> foundation which is a great media group. We observed quite a few of these but we could only make our best assessment of whats going on behind the scenes. Its one of the ones we did observe but fortunately the complaints were detailed in how the
Media Foundation<\/a> worked providing a vital window into how one specific example of the media group updated. The criminal complaint details how the intentionally replicated and duplicated content takes videos to make new videos and this is something we often see kind of replicating the previous content. Having had a whole structure of the hierarchy was different with test products through the different divisions before being published and translated into other more public spaces. It also shows how they use them to their advantage. Where they would plan on twitter to inject into the
Public Discourse<\/a> with decisions would be made without letting others groups know about things. The complaint shows that the media had a medium of connection this is demonstrated when the media tried to start a merger with another group and then they rescinded it when the we know hs sharing there are three categorielike so another interesting thing about this case was the fact that the moniker continued to post after his arrest. So, this may have indicated that there were other coconspirators working wit with him under that before or that other individuals pick up the moniker and began posting under that name after his arrest. Thats one of the main challenges we face trying to do research here is the anonymity that it provides is very strong so it is difficult to know if people are acting behind one user name or if one can have many more people taking up. So it can be a bit of a challenge when it comes to combating exploitation of programs with moving towards pat, what do we do about this . We have the critical considerations coming from the report in the past two years of research. First is a largescale shift away from the program at the moment we assessed it is unlikely. Its a great combined with unique elements of social media where they can have a public broadcasting element as well as encrypted messenger so this unique feature is useful for the states. They also tried to jump to other platforms but maybe more secure, but until there is a viable replacement that has a lot of these combinations of encryption with a lot of user friendliness, it is unlikely. Second is that the paradigm should shape our approach when dealing with extremist exploitation as telegram and online. So, the people that we have been observing our fast and adapting. So, instead of trying to take them from platform to platform, we think we should think a little smarter about how to limit and confine extremism. They should follow the marginalization paradigm which is set up in a paper by two other researchers in the field which comes to confine extremism where number one they cant inject into the
Public Discourse<\/a> and
Law Enforcement<\/a> can still monitor them which brings us to the third consideration, which supporters are currently marginalized so this is the
Current Assessment<\/a>. It is publicly accessible that it is still separated from the mainstream social media so you cant get to the program by google or facebook. There will always be a window in because it is continuously trying to conduct outreach so because of that window as well come on enforcement are able to monitor and if we can get them there pushing them off the platform may not be the best plan of action so instead of the consideration is that the government should encourage the programs to participate in the industry forms. They do monitor and take down content on the public channel and then they do this they see a lot of stuff going on so it would be great to have them share their insight to help other companies to their own moderation. For example if it identifies a new media group, they could alert other
Companies Like<\/a> facebook and twitter so they could identify on their own site. Another area of cooperation is alerting
Smaller Companies<\/a> when they try to exploit or jump through their platforms so if we are able to see where they are linking to they could give a headsup to other companies and say we are seeing a lot of supporters linked to your website and i would be another area of cooperation. These wouldnt force them to change their stance on privacy or even get the governments involved in the profit moderation that enhance the processes that are already in place by industry leaders. The last line is the heavyhanded approaches are effective and consequential so while it may be tempting to say why dont we shut down or ban encryption, there are two examples of when countries have tried to do this. And here are some takeaways from my perspective go but in the academic works to be academically rigorous. This is a select few institutions this is happening so i consider to work at tw in this area as a go to destination for road scholars of their field so kudos for creating that architecture over the last several years. And then to thank you for this study they have genuine policy relevance and in that vein to shape that informed policy and i dont say this lately and the
National Security<\/a> realm there are plenty of areas where the comparative advantage that government has the available information is simply too great and the work done on the outside is interesting and informative but thinking of those fish shoes on officials but in my mind to hit that mark and it does so of the comparative advantage in the direction of scholars because they have the time and the wherewithal in the resources to study the phenomenon and that delta between government in terms of data is nonexistent because they are looking at the same data of my colleagues would be looking at. This just underscores the degree of the genuine policy relevance because poe can do just as good of a job as anybody in government. The key tech away over that one take away is a continued operational significance this isnt a platform used to recruit or spread the word or perpetuate the narrative i would take it as a given but what struck me was that i continued operational relevance that they could be engaged in activity leading to operational outcomes with those case studies and to underscore that is in pretty stark detail. There are any number more that are buried so you can assume that scope and scale beyond the case studies. Those are important because it covers significant theaters with the
United States<\/a> and
United Kingdom<\/a> and
Southeast Asia<\/a> in that first case study but then isis continues to carry out or continues to represent global enterprise. Most scholars would understand the physical defeat from iraq and syria does not change that reality. Most scholars recognize that but its important to bring that home to the public and broader policy even in the midst of the success against isis. So the last tech away one take away is that the roadmap provides for government with private sector engagement. And working with the
Technology Sector<\/a> and that comes with mixed 661 success across the industry. So studies like this one will arm like
Companies Like<\/a> telegram we dont have to deal with the questions what can we release from the government what is classified and what is not this is publicly available data that it is in operational ways by terrorist organizations this is from the study authors thank you for the kind words they can also be shared from the team that you build there. So with that moderator prerogative i will ask a few questions. I was struck the front page of the
New York Post<\/a> at christmas so how important is the mix as ices loses territory with the propaganda is that the new normal for a little bit quick. We started to look at the pell grant was the vast amount of grade media where you can see a pretty big spectrum from individuals where they have taken images and alternate in some small way to larger mashup videos to combine from other pieces for those outlets and creations. So to conduct a study but it proves to be very difficult where that is built into the application. And then trace that back so the to figure out who is producing that and what impact it has. Was also very difficult to tell one isis supporters differentiating between
Media Outlets<\/a> and content that is a trend we are seeing with the whole spectrum of the grade media outlet that does provide an interesting window to what can be an example within the organization and thats something to look forward to and i hope other researcher on researchers will continue to study the impact. I will add that because you can imagine inside government that is devoted to the task of mapping formal isis structures of who what when where why for the purposes of understanding to enable disruptive operations that was incredibly hard and important work but also the tip of an iceberg. And to see what is happening below that waterline and the operational significance. Can we talk about why they decide to go and what level of encryption . Is it the right level and how does lawenforcement work its way around that quick. So the important thing here is to offer different communication options have
Different Levels<\/a> of encryption some of them are end to end encryption and actually im not cryptographer myself but the protocol that the telegram uses has been lambasted by experts they call that homebrewing encryption i dont know about those assessments independently but what i will say there are certain portions and i remember this being a major concern that police and the e. U. Cannot access the message the various attackers were using but there are also other hearts that could not facilitate and in some cases this desire to reach out to those platforms of internal communication is a benefit for those to infiltrate their operations at some point you have to outreach that your parents tell you to never do that person could be a recruit or a detractor so there are advantages there to get a window into that. The other downside is one company has 1 foot inside the general ecosystem to access others. Test test test test test. Test test test test test. Test test test test test. Otherwise. I will open it to questions please raise your hand. Dont be shy. Thank you for your research. I am a specialist that
International Consulting<\/a> there is a lot of other intelligence you can gather from these messages was there any common demographic information whether what you showed earlier with the national breach or age or how much can be trusted or not trusted one of the interesting things into it on on twitter you would see reporters posting pictures of themselves their bios or where they were from or their hometown. Now we are seeing much more security where that information is protected so that is the trouble she was passing around personally identifiable information so we really dont see as much of that passed around because they are so concerned with
Operational Security<\/a> im sure if you could talk to them you may be able to get some of that that we do not communicate with anyone so on that state level we are not seeing that information shared. Thank you for the talk. I am a recent graduate from michigan state. So regarding how karen was outcast because of the misuse of operational norms what about sowing the distrust or using people not following those be leaked into the networks quick. Yes. So your point of other examples the main example is the sharing of phone numbers coming from the indian criminal complaint so that is the one verifiable fact we have on the backend people were accusing her of many other things to be connected to the arrest of other supporters. As far as having dad analysis or not coming from those primary sources that mean example is the sharing of phone numbers. My question is about the recent legislation proposed in the uk and australia having a more heavyhanded approach to content on the internet do you think policies like that will further marginalization paradigm and restrict terrorist content sharing and recruitment . Or do you think they will be ostracized and making them not use telegram or how that will be influenced quick. You can go first. One of the difficulties there is a very careful balance in one of the reasons we caution against these approaches like fight against social media providers it is very difficult to target them to a specific platform. One of the things is very hard to do is to be applied throughout any website that doesnt follow those guidelines that have been reported in the uk or australia subject to the regulation. Its a good strategy if you try to implement the goal to get all terrorist off the internet altogether but thats not necessarily an achievable goal and why we deal with this them being on telegram in the first place is where the regulations were put into place against twitter and facebook, its very difficult to just impact only those platforms so what ends up happening is those more skilled migrations that is an indication like the hot air and cold air in a room if theres more pressure than that migration will go to a platform that is not covered by whatever regulations are put into place. Of course, they are feeling genuine public pressure in the direction of the
Technology Sector<\/a> to have that ability is our government does tuesday
First Amendment<\/a> can be used as a shield. I take the point that is made that in some ways pushes the users and places where we have more difficulty learning and getting value from what they do online. So if you are directing them to those platforms and working to exploit those platforms obviously there is a cap that work in places that they can spend and they spent on 15 platforms as opposed to five that makes the job harder that is not quantifiable. It may shrink but mobilization is more concerning also. I know this was a report on the englishspeaking telegram but are there any insight you thought you could gather from your research or pontificate on the bigger arabic pitcher or french or german or other language official media . The degree of interconnectedness of the languages is important and the great media picture as well these
Media Outlets<\/a> are changing original content and producing their own that is an artificial translation that is important for a couple of reasons because first it picks up the gap where previously you have a media center or official outlets doing the bulk of the work to translate into different languages now its outsourced to supporters the downside is translation but the upside is that it can reach into areas where the
Islamic State<\/a> may not have that capacity before. The other thing we see in our sample even though english language we see intersections with the other languages but english is important as well in this context because that digital arena is one of the few its also a jihadist lingo and an isis supporter in the philippines in nigeria or south america and washington d. C. May not be able to speak to each other fluently and arabic but likely they could in english and thats what our sample gets to the english language is not geographically restrained. I have a quick question beyond the isis problems did you pick up anything anecdotally of the way other organizations are using telegram . At the places we could get some insight was in dispute so they would foreword
Something Else<\/a> from al qaeda and then forward it into their channel and issue a critique so we could get some window of insight but also other detractors and the number of the shia militia groups iraq and elsewhere are active on telegram with active reports that is beyond the scope of the report but they are migrating to telegram very similar with increased pressure from facebook and twitter and google to push them off their platforms that is something to consider even though its not within the scope of our study. I am from the
Australian Embassy<\/a> i would like to commend you for the work you have undertaken and with it comes to legislating the material on the internet and to relate to the christchurch some months ago. And for
Live Streaming<\/a> you have any reflections on how
Live Streaming<\/a> is used on telegram . And then with that instantaneous reaction among supporters on telegram and not getting to in the presentation and the territory does not register either the content category because that type of topic with the isis telegram groups to have supporters engaged with 24 or 96 hour time window with the news media is released but it doesnt do anything much like a major battle over the course over a longer period of time in terms of instantaneous reactions. We have time for one more question. That media was concerned with the centralization with the content produced so can you do research do you have insights on the relationship between those organizations and those media accounts quick. And in the case study to show those rules and the
Writers Group<\/a> and that
Media Foundation<\/a> so im paraphrasing these rules to always follow those official announcements only published content and there were four of them so these rules allow a few guidelines to help the
Media Foundation<\/a> produce the propaganda and to stay within a couple of guidelines. That demonstrated the attempt to try to centralize or keep them in line with the direct oversight or approval with publication was not there so to be free and able those mash up videos and we did see more of a connection but they had already begun the merger and told to rescind. So there are attempts with centralization within the foundation with those other groups and the criminal complaint does show. Adding one more comment to that when central media releases a statement that it is safe to assume at the
Grassroots Level<\/a> that is especially true of the centralization question and in response to the decentralization and from central media. And i can see a general the ctc study along with these regulations to come around that there were disputes at the
Grassroots Level<\/a>. One last question. Thank you for their
Fascinating Research<\/a> and how isis maintains our
National Security<\/a> online. And then to be released 2018 by the foundation and then for the fact to be infiltrated online by security agencies for the groups reaction to that and that will be 30 more literally sending the pledge of allegiance online through text without online extension i was curious of how to maintain operational securities. And those categories of app one
Operational Security<\/a> in the online arena but it is still security. Dont talk to people dont directly message other people. Dont to other people about making trying to conduct an attack. Be careful of other people in groups. Actually, one of our instructional material channel distributed a manual for basic
Operational Security<\/a> about how to avoid a tail, like someone driving behind you in a car or how to not drive through major roads that have cctv cameras on them when youre going
Operational Security<\/a>, things like that. The more important category is cyber security. Thats use privacy maximizing services. Were not safe on telegram. Agents are in here. Weve been infiltrated. Not only use telegram, its encryption, but heres instructions how to download a vpn. Heres how to use a secure email service. Heres how to make sure youre not sharing other information you would be sharing on your telegram account somewhere else online. Measures like that. Were going to leave the last few minutes of this program. You can watch it at cspan. Org. Going live to the
House Intelligence Committee<\/a> holding a hearing to examine the
National Security<\/a> risks posed by artificial intelligence, also manipulated media and deepfake videos. This is the first meeting to examine deepfakes and ai developed synthetic data","publisher":{"@type":"Organization","name":"archive.org","logo":{"@type":"ImageObject","width":"800","height":"600","url":"\/\/ia903001.us.archive.org\/5\/items\/CSPAN3_20190613_120300_George_Washington_University_Discussion_on_Encryption_Technology_and...\/CSPAN3_20190613_120300_George_Washington_University_Discussion_on_Encryption_Technology_and....thumbs\/CSPAN3_20190613_120300_George_Washington_University_Discussion_on_Encryption_Technology_and..._000001.jpg"}},"autauthor":{"@type":"Organization"},"author":{"sameAs":"archive.org","name":"archive.org"}}],"coverageEndTime":"20240716T12:35:10+00:00"}