December 10, 2017
Ghostery Deploys AI in the Fight Against Ad Trackers
Most ad blockers—and there are so, so many of them now—operate roughly the same way, comparing the scripts they encounter on a given site to their whitelist and block list letting the former run and stopping the others. This means they largely share the same drawback, as well; they can’t block what they’ve never seen before. With its latest release, popular ad blocker Ghostery attempts to solve that common dilemma, with a fashionable solution: artificial intelligence.
With Ghostery 8, available Wednesday as an extension for all the major browsers, the popular ad-blocker introduces not only AI-powered anti-tracking technology, but also a new “Smart Mode” that adjusts settings for you, rather than expecting novices to know which trackers to toggle. In doing so, the Edward Snowden-endorsed service has become both more accessible to the average user, and better able to preemptively protect them.
The power-up comes at an auspicious time. A newly released Ghostery study shows that over 15 percent of pages loaded online have 10 more more trackers working in the background. And a significant amount of the traffic that’s free of third-party trackers belongs to Google and Facebook, which hardly need them to know what you’re doing online.
It also, though, comes at a time when Ghostery’s core function—keeping trackers from following you around the internet—is increasingly baked into browsers already. Firefox has blocked tracking in private browsing since 2015. Apple brought tracker-blocking to Safari this year, also using machine learning to stay ahead of its quarry. And Google will block certain types of annoying ads in Chrome by default next year.
What, in that context, can an extension provide that browser-native solutions cannot? In Ghostery’s case, a pretty good amount.
Block Party
It’s important to note that the anti-tracking tech that Ghostery 8 introduces isn’t strictly new; it’s what privacy-focused browser Cliqz already uses uses to ward off tracking, and it pushes the practice past the block lists of yore. Cliqz acquired the Ghostery extension and related apps in February. The AI's function is not just to identify trackers, but to see what type of information they're tracking.
“They actually use a heuristic, AI approach to determine if those trackers are sending unsafe data,” says Jeremy Tillman, Ghostery’s head of product management.
In this context, “unsafe” means anything that’s personally identifiable, that could be used to build a profile of a specific user. Once it makes that determination, Ghostery will overwrite any of those sensitive data points with random information before it gets to a third party. That also means that certain ad elements can remain unblocked without jeopardizing your privacy, a more important feature than you might think.
“There’s a shortlist of trackers that we know are pretty critical to website performance, and we can selectively say that these, when they’re blocked, a web site’s not going to render properly,” says Tillman.
Sniping page elements before confirming that they’re ad trackers has potential downsides; a false positive, for instance, could result in usability being borked. But Tillman says that there, too, algorithms can help. If Ghostery detects that users start refreshing a page over and over, for instance, something’s probably broken, and an adjustment can be made.
The Cliqz acquisition has an ancillary benefit for Ghostery users as well, in the form of, eventually, a new business model. Whereas Ghostery and its previous parent company, Evidon, have historically sold its (repackaged, anonymized) data back to the ad industry and other interested parties, in the future it hopes to focus instead on establishing a premium tier of service as its main revenue driver.
“There’s a really big chunk of Ghostery users who use it less for the detection and blocking and more for the insights they get,” says Tillman. “These are educators, professionals, who use it in their work to analyze websites and analyze the technology on them.”
Smart Mode
Currently, Ghostery blocks trackers based on a library it maintains of over 2600 of them. You can decide to block as many or as few as you want, or to whitelist a given page, or to pause blocking, or to restrict certain sites.
That granularity has a lot of appeal for power users, but can be daunting for novices, or even experts who don’t want to spend the better part of an afternoon toggling trackers. Historically, Ghostery has blocked nothing by default, which has meant that you’re on your own to decide which trackers you want to spike and which stay operational. Simply blocking everything by default sounds like a solution, but doing so can break web sites in fundamental ways; videos won’t play, actually desirable elements won’t load, you name it.
Ghostery 8 takes more care than previous versions to walk users through those steps. When you install it, you're given a choice between a one-click start, or walking through a custom setup based on how much you'd like to block.
The one-click set up, which fires up Ghostery with Smart Mode, will make the most sense for the most people; it automatically makes those decisions for you, adjusting its blockers to maximize both privacy and page load times.
“It enforces a speed requirement,” says Tillman of the smart-blocking mode. “A website that is slow, we’re going to be blocking the things that would slow it down.”
That makes Ghostery’s Smart Mode in some ways even more appealing than the AI upgrade. The stripped-down interface highlights key information more cleanly, without first suggesting you wade into the minutia. It turns on smart-tracking by default. And it does its best to cap page-load speeds at five seconds.
“It’s much more personal,” says Tillman. “Just set it and forget it and let it do its thing.”
Even in Smart Mode, you can see which trackers Ghostery has shut off and which it left running, and can fine-tune as you see fit.
'A website that is slow, we’re going to be blocking the things that would slow it down.'
Jeremy Tillman, Ghostery
I’ve been able to spend a little time with Ghostery 8 in beta, and it does seem adept at keeping out intrusive elements without dinging functionality. It speeds pages up noticeably, and combined with the smart anti-tracking steps, keeps them humming along as intended. And I'll be the first to admit that my previous Ghostery set-up was based on my best guesses of what trackers I should leave behind and which impacted my browsing. The one-click set-up was a relief on a few levels.
It’s also that degree of easy sophistication that Tillman argues will help ensure Ghostery’s relevance even after blocking trackers becomes table stakes for the biggest browsers.
“The Google ad blocker, there’s speculation that it’ll be somewhat selective. We don’t have that same sort of bias against what we choose to block and unblock. We don’t have a vested interest,” says Tillman. “Likewise, Safari anti-tracking is impressive, but doesn’t take very stringent steps toward aggressive user privacy.”
As for Firefox, its parent, Mozilla, has a stake in Cliqz, which again, owns Ghostery, so in some ways it’s all in the family.
There’s a larger debate around ad blockers, of course, and their impact on various industries, like media, that largely rely on advertising to survive. It’s also true, though, that many ads remain obtrusive and, in some cases, vehicles for malware and other digital ills. Hidden online trackers still permeate the web more than most people would ever realize.
Having a tool to remedy that on sites you don’t trust—one that also makes it easy to white list the sites that you do, helping them keep the lights on in the process—seems like as good a balance as one can expect. At the very least, it’s the one that exists. Adding both sophistication and ease of use to that process, as Ghostery 8 does, can only help.
Read more: https://www.wired.com/story/ghostery-deploys-ai-in-fight-against-ad-trackers/
February 20, 2018
Did Russia Affect the 2016 Election? Its Now Undeniable
by MeDaryl • Cars • Tags: 2016 election, american, indictment, Robert Mueller, Russia, Russian, security
For some time, there has been a conflation of issues—the hacking and leaking of illegally obtained information versus propaganda and disinformation; cyber-security issues and the hacking of elections systems versus information operations and information warfare; paid advertising versus coercive messaging or psychological operations—when discussing “Russian meddling” in the 2016 US elections. The refrain has become: “There is no evidence that Russian efforts changed any votes.”
But the bombshell 37-page indictment issued Friday by Robert Mueller against Russia’s Internet Research Agency and its leadership and affiliates provides considerable detail on the Russian information warfare targeting the American public during the elections. And this information makes it increasingly difficult to say that the Kremlin's effort to impact the American mind did not succeed.
The indictment pulls the curtain back on four big questions that have swirled around the Russian influence operation, which, it turns out, began in 2014: What was the scope of the Russian effort? What kind of content did it rely on? Who or what was it targeting, and what did it aim to achieve? And finally, what impact did it have?
Most of the discussion of this to date has focused on ideas of political advertising and the reach of a handful of ads—and this discussion has completely missed the point.
So let’s take these questions one at a time.
1. What was the scope of the Russian effort?
The Mueller indictment permanently demolishes the idea that the scale of the Russian campaign was not significant enough to have any impact on the American public. We are no longer talking about approximately $100,000 (paid in rubles, no less) of advertising grudgingly disclosed by Facebook, but tens of millions of dollars spent over several years to build a broad, sophisticated system that can influence American opinion.
The Russian efforts described in the indictment focused on establishing deep, authenticated, long-term identities for individuals and groups within specific communities. This was underlaid by the establishment of servers and VPNs based in the US to mask the location of the individuals involved. US-based email accounts linked to fake or stolen US identity documents (driver licenses, social security numbers, and more) were used to back the online identities. These identities were also used to launder payments through PayPal and cryptocurrency accounts. All of this deception was designed to make it appear that these activities were being carried out by Americans.
Additionally, the indictment mentions that the IRA had a department whose job was gaming algorithms. This is important because information warfare—the term used in the indictment itself—is not about "fake news" and “bots." It is about creating an information environment and a narrative—specific storytelling vehicles used to achieve goals of subversion and activation, amplified and promoted through a variety of means.
2. What kind of content did it rely on?
As the indictment lays out in thorough detail, the content pumped out by the Russians was not paid or promoted ads; it was so-called native content—including video, visual, memetic, and text elements designed to push narrative themes, conspiracies, and character attacks. All of it was designed to look like it was coming from authentic American voices and interest groups. And the IRA wasn’t just guessing about what worked. They used data-driven targeting and analysis to assess how the content was received, and they used that information to refine their messages and make them more effective.
3. Who or what was the operation targeting, and what did it aim to achieve?
The indictment mentions that the Russian accounts were meant to embed with and emulate “radical” groups. The content was not designed to persuade people to change their views, but to harden those views. Confirmation bias is powerful and commonly employed in these kinds of psychological operations (a related Soviet concept is “reflexive control”—applying pressure in ways to elicit a specific, known response). The intention of these campaigns was to activate—or suppress—target groups. Not to change their views, but to change their behavior.
4. What impact did it have?
We’re only at the beginning of having an answer to this question because we’ve only just begun to ask some of the right questions. But Mueller’s indictment shows that Russian accounts and agents accomplished more than just stoking divisions and tensions with sloppy propaganda memes. The messaging was more sophisticated, and some Americans took action. For example, the indictment recounts a number of instances where events and demonstrations were organized by Russians posing as Americans on social media. These accounts aimed to get people to do specific things. And it turns out—some people did.
Changing or activating behavior in this way is difficult; it’s easier to create awareness of a narrative. Consistent exposure over a period of time has a complex impact on a person’s cognitive environment. If groups were activated, then certainly the narrative being pushed by the IRA penetrated people’s minds. And sure enough, the themes identified in the indictment were topics frequently raised during the election, and they were frequently echoed and promoted across social media and by conservative outlets. A key goal of these campaigns was "mainstreaming" an idea—moving it from the fringe to the mainstream and thus making it appear to be a more widely held than it actually is.
This points to another impact that can be extracted from the indictment: It is now much more difficult to separate what is “Russian” or “American” information architecture in the US information environment. This will make it far harder to assess where stories and narratives are coming from, whether they are real or propaganda, whether they represent the views of our neighbors or not.
This corrosive effect is real and significant. Which part of the fear of “sharia law in America” came from Russian accounts versus readers of InfoWars? How much did the Russian campaigns targeting black voters impact the low turnout, versus the character attacks run against Clinton by the Trump campaign itself? For now, all we can know is that there is shared narrative, and shared responsibility. But if, as the indictment says, Russian information warriors were instructed to support “Sanders and Trump,” and those two campaigns appeared to have the most aggressive and effective online outreach, what piece of that is us, and what is them?
Persuasion and influence via social media cannot be estimated in linear terms; it requires looking at network effects. It is about the impact of a complex media environment with many layers, inputs, voices, amplifiers, and personalities. All of these elements change over time and interact with each other.
So anyone trying to tell you there was little impact on political views from the tools the Russians used doesn't know. Because none of us knows. No one has looked. Social media companies don't want us to know, and they obfuscate and drag their feet rather than disclosing information. The analytical tools to quantify the impact don’t readily exist. But we know what we see, and what we heard—and the narratives pushed by the Russian information operation made it to all of our ears and eyes.
The groups and narratives identified in the indictment were integral parts of the frenzied election circus that built momentum, shaped perceptions, and activated a core base of support for now-President Trump—just as they helped disgust and dismay other groups, making them less likely to vote (or to vote for marginal candidates in protest).
In the indictment, Trump campaign officials are referred to as “unwitting” participants in Russian information warfare. This gives the White House an out—and a chance to finally act against what the Kremlin did. But the evidence presented in the indictment makes it increasingly hard to say Russian efforts to influence the American mind were a failure.
Molly K. McKew (@MollyMcKew) is an expert on information warfare and the narrative architect at New Media Frontier. She advised Georgian President Mikheil Saakashvili’s government from 2009 to 2013 and former Moldovan Prime Minister Vlad Filat in 2014-15.
Related Video
How the Internet Tricks You Into Thinking You're Always Right
A guide to busting through confirmation bias, the cognitive fallacy that's destroying our discourse.
Read more: https://www.wired.com/story/did-russia-affect-the-2016-election-its-now-undeniable/