Search Results
44 items found for ""
- The bot farm is a secret Roskomnadzor project
Roskomnadzor will launch bots that will penetrate the communities of Russians, Belarusians and Ukrainians in May 2023. With their help they are going to obtain information even from closed chats and create influence groups that will broadcast certain ideas and sentiments, including creating the effect of a majority satisfied with the Kremlin’s policies. This is how Roskomnadzor's censors help Putin retain power in the face of severe condemnation from the entire civilized world. This is especially important on the eve of the upcoming Russian presidential elections in 2024. The Bot Farm project is not in the public registers of Roskomnadzor. But thanks to the hacking network of his subordinate department — the “General Radio Frequency Centre” (GRFC) — the CyberPartisans obtained secret documents that relate to this system. In this article we reveal who is responsible for the creation of this Bot Farm and exactly how they plan to use it. When And Why Is a Bot Farm Launched? The staff of the GRFC began developing the Bot Farm in the summer of 2022. The work is scheduled to be completed in May 2023. One of the project documents states, that the Bot Farm is needed for the following purposes: Creation of personal accounts for personal use. Creation of influence groups. Who Creates Bots The project team consists mainly of analysts and developers. Its head is Vladislav Dmitrievich Kovalev — deputy head of the Internal Projects Department. LLC Neobit is also involved in the implementation. This company is engaged in the development of other automated systems for censorship. Its technical director, Dmitriy Moskvin, is a member of the Expert Council of the GRFC of Roskomnadzor for Artificial Intelligence and takes an active part in it. What Bots Can Do And What They Look Like As conceived by Roskomnadzor, the bot farm will allow: The creation of many accounts that look like the accounts of real people. They could use them to infiltrate open and closed Internet communities in order to find materials that would be dangerous from the point of view of censors. To disseminate certain publications, ideas and opinions. This automation will allow such fake accounts to be unique. They will able not to overlap with each other in photos, posts, and comments. As if they were all real users with their own histories, interests, and activities. When creating bots, the system operator assigns each of them a behaviour profile, age, place of residence, intensity of activity, interests, and history. On the screen you can see a sample interface of the Autobot system, which is presented in the internal documents of Roskomnadzor. Bots are programmed to perform all actions based on given psychological portraits. For example, to add users who studied at the same university to their friends, to subscribe to a community of interest, and so on. The operator sets up only the initial settings, and then the bots function autonomously on social networks and messengers. They can add and delete photos, audio recordings, write posts, change statuses, give likes, and even write personal messages to other users. At the same time, the operator can control their behavior at any time, changing settings and giving them certain tasks. All of this can be done with a single bot or a group of bots. What Social Networks And Messengers Will Bots is going to be launched? You can see that list of social networks and messengers below. They include VKontakte, Odnoklassniki, Live Journal, Youtube, TikTok, Facebook, Instagram, Twitter, and Telegram. In other words, these are all platforms popular in Russia, Belarus, and Ukraine. There are plans to create from 20 to 100 bots for one purpose or another. However, the passport of the project states that the number of bots may not be limited and can be scaled up depending on the tasks. How Do They Plan To Implement Bots? So how will social media allow an army of Roskomnadzor bots through? Their experts, in turn, are constantly developing new algorithms to identify and block such accounts. Therefore, when registering a new account, we often have to leave a telephone number or e-mail or enter verification codes and captchas. Чтобы обойти эти приемы, в Роскомнадзоре собираются использовать систему, которая автоматически подбирает ботам разные айпи адреса, виртуальные номера телефонов, одноразовые электронные почты, уникальные отпечатки браузера и даже вводит коды подтверждения. To circumvent these tricks, Roskomnadzor is going to use a system which automatically picks up different IP addresses, virtual phone numbers, disposable emails, unique browser fingerprints and even enters confirmation codes. Interestingly, Roskomnadzor's circumvention documents bot recognition system, the possibility of shady purchase of SIM cards or ready-made accounts on the black market is openly considered. Cooperation with external providers is also mentioned as a solution to the registration problem. Roskomnadzor plans to take mobile phone numbers from five virtual number providers. For registration via e-mail, several one-time mail services are available, and automatic registration of accounts on mail sites has been implemented. In addition, there are several other services, which help to automatically pass the captcha and provide each bot with a personal IP address. Unfortunately, the names of these services are not mentioned in the documentation. At the same time, the farm should make it possible to use bots for other monitoring systems developed by Roskomnadzor, for example, to work in conjunction with the Vepr system. It is also set to launch in 2023. The Vepr system is designed to identify so-called tension points in society. In other words, online resources where any dissatisfaction with the current situation in Russia is expressed. The system is supposed to capture texts of criticism and predict the extent to which the negativity is spreading, so that the authorities can quell discontent in its initial stages. It can be assumed that the bot farm is needed to detect criticism even in closed communities and to create a satisfied majority effect. So that critics feel less supportive in their statements. In the future, we will go into more detail about how the Vepr system works, and how to distinguish a bot from a real person. Follow updates on CyberPartisan's channels on Telegram!
- Roskomnadzor monitors its employees
SecureTower from FalconGaze is a programme with the help of which the Roskomnadzor management monitors its employees like animals in a zoo. The system intercepts and records all actions on employees' computers down to the keystrokes. This is how Roskomnadzor even gets personal information about employees: 🔺 Correspondence in social networks, messengers. 🔺 Documents (even personal ones). 🔺 Passwords. 🔺 Credit card details, etc. FalconGaze's website says that their system "helps companies protect themselves from leaks", but in fact it was SecureTower that made CyberPartisans aware of all employee PC activity for many months. We hacked their product and gained access to all of the above information. 😎 ⚠️ By the way, FalconGaze shamelessly stole and renamed some code libraries, violating their licences. The details of this have already been submitted to the relevant European authorities. 🤝
- On the anniversary of the tragedy in Minsk subway we publish a historical document
On the anniversary of the tragedy in Minsk subway on April 11, 2011 we publish a historical document - the death sentence to D.G. Konovalov and V.Y. Kovalev. We also found that their dates of death recorded in the AIS Passport system diverged from those officially announced. D. G. Konovalov died on March 14, 2012, although it was still believed that the sentence against him was put into execution on March 16. The date of death of V. Y. Kovalev is recorded as May 15, 2012. Although his mother was notified of the putting of the sentence into execution on March 16. This most resonant case in the history of modern Belarus raises many questions, which have not been answered yet. We hope that after the restoration of the rule of law in the country, the investigation of this tragedy will be properly handled. No one will escape responsibility. 👊📛
- How does Roskomnadzor track articles and comments on Ukraine?
Roskomnadzor uses the Brand Analytics system to automatically collect all Russian-language comments, posts and articles on the war in Ukraine. Today we will tell you what it is, who owns this IT product and how it is used. What is Brand Analytics Brand Analytics is a Russian system for monitoring and analysing the media field on the Internet. It is designed to analyse media, public channels and chat rooms, forums, social networks, blogging platforms, video hosting and other open sources that can be used to track people's reactions to certain events. Brand Analytics is developed by an organisation of the same name, which was founded in 2013 as part of the Ayteko group of companies. Ayteko - is a Russian IT integrator, operating on the market since 1997, one of the top 5 largest IT companies in the Russian Federation. 74% of shares are owned by billionaire Shamil Shakirov. 25% is owned by Alexey Remizov, a former lecturer at the USSR KGB Higher School (now the FSB Academy's IKSI), who in the 90s actually stood at the origins of the Russian IT market development. Since its foundation, Ayteko has been working closely with the American company Hewlett-Packard (HP) for 17 years. The Brand Analytics system was developed with its financial support in 2013-2014. The management of both IT giants planned to use this system in combination with the HP Explore software system. Brand Analytics was needed to monitor and collect information from social media, while HP Explore was needed to research, extract meaning and visualise the collected data. However, as of mid-2014, there are no more media reports about the collaboration between Ayteko and HP. Initially, it was stated that the project was focused on analysing marketing trends, monitoring the business reputation of brands, and tracking public opinion on business products. Therefore, it would be possible to respond to the opinions and requests of the audience in a timely manner. Prior to the publication of data from the servers of GRFC, such well-known companies as Decathlon, KFC, Sony, Bayer, Ahmad Tea, etc. could be seen among the major partners on the Brand Analytics website. Now most of the logos of foreign companies have been removed. However, in reality, the system is used not only for business development. Today, Brand Analytics has become part of the Kremlin's repressive apparatus and is used by Roskomnadzor to monitor media and users in the Russian-language segment of the Internet. How is Brand Analytics being used for surveillance in Runet? There are a lot of thematic videos about the functionality of Brand Analytics on the Internet. Therefore, we will only tell you about the part of the system's work that directly concerns tracking articles and comments on the war in Ukraine. Brand Analytics can be used to collect information from the following sources: Online media, press, TV, radio, news agency feeds. Websites of companies, government agencies. Social networks - Vkontakte, Facebook, Instagram, Odnoklassniki. Video services - TikTok, Youtube. Blogs, microblogs - LiveJournal, Twitter. Review sites, forums. Open channels and chats in Telegram. I. e. virtually from any open resources where automatic data monitoring is possible. The system allows you to collect: All messages with certain keywords for a specified date and in the region of interest (for example, "Ukraine", "Putin", "Bucha", "war"). All messages on the pages of certain authors, communities, media, etc. All comments and publications of certain persons (tracking of activists, opinion leaders). When searching for materials with certain keywords, Brand Analytics analyses the texts of articles, posts, comments, titles, headlines, video subtitles, checkins, pictures, stories, online maps. If there is a keyword of interest anywhere in them, it all goes into the report. Moreover, the system can collect not only the materials with certain words, but also the messages left by users, so that it is possible to assess the audience's reaction to a particular text. Tracking results Brand Analytics system provides all collected comments, posts and articles in the form of visual reports with graphs and flexible setting of output parameters. The report contains the following information: Publication date. Text of the post, article, comment. Link to the source. Full name, gender, age, region of residence, which are specified in the author's profile. Audience coverage. Number of repetitions of the text in other sources. Tone (no aggression, aggression, strong aggression). Since 2022, Roskomnadzor employees have been using Brand Analytics to search for texts about the killing of civilians in Ukraine, mobilisation, shelling of Ukrainian cities, calls for protests, Putin's health, nuclear war and other "topical" topics. The general summary includes all materials in Russian, which contain key words, even if they were written, for example, by Belarusians or Ukrainians, but not by Russians. For example, just for the period from 24 February to 3 March 2022, the Brand Analytics system automatically collected 195,176 comments on the shelling of Ukrainian cities. Then these comments are received for processing by the employees of the Department for the organisation of monitoring of mass communication media (DMMCM), which is operated by Roskomnadzor. If they find so-called "fakes" or calls for anti-war actions, the materials are sent to the Prosecutor General's Office of the Russian Federation, from where site owners and providers are sent demands to remove the content, and otherwise threatened with blocking. In addition, administrative and criminal proceedings are initiated against the most dangerous, from the regime's point of view, commentators. Is it possible to avoid surveillance with Brand Analytics? Since Brand Analytics automatically collects all comments, posts, videos and articles on certain topics, your statements may well end up in its reports. However, you can avoid being de-anonymised by following some simple guidelines. We will write about this topic in detail in a separate article. Thank you for your attention. Glory to Ukraine! Long live Belarus! ✌️
- "Pressball" moves to the side of the people
Now people's pictures of heroes who liberate Belarus decorate the main page of the "Pressball" source - pressball.by Thank you to everyone who participated in our contest. Your entries are in their proper place. 😎 "Pressball" was one of the best sports medias in Belarus until 2020, but then it was defeated by the Lukashists and lost almost all of its leading journalists. Since then, its website has been heavily censored. Cyberpartisans for an independent and free press. ✊ We express our support for all journalists who chose freedom of speech over the leash of the regime. P. S. Web archive for those who missed the fun https://archive.ph/arA1F
- Hacking of criminal and administrative case files
As part of Operation Heat in 2021, we hacked into and downloaded the USDBO database with archives of ALL criminal and administrative cases filed in the Republic of Belarus. Recently we found records about ourselves in it. 😎 So there you have it... The regime's propaganda either ignores our hacks or writes that it's all fake. And in the meantime criminal cases are being filed against us. 😆🤡 P. S. By the way, no suspects have been identified in any of these cases. 😎
- Hacking into the AS "Refugees" database
CyberPartisans hacked into the Refugees database and obtained internal documents from the Citizenship and Migration Department of the Ministry of Internal Affairs of the Republic of Belarus during Operation Heat in 2021. We are attaching screen shots of the records of foreigners who were wanted for crimes in their home countries and who applied for refugee status in Belarus. Among the documents there are also fact sheets that were compiled at the request of a number of different structures of the Republic of Belarus. They contain data from open sources on a variety of issues, including: 🔺 The human rights situation in the Russian Federation, in the USA and in other countries. 🔺 The situation of the Russian language population in Ukraine. 🔺 Political persecution in Cuba, etc. By the way, up to and including the year 2021, this information is quite adequate (see the screenshots). For example, they write about human rights problems in the Russian Federation and the lack of oppression of Russian speakers in Ukraine. 🤓 The CyberCompote channel will publish the full version of the briefs. Subscribe and follow the updates!
- ATTACK ON CJSC "WAGON-SERVICE"
We launch a cyber strike against a company that serves the Russian aggressor's railway logistics. 💥 Workstations are encrypted. 💥 The domain controller is in our hands. 💥 All document workflow, emails, data from servers (over 2 TB) have been extracted. 💥 Originals and backups encrypted/deleted. Hacking details CJSC Wagon-Service is a Russian company that specialises in the maintenance of railway trains and includes 101 enterprises across Russia. The company works closely with Russian Railways and has many letters of appreciation for servicing the Russian aggressor's railway logistics. CyberPartisans launched an attack on the servers of CJSC Wagon-Service on Friday 19 May 2023. They successfully penetrated the network, extracted data and started encrypting. On the night of Friday to Saturday, the company realised they had been hacked and tried to counteract us, but without success. Everything they rolled back, we finished overnight Sunday to Monday. In the end, on 22 May 2023, the attack was successful. 🔥 As one of our hacktivists who took part in the hack comments: Every screw in this Rashist regime must break, every cog must stop. Moscow occupiers, get the hell out of Belarus and Ukraine! If you help the RF war machine, you share responsibility for the crimes. P.S. JiveBelarus new password for all your accounts. 🔘🔴🔘