jc_stubbs Profile Banner
Jack Stubbs Profile
Jack Stubbs

@jc_stubbs

Followers
9K
Following
5K
Media
48
Statuses
407

Chief Intelligence Officer, @Graphika_NYC. Previously: Russia, Ukraine, cyber for @Reuters. All views my own - this one ☝️ is the Isle of Harris.

Joined September 2012
Don't wanna be here? Send us removal request.
@jc_stubbs
Jack Stubbs
10 months
RT @snlyngaas: New —> We tied the email addresses reportedly used in non-credible bomb threats on Election Day to a much broader campaign o….
cnn.com
Federal investigators are running down email addresses from Russian internet domains that were used to make a slew of non-credible bomb threats across swing states on Election Day.
0
472
0
@jc_stubbs
Jack Stubbs
10 months
RT @Graphika_NYC: A new report from @CNN featuring exclusive insights from Graphika's @jc_stubbs looks at numerous non-credible bomb threat….
0
6
0
@grok
Grok
22 days
The most fun image & video creation tool in the world is here. Try it for free in the Grok App.
0
161
2K
@jc_stubbs
Jack Stubbs
10 months
Be watchful. Be wary. But don’t get taken in.
1
4
16
@jc_stubbs
Jack Stubbs
10 months
The point is they want our attention. They want to waste our time. And they want our outrage. As @olgs7, @LeeFosterIntel, @RidT, and Gavin Wilde explained so well back in May, it’s how they can claim “impact” - both with the U.S. public and their bosses.
Tweet card summary image
foreignaffairs.com
Underplaying the risk helps foreign propagandists—but so does exaggerating it.
1
5
21
@jc_stubbs
Jack Stubbs
10 months
Or the 2022 midterms, when Russian-operated inauthentic accounts theatrically confessed and “apologized” for their actions
Tweet media one
1
3
12
@jc_stubbs
Jack Stubbs
10 months
Russian IO has a history of this kind of puerile and attention-seeking behavior. Some of us are old enough to remember the heydays of “Peace Data” and “NAEBC” .
Tweet media one
Tweet media two
2
3
13
@jc_stubbs
Jack Stubbs
10 months
What happens when you put all those puzzle pieces together. ? My colleagues at @Graphika_NYC have the answer.
Tweet media one
1
5
19
@jc_stubbs
Jack Stubbs
10 months
That content has impersonated the FBI, the CIA, and a bunch of media outlets. And a number of the Operation Overload posts have contained a QR code embedded with a cryptic little puzzle piece.
Tweet media one
Tweet media two
1
6
11
@jc_stubbs
Jack Stubbs
10 months
In recent weeks, days, and hours, we’ve seen a steady drumbeat of content seeded by a Russia-linked operation variously known as Operation Overload and Matryoshka. The folks at @antibot4navalny and @CheckFirstHQ have done a great job documenting its activities publicly.
1
4
14
@jc_stubbs
Jack Stubbs
10 months
🧩As in previous U.S. election cycles, Russia-linked influence operations have attempted to spread false and inflammatory claims online using deceptive practices. Something else that remains the same: They want our attention and they are trolling us.
7
54
98
@jc_stubbs
Jack Stubbs
2 years
RT @DisinfoEU: Many of you read @wapo’s investigation and we want to reiterate that there's no association between us and 'The DisinfoLab',….
0
66
0
@jc_stubbs
Jack Stubbs
2 years
@NCSC @Graphika_NYC @DFRLab @CrimeSecurityCU @oiioxford @benimmo @Reddit @Reuters @pearswick @Bing_Chris Importantly for IO folks, this does not mean that Secondary Infektion = the FSB. But it’s one more step forward in what has been a years-long journey of discovery.
1
1
9
@jc_stubbs
Jack Stubbs
2 years
@NCSC @Graphika_NYC @DFRLab @CrimeSecurityCU @oiioxford @benimmo @Reddit @Reuters And today we learn those hackers were a group of FSB officers. An actor also known as Callisto Group, SEABORGIUM, or COLDRIVER. @pearswick and @Bing_Chris reported some fascinating details on COLDRIVER earlier this year.
reuters.com
A Russian hacking team known as Cold River targeted three nuclear research laboratories in the United States this past summer, according to internet records reviewed by Reuters and five cyber...
1
2
12
@jc_stubbs
Jack Stubbs
2 years
@NCSC @Graphika_NYC @DFRLab @CrimeSecurityCU @oiioxford @benimmo @Reddit Myself and colleagues at @Reuters later reported that the leaked documents were stolen by state-backed Russian hackers from the email inbox of then UK trade minister Liam Fox.
Tweet card summary image
reuters.com
Classified U.S.-UK trade documents leaked ahead of Britain's 2019 election were stolen from the email account of former trade minister Liam Fox by suspected Russian hackers, two sources with direct...
1
1
12
@jc_stubbs
Jack Stubbs
2 years
@NCSC @Graphika_NYC @DFRLab @CrimeSecurityCU @oiioxford What we found, as detailed by @benimmo at the time, was that the way the papers were first seeded and amplified online exactly matched the behavioral fingerprint of a long-standing Russian influence operation called Secondary Infektion.
1
2
9
@jc_stubbs
Jack Stubbs
2 years
@NCSC Those leaked papers were widely circulated by the UK Labour Party during the election campaign. Myself and researchers including @Graphika_NYC, @DFRLab, @CrimeSecurityCU, and @oiioxford were the first to ask where they came from .
Tweet card summary image
reuters.com
The leak and distribution of classified British-U.S. trade documents online resembles a disinformation campaign uncovered this year that originated in Russia, according to experts who say it could...
1
0
10
@jc_stubbs
Jack Stubbs
2 years
According to the UK's @NCSC, it was hackers almost certainly subordinate to FSB Centre 18 who stole confidential UK-US trade documents which were then leaked ahead of the election by Russia-linked influence operation Secondary Infektion .
Tweet card summary image
gov.uk
The UK condemns Russia’s sustained attempts at political interference in the UK and globally.
1
3
10
@jc_stubbs
Jack Stubbs
2 years
I don’t post much anymore, but today more news dropped in a story I have been following (and reporting) for almost exactly 4 years. It still surprises me how few people are aware, or acknowledge, that Russia targeted the UK 2019 general election with a hack-and-leak operation.
3
49
100