Этот коммит содержится в:
Maarten 2024-09-20 15:13:21 +02:00
родитель e7807c542a
Коммит 8ee1bb85f2
6 изменённых файлов: 174 добавлений и 0 удалений

71
package-lock.json сгенерированный
Просмотреть файл

@ -13,6 +13,7 @@
"@sveltejs/vite-plugin-svelte": "^3.0.0",
"@types/eslint": "^9.6.0",
"archieml": "^0.5.0",
"d3-fetch": "^3.0.1",
"eslint": "^9.0.0",
"eslint-config-prettier": "^9.1.0",
"eslint-plugin-svelte": "^2.36.0",
@ -1133,6 +1134,15 @@
"integrity": "sha512-dOy+3AuW3a2wNbZHIuMZpTcgjGuLU/uBL/ubcZF9OXbDo8ff4O8yVp5Bf0efS8uEoYo5q4Fx7dY9OgQGXgAsQA==",
"dev": true
},
"node_modules/commander": {
"version": "7.2.0",
"resolved": "https://registry.npmjs.org/commander/-/commander-7.2.0.tgz",
"integrity": "sha512-QrWXB+ZQSVPmIWIhtEO9H+gwHaMGYiF5ChvoJ+K9ZGHG/sVsa6yiesAD1GC/x46sET00Xlwo1u49RVVVzvcSkw==",
"dev": true,
"engines": {
"node": ">= 10"
}
},
"node_modules/concat-map": {
"version": "0.0.1",
"resolved": "https://registry.npmjs.org/concat-map/-/concat-map-0.0.1.tgz",
@ -1187,6 +1197,43 @@
"node": ">=4"
}
},
"node_modules/d3-dsv": {
"version": "3.0.1",
"resolved": "https://registry.npmjs.org/d3-dsv/-/d3-dsv-3.0.1.tgz",
"integrity": "sha512-UG6OvdI5afDIFP9w4G0mNq50dSOsXHJaRE8arAS5o9ApWnIElp8GZw1Dun8vP8OyHOZ/QJUKUJwxiiCCnUwm+Q==",
"dev": true,
"dependencies": {
"commander": "7",
"iconv-lite": "0.6",
"rw": "1"
},
"bin": {
"csv2json": "bin/dsv2json.js",
"csv2tsv": "bin/dsv2dsv.js",
"dsv2dsv": "bin/dsv2dsv.js",
"dsv2json": "bin/dsv2json.js",
"json2csv": "bin/json2dsv.js",
"json2dsv": "bin/json2dsv.js",
"json2tsv": "bin/json2dsv.js",
"tsv2csv": "bin/dsv2dsv.js",
"tsv2json": "bin/dsv2json.js"
},
"engines": {
"node": ">=12"
}
},
"node_modules/d3-fetch": {
"version": "3.0.1",
"resolved": "https://registry.npmjs.org/d3-fetch/-/d3-fetch-3.0.1.tgz",
"integrity": "sha512-kpkQIM20n3oLVBKGg6oHrUchHM3xODkTzjMoj7aWQFq5QEM+R6E4WkzT5+tojDY7yjez8KgCBRoj4aEr99Fdqw==",
"dev": true,
"dependencies": {
"d3-dsv": "1 - 3"
},
"engines": {
"node": ">=12"
}
},
"node_modules/debug": {
"version": "4.3.7",
"resolved": "https://registry.npmjs.org/debug/-/debug-4.3.7.tgz",
@ -1630,6 +1677,18 @@
"node": ">=8"
}
},
"node_modules/iconv-lite": {
"version": "0.6.3",
"resolved": "https://registry.npmjs.org/iconv-lite/-/iconv-lite-0.6.3.tgz",
"integrity": "sha512-4fCk79wshMdzMp2rH06qWrJE4iolqLhCUH+OiuIgU++RB0+94NlDL81atO7GX55uUKueo0txHNtvEyI6D7WdMw==",
"dev": true,
"dependencies": {
"safer-buffer": ">= 2.1.2 < 3.0.0"
},
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/ignore": {
"version": "5.3.2",
"resolved": "https://registry.npmjs.org/ignore/-/ignore-5.3.2.tgz",
@ -2272,6 +2331,12 @@
"queue-microtask": "^1.2.2"
}
},
"node_modules/rw": {
"version": "1.3.3",
"resolved": "https://registry.npmjs.org/rw/-/rw-1.3.3.tgz",
"integrity": "sha512-PdhdWy89SiZogBLaw42zdeqtRJ//zFd2PgQavcICDUgJT5oW10QCRKbJ6bg4r0/UY2M6BWd5tkxuGFRvCkgfHQ==",
"dev": true
},
"node_modules/sade": {
"version": "1.8.1",
"resolved": "https://registry.npmjs.org/sade/-/sade-1.8.1.tgz",
@ -2284,6 +2349,12 @@
"node": ">=6"
}
},
"node_modules/safer-buffer": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/safer-buffer/-/safer-buffer-2.1.2.tgz",
"integrity": "sha512-YZo3K82SD7Riyi0E1EQPojLz7kpepnSQI9IyPbHHg1XXXevb5dJI7tpyN2ADxGcQbHG7vcyRHk0cbwqcQriUtg==",
"dev": true
},
"node_modules/sass": {
"version": "1.79.2",
"resolved": "https://registry.npmjs.org/sass/-/sass-1.79.2.tgz",

Просмотреть файл

@ -16,6 +16,7 @@
"@sveltejs/vite-plugin-svelte": "^3.0.0",
"@types/eslint": "^9.6.0",
"archieml": "^0.5.0",
"d3-fetch": "^3.0.1",
"eslint": "^9.0.0",
"eslint-config-prettier": "^9.1.0",
"eslint-plugin-svelte": "^2.36.0",

27
src/lib/components/CaseCard.svelte Обычный файл
Просмотреть файл

@ -0,0 +1,27 @@
<script>
export let cardData;
</script>
<div class="card">
<div class="card-header">
<div class="card-header-title">
<h2 class="is-size-3">Don't cases have titles?</h2>
</div>
</div>
<div class="card-image">
<figure class="image">
<img src={cardData.image_url} alt={cardData.image_credit} />
</figure>
</div>
<div class="card-content">
<div class="content">
<p>{cardData.attribution_date}</p>
<p>{cardData.short_description}</p>
<p>
<span class="tag is-info">{cardData.source}</span>
<span class="tag is-danger">{cardData.actor_nation}</span>
<span class="tag is-link">{cardData.source_category}</span>
</p>
</div>
</div>
</div>

35
src/lib/components/CaseTable.svelte Обычный файл
Просмотреть файл

@ -0,0 +1,35 @@
<script>
export let cases
</script>
<div class="table-container">
<table class="table is-striped is-fullwidth">
<thead>
<tr>
<td>Description</td>
<td>Attribution date</td>
<td>Source</td>
<td>Source category</td>
<td>Actor nation</td>
</tr>
</thead>
<tbody>
{#each cases as attrCase}
<tr>
<td>{attrCase.short_description}</td>
<td>{attrCase.attribution_date}</td>
<td>{attrCase.source}</td>
<td>{attrCase.source_category}</td>
<td>{attrCase.actor_nation}</td>
</tr>
{/each}
</tbody>
</table>
</div>
<style>
thead {
font-weight: bold;
}
</style>

Просмотреть файл

@ -1,5 +1,19 @@
<script>
import copy from "../data/copy.json"
import { onMount } from "svelte";
import { csv } from "d3-fetch"
import { base } from '$app/paths';
import CaseCard from "$lib/components/CaseCard.svelte";
import CaseTable from "$lib/components/CaseTable.svelte";
let cases = []
onMount(async function () {
//const response = await csv(`https://fiat-2024-processed-data.s3.us-west-2.amazonaws.com/Demo_Attribution_Data.csv`);
const response = await csv(`${base}/Demo_Attribution_Data.csv`);
cases = response
})
$: console.log(cases)
</script>
<section class="section">
@ -12,3 +26,22 @@
{/each}
</div>
</section>
<section>
<div class="container">
<div class="grid is-col-min-16">
{#each cases as attrCase}
<div class="cell">
<CaseCard cardData={attrCase}>
</CaseCard>
</div>
{/each}
</div>
</div>
</section>
<section>
<div class="container">
<CaseTable {cases}></CaseTable>
</div>
</section>

7
static/Demo_Attribution_Data.csv Обычный файл
Просмотреть файл

@ -0,0 +1,7 @@
attribution_id,attribution_url,short_description,image_url,image_credit,attribution_archive_url,attribution_type,attribution_date,start_date,end_date,source,source_nation,source_category,actor,actor_nation,campaign,sub_actor_1,sub_actor_nation_1,sub_actor_parent_org_1,campaign_tag_1,sub_actor_2,sub_actor_nation_2,sub_actor_parent_org_2,campaign_tag_2,sub_actor_3,sub_actor_nation_3,sub_actor_parent_org_3,campaign_tag_3,sub_actor_4,sub_actor_nation_4,sub_actor_parent_org_4,campaign_tag_4,sub_actor_5,sub_actor_nation_5,sub_actor_parent_org_5,campaign_tag_5,open_web,platform,other,methods,attribution_financial_incentive,attribution_financial_transparency,attribution_endorse_political,attribution_campaign_affiliation,attribution_published_mis_disinfo,attribution_credibility_score,attribution_language,attribution_convey_content,attribution_factual_argument,attribution_objectivity_score,attribution_clarity,attribution_context,attribution_identified_responsibility,attribution_strategic_rationale,attribution_privileged_evidence,attribution_evidence_score,attribution_open_access,attribution_methodology,attribution_open_source,attribution_acknowledge_limitations,attribution_corroboration,attribution_transparency_score,attribution_total_score
1,https://www.nbcnews.com/news/investigations/russias-2024-election-interference-already-begun-rcna134204,"NBC article on Russia spreading disinformation to damage President Biden and Democrats, undercut U.S. aid to Ukraine, and weaken NATO support. Experts warn of sophisticated tactics including deepfakes and hack-and-leak operations targeting the 2024 election.",https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3859.jpg?raw=true,placeholder_1,http://archive.today/2024.02.27-220620/https://www.nbcnews.com/news/investigations/russias-2024-election-interference-already-begun-rcna134204,Direct Attribution - The source directly accuses the disinformant of malicious political behavior.,2024-02-26,,,NBC News,USA,Media,,Russia,,,,,,,,,,,,,,,,,,,,,,State Media,Facebook;Twitter;Telegram,,Sockpuppets;Coordinated Automated Account Activity;Cheapfakes;Generative AI,,,,,,,,,,,,,,,,,,,,,,,
2,https://www.fdd.org/wp-content/uploads/2024/03/fdd-memo-much-ado-about-%E2%80%98somethings.pdf,"FDD researchers report on a previously unrecognized component of Spamouflage, a China-linked influence operation, operating over 450 Facebook pages and user profiles. The network, dubbed ""War of Somethings"" (WoS), promotes anti-American and anti-Western narratives, and has begun posting content related to the 2024 U.S. elections.",https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3860.jpg?raw=true,placeholder_2,http://archive.today/2024.09.10-171613/https://www.fdd.org/wp-content/uploads/2024/03/fdd-memo-much-ado-about-%E2%80%98somethings.pdf,Direct Attribution - The source directly accuses the disinformant of malicious political behavior.,2024-03-27,2023-07-01,2024-03-27,Foundation for Defense of Democracies,China,Civil Society Organization,Spamouflauge/ 912 Special Project Working Group/ War of Somethings,China,,,,,,,,,,,,,,,,,,,,,,Independent Media,Facebook,,Sockpuppets;Cheapfakes;Generative AI;Coordinated Automated Account Activity,,,,,,,,,,,,,,,,,,,,,,,
3,https://www.isdglobal.org/digital_dispatches/pro-ccp-spamouflage-campaign-experiments-with-new-tactics-targeting-the-us/,"ISD reports on new tactics used by the Spamouflage network, a long-running pro-CCP influence operation. The report identifies a new strategy dubbed 'MAGAflage', where accounts pose as right-wing Americans to exploit domestic divisions and increase influence. This tactic has shown potential to be more effective than previous Spamouflage efforts.",https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3861.jpg?raw=true,placeholder_3,http://archive.today/2024.04.04-025352/https://www.isdglobal.org/digital_dispatches/pro-ccp-spamouflage-campaign-experiments-with-new-tactics-targeting-the-us/,Direct Attribution - The source directly accuses the disinformant of malicious political behavior.,2024-04-01,2023-04-01,2024-04-01,Institute for Strategic Dialogue,United States,Civil Society Organization,,China,,,,,,,,,,,,,,,,,,,,,,,Twitter,,Sockpuppets;Generative AI;Cheapfakes,,,,,,,,,,,,,,,,,,,,,,,
4,https://blogs.microsoft.com/on-the-issues/2024/04/04/china-ai-influence-elections-mtac-cybersecurity/,"Report by Microsoft Threat Analysis Center (MTAC) on China's use of fake social media accounts and AI-generated content in information operations to influence US voters, fuel divisons on controversial domestic issues, and further geopolitical interests. The report also included information North Korea's cyber operations to collect intelligence on the US, Japan, and South Korea.",https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3862.jpg?raw=true,placeholder_4,http://archive.is/2024.04.06-085327/https://blogs.microsoft.com/on-the-issues/2024/04/04/china-ai-influence-elections-mtac-cybersecurity/,Direct Attribution - The source directly accuses the disinformant of malicious political behavior.,2024-04-04,,,Microsoft,United States,Technology Company,Storm-1376,"China, North Korea",Storm-1376,,,,,,,,,,,,,,,,,,,,,,Twitter,,Sockpuppets;Generative AI;Cheapfakes,,,,,,,,,,,,,,,,,,,,,,,
11,https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf,Report by Microsoft Threat Analysis Center (MTAC) on escalation in Iranian influence activities after April 2024 in attempts to collect information on election campaigns and influence voters at opposing ends of the political spectrum. (includes Trump Campaign Hack),https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3863.jpg?raw=true,placeholder_5,https://web.archive.org/web/20240809082628/https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf,Direct Attribution - The source directly accuses the disinformant of malicious political behavior.,2024-08-09,,,Microsoft Threat Analysis Center,US,Technology Company,Iran,Iran,,Sefid Flood,Iran,,Storm-1376,Mint Sandstorm,Iran,IRGC,,Peach Sandstorm (APT-33),Iran,IRGC,,Storm-2035,Iran,,,,,,,"""Junk News""",Twitter,Email,Sockpuppets;Data Exfiltration;Generative AI;Cheapfakes,1.0,1.0,1.0,1.0,1.0,5.0,1.0,1.0,1.0,3.0,1.0,1.0,1.0,1.0,1.0,5.0,0.0,0.0,0.0,0.0,1.0,1.0,14.0
5,https://blogs.microsoft.com/on-the-issues/2024/04/17/russia-us-election-interference-deepfakes-ai/,Report by Microsoft Threat Analysis Center (MTAC) on Russia's influence operations to undermine US support for Ukraine on traditional and social media and China's CCP-linked actors leverage generative AI technologies to sow societal divisions and undermine democracy.,https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3864.jpg?raw=true,placeholder_6,https://web.archive.org/web/20240905204911/https://blogs.microsoft.com/on-the-issues/2024/04/17/russia-us-election-interference-deepfakes-ai/,Direct Attribution - The source directly accuses the disinformant of malicious political behavior.,2024-04-17,,,Microsoft,United States,Technology Company,"Storm-1516, Storm-1099",Russia,,,,,,,,,,,,,,,,,,,,,,,,,Sockpuppets;Cheapfakes;Generative AI;Search Engine Manipulation,,,,,,,,,,,,,,,,,,,,,,,
1 attribution_id attribution_url short_description image_url image_credit attribution_archive_url attribution_type attribution_date start_date end_date source source_nation source_category actor actor_nation campaign sub_actor_1 sub_actor_nation_1 sub_actor_parent_org_1 campaign_tag_1 sub_actor_2 sub_actor_nation_2 sub_actor_parent_org_2 campaign_tag_2 sub_actor_3 sub_actor_nation_3 sub_actor_parent_org_3 campaign_tag_3 sub_actor_4 sub_actor_nation_4 sub_actor_parent_org_4 campaign_tag_4 sub_actor_5 sub_actor_nation_5 sub_actor_parent_org_5 campaign_tag_5 open_web platform other methods attribution_financial_incentive attribution_financial_transparency attribution_endorse_political attribution_campaign_affiliation attribution_published_mis_disinfo attribution_credibility_score attribution_language attribution_convey_content attribution_factual_argument attribution_objectivity_score attribution_clarity attribution_context attribution_identified_responsibility attribution_strategic_rationale attribution_privileged_evidence attribution_evidence_score attribution_open_access attribution_methodology attribution_open_source attribution_acknowledge_limitations attribution_corroboration attribution_transparency_score attribution_total_score
2 1 https://www.nbcnews.com/news/investigations/russias-2024-election-interference-already-begun-rcna134204 NBC article on Russia spreading disinformation to damage President Biden and Democrats, undercut U.S. aid to Ukraine, and weaken NATO support. Experts warn of sophisticated tactics including deepfakes and hack-and-leak operations targeting the 2024 election. https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3859.jpg?raw=true placeholder_1 http://archive.today/2024.02.27-220620/https://www.nbcnews.com/news/investigations/russias-2024-election-interference-already-begun-rcna134204 Direct Attribution - The source directly accuses the disinformant of malicious political behavior. 2024-02-26 NBC News USA Media Russia State Media Facebook;Twitter;Telegram Sockpuppets;Coordinated Automated Account Activity;Cheapfakes;Generative AI
3 2 https://www.fdd.org/wp-content/uploads/2024/03/fdd-memo-much-ado-about-%E2%80%98somethings.pdf FDD researchers report on a previously unrecognized component of Spamouflage, a China-linked influence operation, operating over 450 Facebook pages and user profiles. The network, dubbed "War of Somethings" (WoS), promotes anti-American and anti-Western narratives, and has begun posting content related to the 2024 U.S. elections. https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3860.jpg?raw=true placeholder_2 http://archive.today/2024.09.10-171613/https://www.fdd.org/wp-content/uploads/2024/03/fdd-memo-much-ado-about-%E2%80%98somethings.pdf Direct Attribution - The source directly accuses the disinformant of malicious political behavior. 2024-03-27 2023-07-01 2024-03-27 Foundation for Defense of Democracies China Civil Society Organization Spamouflauge/ 912 Special Project Working Group/ War of Somethings China Independent Media Facebook Sockpuppets;Cheapfakes;Generative AI;Coordinated Automated Account Activity
4 3 https://www.isdglobal.org/digital_dispatches/pro-ccp-spamouflage-campaign-experiments-with-new-tactics-targeting-the-us/ ISD reports on new tactics used by the Spamouflage network, a long-running pro-CCP influence operation. The report identifies a new strategy dubbed 'MAGAflage', where accounts pose as right-wing Americans to exploit domestic divisions and increase influence. This tactic has shown potential to be more effective than previous Spamouflage efforts. https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3861.jpg?raw=true placeholder_3 http://archive.today/2024.04.04-025352/https://www.isdglobal.org/digital_dispatches/pro-ccp-spamouflage-campaign-experiments-with-new-tactics-targeting-the-us/ Direct Attribution - The source directly accuses the disinformant of malicious political behavior. 2024-04-01 2023-04-01 2024-04-01 Institute for Strategic Dialogue United States Civil Society Organization China Twitter Sockpuppets;Generative AI;Cheapfakes
5 4 https://blogs.microsoft.com/on-the-issues/2024/04/04/china-ai-influence-elections-mtac-cybersecurity/ Report by Microsoft Threat Analysis Center (MTAC) on China's use of fake social media accounts and AI-generated content in information operations to influence US voters, fuel divisons on controversial domestic issues, and further geopolitical interests. The report also included information North Korea's cyber operations to collect intelligence on the US, Japan, and South Korea. https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3862.jpg?raw=true placeholder_4 http://archive.is/2024.04.06-085327/https://blogs.microsoft.com/on-the-issues/2024/04/04/china-ai-influence-elections-mtac-cybersecurity/ Direct Attribution - The source directly accuses the disinformant of malicious political behavior. 2024-04-04 Microsoft United States Technology Company Storm-1376 China, North Korea Storm-1376 Twitter Sockpuppets;Generative AI;Cheapfakes
6 11 https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf Report by Microsoft Threat Analysis Center (MTAC) on escalation in Iranian influence activities after April 2024 in attempts to collect information on election campaigns and influence voters at opposing ends of the political spectrum. (includes Trump Campaign Hack) https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3863.jpg?raw=true placeholder_5 https://web.archive.org/web/20240809082628/https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf Direct Attribution - The source directly accuses the disinformant of malicious political behavior. 2024-08-09 Microsoft Threat Analysis Center US Technology Company Iran Iran Sefid Flood Iran Storm-1376 Mint Sandstorm Iran IRGC Peach Sandstorm (APT-33) Iran IRGC Storm-2035 Iran "Junk News" Twitter Email Sockpuppets;Data Exfiltration;Generative AI;Cheapfakes 1.0 1.0 1.0 1.0 1.0 5.0 1.0 1.0 1.0 3.0 1.0 1.0 1.0 1.0 1.0 5.0 0.0 0.0 0.0 0.0 1.0 1.0 14.0
7 5 https://blogs.microsoft.com/on-the-issues/2024/04/17/russia-us-election-interference-deepfakes-ai/ Report by Microsoft Threat Analysis Center (MTAC) on Russia's influence operations to undermine US support for Ukraine on traditional and social media and China's CCP-linked actors leverage generative AI technologies to sow societal divisions and undermine democracy. https://github.com/Mrizzuto/FIAT-2024-Temp-Images/blob/main/wc190924_3864.jpg?raw=true placeholder_6 https://web.archive.org/web/20240905204911/https://blogs.microsoft.com/on-the-issues/2024/04/17/russia-us-election-interference-deepfakes-ai/ Direct Attribution - The source directly accuses the disinformant of malicious political behavior. 2024-04-17 Microsoft United States Technology Company Storm-1516, Storm-1099 Russia Sockpuppets;Cheapfakes;Generative AI;Search Engine Manipulation