Fraudology Podcast with Karisse Hendrick

Identifying Inauthentic Behavior & Financially Motivated Scams on Social Media | Assaf Kipnis (ex- Facebook / Meta)Pt. 2


Listen Later

Fraudology is presented by Sardine. Request a 1:! product demo at sardine.ai

In this episode of Fraudology, Karisse is joined once again by Assaf Kipnis, former Engineering Manager for Integrity Investigations at Meta (previously Facebook). For the 2nd half of this informative conversation, Assaf provides examples of how his team studied & identified the TTPs (Tactics, Techniques, and Procedures) of some of the most complex & pervasion threats to integrity he & his team discovered & dismantled over the last several years of his career. -

Within this episode, Assaf particularly focuses on two of the most innovative threat tactics targeting legitimate users that his team dealt with: Inauthentic Behavior & Financially motivated scams. Some of the topics discussed include:

  • How identifying the motivation & behavior of two schemes that may, on the surface seem similar is critical to get to the root cause & ban the behavior in the future; example: "mis-" or "dis-information" versus "inauthentic behavior". While these terms are often generalized as the former, when it comes to eradicating the behavior, the details of the differences are critically important
  • The potential financial & reputational damage of "inauthentic behavior", and how focusing on behavior versus content is key when identifying coordinated attacks
  • Slight detour to discuss the privilege of having an in-house engineering team for integrity investigations, some tips for what to do if these types of issues can't be solved in-house, the importance of "babysitting" machine learning, and a few cautionary tips when considering new partners for 3rd party detection
  • The most pervasive & impactful financially motivated scams targeting social media platforms & users including "pig-butchering" (crypto scams that often target western citizens; typically originating in SE Asia), investment scams, and impersonation scams; how understanding the role & perspective that social media companies have on this behavior can be helpful in identifying the same attackers manipulating multiple systems for one overall crime

This conversation is incredibly fascinating! Especially if you've ever wondered how complex, yet sophisticated the Trust & Safety team at Meta needs to be to stay on the frontlines of identifying new attacks no one has seen before.

To connect with Assaf Kipnis directly: https://www.linkedin.com/in/assafkipnis/

Links to Additional Information Mentioned by Karisse in the Intro:

The "Coordinated Inauthentic Behavior Report" published by Meta in October 2020:

https://about.fb.com/wp-content/uploads/2020/10/Inauthentic-Behavior-Report-October-2020.pdf

Examples of "Coordinated Inauthentic Behavior" that Assaf's team may have been responsible for detecting & disbanding:

"Removing Coordinated Inauthentic Behavior from Iran, Russia, Macedonia, and Kosovo"; Released March 2019

https://about.fb.com/news/2019/03/cib-iran-russia-macedonia-kosovo/

"Removing Coordinated Inauthentic Behavior from Georgia, Vietnam, and the US"; released December 2019: https://about.fb.com/news/2019/12/removing-coordinated-inauthentic-behavior-from-georgia-vietnam-and-the-us/

Fraudology is hosted by Karisse Hendrick, a fraud fighter with decades of experience advising hundreds of the biggest ecommerce companies in the world on fraud, chargebacks, and other forms of abuse impacting a company's bottom line.

Connect with her on LinkedIn

She brings her experience, expertise, and extensive network of experts to this podcast weekly, on Tuesdays.

...more
View all episodesView all episodes
Download on the App Store

Fraudology Podcast with Karisse HendrickBy Rolled Up

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

36 ratings


More shows like Fraudology Podcast with Karisse Hendrick

View all
WSJ What’s News by The Wall Street Journal

WSJ What’s News

4,356 Listeners

This Week in Tech (Audio) by TWiT

This Week in Tech (Audio)

3,057 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,000 Listeners

WSJ Tech News Briefing by The Wall Street Journal

WSJ Tech News Briefing

1,639 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,019 Listeners

Click Here by Recorded Future News

Click Here

416 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,016 Listeners

The Indicator from Planet Money by NPR

The Indicator from Planet Money

9,529 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

177 Listeners

The Perfect Scam by AARP

The Perfect Scam

1,096 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

Fiction - Comedy Fiction by The Sunset Explorers

Fiction - Comedy Fiction

6,444 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

136 Listeners

Hard Fork by The New York Times

Hard Fork

5,472 Listeners

Pitstop with Sarah Levinger by Rolled Up Podcast Network

Pitstop with Sarah Levinger

14 Listeners

Lucas Walker's Rolled Up by Rolled Up Podcast Network

Lucas Walker's Rolled Up

25 Listeners

Whale Informed by Triple Whale by Triple Whale

Whale Informed by Triple Whale

3 Listeners

Banking on Fraudology by Hailey Windham

Banking on Fraudology

17 Listeners

Bricks and Clicks by Triple Whale Network

Bricks and Clicks

6 Listeners

Adspend with Ash Melwani and Rabah Rahil by Triple Whale Network

Adspend with Ash Melwani and Rabah Rahil

9 Listeners

Original Escapes (Original Heists) hosted by Wes Barker by Triple Whale

Original Escapes (Original Heists) hosted by Wes Barker

22 Listeners

Agency Algorithm by Agency Podcast Network

Agency Algorithm

4 Listeners