Telstra leak: Operation Deep Packet Inspection

Trolling like a pro


Satire

Memo: Commercial-in-Confidence

From: <REDACTED>, Telstra Social Media Market Research

To: <REDACTED>

It would be nice to report the unequivocal success of our first test of Twitter as a market research tool, but for reasons outlined below, I am afraid I cannot.

To recap the high points of the campaign, the strategy was as follows:

Phase 1: Leak story to media

Outcome: Success Once media reports emerged that Telstra intends to trial various traffic management techniques including (possibly) Deep Packet Inspection to “improve the customer experience”, the story was reposted many hundreds of times on Twitter.

This is a far more effective strategy than releasing similar information using an official Telstra account as the first source of information. For some reason, people who believe in the obsolescence of mainstream media still exhibit a remarkable dependency on these outlets as their primary sources.

Phase 2: Troll social media with vague official response

Outcome: Success Twitter users’ dissatisfaction with Telstra’s official response was quite gratifying, since they helped spread the story even further than its original footprint to tell each other that we were not taking their concerns seriously.

The multiplier effect of the “fake response strategy” is noted and will be refined in future campaigns.

A special mention goes to <REDACTED> whose brilliant suggestion left our statement sufficiently vague that nobody can tell which network (ADSL, cable, 3G, 4G) will be used in the test. This allowed plenty of latitude for further argument about the nature and purpose of the test.

Phase 3: Analysis of responses

Outcome: Mixed While the exercise provided a great deal of data, as you can see in the chart below, much of the data had to be discarded:

While eliminating bots (including our own) was easy, a strong favourable response in our initial analysis turned out to be a false positive, since the hashtag #DPI overlapped with a discussion of a Department of Primary Industries educational initiative.

We were thus disappointed to find that once we corrected the data for this mistake, only 2 percent of responses justified analysis. At this point, it became easier to skip the “Big Data” approach and use a spreadsheet for analysis:

Deep Packet Inspection is a “hot button” topic for anybody operating an “Anonymous” account, which meant a number of “serious” responses to the story are of no real value. We already know what Anonymous thinks of us, and most operators of such accounts are not located in Australia.

Of the remainder, 28 percent were already known as accounts that “hate Telstra” – Whirlpool users, our competitors and so on.

Pickup by the indefatigable Malcolm Turnbull might have been useful, except that his own followers generate a predictable pattern of discussion, mostly from known individuals.

The number of Telstra staff and consultants responding on their own time would be gratifying, except that it also resulted in a significant number of responses having to be disregarded. We should improve our internal communications before attempting similar exercises in the future.

This left a mere five percent of responses providing useful information: Telstra customers, non-Telstra customers, “bush lawyers” (by which I mean people who consider their grasp of the legality of DPI as better than our internal legal team), those who don’t understand what’s going on, and experts.

Regrettably, we were unable to find any supporters of the original “proposal”.

The most important data point, it appears to me, is the very low proportion of clueless users. This suggests that if we are proposing an initiative that’s likely to be unpopular, a great deal more obfuscation of our intent will be required to ensure success.

To conclude, then, Operation Deep Packet Inspection tells us that our use of social media as a market research tool is in its infancy. It will need considerable refinement before it comes anywhere close to yielding the petabytes of analytical data we believed would result.

<SIGNATURE REDACTED>

Similar topics


Other stories you might like

  • DigitalOcean sets sail for serverless seas with Functions feature
    Might be something for those who find AWS, Azure, GCP overly complex

    DigitalOcean dipped its toes in the serverless seas Tuesday with the launch of a Functions service it's positioning as a developer-friendly alternative to Amazon Web Services Lambda, Microsoft Azure Functions, and Google Cloud Functions.

    The platform enables developers to deploy blocks or snippets of code without concern for the underlying infrastructure, hence the name serverless. However, according to DigitalOcean Chief Product Officer Gabe Monroy, most serverless platforms are challenging to use and require developers to rewrite their apps for the new architecture. The ultimate goal being to structure, or restructure, an application into bits of code that only run when events occur, without having to provision servers and stand up and leave running a full stack.

    "Competing solutions are not doing a great job at meeting developers where they are with workloads that are already running today," Monroy told The Register.

    Continue reading
  • Patch now: Zoom chat messages can infect PCs, Macs, phones with malware
    Google Project Zero blows lid off bug involving that old chestnut: XML parsing

    Zoom has fixed a security flaw in its video-conferencing software that a miscreant could exploit with chat messages to potentially execute malicious code on a victim's device.

    The bug, tracked as CVE-2022-22787, received a CVSS severity score of 5.9 out of 10, making it a medium-severity vulnerability. It affects Zoom Client for Meetings running on Android, iOS, Linux, macOS and Windows systems before version 5.10.0, and users should download the latest version of the software to protect against this arbitrary remote-code-execution vulnerability.

    The upshot is that someone who can send you chat messages could cause your vulnerable Zoom client app to install malicious code, such as malware and spyware, from an arbitrary server. Exploiting this is a bit involved, so crooks may not jump on it, but you should still update your app.

    Continue reading
  • Google says it would release its photorealistic DALL-E 2 rival – but this AI is too prejudiced for you to use
    It has this weird habit of drawing stereotyped White people, team admit

    DALL·E 2 may have to cede its throne as the most impressive image-generating AI to Google, which has revealed its own text-to-image model called Imagen.

    Like OpenAI's DALL·E 2, Google's system outputs images of stuff based on written prompts from users. Ask it for a vulture flying off with a laptop in its claws and you'll perhaps get just that, all generated on the fly.

    A quick glance at Imagen's website shows off some of the pictures it's created (and Google has carefully curated), such as a blue jay perched on a pile of macarons, a robot couple enjoying wine in front of the Eiffel Tower, or Imagen's own name sprouting from a book. According to the team, "human raters exceedingly prefer Imagen over all other models in both image-text alignment and image fidelity," but they would say that, wouldn't they.

    Continue reading
  • Facebook opens political ad data vaults to researchers
    Facebook builds FORT to protect against onslaught of regulation, investigation

    Meta's ad transparency tools will soon reveal another treasure trove of data: advertiser targeting choices for political, election-related, and social issue spots.

    Meta said it plans to add the targeting data into its Facebook Open Research and Transparency (FORT) environment for academic researchers at the end of May.

    The move comes a day after Meta's reputation as a bad data custodian resurfaced with news of a lawsuit filed in Washington DC against CEO Mark Zuckerberg. Yesterday's filing alleges Zuckerberg built a company culture of mishandling data, leading directly to the Cambridge Analytica scandal. The suit seeks to hold Zuckerberg responsible for the incident, which saw millions of users' data harvested and used to influence the 2020 US presidential election.

    Continue reading
  • Toyota cuts vehicle production over global chip shortage
    Just as Samsung pledges to invest $360b to shore up next-gen industries

    Toyota is to slash global production of motor vehicles due to the semiconductor shortage. The news comes as Samsung pledges to invest about $360 billion over the next five years to bolster chip production, along with other strategic sectors.

    In a statement, Toyota said it has had to lower the production schedule by tens of thousands of units globally from the numbers it provided to suppliers at the beginning of the year.

    "The shortage of semiconductors, spread of COVID-19 and other factors are making it difficult to look ahead, but we will continue to make every effort possible to deliver as many vehicles to our customers at the earliest date," the company said.

    Continue reading

Biting the hand that feeds IT © 1998–2022