SlideShare ist ein Scribd-Unternehmen logo
1 von 43
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
The business(es) of
cognitive security
SJ Terp, NYU Computational Disinformation Symposium, Dec 2021
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Cognitive Security is Infosec applied to
disinformation
“Cognitive security is the application of information security principles, practices, and tools
to misinformation, disinformation, and influence operations.
It takes a socio-technical lens to high-volume, high-velocity, and high-variety forms
of “something is wrong on the internet”.
Cognitive security can be seen as a holistic view of disinformation from a security
practitioner’s perspective
“Cognitive Security is the
application of artificial intelligence
technologies, modeled on human
thought processes, to detect
security threats.” - XTN
“Cognitive Security (COGSEC) refers to
practices, methodologies, and efforts
made to defend against social
engineering attempts‒intentional and
unintentional manipulations of and
disruptions to cognition and sensemaking”
- cogsec.org
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Cognitive Security is risk management
Confidentiality, integrity, availability
■ Confidentiality: data should only be visible to
people who authorized to see it
■ Integrity: data should not be altered in
unauthorized ways
■ Availability: data should be available to be
used
Possession, authenticity, utility
■ Possession: controlling the data media
■ Authenticity: accuracy and truth of the origin of
the information
■ Utility: usefulness (e.g. losing the encryption
key)
3
Image: Parkerian Hexad, from
https://www.sciencedirect.com/topics/computer-
science/parkerian-hexad
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Response frameworks
4
Campaigns
Incidents
Narratives and
behaviours
Artifacts
WHAT WHEN
Image: WHO emergency cycle - see
https://www.euro.who.int/en/health-topics/health-
emergencies/pages/about-health-emergencies-in-the-european-
region/emergency-cycle
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021 Behaviour models: AMITT Red, AMITT
Blue
5
Planning
Strate
gic
Planni
ng
Objec
tive
Planni
ng
Preparation
Devel
op
Peopl
e
Devel
op
Netwo
rks
Microt
argeti
ng
Devel
op
Conte
nt
Chan
nel
Select
ion
Execution
Pump
Primin
g
Expos
ure
Prebun
king
Humorou
s counter
narrative
s
Mark
content
with
ridicule /
decelera
nts
Expire
social
media
likes/
retweets
Influence
r
disavows
misinfo
Cut off
banking
access
Dampen
emotiona
l reaction
Remove
/ rate
limit
botnets
Social
media
amber
alert
Etc
Go
Physi
cal
Persis
tence
Eval
uati
on
Meas
ure
Effecti
venes
s
Have a
disinfor
mation
respon
se plan
Improve
stakehol
der
coordinat
ion
Make
civil
society
more
vibrant
Red
team
disinform
ation,
design
mitigatio
ns
Enhance
d privacy
regulatio
n for
social
media
Platform
regulatio
n
Shared
fact
checking
database
Repair
broken
social
connecti
ons
Pre-
emptive
action
against
disinform
ation
team
infrastruc
ture
Etc
Media
literacy
throug
h
games
Tabletop
simulatio
ns
Make
informati
on
provenan
ce
available
Block
access
to
disinform
ation
resource
s
Educate
influence
rs
Buy out
troll farm
employe
es / offer
jobs
Legal
action
against
for-profit
engagem
ent farms
Develop
compelli
ng
counter
narrative
s
Run
competin
g
campaig
ns
Etc
Find
and
train
influen
cers
Counter-
social
engineeri
ng
training
Ban
incident
actors
from
funding
sites
Address
truth in
narrative
s
Marginali
se and
discredit
extremist
groups
Ensure
platforms
are
taking
down
accounts
Name
and
shame
disinform
ation
influence
rs
Denigrat
e funding
recipient
/ project
Infiltrate
in-groups
Etc
Remov
e old
and
unused
accoun
ts
Unravel
Potemkin
villages
Verify
project
before
posting
fund
requests
Encoura
ge
people to
leave
social
media
Deplatfor
m
message
groups
and
boards
Stop
offering
press
credentia
ls to
disinform
ation
outlets
Free
open
library
sources
Social
media
source
removal
Infiltrate
disinform
ation
platforms
Etc
Fill
informa
tion
voids
Stem
flow of
advertisi
ng
money
Buy
more
advertisi
ng than
disinform
ation
creators
Reduce
political
targeting
Co-opt
disinform
ation
hashtags
Mentorsh
ip:
elders,
youth,
credit
Hijack
content
and
link to
informa
tion
Honeypo
t social
communi
ty
Corporat
e
research
funding
full
disclosur
e
Real-
time
updates
to
factchec
k
database
Remove
non-
relevant
content
from
special
interest
groups
Content
moderati
on
Prohibit
images
in
political
Chanels
Add
metadata
to
original
content
Add
warning
labels on
sharing
Etc
Rate-
limit
engage
ment
Redirect
searches
away
from
disinfo
Honeypo
t: fake
engagem
ent
system
Bot to
engage
and
distract
trolls
Strength
en
verificati
on
methods
Verified
ids to
comment
or
contribut
e to poll
Revoke
whitelist /
verified
status
Microta
rget
likely
targets
with
counter
messa
ges
Train
journalist
s to
counter
influence
moves
Tool
transpare
ncy and
literacy
in
followed
channels
Ask
media
not to
report
false info
Repurpo
se
images
with
counter
message
s
Engage
payload
and
debunk
Debunk/
defuse
fake
expert
credentia
ls
Don’t
engage
with
payloads
Hashtag
jacking
Etc
DMCA
takedo
wn
request
s
Spam
domestic
actors
with
lawsuits
Seize
and
analyse
botnet
servers
Poison
monitor
ing and
evaluat
ion
data
Bomb
link
shortener
s with
calls
Add
random
links to
network
graphs
https://github.com/cogsec-collaborative/AMITT
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021 Rapid Sharing: Cognitive Security Operations
Centers
Cognitive
ISAO
ISAC/
ISAO
Infosec
SOC
Comms
Legal
COG
SOC Trust&
Safety
Platform
ORG
Infosec
SOC
Comms
Legal
COG
Desk Trust&
Safety
Platform
Comms
Legal
COG
Desk
Trust&
Safety
Platform
ORG
ORG
ORG
ORG
ORG
ORG
ORG
COG
SOC
6
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Cognitive Security Ecosystem Mapping
Information
Landscape
• Information seeking
• Information sharing
• Information sources
• Information voids
Threat
Landscape
• Motivations
• Sources/ Starting points
• Effects
• Misinformation Narratives
• Hateful speech narratives
• Crossovers
• Tactics and Techniques
• Artifacts
Response
Landscape
• Monitoring organisations
• Countering organisations
• Coordination
• Existing policies
• Technologies
• etc
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Business
We’ve already been talking
about the business of
disinformation…
8
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Business questions
● Is there a market here?
● Does the market pay enough to
sustain businesses?
● Where’s the money coming from?
● What’s it paying for?
● Who is already in this space?
● Who is likely to move into this
space?
● Who is the customer base?
● What features and restrictions do we
have?
9
FOLLOW THE MONEY
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Where is the money in a threat landscape?
• Motivations
• Geopolitics mostly absent
• Party politics (internal, inter-party)
• Actors
• Political parties
• Nationstates
• Entrepreneurs
• Activities
• Manipulate faith communities
• Discredit election process
• Discredit/discourage journalists
• Attention (more drama)
• Potential harms / severities
• Assassination
• Voting reduction
• Sources
• WhatsApp
• Blogs
• Facebook pages
• Online newspapers
• Media
• Routes
• Hijacked narratives
• Whatsapp to blogs, vice versa
• Whatsapp forwarding
• facebook to whatsapp
• Social media to traditional media
• Social media to word of mouth
10
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Adjacent markets for creation:
ransomware, infosec
11
Image: https://sec.okta.com/articles/2020/08/crimeops-operational-art-cyber-crime
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Adjacent/ feeder market: Marketing
lumascapes
12
Image: https://chiefmartec.com/2020/04/marketing-technology-landscape-2020-martech-5000/
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Adjacent market for response:
Cybersecurity lumascapes
13
Image: https://momentumcyber.com/docs/CYBERscape.pdf
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
CogSec
creator
business
landscape
Disinformation creators etc
14
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation Actors
Persistent
Manipulators
Advanced teams
• Internet Research Agency
• China, Iran teams etc
For-profit website networks
• Antivax websites
• Pink slime sites
• “Stolen” US election sites
Nationstate media
• Sputnik
• Russia Today
Service
Providers
Disinformation as a Service
• Factories
• Ex-marketing, spam etc
Ad-Hoc paid teams
• EBLA Ghana
• PeaceData USA
Opportunists
Wares Sellers
• Clicks
• T-shirts
• Books etc.
Groups
• Conspiracy groups
• Extremists
Individuals
• Attention-seekers
• Jokers etc
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation as a service (DaaS)
“Doctor Zhivago’s services were priced very specifically, as seen below:
● $15 for an article up to 1,000 characters
● $8 for social media posts and commentary up to 1,000 characters
● $10 for Russian to English translation up to 1,800 characters
● $25 for other language translation up to 2,000 characters
● $1,500 for SEO services to further promote social media posts and traditional media articles, with a time frame of 10 to 15
days
Raskolnikov, on the other hand, had less specific pricing:
● $150 for Facebook and other social media accounts and content
● $200 for LinkedIn accounts and content
● $350–$550 per month for social media marketing
● $45 for an article up to 1,000 characters
● $65 to contact a media source directly to spread material
● $100 per 10 comments for a given article or news story”
Image: https://www.recordedfuture.com/disinformation-service-campaigns/
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
DaaS examples
Internet Research Agency
● Russian “troll farm”
● Well organised
● Ex marketing
● Not quite official
Satellite organisation: EBLA
● Cut-out organisation based in Ghana
● Kids round a kitchen table model
Troll farms in the Philippines
● PR experts plus younger social media influencers
● Philippines because English-speaking workforce, used to call center, content moderation work
PR firms, various locations
● US-based: operating in other countries (Venezuela, Bolivia etc)
● MAS Agency (Ukraine-based PR firm)
● Saudi digital marketing firm
18
Image: https://en.wikipedia.org/wiki/Internet_Research_Agency
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation Creation Actors: Self-Serve
Image: https://gijn.org/2020/07/08/6-tools-and-6-techniques-reporters-can-use-to-unmask-the-actors-behind-covid-19-disinformation/
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Antivax Superspreaders
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Also making money: fake experts
Image: https://7news.com.au/travel/coronavirus/plandemic-the-concerning-virus-conspiracy-documentary-goes-viral--c-1028000
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Secondary money: Freedom To Breathe
Agency
Images: various
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
CogSec creator
support
business
landscape
Disinformation suppliers etc
23
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Tools
● Bots/ botnets
● IFTTT variants
● Personas
● Network analysis
● Marketing tools
● Deepfake
generators
Image: https://twitter.com/conspirator0/status/1249020176382779392
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Suppliers: Account sets, Astroturfers etc
Image: https://knowyourmeme.com/photos/923510-wikipedia
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
AdTech industry
Image: https://www.adexchanger.com/venture-capital/ecosystem-map-luma-partners-kawaja/
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Customer segmentation and targetting
Image: https://commons.wikimedia.org/wiki/File:Customer_Segmentation.png
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation Creation Lumascape
Disinformation as a service
Public relations
Digital strategy
28
Tools
Audience growth
Botnet supply
Advertising
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation Response Lumascape
Advanced Threat Protection
Botnet detection and removal
Disinformation research
Fact checking
Training (inc exercises)
Information monitoring
Tools
Consultancy
30
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Thank you
SJ Terp, @bodaceacat, sarajterp@gmail.com / sjterp@umd.edu
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
CogSec
Response
Business
landscape
How the response business is
shaping up
32
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Response Actors
Disinformation SOCs
Large actors
• ISAOs
• Platforms
• Other large actors
Event-specific
• War rooms
• Agencies
Disinformation
Teams
Disinformation “desk"
• In existing SOC
• Standalone unit
Investigators
• Journalists
• Academics
• Independent journalists
Other Responders
Policymakers
Law enforcement
Corporations
Influencers
Nonprofits
Educators
Individual researchers
Concerned citizens
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Example Response Landscape (Needs / Work /
Gaps)
Risk Reduction
● Media and influence
literacy
● information
landscaping
● Other risk reduction
Monitoring
● Radio, TV, newspapers
● Social media platforms
● Tips
Analysis
● Tier 1 (creates tickets)
● Tier 2 (creates
mitigations)
● Tier 3 (creates reports)
● Tier 4 (coordination)
Response
● Messaging
○ prebunk
○ debunk
○ counternarratives
○ amplification
● Actions
○ removal
○ other actions
● Reach
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Where’s the money?
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Where’s the money?
36
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation Response Lumascape
Advanced Threat Protection
Botnet detection and removal
Disinformation research
Fact checking
Training (inc exercises)
Information monitoring
Tools
Consultancy
37
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
AfricaCheck / Meedan
38
Image: https://africacheck.org/fact-checks/fbchecks/no-vaccines-wont-make-you-seedless
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Alethea Group: threat assessments
● DC-based disinformation
consultancy
● Techniques rooted in intelligence
methods
● Aimed at businesses
Image: aletheagroup.com
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Fiveby: Adapting supply chain risk
management
● Seattle-based risk
consultancy
● Techniques rooted in fraud
risk assessment
● Aimed at platforms and
other online businesses
Image: https://www.fiveby.com/wp-content/uploads/2021/05/Fiveby_disinformation_whitepaper_032921_final-1.pdf
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
CogSec Response
Support Business
landscape
Tools for responders etc
41
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation tools market
42
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Tool: Builtwith
43
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
DROG: Training
44
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Card games - do try this at home…
45

Weitere ähnliche Inhalte

Was ist angesagt?

disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...Sara-Jayne Terp
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_secSara-Jayne Terp
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspacemark-smith
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesJohn Bambenek
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Chuck Brooks
 
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...Chuck Brooks
 
Yours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceYours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceJack Whitsitt
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security MonitoringSysomos
 
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksUsing AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksSara-Jayne Terp
 

Was ist angesagt? (20)

disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
2020 09-01 disclosure
2020 09-01 disclosure2020 09-01 disclosure
2020 09-01 disclosure
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
CorpExecProfile
CorpExecProfileCorpExecProfile
CorpExecProfile
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
 
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
 
Yours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceYours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem Space
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security Monitoring
 
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksUsing AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworks
 

Ähnlich wie 2021 12 nyu-the_business_of_disinformation

Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationBruce Forrester
 
CSW2022_03_threat_environment.pptx.pdf
CSW2022_03_threat_environment.pptx.pdfCSW2022_03_threat_environment.pptx.pdf
CSW2022_03_threat_environment.pptx.pdfSaraJayneTerp
 
Threat Sharing for Human Rights
Threat Sharing for Human RightsThreat Sharing for Human Rights
Threat Sharing for Human RightsMegan DeBlois
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.Phil Wolff
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking PresentationDoug Cornelius
 
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...g8briel
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightDeep Shankar Yadav
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
Intro to Data Science
Intro to Data ScienceIntro to Data Science
Intro to Data ScienceTJ Stalcup
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
 
What-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-GroupWhat-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-GroupSusan Etlinger
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science TJ Stalcup
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021andygustafson
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecuritySaqib Chaudhry
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in GovernmentNeo4j
 

Ähnlich wie 2021 12 nyu-the_business_of_disinformation (20)

Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 Presentation
 
CSW2022_03_threat_environment.pptx.pdf
CSW2022_03_threat_environment.pptx.pdfCSW2022_03_threat_environment.pptx.pdf
CSW2022_03_threat_environment.pptx.pdf
 
Threat Sharing for Human Rights
Threat Sharing for Human RightsThreat Sharing for Human Rights
Threat Sharing for Human Rights
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking Presentation
 
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
 
Intro to Data Science
Intro to Data ScienceIntro to Data Science
Intro to Data Science
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
What-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-GroupWhat-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
204
204204
204
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
 

Mehr von SaraJayneTerp

Guidance note: Advancing Infodemic Management within Risk Communication and C...
Guidance note: Advancing Infodemic Management within Risk Communication and C...Guidance note: Advancing Infodemic Management within Risk Communication and C...
Guidance note: Advancing Infodemic Management within Risk Communication and C...SaraJayneTerp
 
CSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdfCSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdfSaraJayneTerp
 
CSW2022_02_info_response_environments.pptx.pdf
CSW2022_02_info_response_environments.pptx.pdfCSW2022_02_info_response_environments.pptx.pdf
CSW2022_02_info_response_environments.pptx.pdfSaraJayneTerp
 
CSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfCSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfSaraJayneTerp
 
CSW2022_07_narratives.pptx.pdf
CSW2022_07_narratives.pptx.pdfCSW2022_07_narratives.pptx.pdf
CSW2022_07_narratives.pptx.pdfSaraJayneTerp
 
CSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdfCSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdfSaraJayneTerp
 
CSW2022_11_hotwash.pptx.pdf
CSW2022_11_hotwash.pptx.pdfCSW2022_11_hotwash.pptx.pdf
CSW2022_11_hotwash.pptx.pdfSaraJayneTerp
 
CSW2022_09_riskassessment.pptx.pdf
CSW2022_09_riskassessment.pptx.pdfCSW2022_09_riskassessment.pptx.pdf
CSW2022_09_riskassessment.pptx.pdfSaraJayneTerp
 
CSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdfCSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdfSaraJayneTerp
 
CSW2022_05_data collection.pptx.pdf
CSW2022_05_data collection.pptx.pdfCSW2022_05_data collection.pptx.pdf
CSW2022_05_data collection.pptx.pdfSaraJayneTerp
 
CSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdfCSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdfSaraJayneTerp
 
2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptx2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptxSaraJayneTerp
 
WG-misinfosec report out to CredCo.pdf
WG-misinfosec report out to CredCo.pdfWG-misinfosec report out to CredCo.pdf
WG-misinfosec report out to CredCo.pdfSaraJayneTerp
 
CanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfCanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfSaraJayneTerp
 
AMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptxAMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptxSaraJayneTerp
 
Disarm vanguards 2022-02-25 (3)
Disarm vanguards 2022-02-25 (3)Disarm vanguards 2022-02-25 (3)
Disarm vanguards 2022-02-25 (3)SaraJayneTerp
 

Mehr von SaraJayneTerp (16)

Guidance note: Advancing Infodemic Management within Risk Communication and C...
Guidance note: Advancing Infodemic Management within Risk Communication and C...Guidance note: Advancing Infodemic Management within Risk Communication and C...
Guidance note: Advancing Infodemic Management within Risk Communication and C...
 
CSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdfCSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdf
 
CSW2022_02_info_response_environments.pptx.pdf
CSW2022_02_info_response_environments.pptx.pdfCSW2022_02_info_response_environments.pptx.pdf
CSW2022_02_info_response_environments.pptx.pdf
 
CSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfCSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdf
 
CSW2022_07_narratives.pptx.pdf
CSW2022_07_narratives.pptx.pdfCSW2022_07_narratives.pptx.pdf
CSW2022_07_narratives.pptx.pdf
 
CSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdfCSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdf
 
CSW2022_11_hotwash.pptx.pdf
CSW2022_11_hotwash.pptx.pdfCSW2022_11_hotwash.pptx.pdf
CSW2022_11_hotwash.pptx.pdf
 
CSW2022_09_riskassessment.pptx.pdf
CSW2022_09_riskassessment.pptx.pdfCSW2022_09_riskassessment.pptx.pdf
CSW2022_09_riskassessment.pptx.pdf
 
CSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdfCSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdf
 
CSW2022_05_data collection.pptx.pdf
CSW2022_05_data collection.pptx.pdfCSW2022_05_data collection.pptx.pdf
CSW2022_05_data collection.pptx.pdf
 
CSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdfCSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdf
 
2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptx2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptx
 
WG-misinfosec report out to CredCo.pdf
WG-misinfosec report out to CredCo.pdfWG-misinfosec report out to CredCo.pdf
WG-misinfosec report out to CredCo.pdf
 
CanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfCanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdf
 
AMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptxAMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptx
 
Disarm vanguards 2022-02-25 (3)
Disarm vanguards 2022-02-25 (3)Disarm vanguards 2022-02-25 (3)
Disarm vanguards 2022-02-25 (3)
 

Kürzlich hochgeladen

Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the siteAshtonCains
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECall girl Jaipur
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Onlykhanf3647647
 
Enhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content MarketingEnhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content MarketingDigital Marketing Lab
 
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verifiedKarol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...Heena Escort Service
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Delhi Call girls
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutioneliklein8
 
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot ModelInternational Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for siteAshtonCains
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRNeha Kajulkar
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundationsolidgbemi
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfeliklein8
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...ZurliaSoop
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDYgalaxypingy
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for siteAshtonCains
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<Health
 

Kürzlich hochgeladen (20)

Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
 
Enhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content MarketingEnhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content Marketing
 
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verifiedKarol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot ModelInternational Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for site
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDY
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 

2021 12 nyu-the_business_of_disinformation

Hinweis der Redaktion

  1. Hi. I’m SJ. Delighted to be at the NYU Computational Disinformation Symposium. I’m here to put a framework around some of the rest of today. Links: NY Times, "inside the disinformation wars" Harpers, Bad News
  2. First, a recap. I work on cognitive security. It’s wider than just disinformation - it’s about protecting the security of human beliefs and social signals from large-scale technology-enabled efforts to disrupt and manipulate them - but for the purposes of today, it’s about taking a security risk practitioner’s view of disinformation and other human cyber harms. “Disinformation is not a tech problem; it is a social problem enabled by technology” - Pablo Breuer
  3. Cognitive security is about risk management. Which traditionally is the combination of the frequency of losses combined with the severity of those losses. I’ve done separate work on applying information security risk management frameworks (e.g. NIST and FAIR) to cognitive security, and the components we need for that: threat models, conversion probabilities from threat to loss, loss categories and sizings etc. I have a whole talk on that, but I’ll just put up this slide. Before you do the sizings, you need to think about what you’re protecting. Most people in infosec know the CIA triangle of confidentiality, integrity, availability, and that disinformation is primarily an integrity problem. Less people know the Parkerian Hexad, which adds possession, authenticity, utility: all properties important to cognitive security. SJ Parkerian Hexad: https://www.staffhosteurope.com/blog/2019/03/cybersecurity-and-the-parkerian-hexad and https://www.sciencedirect.com/topics/computer-science/parkerian-hexad
  4. We talked last time about frameworks. Here are two ways to think about disinformation incidents: the what and when of Kipling’s six honest serving men (what, why, when, how, where, who). Rudyard Kipling quote: “I keep six honest serving-men (They taught me all I knew); Their names are: What and Why and When and How and Where and Who”.
  5. This is the AMITT Red framework: the disinformation version of MITRE ATT&CK that we built to model the stages and techniques in disinformation creation, and the AMITT Blue framework of counters to them.  Looking at this from the top to the bottom, the first line is operational phases, then the blue boxes are “tactic stages”, links in the disinformation kill chain. The kill chain is different: we tried to fit it to the existing one, but it didn’t cover every part of disinformation. The grey boxes are the TTPs (tactic, technique, or procedure) that allow you to complete each stage. TTPs are behaviors that we can view examples and counters for, and the Cognitive Security Intelligence Centre is adding indicators to this. AMITT Red is deliberately similar to the ATT&CK TTP framework, so you can use all ATT&CK-compatible tools with it.
  6. We’ve been working on how to rapidly share information about actors, behaviours, narratives and artifacts for a while. All that work on standards is for this: getting organisations to work closely together. So one question is “where do you put a disinformation SOC”? Here are some options, ranging from a large dedicated SOC (e.g. the Cognitive Security ISAO), to a small standalone team, each connected to other organisations and functions. Different sizings: ISAO will be full works, Platforms and others with this as main problem will have COGSOCS interacting with Infosec; most large businesses will have a team, probably a desk in the infosec soc; small orgs and current teams usually just the desk, not working with infosec SOC. The two options in the middle are interesting - this is us working out how to connect a disinformation SOC to an existing Infosec SOC - either as an equal partner, or as a “desk” inside the existing SOC.
  7. We also divided cognitive security into three interacting ecosystems: information landscape, the threat landscape within it, and the response landscape both improving the information landscape and countering threats.
  8. An innovations colleague used to say “Is there a hole in the market, is there a market in the hole?”, i.e. is there a business need here, and is there money in meeting that need. Both are needed for businesses to survive.
  9. Here’s a typical threat landscape. There’s money all over this landscape. People get paid directly for disinformation campaigns, but they also get paid for advertisements, influence, websites, youtube views, and selling everything from clicks to fake cures.
  10. We can get a clue from adjacent markets, and specifically the ransomware market. These are businesses - often outsourcing things like finding target markets, recruitment etc. They value things like repeatable processes (think script kiddies), but will also innovate when they encounter countermeasures. Go read this post and think about how it applies to cognitive security. Links https://sec.okta.com/articles/2020/08/crimeops-operational-art-cyber-crime
  11. The disinformation business isn’t as black and white as we’d like it to be. We’re already seeing techniques created for disinformation being reused in other parts of the internet, and tools and feeder markets from adjacent markets like marketing being used in disinformation. Links: https://chiefmartec.com/2020/04/marketing-technology-landscape-2020-martech-5000/
  12. Response is also a market - not one we’re covering today, but there are adjacent markets for that too. I’ve started on lumascapes for both creation and response - the main difference between them is that because creation organisations can be ephemeral, it’s more useful to capture the *types* of these organisations, whilst there are now thousands of response organisations, which is more amenable to a logos-in-groups display like this. Links: https://momentumcyber.com/docs/CYBERscape.pdf
  13. There are many actors in this space. We hear a lot about threat actors - these are at different scales, with different capabilities and motivations. They’re learning from each other, and they often interact - for instance, we see t-shirt sellers picking up geopolitical narratives.
  14. Today we’re talking about disinformation as a service, but that’s not the only way money changes hands. DaaS has its roots in marketing, but also in the early internet, where people realized they could make money by boosting account follower numbers. From https://www.recordedfuture.com/disinformation-service-campaigns/ Since then, more ex marketing, spam etc companies have joined in, and actors from countries (using fake groups as cutouts) to individuals (to sway a court case) have used DAAS services.
  15. Here are some actor examples, from the large to the small. Links https://web.archive.org/web/20200311133702/https://eblango.org/about-us/ https://public-assets.graphika.com/reports/graphika_report_ira_in_ghana_double_deceit.pdf https://www.washingtonpost.com/world/asia_pacific/why-crafty-internet-trolls-in-the-philippines-may-be-coming-to-a-website-near-you/2019/07/25/c5d42ee2-5c53-11e9-98d4-844088d135f2_story.html https://cyber.fsi.stanford.edu/io/news/us-pr-firm-steps-contested-elections https://medium.com/dfrlab/facebook-removes-hyperlocal-news-pages-that-promoted-political-party-members-in-ukraine-e1073f188d60 https://cyber.fsi.stanford.edu/io/news/smaat-twitter-takedown https://www.brookings.edu/techstream/how-disinformation-evolved-in-2020/
  16. Entities behind disinformation include nationstates, individuals, and companies. Within those companies, there are disinformation as a service companies, providing disinformation activities for money, and there are organisations creating disinformation campaigns for their own direct profits. Most of these have some form of URL attached to their money making - a website or set of websites, a funding campaign page, a youtube channel, or pages on onlines sales sites.
  17. Some examples, For instance, Naturalnews.com has about 40 other sites in its network. Natural News, National Vaccine Information Center, Informed Consent Action Network, Children’s Health Defense (yes, that is *that* Robert Kennedy).
  18. Different sizes. Experts make money from attention, talks, books etc.
  19. Smaller scale again. Here’s disinformation as a tool for attention, which can then be monetised in other ways. Selling cards, ad clicks, driving traffic to their own websites, and making money from things like books and talks that aren’t necessarily related to the disinformation campaign.
  20. Let’s look at the support landscape for these. Think back to the ransomware example. What goods and services do disinformation creators need? This is both an issue, and an opportunity: not all of them are on the dark side, and these are all places that we can apply pressure to stop.
  21. Tools can make money: here are some examples. On the right, If This Then That has been used to create a set of repeated tweets across accounts.
  22. As with ransomware, there are supply chains. Here’s one. Image: https://knowyourmeme.com/photos/923510-wikipedia
  23. Non-disinformation industries also support disinformation. This is an opportunity to reduce the money flows. Image: https://www.adexchanger.com/venture-capital/ecosystem-map-luma-partners-kawaja/
  24. Other related organizations do all the things for marketing, including audience segmentation. Another opportunity. Image: https://commons.wikimedia.org/wiki/File:Customer_Segmentation.png
  25. Don’t laugh, but I started some lumascapes. I think it’s time we did this. For disinformation creation, we probably have a primary and secondary market, and will talk about types of organization, not necessarily individuals.
  26. Not talking about this today, but I also did the same thing (following the money) with disinformation response- and here, we can put names against categories. There’s a whole talk on that too - suffice to say that these two markets are both interdependent, and very very unbalanced: organisations making money from disinformation actions versus responders working on grants, and limited in their money making capacities.
  27. Hi. I’m SJ. Delighted to be at the NYU Computational Disinformation Symposium. I’m here to put a framework around some of the rest of today. Links: NY Times, "inside the disinformation wars" Harpers, Bad News
  28. But there are also response actors in this space. These are also at different scales, with different motivations, capabilities, and connections. Our work is on how best to join these together into a coordinated rapid response. And to do this, we’re borrowing the idea of a Security Operations Center or SOC - a coordinating unit, focussed on cognitive security, connected to other disinformation SOCs. These organizations are starting to exist. This won’t be the same for everyone, so we’re designing operations for different sizes of organization, from ISAO sized down to small teams embedded in an information security unit, to independent teams, with connections to a response network, maybe as information providers or responders.
  29. Extra important that cross-group interfaces are efficient
  30. Image: https://africacheck.org/fact-checks/fbchecks/no-vaccines-wont-make-you-seedless
  31. Image: aletheagroup.com
  32. Links: Disinfocloud.com