SlideShare a Scribd company logo
1 of 40
Distributed Defense Against Disinformation
Lessons Learned in The CTI League’s Disinformation Team
SJ Terp & Pablo Breuer, CogSecCollab, Disclosure 2020
1
2020: NOT YOUR
GRANDMA’S
DISINFORMATION
ECOSYSTEM
2
Find them, Fix them,
F<del><del>do something
about them
DISINFORMATION. DIS. NOT MIS.
“deliberate promotion… of false,
misleading or mis-attributed information
focus on online creation, propagation,
consumption of disinformation
We are especially interested in
disinformation designed to change
beliefs or emotions in a large number of
people”
3
MISINFORMATION: COVID19 NARRATIVES
• Origin myths
• Escaped bioweapon
• Country x created Covid
• US soldiers took Covid to China
• Covid isn’t serious
• Covid doesn’t exist
• Individual medical targets
• Medical scams
• MMS prevents
• Alcohol prevents
• etc
• Resolution myths
• Country x has a Covid cure
● Crossover with conspiracies
○ Covid and 5G
○ Covid and antivax / anti-Gates
○ Helicopters spraying for covid
○ Depopulation conspiracy
● Crossover with ‘freedom rights’
○ Anti- stayathome
○ 2nd amendment
○ anti-immigration
○ Usual far-rightwing groups
○ Antivax+2a+covid+
● Geopolitics
○ China, Iran: covert + overt
○ “Blue check” disinfo
4
MORE FRAMING: INTENT
• Geopolitical gain
• Countries
• Power gain
• Follow the divisions
• Financial gain
• Follow the money
• Attention seeking
• Sharks, satire and other LOLs
• Online discussion
• opinion
• conspiracies
• protest
• nazis
• all the above
Blahblahbla
hblah
5
MOTIVATIONS: MONEY
Covid19 hucksters are selling:
• T-shirts
• “Cures”
• Blood
• Views and clicks
• And a bunch of other stuff
Follow the money!
6
MONEY NEEDS URLS
7
EVOLUTION: #WeWontStayHome
8
EVOLUTION: Face Mask Exemption Cards
9
EVOLUTION: Face Mask Countermeasures
10
Evolution: Disinformation and Business
11
HONE YOUR UNDERSTANDING
Blue team: respond to disinformation
• response plan
• playbook
• tracking: campaigns, incidents, narratives, artifacts
Red team: learn from examples
• run a "disinformation as a service"/alternative marketing company,
• run a hostile social media platform,
• mix disinformation with coordinated sensor spoofs
• extend an existing narrative (e.g. anti-medical safety)
2020: COGNITIVE
SECURITY IS REAL NOW
13
Join us
THOUSAND-POINT SOLUTION TO A THOUSAND-POINT PROBLEM
Collaborative, Heterogeneous, Connected
AXIS: DISINFORMATION LAYERS
1
5
Campaigns
Incidents
Narratives
Artifacts
AXIS: THREAT INTELLIGENCE TASKS
Find recent, current and future threats
• Intelligence analysis:
• Situation: what’s going on, who’s involved, best guesses about now and future
• Intent: why
• Attribution: who. Attribution is hard, and rarely necessary to act
• OSINT:
• Using public data, what can we tell responders, in time for them to act?
• (most disinformation is public and lends itself well to OSINT)
• Data science:
• find patterns and information in data
• 3V (volume, velocity, variety): too big, fast, different for humans to respond in time
AXIS: TIME
AXIS: RESPONSE TIMESCALES
• Strategic - weeks/months/years.
• Issue focussed. e.g. long-form journalism. [Stanford Internet
Observatory, UWashington, Shorenstein Center, Bellingcat, DFRlab,
Grafika, platforms].
• Operational - days/weeks.
• Project focussed. Usually embedded in dev team. Support behaviour/
hypothesis-driven development, lean enterprise (pruning value trees
etc). [AI/ML-based disinformation data and tool companies].
• Tactical - hours/days.
• Incident focussed. Includes many data journalists. [NY Times, CTI
League team, some of MLSEC, some of the crisis-mappers].
DISINFORMATION
INCIDENT
RESPONSE
Threat Intelligence with brains and feels
19
COMMUNITY: COGSECCOLLAB
10 years ago: Disaster Data Today: Disinformation
• Covid19Activation
• Covid19Disinformation
• CTI League Disinformation
• CogSecCollab
• Threet
PRACTICE: CTI LEAGUE’S DISINFORMATION TEAM
First Global Volunteer emergency response Community, defending
and neutralizing cybersecurity threats and vulnerabilities to the life-
saving sectors related to the current COVID-19 pandemic.
• Active Cyber-attack Neutralization
• Cyber-attack Prevention
• Cyber-supporting the Life-saving and Health-related Sectors
• Monitoring Cyberspace for Potential Danger to Public Health and
Safety.
DISINFORMATION SERVICES
• Neutralise: Disinformation incident response: triage, takedown, escalation.
• Clearinghouse: Collate and share incident data, including with organizations
focusing on response and countercampaigns.
• Prevent: Collate disinformation indicators of compromise (IoCs) and
vulnerabilities; supply to organisations.
• Support: Assess the possibility of direct attack, and ways to be ready.
22
INCIDENT RESPONSE REQUIREMENTS
• People
• Enough people to make a difference, in time
• Enough connections / levers to make a difference
• Culture
• Safety processes: mental health and opsec
• Process
• Understand disinformation, understand threat response
• Fast, lightweight processes
• Technology
• Speed - supporting analysis, storage etc
• Sharing - get data to responders in ways they understand (whatever works)
Response Support: Process, Tools, Training
Training: e.g. Data Science for Disinformation Response
• Introduction to the disinformation team
• What are we chasing? Digital harm training
• Getting set up for disinformation data science
• Data sources (process, sources, stores)
• Disinfo Data Science examples
• Social text analysis
• Image data analysis
• Relationships as data
• Extending your analysis with machine learning skillz
• Communicating results (style, narratives, visualisations)
24
Tools:
• HIVE/D3PO - case tracking
• Data tools - analysis support (scrapers etc)
• MISP - intelligence sharing (AMITT TTPs etc)
Process:
GOING BACK TO BASICS
OBSERVE:
2020’S DECADE OF
TRACKING COVID19
DISINFORMATION
trust us, it feels that way
26
TRIAGE: deciding whether to start an incident
• Is this potentially doing harm?
• What effects might this have?
• Is it large? Coordinated? Targetted (to demographics etc)?
• Is this disinformation
• Is the content false (e.g. misinformation?)
• Is it e.g. phishing rather than disinformation?
• Does it include fake groups, fake profiles, fake amplification etc
• Is our team the best one to respond to this?
• Is this in our area (e.g. CTI = currently working on Covid19 / medically-related?)
• Is someone else already tracking and responding to this?
• Do we have the resources to respond?
27
(Some) Tactical Tasks
• Activity analysis
• Track artefacts (messages, images, urls, accounts, groups etc), e.g.
• find artefact origins,
• track how artefact moves across channels/groups etc
• find related artefacts
• Detect AMITT Techniques, e.g.
• detect computational amplification
• detect, track and analyse narratives
• Network detection
• Find inauthentic website networks (pinkslime)
• Find inauthentic account and group networks (including botnets)
• Credibility/ Verification
• Fact-checking: verify article, image, video etc doesn’t contain disinformation.
• Source-checking: verify source (publisher, domain etc) doesn’t distribute disinformation.
Machine Learning / AI
• Graph analysis
• Find super-spreaders
• Find rumor origins
• Uncover new artefacts
• Track movement over time
• Text Analysis
• Find themes
• Classify to narratives
• Cluster text to narratives
• Search for similar text/narratives
• Image, video, audio analysis
• Cluster images
• Search for similar images
• Detect shallowfakes
ORIENT: GETTING
THE SITUATION
PICTURE
Sensemaking
30
Shared Awareness: MISP Threat Intelligence Platform
• Threat sharing standard with large
community
• EU funded (ENISA, CIRCL)
• ISAC, ISAO, CERTs, CSIRTs
• NATO, Military, Intelligence
• Fortune 500’s
• Open data standards
• MISP Core, STIX
• Connections
• API push/pull
• Email
• Anomali ThreatStream, ThreatConnect,
OSQuery
31
Data Standards: STIX Extension
Disinformation STIX Description Level Infosec STIX
Report communication to other responders Communication Report
Campaign Longer attacks (Russia’s interference in the 2016 US elections is
a “campaign”)
Strategy Campaign
Incident Shorter-duration attacks, often part of a campaign Strategy Intrusion Set
Course of Action Response Strategy Course of Action
Identity Actor (individual, group, organisation etc): creator, responder,
target, useful idiot etc.
Strategy Identity
Threat actor Incident creator Strategy Threat Actor
Attack pattern Technique used in incident (see framework for examples) TTP Attack pattern
Narrative Malicious narrative (story, meme) TTP Malware
Tool bot software, APIs, marketing tools TTP Tool
Observed Data artefacts like messages, user accounts, etc Artefact Observed Data
Indicator posting rates, follow rates etc Artefact Indicator
Vulnerability Cognitive biases, community structural weakness etc Vulnerability Vulnerability
32https://github.com/cogsec-collaborative/amitt_cti
Disinformation TTPs: AMITT Framework
33(TTP Framework adopted by MITRE, upstream development by CogSecCollab)
Other MISP Disinformation Objects
• taxonomies
● DFRLab Dichotomies of Disinformation
● NATO Disinformation Taxonomy (WIP)
• objects
• forged-document, publication, etc.
• twitter-post, facebook-post, reddit-post, etc.
• twitter-group, facebook-group, reddit-
subreddit, etc
• twitter-account, facebook-account, reddit-
account, etc.
• relationships
• authored-by
• relates-to, etc.
34
DECIDE: OPTIONS ON
COUNTERMEASURES,
MITIGATIONS,
RESILIENCE
Not just admiring the problem any
more
35
Response: Actors
• Platform
• Law Enforcement
• Government
• Elves
• Public
• Influencer
• Media
• Nonprofit
• Educator
• Corporation
36
Response: Mitigations and Countermeasures
37
● Detect: find them
● Deny: stop them getting in
● Disrupt: interrupt them
● Degrade: slow them down
● Deceive: divert them
● Destroy: damage them
● Deter: discourage them
https://github.com/cogsec-collaborative/amitt_counters
ACT: GETTING
COLLABORATIVE,
GETTING
INTERACTIVE
And the waves to come
38
Back To Multiplayer Games
THANK YOU
@bodaceacat
@ngree_h0bit
https://cogsec-collab.org/
40

More Related Content

What's hot

Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformationSaraJayneTerp
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...Sara-Jayne Terp
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
SocialmediapublicsavetyFrank Smilda
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security MonitoringSysomos
 
Some Perspective on Hackers
Some Perspective on HackersSome Perspective on Hackers
Some Perspective on HackersRandi Lovelett
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technologypradhansushil
 
911 commission report for SDSU EDTEC Performance Improvement Class
911 commission report for SDSU EDTEC Performance Improvement Class911 commission report for SDSU EDTEC Performance Improvement Class
911 commission report for SDSU EDTEC Performance Improvement ClassKathleen Wooley
 
SASIG Workshop on “Improving the digital landscape for our children”
SASIG Workshop on “Improving the digital landscape for our children”SASIG Workshop on “Improving the digital landscape for our children”
SASIG Workshop on “Improving the digital landscape for our children”The Open University
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesPetter Bae Brandtzæg
 
The art and science of data-driven journalism
The art and science of data-driven journalism The art and science of data-driven journalism
The art and science of data-driven journalism Alexander Howard
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operationsClifford Stone
 

What's hot (20)

Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security Monitoring
 
Some Perspective on Hackers
Some Perspective on HackersSome Perspective on Hackers
Some Perspective on Hackers
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
 
911 commission report for SDSU EDTEC Performance Improvement Class
911 commission report for SDSU EDTEC Performance Improvement Class911 commission report for SDSU EDTEC Performance Improvement Class
911 commission report for SDSU EDTEC Performance Improvement Class
 
SASIG Workshop on “Improving the digital landscape for our children”
SASIG Workshop on “Improving the digital landscape for our children”SASIG Workshop on “Improving the digital landscape for our children”
SASIG Workshop on “Improving the digital landscape for our children”
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Introducing Globaleaks
Introducing GlobaleaksIntroducing Globaleaks
Introducing Globaleaks
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sites
 
The art and science of data-driven journalism
The art and science of data-driven journalism The art and science of data-driven journalism
The art and science of data-driven journalism
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
2007 un dss class before one briefing
2007 un dss class before one briefing2007 un dss class before one briefing
2007 un dss class before one briefing
 

Similar to 2020 09-01 disclosure

Misinfosec frameworks Cansecwest 2019
Misinfosec frameworks Cansecwest 2019Misinfosec frameworks Cansecwest 2019
Misinfosec frameworks Cansecwest 2019bodaceacat
 
CansecWest2019: Infosec Frameworks for Misinformation
CansecWest2019: Infosec Frameworks for MisinformationCansecWest2019: Infosec Frameworks for Misinformation
CansecWest2019: Infosec Frameworks for Misinformationbodaceacat
 
Terp breuer misinfosecframeworks_cansecwest2019
Terp breuer misinfosecframeworks_cansecwest2019Terp breuer misinfosecframeworks_cansecwest2019
Terp breuer misinfosecframeworks_cansecwest2019bodaceacat
 
Threat Sharing for Human Rights
Threat Sharing for Human RightsThreat Sharing for Human Rights
Threat Sharing for Human RightsMegan DeBlois
 
Filth and lies: analysing social media
Filth and lies: analysing social mediaFilth and lies: analysing social media
Filth and lies: analysing social mediaDiana Maynard
 
Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Stanford University
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicTyrone Grandison
 
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...MITRE - ATT&CKcon
 
Grounded, data with a story
Grounded, data with a storyGrounded, data with a story
Grounded, data with a storyInWithForward
 
Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsJack Whitsitt
 
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...Health IT Conference – iHT2
 
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...
Think Like a Bad Guy "Hacker" -  Change the game to proactively protect your ...Think Like a Bad Guy "Hacker" -  Change the game to proactively protect your ...
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...Saqib Chaudhry
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...Alexandre Sieira
 
Why aren't Evaluators using Digital Media Analytics?
Why aren't Evaluators using Digital Media Analytics?Why aren't Evaluators using Digital Media Analytics?
Why aren't Evaluators using Digital Media Analytics?CesToronto
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
CIL Stats Workshop April1 2022 Abram Silk.pdf
CIL Stats Workshop April1 2022 Abram Silk.pdfCIL Stats Workshop April1 2022 Abram Silk.pdf
CIL Stats Workshop April1 2022 Abram Silk.pdfStephen Abram
 

Similar to 2020 09-01 disclosure (20)

Misinfosec frameworks Cansecwest 2019
Misinfosec frameworks Cansecwest 2019Misinfosec frameworks Cansecwest 2019
Misinfosec frameworks Cansecwest 2019
 
CansecWest2019: Infosec Frameworks for Misinformation
CansecWest2019: Infosec Frameworks for MisinformationCansecWest2019: Infosec Frameworks for Misinformation
CansecWest2019: Infosec Frameworks for Misinformation
 
Terp breuer misinfosecframeworks_cansecwest2019
Terp breuer misinfosecframeworks_cansecwest2019Terp breuer misinfosecframeworks_cansecwest2019
Terp breuer misinfosecframeworks_cansecwest2019
 
Threat Sharing for Human Rights
Threat Sharing for Human RightsThreat Sharing for Human Rights
Threat Sharing for Human Rights
 
Filth and lies: analysing social media
Filth and lies: analysing social mediaFilth and lies: analysing social media
Filth and lies: analysing social media
 
Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Small Ideas for ICRC
Small Ideas for ICRCSmall Ideas for ICRC
Small Ideas for ICRC
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
 
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
 
Grounded, data with a story
Grounded, data with a storyGrounded, data with a story
Grounded, data with a story
 
Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication Skills
 
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
 
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...
Think Like a Bad Guy "Hacker" -  Change the game to proactively protect your ...Think Like a Bad Guy "Hacker" -  Change the game to proactively protect your ...
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
 
Why aren't Evaluators using Digital Media Analytics?
Why aren't Evaluators using Digital Media Analytics?Why aren't Evaluators using Digital Media Analytics?
Why aren't Evaluators using Digital Media Analytics?
 
Diff6b eng
Diff6b engDiff6b eng
Diff6b eng
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
CIL Stats Workshop April1 2022 Abram Silk.pdf
CIL Stats Workshop April1 2022 Abram Silk.pdfCIL Stats Workshop April1 2022 Abram Silk.pdf
CIL Stats Workshop April1 2022 Abram Silk.pdf
 

More from Sara-Jayne Terp

BSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideBSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideSara-Jayne Terp
 
Social engineering at scale
Social engineering at scaleSocial engineering at scale
Social engineering at scaleSara-Jayne Terp
 
engineering misinformation
engineering misinformationengineering misinformation
engineering misinformationSara-Jayne Terp
 
Online misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowOnline misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowSara-Jayne Terp
 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSara-Jayne Terp
 
Belief: learning about new problems from old things
Belief: learning about new problems from old thingsBelief: learning about new problems from old things
Belief: learning about new problems from old thingsSara-Jayne Terp
 
risks and mitigations of releasing data
risks and mitigations of releasing datarisks and mitigations of releasing data
risks and mitigations of releasing dataSara-Jayne Terp
 
Session 10 handling bigger data
Session 10 handling bigger dataSession 10 handling bigger data
Session 10 handling bigger dataSara-Jayne Terp
 
Session 09 learning relationships.pptx
Session 09 learning relationships.pptxSession 09 learning relationships.pptx
Session 09 learning relationships.pptxSara-Jayne Terp
 
Session 08 geospatial data
Session 08 geospatial dataSession 08 geospatial data
Session 08 geospatial dataSara-Jayne Terp
 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptxSara-Jayne Terp
 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptxSara-Jayne Terp
 
Session 06 machine learning.pptx
Session 06 machine learning.pptxSession 06 machine learning.pptx
Session 06 machine learning.pptxSara-Jayne Terp
 
Session 05 cleaning and exploring
Session 05 cleaning and exploringSession 05 cleaning and exploring
Session 05 cleaning and exploringSara-Jayne Terp
 
Session 04 communicating results
Session 04 communicating resultsSession 04 communicating results
Session 04 communicating resultsSara-Jayne Terp
 
Session 03 acquiring data
Session 03 acquiring dataSession 03 acquiring data
Session 03 acquiring dataSara-Jayne Terp
 
Session 02 python basics
Session 02 python basicsSession 02 python basics
Session 02 python basicsSara-Jayne Terp
 
Session 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSession 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSara-Jayne Terp
 
Evolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data EcosystemEvolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data EcosystemSara-Jayne Terp
 

More from Sara-Jayne Terp (19)

BSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideBSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guide
 
Social engineering at scale
Social engineering at scaleSocial engineering at scale
Social engineering at scale
 
engineering misinformation
engineering misinformationengineering misinformation
engineering misinformation
 
Online misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowOnline misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz now
 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_belief
 
Belief: learning about new problems from old things
Belief: learning about new problems from old thingsBelief: learning about new problems from old things
Belief: learning about new problems from old things
 
risks and mitigations of releasing data
risks and mitigations of releasing datarisks and mitigations of releasing data
risks and mitigations of releasing data
 
Session 10 handling bigger data
Session 10 handling bigger dataSession 10 handling bigger data
Session 10 handling bigger data
 
Session 09 learning relationships.pptx
Session 09 learning relationships.pptxSession 09 learning relationships.pptx
Session 09 learning relationships.pptx
 
Session 08 geospatial data
Session 08 geospatial dataSession 08 geospatial data
Session 08 geospatial data
 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptx
 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptx
 
Session 06 machine learning.pptx
Session 06 machine learning.pptxSession 06 machine learning.pptx
Session 06 machine learning.pptx
 
Session 05 cleaning and exploring
Session 05 cleaning and exploringSession 05 cleaning and exploring
Session 05 cleaning and exploring
 
Session 04 communicating results
Session 04 communicating resultsSession 04 communicating results
Session 04 communicating results
 
Session 03 acquiring data
Session 03 acquiring dataSession 03 acquiring data
Session 03 acquiring data
 
Session 02 python basics
Session 02 python basicsSession 02 python basics
Session 02 python basics
 
Session 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSession 01 designing and scoping a data science project
Session 01 designing and scoping a data science project
 
Evolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data EcosystemEvolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data Ecosystem
 

Recently uploaded

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 

Recently uploaded (20)

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 

2020 09-01 disclosure

  • 1. Distributed Defense Against Disinformation Lessons Learned in The CTI League’s Disinformation Team SJ Terp & Pablo Breuer, CogSecCollab, Disclosure 2020 1
  • 2. 2020: NOT YOUR GRANDMA’S DISINFORMATION ECOSYSTEM 2 Find them, Fix them, F<del><del>do something about them
  • 3. DISINFORMATION. DIS. NOT MIS. “deliberate promotion… of false, misleading or mis-attributed information focus on online creation, propagation, consumption of disinformation We are especially interested in disinformation designed to change beliefs or emotions in a large number of people” 3
  • 4. MISINFORMATION: COVID19 NARRATIVES • Origin myths • Escaped bioweapon • Country x created Covid • US soldiers took Covid to China • Covid isn’t serious • Covid doesn’t exist • Individual medical targets • Medical scams • MMS prevents • Alcohol prevents • etc • Resolution myths • Country x has a Covid cure ● Crossover with conspiracies ○ Covid and 5G ○ Covid and antivax / anti-Gates ○ Helicopters spraying for covid ○ Depopulation conspiracy ● Crossover with ‘freedom rights’ ○ Anti- stayathome ○ 2nd amendment ○ anti-immigration ○ Usual far-rightwing groups ○ Antivax+2a+covid+ ● Geopolitics ○ China, Iran: covert + overt ○ “Blue check” disinfo 4
  • 5. MORE FRAMING: INTENT • Geopolitical gain • Countries • Power gain • Follow the divisions • Financial gain • Follow the money • Attention seeking • Sharks, satire and other LOLs • Online discussion • opinion • conspiracies • protest • nazis • all the above Blahblahbla hblah 5
  • 6. MOTIVATIONS: MONEY Covid19 hucksters are selling: • T-shirts • “Cures” • Blood • Views and clicks • And a bunch of other stuff Follow the money! 6
  • 9. EVOLUTION: Face Mask Exemption Cards 9
  • 10. EVOLUTION: Face Mask Countermeasures 10
  • 12. HONE YOUR UNDERSTANDING Blue team: respond to disinformation • response plan • playbook • tracking: campaigns, incidents, narratives, artifacts Red team: learn from examples • run a "disinformation as a service"/alternative marketing company, • run a hostile social media platform, • mix disinformation with coordinated sensor spoofs • extend an existing narrative (e.g. anti-medical safety)
  • 13. 2020: COGNITIVE SECURITY IS REAL NOW 13 Join us
  • 14. THOUSAND-POINT SOLUTION TO A THOUSAND-POINT PROBLEM Collaborative, Heterogeneous, Connected
  • 16. AXIS: THREAT INTELLIGENCE TASKS Find recent, current and future threats • Intelligence analysis: • Situation: what’s going on, who’s involved, best guesses about now and future • Intent: why • Attribution: who. Attribution is hard, and rarely necessary to act • OSINT: • Using public data, what can we tell responders, in time for them to act? • (most disinformation is public and lends itself well to OSINT) • Data science: • find patterns and information in data • 3V (volume, velocity, variety): too big, fast, different for humans to respond in time
  • 18. AXIS: RESPONSE TIMESCALES • Strategic - weeks/months/years. • Issue focussed. e.g. long-form journalism. [Stanford Internet Observatory, UWashington, Shorenstein Center, Bellingcat, DFRlab, Grafika, platforms]. • Operational - days/weeks. • Project focussed. Usually embedded in dev team. Support behaviour/ hypothesis-driven development, lean enterprise (pruning value trees etc). [AI/ML-based disinformation data and tool companies]. • Tactical - hours/days. • Incident focussed. Includes many data journalists. [NY Times, CTI League team, some of MLSEC, some of the crisis-mappers].
  • 20. COMMUNITY: COGSECCOLLAB 10 years ago: Disaster Data Today: Disinformation • Covid19Activation • Covid19Disinformation • CTI League Disinformation • CogSecCollab • Threet
  • 21. PRACTICE: CTI LEAGUE’S DISINFORMATION TEAM First Global Volunteer emergency response Community, defending and neutralizing cybersecurity threats and vulnerabilities to the life- saving sectors related to the current COVID-19 pandemic. • Active Cyber-attack Neutralization • Cyber-attack Prevention • Cyber-supporting the Life-saving and Health-related Sectors • Monitoring Cyberspace for Potential Danger to Public Health and Safety.
  • 22. DISINFORMATION SERVICES • Neutralise: Disinformation incident response: triage, takedown, escalation. • Clearinghouse: Collate and share incident data, including with organizations focusing on response and countercampaigns. • Prevent: Collate disinformation indicators of compromise (IoCs) and vulnerabilities; supply to organisations. • Support: Assess the possibility of direct attack, and ways to be ready. 22
  • 23. INCIDENT RESPONSE REQUIREMENTS • People • Enough people to make a difference, in time • Enough connections / levers to make a difference • Culture • Safety processes: mental health and opsec • Process • Understand disinformation, understand threat response • Fast, lightweight processes • Technology • Speed - supporting analysis, storage etc • Sharing - get data to responders in ways they understand (whatever works)
  • 24. Response Support: Process, Tools, Training Training: e.g. Data Science for Disinformation Response • Introduction to the disinformation team • What are we chasing? Digital harm training • Getting set up for disinformation data science • Data sources (process, sources, stores) • Disinfo Data Science examples • Social text analysis • Image data analysis • Relationships as data • Extending your analysis with machine learning skillz • Communicating results (style, narratives, visualisations) 24 Tools: • HIVE/D3PO - case tracking • Data tools - analysis support (scrapers etc) • MISP - intelligence sharing (AMITT TTPs etc) Process:
  • 25. GOING BACK TO BASICS
  • 26. OBSERVE: 2020’S DECADE OF TRACKING COVID19 DISINFORMATION trust us, it feels that way 26
  • 27. TRIAGE: deciding whether to start an incident • Is this potentially doing harm? • What effects might this have? • Is it large? Coordinated? Targetted (to demographics etc)? • Is this disinformation • Is the content false (e.g. misinformation?) • Is it e.g. phishing rather than disinformation? • Does it include fake groups, fake profiles, fake amplification etc • Is our team the best one to respond to this? • Is this in our area (e.g. CTI = currently working on Covid19 / medically-related?) • Is someone else already tracking and responding to this? • Do we have the resources to respond? 27
  • 28. (Some) Tactical Tasks • Activity analysis • Track artefacts (messages, images, urls, accounts, groups etc), e.g. • find artefact origins, • track how artefact moves across channels/groups etc • find related artefacts • Detect AMITT Techniques, e.g. • detect computational amplification • detect, track and analyse narratives • Network detection • Find inauthentic website networks (pinkslime) • Find inauthentic account and group networks (including botnets) • Credibility/ Verification • Fact-checking: verify article, image, video etc doesn’t contain disinformation. • Source-checking: verify source (publisher, domain etc) doesn’t distribute disinformation.
  • 29. Machine Learning / AI • Graph analysis • Find super-spreaders • Find rumor origins • Uncover new artefacts • Track movement over time • Text Analysis • Find themes • Classify to narratives • Cluster text to narratives • Search for similar text/narratives • Image, video, audio analysis • Cluster images • Search for similar images • Detect shallowfakes
  • 31. Shared Awareness: MISP Threat Intelligence Platform • Threat sharing standard with large community • EU funded (ENISA, CIRCL) • ISAC, ISAO, CERTs, CSIRTs • NATO, Military, Intelligence • Fortune 500’s • Open data standards • MISP Core, STIX • Connections • API push/pull • Email • Anomali ThreatStream, ThreatConnect, OSQuery 31
  • 32. Data Standards: STIX Extension Disinformation STIX Description Level Infosec STIX Report communication to other responders Communication Report Campaign Longer attacks (Russia’s interference in the 2016 US elections is a “campaign”) Strategy Campaign Incident Shorter-duration attacks, often part of a campaign Strategy Intrusion Set Course of Action Response Strategy Course of Action Identity Actor (individual, group, organisation etc): creator, responder, target, useful idiot etc. Strategy Identity Threat actor Incident creator Strategy Threat Actor Attack pattern Technique used in incident (see framework for examples) TTP Attack pattern Narrative Malicious narrative (story, meme) TTP Malware Tool bot software, APIs, marketing tools TTP Tool Observed Data artefacts like messages, user accounts, etc Artefact Observed Data Indicator posting rates, follow rates etc Artefact Indicator Vulnerability Cognitive biases, community structural weakness etc Vulnerability Vulnerability 32https://github.com/cogsec-collaborative/amitt_cti
  • 33. Disinformation TTPs: AMITT Framework 33(TTP Framework adopted by MITRE, upstream development by CogSecCollab)
  • 34. Other MISP Disinformation Objects • taxonomies ● DFRLab Dichotomies of Disinformation ● NATO Disinformation Taxonomy (WIP) • objects • forged-document, publication, etc. • twitter-post, facebook-post, reddit-post, etc. • twitter-group, facebook-group, reddit- subreddit, etc • twitter-account, facebook-account, reddit- account, etc. • relationships • authored-by • relates-to, etc. 34
  • 36. Response: Actors • Platform • Law Enforcement • Government • Elves • Public • Influencer • Media • Nonprofit • Educator • Corporation 36
  • 37. Response: Mitigations and Countermeasures 37 ● Detect: find them ● Deny: stop them getting in ● Disrupt: interrupt them ● Degrade: slow them down ● Deceive: divert them ● Destroy: damage them ● Deter: discourage them https://github.com/cogsec-collaborative/amitt_counters