SlideShare a Scribd company logo
Disinformation, Public OpinionDisinformation, Public Opinion
Swinging and False FlagsSwinging and False Flags
Dan Demeter, Kaspersky Lab Romania
-- def.camp, 2018@_xdanx
Remember, remember!
The fifth of November,
The Gunpowder treason and plot;
I know of no reason
Why the Gunpowder treason
Should ever be forgot!
"Who owns the information, he owns the world."
-- Guy Fawkes (1570-1606)
./whoami./whoami
MEng from Imperial College London in 2014
Security Researcher @ Kaspersky Lab
#KLara developer
GReATGReAT - Elite Threat Research- Elite Threat Research
Global Research and Analysis Team
Founded 2008
Threat intelligence, research and innovation
leadership
APTs, critical infrastructure threats, banking threats,
targeted attacks, finding attacks using zero-days in
popular OS’es and products
PastPast
Ion Mihai PacepaIon Mihai Pacepa
Ion Mihai Pacepa
DezinformatsiyaDezinformatsiya
DezinformatsiyaDezinformatsiya
Our friends in Moscow call it "dezinformatsiya". Our
enemies in America call it "active measures", and I,
dear friends, call it "my favorite pastime."
-- Col. Rolf Wagenbreth (b. 1929) (Director of
Department X (dis-information) of East German
foreign intelligence
DezinformatsiyaDezinformatsiya
IF YOU ARE GOOD AT DISINFORMATION, YOU
CAN GET AWAY WITH ANYTHING.” (p. 80)
Trivia timeTrivia time
A) AIDS was created in a lab
B) The Earth if Flat
C) Napoleon was short (1.6 m)
D) We eat clones from a single selectively-bred
banana
E) Einstein failed at maths
Trivia timeTrivia time
A) AIDS was created in a lab
B) The Earth if Flat
C) Napoleon was short (1.6 m)
D) We eat clones from a single selectively-bred
banana
E) Einstein failed at maths
Was Napoleon Short?Was Napoleon Short?
For years, the history books listed Napoleon's official
height as 5 feet, 2 inches (1.58 meters), indisputably
in "shorty" territory. But that's because they
mistakenly believed that a French "foot" was the same
as an English foot.
He was actually 1.7m
Einstein failed at Maths?Einstein failed at Maths?
The source of the "Einstein flunked math" myth is not
clear. However, when shown the allegation in a 1935
"Ripley's Believe It or Not" column, Einstein replied, "I
never failed in mathematics. Before I was 15 I had
mastered differential and integral calculus"
активные мерыактивные меры
active measuresactive measures
Active measures is a Soviet term for the actions of
political warfare conducted by the Soviet and Russian
security services to influence the course of world
events, in addition to collecting intelligence and
producing "politically correct" assessment of it. Active
measures range "from media manipulations to special
actions involving various degrees of violence". They
were used both abroad and domestically.
Source: Wikipedia
Active measures is a Soviet term for the actions of
political warfare conducted by the Soviet and Russian
security services to influence the course of world
events, in addition to collecting intelligence and
producing "politically correct" assessment of it. Active
measures range "from media manipulations to special
actions involving various degrees of violence". They
were used both abroad and domestically.
Source: Wikipedia
Active measures’ can include a combination of White,
Grey and Black propaganda.
Source: LSE Soviet Subversion, Disinformation and Propaganda: How the West Fought Against it (2017) (p.
17)
активные меры cookbookактивные меры cookbook
Front Organisations
Agents of Influence
Influence/Infiltrate the Media
Fake Stories
Forgeries
Source: LSE Soviet Subversion, Disinformation and Propaganda: How the West Fought Against it (2017) (p.
20)
AIDS was created by theAIDS was created by the
AmericansAmericans
Operation INFEKTIONOperation INFEKTION
Soviet Bloc Intelligence and Its AIDSSoviet Bloc Intelligence and Its AIDS
Disinformation CampaignDisinformation Campaign
-- Thomas Boghardt-- Thomas Boghardt
Deadly consequences...Deadly consequences...
Source: LSE Soviet Subversion, Disinformation and Propaganda: How the West Fought Against it (p. 23)
Fake News && Active Measures - CostsFake News && Active Measures - Costs
Soviet Bloc Intelligence and Its AIDS Disinformation Campaign -- Thomas Boghardt
9.18 B$9.18 B$
US Active MeasuresUS Active Measures
US Active MeasuresUS Active Measures
Source: Airborne Leaflet Propaganda
Radio Free EuropeRadio Free Europe
https://www.cia.gov/library/readingroom/document/cia-rdp80b01676r002600100042-9
Radio Free EuropeRadio Free Europe
https://www.cia.gov/library/readingroom/document/cia-rdp80b01676r002600100042-9
Radio Free EuropeRadio Free Europe
https://www.cia.gov/library/readingroom/document/cia-rdp80b01676r002600100042-9
Radio Free EuropeRadio Free Europe
https://www.amazon.com/Radio-Free-Europe-Liberty-International/dp/0804773564
Disinformation elsewhereDisinformation elsewhere
Fake News in Communist RomaniaFake News in Communist Romania
PresentPresent
YT: How false news can spread - Noah TavlinYT: How false news can spread - Noah Tavlin
"Our desire for quick answers may overpower the
desire to be certain of their validity"
YT: How false news can spread - Noah TavlinYT: How false news can spread - Noah Tavlin
Why does it happen? How doesWhy does it happen? How does
it work?it work?
Tribalism (or Partisanship)
Confirmation bias
Dangers of debunked ideas
Parlemeter 2018 -Parlemeter 2018 -
Eurobarometer Survey 90.1Eurobarometer Survey 90.1
"More than ever, European citizens see their country’s
membership to the EU as a good thing"
Parlemeter 2018 - Eurobarometer Survey 90.1Parlemeter 2018 - Eurobarometer Survey 90.1
Parlemeter 2018 -Parlemeter 2018 -
Eurobarometer Survey 90.1Eurobarometer Survey 90.1
On European average, the abuse of personal data
online as well as fake news and disinformation online
return as lowest-ranked threats. On national level, the
abuse of personal data online scores the highest in
Denmark with 26% and 23% in both the Netherlands
and Ireland for. In Latvia (25%), Sweden and
Romania (both 24%) the threat of fake news and
disinformation online find its highest relative support
Balkans: Most susceptible for fake newsBalkans: Most susceptible for fake news
Fact Checking ReportFact Checking Report
https://ksj.mit.edu
"[...]conducted more than 300 surveys and more than
90 interviews [...] to gather various perspectives on
fact-checking policies and procedures"
Fact Checking ReportFact Checking Report
https://ksj.mit.edu
"The study focused not on the watchdog efforts of
political fact-checkers [...], but rather on the in-house
quality control that publications do before a story goes
to print - a practice known as editorial fact checking"
Borel says she was also struck to learn that “the hourly rate for fact-checkers is all over the place.” Some
fact checkers reported earning $19 an hour; others four times that much. Some outlets paid as little as $15
an hour. On average, fact-checkers who participated in the study earned about $30.
Bots, bots, bots...Bots, bots, bots...
Let's play a game...Let's play a game...
Report a Facebook Page
1 euro ~ Beer
2 euro ~ Better Beer
4 euro ~ Average Lunch
10 euro ~ B0$$ Lunch
20 euro ~ Therme ticket
Internet BalkanizationInternet Balkanization
Stefan Tanase - Today @12:30
PrivacyPrivacy
the state of being apart from other people or
concealed from their view; solitude; seclusion
OR
freedom from damaging publicity, public scrutiny,
secret surveillance, or unauthorized disclosure of
one’s personal data or information, as by a
government, corporation, or individual
PrivacyPrivacy
The state of being free from unwanted or undue
intrusion or disturbance in one's private life or affairs;
freedom to be left alone
Illusion of privacyIllusion of privacy
Nothing to hide argumentNothing to hide argument
Cambridge AnalyticaCambridge Analytica
US '16 Elections
UK '16 Brexit Vote
 Advanced Symbolics Advanced Symbolics
Is privacy 'dead'?Is privacy 'dead'?
Is there anything we can do?Is there anything we can do?
Things we can do
User education
Quality Journalism
User education
Support these guysSupport these guys
Casa Jurnalistului
Scena9
Recorder
etc...
ThanksThanks
Bib working group (S. & A.)
Costin and Vicente
You
"Who owns the information, he owns the world."
-- Nathan Rothschild (1777-1836)
Dan DemeterDan Demeter
@_xdanx
Global Research and Analysis Team
Kaspersky Lab
The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags

More Related Content

What's hot

Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014
protected7000
 
CORONA VIRUS COVID-19 False Flag Free Book
CORONA VIRUS COVID-19 False Flag Free BookCORONA VIRUS COVID-19 False Flag Free Book
CORONA VIRUS COVID-19 False Flag Free Book
The Free School
 
CORONA VIRUS COVID-19 False Flag Scam Free Book
CORONA VIRUS COVID-19 False Flag Scam Free BookCORONA VIRUS COVID-19 False Flag Scam Free Book
CORONA VIRUS COVID-19 False Flag Scam Free Book
The Free School
 
Plug & Play News
Plug & Play News Plug & Play News
Plug & Play News
Niki Radisic
 
Fake news full
Fake news fullFake news full
Fake news full
Vasily Gatov
 
Fake News Defined
Fake News DefinedFake News Defined
Magdalena Paul: Fake news
Magdalena Paul: Fake newsMagdalena Paul: Fake news
Magdalena Paul: Fake news
ÚISK FF UK
 
Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.
Chetan Thathoo
 
PROJECT BLUE BEAM
PROJECT BLUE BEAM PROJECT BLUE BEAM
PROJECT BLUE BEAM
ICJ-ICC
 
Fake News
Fake NewsFake News
Fake News
Phil Bradley
 
Scam watch educational awareness: why call it Intelligence?
Scam watch educational awareness: why call it Intelligence?Scam watch educational awareness: why call it Intelligence?
Scam watch educational awareness: why call it Intelligence?
Roxy Bolton
 
The imminent rise of the everyday European activist
The imminent rise of the everyday European activistThe imminent rise of the everyday European activist
The imminent rise of the everyday European activist
Brett Kobie
 
 SCIENTIFIC INTEGRITY MAY 2009
 SCIENTIFIC INTEGRITY MAY 2009 SCIENTIFIC INTEGRITY MAY 2009
 SCIENTIFIC INTEGRITY MAY 2009
Prayer Warriors Institute
 
Media bias in 2017
Media bias in 2017Media bias in 2017
Media bias in 2017
Dan Kennedy
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
Censorship presentation
Censorship presentation Censorship presentation
Censorship presentation
Patricio Gonzalez
 
Coronavirus Fake Pandemic - Economic Reset False Flag; 12 March 2020
Coronavirus Fake Pandemic - Economic Reset False Flag; 12 March 2020Coronavirus Fake Pandemic - Economic Reset False Flag; 12 March 2020
Coronavirus Fake Pandemic - Economic Reset False Flag; 12 March 2020
The Free School
 
Cracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media CommunicationsCracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media Communications
Scott Rickard
 
Analysis of sources and effect of fake news on society
Analysis of sources and effect of fake news on society Analysis of sources and effect of fake news on society
Analysis of sources and effect of fake news on society
Arpit Khurana
 
PROJECT BLUE BEAM: False Flag. Free Book. 2020
PROJECT BLUE BEAM: False Flag. Free Book. 2020PROJECT BLUE BEAM: False Flag. Free Book. 2020
PROJECT BLUE BEAM: False Flag. Free Book. 2020
The Free School
 

What's hot (20)

Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014
 
CORONA VIRUS COVID-19 False Flag Free Book
CORONA VIRUS COVID-19 False Flag Free BookCORONA VIRUS COVID-19 False Flag Free Book
CORONA VIRUS COVID-19 False Flag Free Book
 
CORONA VIRUS COVID-19 False Flag Scam Free Book
CORONA VIRUS COVID-19 False Flag Scam Free BookCORONA VIRUS COVID-19 False Flag Scam Free Book
CORONA VIRUS COVID-19 False Flag Scam Free Book
 
Plug & Play News
Plug & Play News Plug & Play News
Plug & Play News
 
Fake news full
Fake news fullFake news full
Fake news full
 
Fake News Defined
Fake News DefinedFake News Defined
Fake News Defined
 
Magdalena Paul: Fake news
Magdalena Paul: Fake newsMagdalena Paul: Fake news
Magdalena Paul: Fake news
 
Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.
 
PROJECT BLUE BEAM
PROJECT BLUE BEAM PROJECT BLUE BEAM
PROJECT BLUE BEAM
 
Fake News
Fake NewsFake News
Fake News
 
Scam watch educational awareness: why call it Intelligence?
Scam watch educational awareness: why call it Intelligence?Scam watch educational awareness: why call it Intelligence?
Scam watch educational awareness: why call it Intelligence?
 
The imminent rise of the everyday European activist
The imminent rise of the everyday European activistThe imminent rise of the everyday European activist
The imminent rise of the everyday European activist
 
 SCIENTIFIC INTEGRITY MAY 2009
 SCIENTIFIC INTEGRITY MAY 2009 SCIENTIFIC INTEGRITY MAY 2009
 SCIENTIFIC INTEGRITY MAY 2009
 
Media bias in 2017
Media bias in 2017Media bias in 2017
Media bias in 2017
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
Censorship presentation
Censorship presentation Censorship presentation
Censorship presentation
 
Coronavirus Fake Pandemic - Economic Reset False Flag; 12 March 2020
Coronavirus Fake Pandemic - Economic Reset False Flag; 12 March 2020Coronavirus Fake Pandemic - Economic Reset False Flag; 12 March 2020
Coronavirus Fake Pandemic - Economic Reset False Flag; 12 March 2020
 
Cracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media CommunicationsCracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media Communications
 
Analysis of sources and effect of fake news on society
Analysis of sources and effect of fake news on society Analysis of sources and effect of fake news on society
Analysis of sources and effect of fake news on society
 
PROJECT BLUE BEAM: False Flag. Free Book. 2020
PROJECT BLUE BEAM: False Flag. Free Book. 2020PROJECT BLUE BEAM: False Flag. Free Book. 2020
PROJECT BLUE BEAM: False Flag. Free Book. 2020
 

Similar to The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags

Antarctica 2020 : NESARA Fake news distractions
Antarctica 2020 : NESARA Fake news distractionsAntarctica 2020 : NESARA Fake news distractions
Antarctica 2020 : NESARA Fake news distractions
The Free School
 
Critical Thinking IATEFL pl 2016
Critical Thinking IATEFL pl 2016Critical Thinking IATEFL pl 2016
Critical Thinking IATEFL pl 2016
Marcin Stanowski
 
Libraries fighting fake news challenges, allies, resources and opportunities...
Libraries fighting fake news  challenges, allies, resources and opportunities...Libraries fighting fake news  challenges, allies, resources and opportunities...
Libraries fighting fake news challenges, allies, resources and opportunities...
Universitat Oberta de Catalunya (UOC)
 
Indian chronicles summary
Indian chronicles summaryIndian chronicles summary
Indian chronicles summary
ZahidManiyar
 
On A Trajectory of Revelations
On A Trajectory of RevelationsOn A Trajectory of Revelations
On A Trajectory of Revelations
Gegham Vardanyan
 
Funding Truth in the Media with its Fake News
Funding Truth in the Media with its Fake NewsFunding Truth in the Media with its Fake News
Funding Truth in the Media with its Fake News
Paul H. Carr
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
Felipe Prado
 
Lesson 15
Lesson 15Lesson 15
Non mashable disinformation deck (version 3.0)
Non mashable disinformation deck (version 3.0)Non mashable disinformation deck (version 3.0)
Non mashable disinformation deck (version 3.0)
Reti
 
Fact-checking in the newsroom: best practices, open questions
Fact-checking in the newsroom: best practices, open questionsFact-checking in the newsroom: best practices, open questions
Fact-checking in the newsroom: best practices, open questions
Centre for Media Pluralism and Media Freedom
 
Welcome to Planet Hoax 8th Issue Infowars Magazine
Welcome to Planet Hoax 8th Issue Infowars MagazineWelcome to Planet Hoax 8th Issue Infowars Magazine
Welcome to Planet Hoax 8th Issue Infowars Magazine
infowarrior78
 
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media PhenomenonComet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
The Free School
 
Corruption, the AIDS of civilization
Corruption, the AIDS of civilization Corruption, the AIDS of civilization
Corruption, the AIDS of civilization
Dr. Suhail Bin Tarraf PHD
 
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
Wikileak’s Prosecution or Persecution:  Is this Western Democracy?Wikileak’s Prosecution or Persecution:  Is this Western Democracy?
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
Thesigan Nadarajan
 
LAT_HumanTrafficking_Page_v4
LAT_HumanTrafficking_Page_v4LAT_HumanTrafficking_Page_v4
LAT_HumanTrafficking_Page_v4
Lane Wollerton
 
India legal 15 december 2015
India legal 15 december 2015India legal 15 december 2015
India legal 15 december 2015
ENC
 
Notes from RUSI International Military Influence Conference 2015
Notes from RUSI International Military Influence Conference 2015Notes from RUSI International Military Influence Conference 2015
Notes from RUSI International Military Influence Conference 2015
East European Security Research Initiative
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
andreteh3214474
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
andreteh3214474
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
andreteh3214474
 

Similar to The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags (20)

Antarctica 2020 : NESARA Fake news distractions
Antarctica 2020 : NESARA Fake news distractionsAntarctica 2020 : NESARA Fake news distractions
Antarctica 2020 : NESARA Fake news distractions
 
Critical Thinking IATEFL pl 2016
Critical Thinking IATEFL pl 2016Critical Thinking IATEFL pl 2016
Critical Thinking IATEFL pl 2016
 
Libraries fighting fake news challenges, allies, resources and opportunities...
Libraries fighting fake news  challenges, allies, resources and opportunities...Libraries fighting fake news  challenges, allies, resources and opportunities...
Libraries fighting fake news challenges, allies, resources and opportunities...
 
Indian chronicles summary
Indian chronicles summaryIndian chronicles summary
Indian chronicles summary
 
On A Trajectory of Revelations
On A Trajectory of RevelationsOn A Trajectory of Revelations
On A Trajectory of Revelations
 
Funding Truth in the Media with its Fake News
Funding Truth in the Media with its Fake NewsFunding Truth in the Media with its Fake News
Funding Truth in the Media with its Fake News
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
Lesson 15
Lesson 15Lesson 15
Lesson 15
 
Non mashable disinformation deck (version 3.0)
Non mashable disinformation deck (version 3.0)Non mashable disinformation deck (version 3.0)
Non mashable disinformation deck (version 3.0)
 
Fact-checking in the newsroom: best practices, open questions
Fact-checking in the newsroom: best practices, open questionsFact-checking in the newsroom: best practices, open questions
Fact-checking in the newsroom: best practices, open questions
 
Welcome to Planet Hoax 8th Issue Infowars Magazine
Welcome to Planet Hoax 8th Issue Infowars MagazineWelcome to Planet Hoax 8th Issue Infowars Magazine
Welcome to Planet Hoax 8th Issue Infowars Magazine
 
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media PhenomenonComet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
 
Corruption, the AIDS of civilization
Corruption, the AIDS of civilization Corruption, the AIDS of civilization
Corruption, the AIDS of civilization
 
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
Wikileak’s Prosecution or Persecution:  Is this Western Democracy?Wikileak’s Prosecution or Persecution:  Is this Western Democracy?
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
 
LAT_HumanTrafficking_Page_v4
LAT_HumanTrafficking_Page_v4LAT_HumanTrafficking_Page_v4
LAT_HumanTrafficking_Page_v4
 
India legal 15 december 2015
India legal 15 december 2015India legal 15 december 2015
India legal 15 december 2015
 
Notes from RUSI International Military Influence Conference 2015
Notes from RUSI International Military Influence Conference 2015Notes from RUSI International Military Influence Conference 2015
Notes from RUSI International Military Influence Conference 2015
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
 

More from DefCamp

Remote Yacht Hacking
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht Hacking
DefCamp
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
DefCamp
 
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp
 
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
DefCamp
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp
 
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp
 
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
DefCamp
 
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
DefCamp
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
DefCamp
 
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
DefCamp
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
DefCamp
 
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
DefCamp
 
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
DefCamp
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
 
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
DefCamp
 
The lions and the watering hole
The lions and the watering holeThe lions and the watering hole
The lions and the watering hole
DefCamp
 

More from DefCamp (20)

Remote Yacht Hacking
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht Hacking
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
 
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
 
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
 
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
 
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
 
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
 
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
 
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
 
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
 
The lions and the watering hole
The lions and the watering holeThe lions and the watering hole
The lions and the watering hole
 

Recently uploaded

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 

Recently uploaded (20)

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 

The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags

  • 1. Disinformation, Public OpinionDisinformation, Public Opinion Swinging and False FlagsSwinging and False Flags Dan Demeter, Kaspersky Lab Romania -- def.camp, 2018@_xdanx
  • 2.
  • 3.
  • 4.
  • 5. Remember, remember! The fifth of November, The Gunpowder treason and plot; I know of no reason Why the Gunpowder treason Should ever be forgot!
  • 6.
  • 7. "Who owns the information, he owns the world." -- Guy Fawkes (1570-1606)
  • 8.
  • 9. ./whoami./whoami MEng from Imperial College London in 2014 Security Researcher @ Kaspersky Lab #KLara developer
  • 10.
  • 11. GReATGReAT - Elite Threat Research- Elite Threat Research Global Research and Analysis Team Founded 2008 Threat intelligence, research and innovation leadership APTs, critical infrastructure threats, banking threats, targeted attacks, finding attacks using zero-days in popular OS’es and products
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. Ion Mihai PacepaIon Mihai Pacepa
  • 62.
  • 64.
  • 66.
  • 67. DezinformatsiyaDezinformatsiya Our friends in Moscow call it "dezinformatsiya". Our enemies in America call it "active measures", and I, dear friends, call it "my favorite pastime." -- Col. Rolf Wagenbreth (b. 1929) (Director of Department X (dis-information) of East German foreign intelligence
  • 68.
  • 69. DezinformatsiyaDezinformatsiya IF YOU ARE GOOD AT DISINFORMATION, YOU CAN GET AWAY WITH ANYTHING.” (p. 80)
  • 70.
  • 71.
  • 72.
  • 73. Trivia timeTrivia time A) AIDS was created in a lab B) The Earth if Flat C) Napoleon was short (1.6 m) D) We eat clones from a single selectively-bred banana E) Einstein failed at maths
  • 74.
  • 75. Trivia timeTrivia time A) AIDS was created in a lab B) The Earth if Flat C) Napoleon was short (1.6 m) D) We eat clones from a single selectively-bred banana E) Einstein failed at maths
  • 76.
  • 77. Was Napoleon Short?Was Napoleon Short? For years, the history books listed Napoleon's official height as 5 feet, 2 inches (1.58 meters), indisputably in "shorty" territory. But that's because they mistakenly believed that a French "foot" was the same as an English foot. He was actually 1.7m
  • 78.
  • 79. Einstein failed at Maths?Einstein failed at Maths? The source of the "Einstein flunked math" myth is not clear. However, when shown the allegation in a 1935 "Ripley's Believe It or Not" column, Einstein replied, "I never failed in mathematics. Before I was 15 I had mastered differential and integral calculus"
  • 80.
  • 82.
  • 84.
  • 85. Active measures is a Soviet term for the actions of political warfare conducted by the Soviet and Russian security services to influence the course of world events, in addition to collecting intelligence and producing "politically correct" assessment of it. Active measures range "from media manipulations to special actions involving various degrees of violence". They were used both abroad and domestically. Source: Wikipedia
  • 86.
  • 87. Active measures is a Soviet term for the actions of political warfare conducted by the Soviet and Russian security services to influence the course of world events, in addition to collecting intelligence and producing "politically correct" assessment of it. Active measures range "from media manipulations to special actions involving various degrees of violence". They were used both abroad and domestically. Source: Wikipedia
  • 88.
  • 89. Active measures’ can include a combination of White, Grey and Black propaganda. Source: LSE Soviet Subversion, Disinformation and Propaganda: How the West Fought Against it (2017) (p. 17)
  • 90.
  • 91. активные меры cookbookактивные меры cookbook Front Organisations Agents of Influence Influence/Infiltrate the Media Fake Stories Forgeries Source: LSE Soviet Subversion, Disinformation and Propaganda: How the West Fought Against it (2017) (p. 20)
  • 92.
  • 93. AIDS was created by theAIDS was created by the AmericansAmericans
  • 94.
  • 95. Operation INFEKTIONOperation INFEKTION Soviet Bloc Intelligence and Its AIDSSoviet Bloc Intelligence and Its AIDS Disinformation CampaignDisinformation Campaign -- Thomas Boghardt-- Thomas Boghardt
  • 96.
  • 97.
  • 98.
  • 100.
  • 101.
  • 102. Source: LSE Soviet Subversion, Disinformation and Propaganda: How the West Fought Against it (p. 23)
  • 103.
  • 104. Fake News && Active Measures - CostsFake News && Active Measures - Costs Soviet Bloc Intelligence and Its AIDS Disinformation Campaign -- Thomas Boghardt
  • 105.
  • 107.
  • 108. US Active MeasuresUS Active Measures
  • 109.
  • 110. US Active MeasuresUS Active Measures Source: Airborne Leaflet Propaganda
  • 111.
  • 112. Radio Free EuropeRadio Free Europe https://www.cia.gov/library/readingroom/document/cia-rdp80b01676r002600100042-9
  • 113.
  • 114. Radio Free EuropeRadio Free Europe https://www.cia.gov/library/readingroom/document/cia-rdp80b01676r002600100042-9
  • 115.
  • 116. Radio Free EuropeRadio Free Europe https://www.cia.gov/library/readingroom/document/cia-rdp80b01676r002600100042-9
  • 117.
  • 118. Radio Free EuropeRadio Free Europe https://www.amazon.com/Radio-Free-Europe-Liberty-International/dp/0804773564
  • 119.
  • 121.
  • 122. Fake News in Communist RomaniaFake News in Communist Romania
  • 123.
  • 124.
  • 126.
  • 127. YT: How false news can spread - Noah TavlinYT: How false news can spread - Noah Tavlin "Our desire for quick answers may overpower the desire to be certain of their validity"
  • 128.
  • 129. YT: How false news can spread - Noah TavlinYT: How false news can spread - Noah Tavlin
  • 130.
  • 131. Why does it happen? How doesWhy does it happen? How does it work?it work? Tribalism (or Partisanship) Confirmation bias Dangers of debunked ideas
  • 132.
  • 133.
  • 134.
  • 135. Parlemeter 2018 -Parlemeter 2018 - Eurobarometer Survey 90.1Eurobarometer Survey 90.1 "More than ever, European citizens see their country’s membership to the EU as a good thing"
  • 136.
  • 137. Parlemeter 2018 - Eurobarometer Survey 90.1Parlemeter 2018 - Eurobarometer Survey 90.1
  • 138.
  • 139. Parlemeter 2018 -Parlemeter 2018 - Eurobarometer Survey 90.1Eurobarometer Survey 90.1 On European average, the abuse of personal data online as well as fake news and disinformation online return as lowest-ranked threats. On national level, the abuse of personal data online scores the highest in Denmark with 26% and 23% in both the Netherlands and Ireland for. In Latvia (25%), Sweden and Romania (both 24%) the threat of fake news and disinformation online find its highest relative support
  • 140.
  • 141. Balkans: Most susceptible for fake newsBalkans: Most susceptible for fake news
  • 142.
  • 143. Fact Checking ReportFact Checking Report https://ksj.mit.edu "[...]conducted more than 300 surveys and more than 90 interviews [...] to gather various perspectives on fact-checking policies and procedures"
  • 144.
  • 145. Fact Checking ReportFact Checking Report https://ksj.mit.edu "The study focused not on the watchdog efforts of political fact-checkers [...], but rather on the in-house quality control that publications do before a story goes to print - a practice known as editorial fact checking"
  • 146.
  • 147. Borel says she was also struck to learn that “the hourly rate for fact-checkers is all over the place.” Some fact checkers reported earning $19 an hour; others four times that much. Some outlets paid as little as $15 an hour. On average, fact-checkers who participated in the study earned about $30.
  • 148.
  • 149. Bots, bots, bots...Bots, bots, bots...
  • 150.
  • 151.
  • 152.
  • 153.
  • 154.
  • 155.
  • 156.
  • 157.
  • 158.
  • 159. Let's play a game...Let's play a game... Report a Facebook Page 1 euro ~ Beer 2 euro ~ Better Beer 4 euro ~ Average Lunch 10 euro ~ B0$$ Lunch 20 euro ~ Therme ticket
  • 160.
  • 162.
  • 163.
  • 164.
  • 165.
  • 166.
  • 167. PrivacyPrivacy the state of being apart from other people or concealed from their view; solitude; seclusion OR freedom from damaging publicity, public scrutiny, secret surveillance, or unauthorized disclosure of one’s personal data or information, as by a government, corporation, or individual
  • 168.
  • 169. PrivacyPrivacy The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be left alone
  • 170.
  • 171. Illusion of privacyIllusion of privacy Nothing to hide argumentNothing to hide argument
  • 172.
  • 173. Cambridge AnalyticaCambridge Analytica US '16 Elections UK '16 Brexit Vote
  • 174.
  • 176.
  • 177. Is privacy 'dead'?Is privacy 'dead'? Is there anything we can do?Is there anything we can do?
  • 178.
  • 179.
  • 180.
  • 181. Things we can do User education Quality Journalism User education
  • 182.
  • 183.
  • 184.
  • 185. Support these guysSupport these guys Casa Jurnalistului Scena9 Recorder etc...
  • 186.
  • 187.
  • 188.
  • 189.
  • 190.
  • 191.
  • 192.
  • 193. ThanksThanks Bib working group (S. & A.) Costin and Vicente You
  • 194.
  • 195. "Who owns the information, he owns the world." -- Nathan Rothschild (1777-1836)
  • 196.
  • 197. Dan DemeterDan Demeter @_xdanx Global Research and Analysis Team Kaspersky Lab