skip to main content
10.1145/3308560.3316742acmotherconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

Misinfosec

Published: 13 May 2019 Publication History

Abstract

State actors, private influence operators and grassroots groups are all exploiting the openness and reach of the Internet to manipulate populations at a distance, extending their decades-long struggle for “hearts and minds” via propaganda, influence operations and information warfare. Computational propaganda fueled by AI makes matters worse.
The structure and propagation patterns of these attacks have many similarities to those seen in information security and computer hacking. The Credibility Coalition's MisinfosecWG working group is analyzing those similarities, including information security frameworks that could give the truth-based community better ways to describe, identify and counter misinformation-based attacks.  Specifically, we place misinformation components into a framework commonly used to describe information security incidents. We anticipate that our work will give responders the ability to transfer other information security principles to the misinformation sphere, and to plan defenses and countermoves .

References

[1]
Y. Benkler, R. Farris and H. Roberts, Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics, Oxford: Oxford University Press, 2018.
[2]
Smith and Banic, "Fake News: How a partying Macedonian teen earns thousands publishing lies," NBC News, 2016.
[3]
R. DiResta, "THE INFORMATION WAR IS ON. ARE WE READY FOR IT?," Wired, 2018.
[4]
A. Petrov, "Modeling Position Selection by Individuals during Information Warfare in Society," Mathematical Models and Computer Simulations, pp. 401-8, 2016.
[5]
S. Oates, "When Media Worlds Collide: Using Media Model Theory to Understand How Russia Spreads Disinformation in the United States," in American Political Science Association 2018 Annual Meeting, Boston, MA, 2018.
[6]
S. Oates, J. B. Barrow and B. Foster, "From Network to Narrative: Understanding the Nature and Trajectory of Russian Disinformation in the U.S. News.," in International Journal of Press/Politics Conference, Oxford, UK, 2018.
[7]
A. Field, D. Kliger, S. Wintner, J. Pan, D. Jurafsky and Y. Tsvetkov, "Framing and Agenda-setting in Russian News: a Computational Analysis of Intricate Political Strategies.," EMNLP, 2018.
[8]
T. Boucher, "Adversarial social media tactics," Medium, 2018.
[9]
S.-J. Terp, "Security frameworks for misinformation," 2018.
[10]
S.-J. Terp, "Practical influence operations," 2018.
[11]
S.-J. Terp, "Social engineering at scale," 2018.
[12]
Stubbs, "Exclusive Iran based political influence operation - bigger, persistent, global," Reuters, 2018.
[13]
F. Mortola, "Disinformation through fabricated news site," 2018.
[14]
Foster, "Influence Operations Targeting the 2018 U.S. Midterms: What are we seeing? What are we not?," 2018.
[15]
Ehmke, "Influencer Vaccine: Identifying Information Operations Infrastructure," 2018.
[16]
Kuhr, "Leveraging threat intel disinformation campaigns to defeat attribution," 27 February 2017. {Online}. Available: https://www.synack.com/2017/02/27/shmoocon-2017-recap-election-hackers-vs-threat-intel-attribution/.
[17]
Landau, "Cybersecurity: time for a new definition," 2018.
[18]
Rogers, "Fake news as an information security problem," May.
[19]
Rogers, Director, Fake news as an information security problem. {Film}. 2018.
[20]
D. Gordon, "DEFENDING THE INDEFENSIBLE: A NEW STRATEGY FOR STOPPING INFORMATION OPERATIONS," 2018.
[21]
Grugq., "Lessons in Cyber: Influence Operations," 2018.
[22]
A. Zegart, H. Lin, T. Fingar, N. Persily and L. Ross, "Cyber-Enabled Information and Influence Warfare and Manipulation: Understanding Problems, Developing Solutions," 2017.
[23]
H. Lin and J. Kerr, "On Cyber-Enabled Information/Influence Warfare and Manipulation," 2017.
[24]
H. Lin, "Developing Responses to Cyber-Enabled Information Warfare and Influence Operations," 2018.
[25]
FreedomHouse., "Manipulating Social Media to Undermine Democracy," 2018.
[26]
S. Zannettou, T. Caulfield, W. Setzer, M. Sirivianos, G. Stringhini and J. Blackburn, "Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls," 2018.
[27]
D. D. Kirkpatrick, "Signs of Russian Meddling in Brexit Referendum," 2017.
[28]
D. O'Sullivan and D. Byers, "Exclusive: Fake black activist accounts linked to Russian government," 2017.
[29]
V. Joler, M. Jovanović and A. Petrovski, "Mapping and quantifying political information warfare Part 1 : Propaganda, domination & attacks on online media," 2016.
[30]
M. Rosenberg, N. Confessore and C. Cadwalladr, "How Trump Consultants Exploited the Facebook Data of Millions," 2018.
[31]
A. Nossiter, D. E. Sanger and N. Perlroth, "Hackers Came, but the French Were Prepared," 2017.
[32]
H. G. Frankfurt, On Bullshit, Princeton, NJ: Princeton Univerity Press, 2005.
[33]
DoD, "Joint Publication 3-13: Information Operations, February 13, 2006," 2006.
[34]
Cyberpedia, "HOW TO BREAK THE CYBER ATTACK LIFECYCLE," 2019.
[35]
B. Ninmo, "The 4 Ds of Propaganda: Dismiss, Distort, Distract, Dismay," 2017.
[36]
MITRE, "Att&ck matrix for enterprise," 2019. {Online}. Available: https://attack.mitre.org/.
[37]
"Post-Exploit Threat Modeling with ATT&CK," 2016.
[38]
K. H. Jamieson, Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don't, Can't, and Do Know, Oxford. UK: Oxford University Press, 2018.
[39]
M. Brundage, A. Shahar, J. Clark, H. Toner, P. Eckersley, B. Garfinkel, A. Dafoe, P. Scharre, T. Zeitzoff, B. Filar, H. Anderson, H. Roff, G. C. Allen, J. Steinhardt and C. Flynn, "The Malicious Use of Artificial Intelligence:," Archiv, 2018.
[40]
M. Brockman, "Data-Driven Propaganda as a Subset of Adversarial Examples," 2018.
[41]
C. Watts, Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News, New York, NY: Harper Collins, 2018.

Cited By

View all
  • (2024)Cyber influence defense: Applying the DISARM framework to a cognitive hacking case from the Romanian digital spaceApplied Cybersecurity & Internet Governance10.60097/ACIG/190196Online publication date: 10-Jul-2024

Index Terms

  1. Misinfosec
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        WWW '19: Companion Proceedings of The 2019 World Wide Web Conference
        May 2019
        1331 pages
        ISBN:9781450366755
        DOI:10.1145/3308560
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        In-Cooperation

        • IW3C2: International World Wide Web Conference Committee

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 13 May 2019

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. disinformation
        2. influence campaigns
        3. infosec
        4. misinformation
        5. viral deception

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        WWW '19
        WWW '19: The Web Conference
        May 13 - 17, 2019
        San Francisco, USA

        Acceptance Rates

        Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)26
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 13 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Cyber influence defense: Applying the DISARM framework to a cognitive hacking case from the Romanian digital spaceApplied Cybersecurity & Internet Governance10.60097/ACIG/190196Online publication date: 10-Jul-2024

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media