ABSTRACT
State actors, private influence operators and grassroots groups are all exploiting the openness and reach of the Internet to manipulate populations at a distance, extending their decades-long struggle for “hearts and minds” via propaganda, influence operations and information warfare. Computational propaganda fueled by AI makes matters worse.
The structure and propagation patterns of these attacks have many similarities to those seen in information security and computer hacking. The Credibility Coalition's MisinfosecWG working group is analyzing those similarities, including information security frameworks that could give the truth-based community better ways to describe, identify and counter misinformation-based attacks. Specifically, we place misinformation components into a framework commonly used to describe information security incidents. We anticipate that our work will give responders the ability to transfer other information security principles to the misinformation sphere, and to plan defenses and countermoves .
- Y. Benkler, R. Farris and H. Roberts, Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics, Oxford: Oxford University Press, 2018.Google ScholarDigital Library
- Smith and Banic, "Fake News: How a partying Macedonian teen earns thousands publishing lies," NBC News, 2016.Google Scholar
- R. DiResta, "THE INFORMATION WAR IS ON. ARE WE READY FOR IT?," Wired, 2018.Google Scholar
- A. Petrov, "Modeling Position Selection by Individuals during Information Warfare in Society," Mathematical Models and Computer Simulations, pp. 401-8, 2016.Google Scholar
- S. Oates, "When Media Worlds Collide: Using Media Model Theory to Understand How Russia Spreads Disinformation in the United States," in American Political Science Association 2018 Annual Meeting, Boston, MA, 2018.Google Scholar
- S. Oates, J. B. Barrow and B. Foster, "From Network to Narrative: Understanding the Nature and Trajectory of Russian Disinformation in the U.S. News.," in International Journal of Press/Politics Conference, Oxford, UK, 2018.Google Scholar
- A. Field, D. Kliger, S. Wintner, J. Pan, D. Jurafsky and Y. Tsvetkov, "Framing and Agenda-setting in Russian News: a Computational Analysis of Intricate Political Strategies.," EMNLP, 2018.Google Scholar
- T. Boucher, "Adversarial social media tactics," Medium, 2018.Google Scholar
- S.-J. Terp, "Security frameworks for misinformation," 2018.Google Scholar
- S.-J. Terp, "Practical influence operations," 2018.Google Scholar
- S.-J. Terp, "Social engineering at scale," 2018.Google Scholar
- Stubbs, "Exclusive Iran based political influence operation - bigger, persistent, global," Reuters, 2018.Google Scholar
- F. Mortola, "Disinformation through fabricated news site," 2018.Google Scholar
- Foster, "Influence Operations Targeting the 2018 U.S. Midterms: What are we seeing? What are we not?," 2018.Google Scholar
- Ehmke, "Influencer Vaccine: Identifying Information Operations Infrastructure," 2018.Google Scholar
- Kuhr, "Leveraging threat intel disinformation campaigns to defeat attribution," 27 February 2017. {Online}. Available: https://www.synack.com/2017/02/27/shmoocon-2017-recap-election-hackers-vs-threat-intel-attribution/.Google Scholar
- Landau, "Cybersecurity: time for a new definition," 2018.Google Scholar
- Rogers, "Fake news as an information security problem," May.Google Scholar
- Rogers, Director, Fake news as an information security problem. {Film}. 2018.Google Scholar
- D. Gordon, "DEFENDING THE INDEFENSIBLE: A NEW STRATEGY FOR STOPPING INFORMATION OPERATIONS," 2018.Google Scholar
- Grugq., "Lessons in Cyber: Influence Operations," 2018.Google Scholar
- A. Zegart, H. Lin, T. Fingar, N. Persily and L. Ross, "Cyber-Enabled Information and Influence Warfare and Manipulation: Understanding Problems, Developing Solutions," 2017.Google Scholar
- H. Lin and J. Kerr, "On Cyber-Enabled Information/Influence Warfare and Manipulation," 2017.Google Scholar
- H. Lin, "Developing Responses to Cyber-Enabled Information Warfare and Influence Operations," 2018.Google Scholar
- FreedomHouse., "Manipulating Social Media to Undermine Democracy," 2018.Google Scholar
- S. Zannettou, T. Caulfield, W. Setzer, M. Sirivianos, G. Stringhini and J. Blackburn, "Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls," 2018.Google Scholar
- D. D. Kirkpatrick, "Signs of Russian Meddling in Brexit Referendum," 2017.Google Scholar
- D. O'Sullivan and D. Byers, "Exclusive: Fake black activist accounts linked to Russian government," 2017.Google Scholar
- V. Joler, M. Jovanović and A. Petrovski, "Mapping and quantifying political information warfare Part 1 : Propaganda, domination & attacks on online media," 2016.Google Scholar
- M. Rosenberg, N. Confessore and C. Cadwalladr, "How Trump Consultants Exploited the Facebook Data of Millions," 2018.Google Scholar
- A. Nossiter, D. E. Sanger and N. Perlroth, "Hackers Came, but the French Were Prepared," 2017.Google Scholar
- H. G. Frankfurt, On Bullshit, Princeton, NJ: Princeton Univerity Press, 2005.Google Scholar
- DoD, "Joint Publication 3-13: Information Operations, February 13, 2006," 2006.Google Scholar
- Cyberpedia, "HOW TO BREAK THE CYBER ATTACK LIFECYCLE," 2019.Google Scholar
- B. Ninmo, "The 4 Ds of Propaganda: Dismiss, Distort, Distract, Dismay," 2017.Google Scholar
- MITRE, "Att&ck matrix for enterprise," 2019. {Online}. Available: https://attack.mitre.org/.Google Scholar
- "Post-Exploit Threat Modeling with ATT&CK," 2016.Google Scholar
- K. H. Jamieson, Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don't, Can't, and Do Know, Oxford. UK: Oxford University Press, 2018.Google Scholar
- M. Brundage, A. Shahar, J. Clark, H. Toner, P. Eckersley, B. Garfinkel, A. Dafoe, P. Scharre, T. Zeitzoff, B. Filar, H. Anderson, H. Roff, G. C. Allen, J. Steinhardt and C. Flynn, "The Malicious Use of Artificial Intelligence:," Archiv, 2018.Google Scholar
- M. Brockman, "Data-Driven Propaganda as a Subset of Adversarial Examples," 2018.Google Scholar
- C. Watts, Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News, New York, NY: Harper Collins, 2018. Google ScholarDigital Library
Index Terms
- Misinfosec
Recommendations
Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web
WWW '19: Companion Proceedings of The 2019 World Wide Web ConferenceOver the past couple of years, anecdotal evidence has emerged linking coordinated campaigns by state-sponsored actors with efforts to manipulate public opinion on the Web, often around major political events, through dedicated accounts, or “trolls.” ...
Interactions with Potential Mis/Disinformation URLs Among U.S. Users on Facebook, 2017-2019
FOCI '21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the InternetMisinformation and disinformation online---and on social media in particular--- have become a topic of widespread concern. Recently, Facebook and Social Science One released a large, unique, privacy-preserving dataset to researchers that contains data on ...
Science Disinformation: On the Problem of Fake News
AbstractThis article is devoted to an important socio-cultural phenomenon that undermines public confidence in science, that is, fake science news. The term fake news is analyzed and data on the dissemination of fake news on social networks is provided. ...
Comments