skip to main content
10.1145/3308560.3316742acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Misinfosec

Published:13 May 2019Publication History

ABSTRACT

State actors, private influence operators and grassroots groups are all exploiting the openness and reach of the Internet to manipulate populations at a distance, extending their decades-long struggle for “hearts and minds” via propaganda, influence operations and information warfare. Computational propaganda fueled by AI makes matters worse.

The structure and propagation patterns of these attacks have many similarities to those seen in information security and computer hacking. The Credibility Coalition's MisinfosecWG working group is analyzing those similarities, including information security frameworks that could give the truth-based community better ways to describe, identify and counter misinformation-based attacks.  Specifically, we place misinformation components into a framework commonly used to describe information security incidents. We anticipate that our work will give responders the ability to transfer other information security principles to the misinformation sphere, and to plan defenses and countermoves .

References

  1. Y. Benkler, R. Farris and H. Roberts, Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics, Oxford: Oxford University Press, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Smith and Banic, "Fake News: How a partying Macedonian teen earns thousands publishing lies," NBC News, 2016.Google ScholarGoogle Scholar
  3. R. DiResta, "THE INFORMATION WAR IS ON. ARE WE READY FOR IT?," Wired, 2018.Google ScholarGoogle Scholar
  4. A. Petrov, "Modeling Position Selection by Individuals during Information Warfare in Society," Mathematical Models and Computer Simulations, pp. 401-8, 2016.Google ScholarGoogle Scholar
  5. S. Oates, "When Media Worlds Collide: Using Media Model Theory to Understand How Russia Spreads Disinformation in the United States," in American Political Science Association 2018 Annual Meeting, Boston, MA, 2018.Google ScholarGoogle Scholar
  6. S. Oates, J. B. Barrow and B. Foster, "From Network to Narrative: Understanding the Nature and Trajectory of Russian Disinformation in the U.S. News.," in International Journal of Press/Politics Conference, Oxford, UK, 2018.Google ScholarGoogle Scholar
  7. A. Field, D. Kliger, S. Wintner, J. Pan, D. Jurafsky and Y. Tsvetkov, "Framing and Agenda-setting in Russian News: a Computational Analysis of Intricate Political Strategies.," EMNLP, 2018.Google ScholarGoogle Scholar
  8. T. Boucher, "Adversarial social media tactics," Medium, 2018.Google ScholarGoogle Scholar
  9. S.-J. Terp, "Security frameworks for misinformation," 2018.Google ScholarGoogle Scholar
  10. S.-J. Terp, "Practical influence operations," 2018.Google ScholarGoogle Scholar
  11. S.-J. Terp, "Social engineering at scale," 2018.Google ScholarGoogle Scholar
  12. Stubbs, "Exclusive Iran based political influence operation - bigger, persistent, global," Reuters, 2018.Google ScholarGoogle Scholar
  13. F. Mortola, "Disinformation through fabricated news site," 2018.Google ScholarGoogle Scholar
  14. Foster, "Influence Operations Targeting the 2018 U.S. Midterms: What are we seeing? What are we not?," 2018.Google ScholarGoogle Scholar
  15. Ehmke, "Influencer Vaccine: Identifying Information Operations Infrastructure," 2018.Google ScholarGoogle Scholar
  16. Kuhr, "Leveraging threat intel disinformation campaigns to defeat attribution," 27 February 2017. {Online}. Available: https://www.synack.com/2017/02/27/shmoocon-2017-recap-election-hackers-vs-threat-intel-attribution/.Google ScholarGoogle Scholar
  17. Landau, "Cybersecurity: time for a new definition," 2018.Google ScholarGoogle Scholar
  18. Rogers, "Fake news as an information security problem," May.Google ScholarGoogle Scholar
  19. Rogers, Director, Fake news as an information security problem. {Film}. 2018.Google ScholarGoogle Scholar
  20. D. Gordon, "DEFENDING THE INDEFENSIBLE: A NEW STRATEGY FOR STOPPING INFORMATION OPERATIONS," 2018.Google ScholarGoogle Scholar
  21. Grugq., "Lessons in Cyber: Influence Operations," 2018.Google ScholarGoogle Scholar
  22. A. Zegart, H. Lin, T. Fingar, N. Persily and L. Ross, "Cyber-Enabled Information and Influence Warfare and Manipulation: Understanding Problems, Developing Solutions," 2017.Google ScholarGoogle Scholar
  23. H. Lin and J. Kerr, "On Cyber-Enabled Information/Influence Warfare and Manipulation," 2017.Google ScholarGoogle Scholar
  24. H. Lin, "Developing Responses to Cyber-Enabled Information Warfare and Influence Operations," 2018.Google ScholarGoogle Scholar
  25. FreedomHouse., "Manipulating Social Media to Undermine Democracy," 2018.Google ScholarGoogle Scholar
  26. S. Zannettou, T. Caulfield, W. Setzer, M. Sirivianos, G. Stringhini and J. Blackburn, "Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls," 2018.Google ScholarGoogle Scholar
  27. D. D. Kirkpatrick, "Signs of Russian Meddling in Brexit Referendum," 2017.Google ScholarGoogle Scholar
  28. D. O'Sullivan and D. Byers, "Exclusive: Fake black activist accounts linked to Russian government," 2017.Google ScholarGoogle Scholar
  29. V. Joler, M. Jovanović and A. Petrovski, "Mapping and quantifying political information warfare Part 1 : Propaganda, domination & attacks on online media," 2016.Google ScholarGoogle Scholar
  30. M. Rosenberg, N. Confessore and C. Cadwalladr, "How Trump Consultants Exploited the Facebook Data of Millions," 2018.Google ScholarGoogle Scholar
  31. A. Nossiter, D. E. Sanger and N. Perlroth, "Hackers Came, but the French Were Prepared," 2017.Google ScholarGoogle Scholar
  32. H. G. Frankfurt, On Bullshit, Princeton, NJ: Princeton Univerity Press, 2005.Google ScholarGoogle Scholar
  33. DoD, "Joint Publication 3-13: Information Operations, February 13, 2006," 2006.Google ScholarGoogle Scholar
  34. Cyberpedia, "HOW TO BREAK THE CYBER ATTACK LIFECYCLE," 2019.Google ScholarGoogle Scholar
  35. B. Ninmo, "The 4 Ds of Propaganda: Dismiss, Distort, Distract, Dismay," 2017.Google ScholarGoogle Scholar
  36. MITRE, "Att&ck matrix for enterprise," 2019. {Online}. Available: https://attack.mitre.org/.Google ScholarGoogle Scholar
  37. "Post-Exploit Threat Modeling with ATT&CK," 2016.Google ScholarGoogle Scholar
  38. K. H. Jamieson, Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don't, Can't, and Do Know, Oxford. UK: Oxford University Press, 2018.Google ScholarGoogle Scholar
  39. M. Brundage, A. Shahar, J. Clark, H. Toner, P. Eckersley, B. Garfinkel, A. Dafoe, P. Scharre, T. Zeitzoff, B. Filar, H. Anderson, H. Roff, G. C. Allen, J. Steinhardt and C. Flynn, "The Malicious Use of Artificial Intelligence:," Archiv, 2018.Google ScholarGoogle Scholar
  40. M. Brockman, "Data-Driven Propaganda as a Subset of Adversarial Examples," 2018.Google ScholarGoogle Scholar
  41. C. Watts, Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News, New York, NY: Harper Collins, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Misinfosec
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          WWW '19: Companion Proceedings of The 2019 World Wide Web Conference
          May 2019
          1331 pages
          ISBN:9781450366755
          DOI:10.1145/3308560

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 May 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate1,899of8,196submissions,23%
        • Article Metrics

          • Downloads (Last 12 months)27
          • Downloads (Last 6 weeks)9

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format