CyOP: Cyber-Enhanced Influence Operations and Propaganda

Similar documents
Panel: Norms, standards and good practices aimed at securing elections

Countering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary

What do we mean by strategic communications and why do we need it?

Fake Or Real? How To Self-Check The News And Get The Facts

Areeq Chowdhury: Yeah, could you speak a little bit louder? I just didn't hear the last part of that question.

Strasserism in the US

Fake Or Real? How To Self-Check The News And Get The Facts

The Internet and the Tragedy of the Commons

Issue Overview: Are social networking sites good for our society?

Traibalism and Liberal Democracy in a Post-Truth Environment. ISEEES Talk. Sept

Russian Information Warfare Trend Analysis

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS JUNE 2000 VOTER ATTITUDES SURVEY 21ST CENTURY VOTER FINAL TOPLINE June 14-28, 2000 N=2,174

HART RESEARCH ASSOCIATES/PUBLIC OPINION STRATEGIES Study # page 1

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS CAMPAIGN CONSULTANTS SURVEY FINAL TOPLINE November 1997 March 1998 N=200

Election Hacking: Russian Interference in the 2016 U.S. Presidential Election PRESENTER: JIM MILLER

NATIONAL: FAKE NEWS THREAT TO MEDIA; EDITORIAL DECISIONS, OUTSIDE ACTORS AT FAULT

Executive Summary. The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies. By Jamie Fly, Laura Rosenberger, and David Salvo

Your Voice: Your Vote

WORTH PURSUING? AN ANALYSIS INTO THE RELEVANCE OF THE NEWSPAPER ENDORSEMENT. Sarah Kellogg. Mark Horvit, Project Supervisor ANALYSIS

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

North Carolina Races Tighten as Election Day Approaches

On Cyber-Enabled IWIO (Information Warfare and Influence Operations)

Opinion about North Carolina Political Leaders: One Year after Election 2016 TABLE OF CONTENTS

Fake news on Twitter. Lisa Friedland, Kenny Joseph, Nir Grinberg, David Lazer Northeastern University

FRIEND OR FAUX? Teaching students to separate fact from fiction in the age of Fake News.

EMBARGOED. Overcovered: Protesters, Ex-Generals WAR COVERAGE PRAISED, BUT PUBLIC HUNGRY FOR OTHER NEWS

HART RESEARCH ASSOCIATES/PUBLIC OPINION STRATEGIES Study # page 1

English as a Second Language Podcast ESL Podcast Legal Problems

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS MARCH 1999 NEWS INTEREST INDEX FINAL TOPLINE March 24-30, 1999 N=1,786

Most Still Say Reform Issues Hard to Understand PUBLIC CLOSELY TRACKING HEALTH CARE DEBATE

Electoral Reform in Local Government in Wales

AMERICAN VIEWS: TRUST, MEDIA AND DEMOCRACY A GALLUP/KNIGHT FOUNDATION SURVEY

Can Hashtags Change Democracies? By Juliana Luiz * Universidade Estadual do Rio de Janeiro, Rio de Janeiro, Rio de Janeiro, Brazil

Ohio State University

RUSSIAN INFORMATION AND PROPAGANDA WAR: SOME METHODS AND FORMS TO COUNTERACT AUTHOR: DR.VOLODYMYR OGRYSKO

Political Environment and Congressional Breakdown Charts. November 7, 2017

Hey, there, (Name) here! Alright, so if you wouldn t mind just filling out this short

The People, The Press & Politics. Campaign '92: Priorities For The President

What were the final scores in your scenario for prosecution and defense? What side were you on? What primarily helped your win or lose?

North Korea s Climate Co- operation Dr Benjamin Habib

GW POLITICS POLL 2018 MIDTERM ELECTION WAVE 1

(i) Aim is to understand foreign policy decisions, understood in the first. instance as action undertaken by a government.

Fake News 101 To Believe or Not to Believe

Survey of US Voters Caddell & Associates March 10, 2016

Russian Disinformation War against Poland and Europe.

Yes, my name's Priit, head of the Estonian State Election Office. Right. So how secure is Estonia's online voting system?

HOW TO NEGOTIATE WITH THE EU? THEORIES AND PRACTICE

Most are skeptical Trump will act to block future Russian meddling

Impeach Bush Yourself!

CSAI Escalating Inequality. Session #6 Conventional Attempts at Reform. UUCF October 19, 2015

Case 5:16-cm SP Document Filed 03/15/16 Page 1 of 5 Page ID #:2806. Exhibit HH

Political Environment and Congressional Breakdown Charts. December 12, 2017

Public s Good Mood and Optimism Undeterred by Latest Developments SUPPORT FOR CLINTON UNCHANGED BY JUDICIARY VOTE

FOR RELEASE MAY 10, 2018

Interview with Kim Monk, managing director, Capital Alpha 11/29/16

Survey Report Victoria Advocate Journalism Credibility Survey The Victoria Advocate Associated Press Managing Editors

Increasing Your Impact with Social. Rebecca Vander Linde, Social Media Manager Rachel Weatherly, Director of Digital Communications Strategy

The StratCom-Security Nexus

FOR RELEASE NOVEMBER 07, 2017

FOR RELEASE APRIL 26, 2018

Changing Confidence in the News Media: Political Polarization on the Rise

The Political Assassination of Michael Flynn

RECOMMENDED CITATION: Pew Research Center, October, 2016, Trump, Clinton supporters differ on how media should cover controversial statements

HIGH POINT UNIVERSITY POLL MEMO RELEASE 10/13/2017 (UPDATE)

Growing share of public says there is too little focus on race issues

BY Cary Funk and Lee Rainie

INNOVATIVE SOLUTIONS IN MODERN SCIENCE 2 (2), 2016

PEW RESEARCH CENTER FOR THE PEOPLE AND THE PRESS JULY 1996 NEWS INTEREST INDEX SURVEY -- TOPLINE -- JULY 25-28, 1996 N = 1216

Harry Ridgewell: So how have islands in the South Pacific been affected by rising sea levels in the last 10 years?

Transcript: Condoleezza Rice on FNS

Handling Encounters With Law Enforcement

U.S. VOTERS OPPOSE HEALTH CARE PLAN BY WIDE MARGIN, QUINNIPIAC UNIVERSITY NATIONAL POLL FINDS; VOTERS SAY 3-1, PLAN SHOULD NOT PAY FOR ABORTIONS

VOTING MACHINES AND THE UNDERESTIMATE OF THE BUSH VOTE

1 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA 2 CASE NO. 12-CV MGC. Plaintiff, June 11, vs.

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

Google Consumer Surveys Presidential Poll Fielded 8/18-8/19

Reality Gap in politics and Casualties in Public Opinion

5 Key Facts. About Online Discussion of Immigration in the New Trump Era

John Paul Tabakian, Ed.D. Political Science 5 Western Political Thought. Spring 2018 / Fall 2018 Power Point 6

FOR RELEASE DECEMBER 07, 2017

Social Network and Topic Modeling Analysis of US Political Blogosphere

APPENDIX TO MILITARY ALLIANCES AND PUBLIC SUPPORT FOR WAR TABLE OF CONTENTS I. YOUGOV SURVEY: QUESTIONS... 3

2. Do you approve or disapprove of the job Congress is doing? Dec 07 25% Democrats 62% Nov 07 26% Republicans 19% 74 8

State of the Facts 2018

All right, so we re here with Reaz Jafri, who is an immigration lawyer for Withers Bergman LLP.

THE HON RICHARD MARLES MP SHADOW MINISTER FOR DEFENCE MEMBER FOR CORIO

Candidate Qualifying and Vetting Questions

VIEWS FROM ASIA: CONTENT ANALYSIS OF PAPERS PRESENTED IN THE ANPOR ANNUAL CONFERENCES

AMERICANS ON GLOBALIZATION: A Study of US Public Attitudes March 28, 2000

Survey of US Voters Issues and Attitudes June 2014

IN POLITICS, WHAT YOU KNOW IS LESS IMPORTANT THAN WHAT YOU D LIKE TO BELIEVE

HART RESEARCH ASSOCIATES/PUBLIC OPINION STRATEGIES Study # page 1

Deliberative Online Poll Phase 2 Follow Up Survey Experimental and Control Group

By Andrew Soergel Economy Reporter Dec. 9, 2016

CHAIRMAN BOB GOODLATTE: 00:00:32:00 Let's talk about Leader Boehner said. happening in 2014? CHAIRMAN BOB GOODLATTE:

NATIONAL: POTUS LESS TRUSTED THAN MEDIA, FAKE NEWS COMES FROM ALL SOURCES

November 2018 Hidden Tribes: Midterms Report

TO: Interested Parties FROM: Geoff Garin DATE: November 27, 2018 RE: New Survey Findings on the Mueller Investigation

Statement Prepared for the U.S. Senate Committee on Armed Services Subcommittee On Cybersecurity

Political Environment and Congressional Breakdown Charts. October 17, 2017

Transcription:

CyOP: Cyber-Enhanced Influence Operations and Propaganda Cybersecurity in the world of psychology, political economics, and social choice theory David M. Perlman, Ph.D. SOFWERX 2018-12-04

How powerful of a weapon is a CyOP campaign?

2016 Intel agencies report Russian attacks on US elections Senate hearing early December Widely reported

2016 Outrageous, absurd "Pizzagate" appears First Twitter and Reddit posts Oct 30-Nov 4 Widely propagated on known fake news sites & shows Spread by prominent far-right figures

December 2016 polls Poll numbers Dec. 17-20, 2016: 54% believe "Russia hacked Democratic emails to help Donald Trump" 32% believe "Leaked emails from the Clinton campaign talked about pedophilia and human trafficking, pizzagate" Less than 2 months: 32% of America believes an obvious lie 46% disbelieve truth from legitimate respectable sources

Even worse by party...

Republicans traditionally the party of national security nearly unanimously rejected the wisdom of our own national security community. More than half came to believe an outrageous lie after less than 2 months of CyOP

The objective of this campaign had nothing to do with "pizzagate" of course...

YouGov Pew Gallup Gallup YouGov

YouGov NBC Gallup Pew

The ongoing CyOP campaign has been extremely effective at manipulating public sentiment and beliefs in the US in ways favorable to Russia and we can only expect this to get worse

Prolog on cognitive bias Sampling of techniques used in CyOP Government and private players (Domestic US-centric) What can, can't, and should be done right now Comprehensive influence security framework! Sara-Jayne Terp

Prolog: On Cognitive Bias Convenient heuristic for thinking and bias: System 1 (fast, approximate) System 2 (slow, careful) thinking Biases generally err towards ego and social consistency These biases affect everyone Including you

So, what can I do about my own bias?

So, what can I do about my own bias? Intuition won't de-bias you Willpower won't de-bias you Calling yourself a scientist/objectivist/rationalist won't debias you "Bias Hygiene" Learn types of bias Assume you are biased Use habits of pre-flight and debrief

Types of cognitive bias Biases generally err towards ego and social consistency: Confirmation bias Social conformity (Asch) Availability heuristic Framing effects Self-serving/Superiority/Dunning-Kruger https://en.wikipedia.org/wiki/list_of_cognitive_biases Many excellent, accessible books and articles

WRONG: IDENTITY "I'm a scientist, so I'd better try as hard as I can to be rational and objective!" "Yeah I think I'm doing a pretty good job! Look at how objective I am! I'm a great scientist!" Self-serving biases will trick you into thinking you are not biased If you convince yourself you're not biased, when you really are, that's worse than baseline

WRONG: IDENTITY "I'm a scientist, so I'd better try as hard as I can to be rational and objective!" "Yeah I think I'm doing a pretty good job! Look at how objective I am! I'm a great scientist!" Self-serving biases will trick you into thinking you are not biased If you convince yourself you're not biased, when you really are, that's worse than baseline RIGHT: BIAS HYGIENE "I know I am biased!" Pre-flight checklist Second opinion if possible Which direction am I most likely to be biased? Consciously edit decision/opinion It will feel "wrong": but that's OK "System 1" will adapt over time Debrief Which direction did I err? Is that consistent with my self-image? How well did my pre-flight efforts work? What could I do differently next time?

Always remember: YOU have cognitive bias

Execution: front line Two startups accidentally choose same name One has bigger budget Both have teams with similar reputations Underdog wants to own the namespace

Tactics: Large-scale political manipulation How to radically and rapidly shift public opinion en masse? No individual matters, only the demographics...

Overton Window Originally defined on the left-right spectrum, Overton Window is the range that is socially acceptable in mainstream political and media discourse.

Overton Window Originally defined on the left-right spectrum, Overton Window is the range that is socially acceptable in mainstream political and media discourse. 1-D left-right spectrum is inadequate: Nolan Plot

Social Economic

Overton Window Extend Overton Window to multiple dimensions: K-Dimensional Overton Window (kdow) or "Overton Blob" Regions of high density in the population distribution

Somewhere In Here Not Out Here in the Fringe!

Overton Window Convex Hull Postulate: compromise positions are always socially acceptable Example: Maybe all Americans are either pro-choice or anti-abortion with no moderates. However, a pundit who advocated compromise would be acceptable on TV. Formalization: Overton convex hull

Security implications of Overton Hull Gradually move the window. "Foot-in-the-door" technique (FITD): Stretch it a little bit at a time Time- and resource-intensive

Security implications of Overton Hull Stretch the window rapidly?

Security implications of Overton Hull Stretch the window rapidly? "Door-in-the-face" (DITF) technique: Stretch the window immediately with an extreme position to make room for a less extreme position

Security implications of Overton Hull If one teenager eats a spoonful of cinnamon, it's crazy But if enough do it then it's news

Security implications of Overton Hull If one teenager eats a spoonful of cinnamon, it's crazy But if enough do it then it's news TIDE PODS!!!

New Fringe Cluster

Out Here in the Fringe is OK now!

Extreme political manipulation Most people's beliefs are very hard to change. "Lunatic fringe" of gullible individuals easier to manipulate. Sweep up the fringe. Charismatic demagogue could cultivate a following of conspiracy theory believers Unreasonableness guarantees community will consist only of the unquestioning (compare to 419 scams) Cold War "useful idiots" but at a population level: Weaponized Demographic or WUID

Monitoring the "battlefield" This tactic would be easy to see if you had a visualization of the battlefield. "Big Data", social media allow passively sampling in near-real-time. Signatures of organic and manipulated changes could be identified and then used as an early warning system Note that this is different from "microtargeting". Purely defensive and transparent. Privacy-safe: only requires collective data, can be anonymous!

What tech companies can and can't do

"Why doesn't [tech company] just [ban/delete] all the [bots/russians/troll farms]?"

What the tech companies can and can't do Signals are too noisy for screening: problem of false positives in public health High cost for false positive enforcement Ranking algorithms: promote and demote content and users Promote and demote content at the trend level after identifying campaigns Train models to identify campaigns: need campaign-level signal Not account-level or content-level Can incorporate input from e.g. Intel

What the government can and can't do Nationalize Facebook! Control content directly Counter-propaganda is propaganda: Smith-Mundt, posse comitatus, etc. Can provide intel to private companies Can do law enforcement activities: subpoenas, etc.

Private Defensive Security Intelligence Tech Companies "Dark Arts" Offensive Security: counteroperations Execution Law Enforcement

Thank you for your attention economy

Postscript: "Adversary" considered harmful "Adversary" (based on identity) versus "Attacker" or "threat actor" (based on hostile actions) Attackers may not even have intention. Citizens aren't "adversaries" but they may be "attackers". Citizens can advocate for more or less military funding, but we don't let people steal fighter planes just because they're citizens. Citizens can advocate for more or less electric generation, but we don't let people hack into the power grid just because they're citizens. Citizens vote and campaign in elections. But we should not let people hack elections just because they're citizens. Need clarity in the law!

Postscript: "Adversary" considered harmful As Peter Singer pointed out, hostile influence operations can hide behind e.g. domestic white supremacist groups. Tribal framing blinds us to seeing the threat.