SlideShare a Scribd company logo
Bodacea Light Industries, 2018
Practical Influence
Operations
Sara-Jayne “SJ” Terp
December 2018
1
Bodacea Light Industries, 2018
Offense
Where we are today
2
Bodacea Light Industries, 2018
Definitions
3
Bodacea Light Industries, 2018
Misinformation
4
Bodacea Light Industries, 2018
Social Engineering
5
ion of people into performing actions or divulging
Bodacea Light Industries, 2018
At Scale
6
Facebook group total_shares interactions
Facebook.com/Blacktivists 103,767,792 6,182,835
Facebook.com/Txrebels 102,950,151 3,453,143
Facebook.Com/MuslimAmerica 71,355,895 2,128,875
Facebook.Com/Patriototus 51,139,860 4,438,745
Facebook.Com/Secured.Borders 5,600,136 1,592,771
Facebook.Com/Lgtbun 5,187,494 1,262,386
Bodacea Light Industries, 2018
Impact of
misinformation
7
Bodacea Light Industries, 2018
Individuals: fake events
8
Bodacea Light Industries, 2018
Communities: diverted crisis efforts
9
Bodacea Light Industries, 2018
Nationstates: Qanon campaigns
10
“Action: continuous barrage of
memes. All SM platforms
Hashtags: #HRCvideo
#releasethevideo #maga #QAnon
Use top trending hashtags along
with your posts. Share and
retweet as much as possible”
Bodacea Light Industries, 2018
How big is this
11
Bodacea Light Industries, 2018
Targeting your brain
12
Bodacea Light Industries, 2018
Targeting groups
13
Bodacea Light Industries, 2018
Targeting all social sites
14
Bodacea Light Industries, 2018
Targeting everyone
15
Bodacea Light Industries, 2018
Actors, Motivations
• State/nonstate actors
• Entrepreneurs
• Grassroots groups
• Private influencers
16
Bodacea Light Industries, 2018
Defense
“Isn’t it just like spam?”
17
Bodacea Light Industries, 2018
This isn’t too different to infosec
18
Bodacea Light Industries, 2018
Detect
19
Bodacea Light Industries, 2018
Sources
20
Bodacea Light Industries, 2018
Artefacts: Content
21
• Co-occurring hashtags
• Correlated text
• URLs
• Stories
Bodacea Light Industries, 2018
Stories
22
Bodacea Light Industries, 2018
Artefacts: Context
23
• Known botnets/trolls
• Previous rumours
• friends/followers
• retweets/likes
• Metadata (e.g. DNS)
Bodacea Light Industries, 2018
Money
24
Bodacea Light Industries, 2018
Respond
25
Bodacea Light Industries, 2018
Individual: report trolls/botnets
26
“Twitter (reportedly)
suspended over 70 million
accounts”
“Facebook created a human
crisis team after algorithms
failed it”
Bodacea Light Industries, 2018
Individual: report fraud
27
Bodacea Light Industries, 2018
Individual: block
28
Bodacea Light Industries, 2018
Platforms
• Remove non-human traffic
• Rate-limit / shadowban trolls
• Remove pages from ad exchanges
• Remove non-human traffic from ad exchanges
29
Bodacea Light Industries, 2018
Community: Engage
30
Bodacea Light Industries, 2018
Individual: Repair
31
Bodacea Light Industries, 2018
Community
• Parody-based counter-campaigns (e.g. riffs on “Q”)
• SEO-hack misinformation sites
• Dogpile onto misinformation hashtags
• Divert followers (typosquat trolls, spoof messaging etc)
• Identify and engage with affected individuals
• Educate, verify, bring into the light
32
Bodacea Light Industries, 2018
Adaptations
The game is changing all the time
33
Bodacea Light Industries, 2018
Attacks are adapting all the time
34
Bodacea Light Industries, 2018
Offense: Potentials for Next
• Algorithms + humans attack algorithms + humans
• Shift from trolls to ‘nudging’ existing human communities
(‘useful idiots’)
• Subtle attacks, e.g. ’low-and-slows’, ‘pop-up’, etc
• Massively multi-channel attacks
• More commercial targets
• A well-established part of hybrid warfare
35
Bodacea Light Industries, 2018
(Please) stop being passive
36
Bodacea Light Industries, 2018
Defence: Potential for next
• Strategic and tactical collaboration
• Trusted third-party sharing on fake news sites / botnets
• Misinformation version of ATT&CK, SANS20 frameworks
• Algorithms + humans counter algorithms + humans
• Thinking the unthinkable
• “Countermeasures and self-defense actions”
37
Bodacea Light Industries, 2018
My current work: Anti-Fraud
38
Bodacea Light Industries, 2018
My Hobby: Infrastructure
39
Bodacea Light Industries, 2018
Your part: don’t fight the last war
40
Bodacea Light Industries, 2018
Thank you
SJ Terp
@bodaceacat
41

More Related Content

PPT
The social graph Call
PPT
Facebook comes of age?
PPTX
Sjterp ds_of_misinfo_feb_2019
PPTX
Dark Influence: Winning Wars, Ruining Reputations, Fixing Elections, and Maki...
PPTX
Ai, social media and political polarization
PDF
Data and society media manipulation and disinformation online
PPT
Italian Politics and Society - The politician as a corporation, as a startup ...
PPTX
Social engineering at scale
The social graph Call
Facebook comes of age?
Sjterp ds_of_misinfo_feb_2019
Dark Influence: Winning Wars, Ruining Reputations, Fixing Elections, and Maki...
Ai, social media and political polarization
Data and society media manipulation and disinformation online
Italian Politics and Society - The politician as a corporation, as a startup ...
Social engineering at scale

Similar to Practical Influence Operations, presentation at Sofwerx Dec 2018 (20)

PDF
Social Media Security Risk Slide Share Version
PPTX
BSidesLV 2018 talk: social engineering at scale, a community guide
PPT
Prog summit3022013
PPTX
Deep Fakes, Digital Identity and Democracy
PPTX
An Introduction to Maskirovka aka Information Operations
PPT
Social Media Audit - how to map your social graph
PDF
War-of-Keywords
PPTX
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
PPTX
Cognitive security: all the other things
PPTX
Political Social Media Presentation
PPT
Leveraging Social CRM
PPTX
Activist groups and practices of mobilisation
PDF
Bad Pitch Secrets & Lies at PRSA ICON
PDF
Senate
PPTX
Internet & Social Media issues for brand owners
PPTX
Terp breuer misinfosecframeworks_cansecwest2019
PPTX
Misinfosec frameworks Cansecwest 2019
PPTX
CansecWest2019: Infosec Frameworks for Misinformation
PDF
CSW2022_03_threat_environment.pptx.pdf
PPTX
Abuja training
Social Media Security Risk Slide Share Version
BSidesLV 2018 talk: social engineering at scale, a community guide
Prog summit3022013
Deep Fakes, Digital Identity and Democracy
An Introduction to Maskirovka aka Information Operations
Social Media Audit - how to map your social graph
War-of-Keywords
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Cognitive security: all the other things
Political Social Media Presentation
Leveraging Social CRM
Activist groups and practices of mobilisation
Bad Pitch Secrets & Lies at PRSA ICON
Senate
Internet & Social Media issues for brand owners
Terp breuer misinfosecframeworks_cansecwest2019
Misinfosec frameworks Cansecwest 2019
CansecWest2019: Infosec Frameworks for Misinformation
CSW2022_03_threat_environment.pptx.pdf
Abuja training
Ad

More from bodaceacat (18)

PDF
2019 11 terp_breuer_disclosure_master
PPTX
Session 10 handling bigger data
PPTX
Session 09 learning relationships.pptx
PPTX
Session 08 geospatial data
PPTX
Session 07 text data.pptx
PPTX
Session 06 machine learning.pptx
PPTX
Session 05 cleaning and exploring
PPTX
Session 04 communicating results
PPTX
Session 03 acquiring data
PPTX
Session 02 python basics
PPTX
Session 01 designing and scoping a data science project
ODP
Gp technologybuilds july2011
ODP
Gp technologybuilds july2011
ODP
Ardrone represent
PPTX
Global pulse app connection manager
PPT
Un Pulse Camp - Humanitarian Innovation
PPT
Blue light services
PPT
Rhok and opendata hackathon intro
2019 11 terp_breuer_disclosure_master
Session 10 handling bigger data
Session 09 learning relationships.pptx
Session 08 geospatial data
Session 07 text data.pptx
Session 06 machine learning.pptx
Session 05 cleaning and exploring
Session 04 communicating results
Session 03 acquiring data
Session 02 python basics
Session 01 designing and scoping a data science project
Gp technologybuilds july2011
Gp technologybuilds july2011
Ardrone represent
Global pulse app connection manager
Un Pulse Camp - Humanitarian Innovation
Blue light services
Rhok and opendata hackathon intro
Ad

Recently uploaded (20)

PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
project resource management chapter-09.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Tartificialntelligence_presentation.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Mushroom cultivation and it's methods.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
DP Operators-handbook-extract for the Mautical Institute
Hindi spoken digit analysis for native and non-native speakers
MIND Revenue Release Quarter 2 2025 Press Release
Web App vs Mobile App What Should You Build First.pdf
project resource management chapter-09.pdf
A comparative study of natural language inference in Swahili using monolingua...
Tartificialntelligence_presentation.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A novel scalable deep ensemble learning framework for big data classification...
Mushroom cultivation and it's methods.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
1. Introduction to Computer Programming.pptx
NewMind AI Weekly Chronicles - August'25-Week II
WOOl fibre morphology and structure.pdf for textiles
OMC Textile Division Presentation 2021.pptx
Chapter 5: Probability Theory and Statistics
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Unlocking AI with Model Context Protocol (MCP)
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

Practical Influence Operations, presentation at Sofwerx Dec 2018

Editor's Notes

  • #3: You’ve already heard a lot today about misinformation. I’ll just add a little to that.
  • #5: Misinformation is deliberately false information. One example is the “fake news” sites above, containing misinformation that’s used to gain advertising money, with clickbait tweets that bring people to them. Some of these currently contain the typical aliens and healthcure material, but many are political and trading on strong emotions like fear and useful divisions in society. Image: screenshot of http://www.sawthis.one/ 2018-07-08
  • #6: “A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.” Source: wikipedia
  • #7: Online misinformation is huge. A few hundred trolls and thousands of bots can affect millions of people at a time. This is the scale that nationstate-run groups and pages, dedicated to creating division and confusion, typically work at. Here are some of the Russian-owned Facebook groups shown to Congress: these high volumes of shares and interactions might include a lot of botnet activity, but are still not insignificant.
  • #9: Misinformation is also moving from online to offline. Several times now, misinformation actors have sent invites to opposing groups to demonstrate at the same time in the same place. https://twitter.com/JuliaDavisNews/status/994704834577215495 https://twitter.com/donie/status/957246815056908288
  • #10: Misinformation is information that’s deliberately false (actually that’s disinformation, but “misinformation” as a term won). The smallest form of online misinformation is ‘joke’ viral content, for example in every disaster there’s someone who puts up an image of a shark in the street. Image: http://www.politifact.com/truth-o-meter/statements/2017/aug/28/blog-posting/there-are-no-sharks-swimming-streets-houston-or-an/ and pretty much any major US disaster
  • #11: And then, if you look, you can find organising pages for campaigns. Here are two Qanon “meme war organising page”. Qanon is a major group, but is just one of many. Note that this is from March/April, and has a specific date on it, targetting a specific event.
  • #13: Familiarity backfire effect Memory traces Emotions = stronger traces Here are some common brain vulnerabilities. My favourites are the familiarity backfire effect, where if you repeat a message with a negative in it, people remember the message without the negative, and that when people read, they take false information in as true before rejecting it - and in that fraction of a second, build other assertions off the false information, even if they *know* the original information is false.
  • #14: This is targetting groups. This is one of the congress adverts set
  • #15: This stuff is everywhere online: the expected places (FB, twitter, reddit, eventbrite, medium etc) but also comment streams, payment and event sites.
  • #16: Social media buys reach and scale. 100 good bots = long game; 10000 ba ones = short but effective You can also use other advertising techniques, and things like that familiarity backfire. Botnets are very useful for this, and very cheap, at about $150 for a difficult-to-find “aged” set, to a few dollars per thousand for Russian recent bots. Buy the bots, use any of the handy online guides to set them up messaging or retweeting etc, or use some simple pattern matching or AI to make them harder to find.
  • #21: One big weakness for attackers is that they have to tell you about themselves. They leave a lot of “artefacts” - ways to find them. botsentinal.com
  • #22: Here are some of them, including hashtags, URLs, adverts. A simple media search with twitter, tweetdeck etc will find a lot of these. On the right are the artifacts tracked as part of the Canadian elections.
  • #23: There’s also a lot of content in fact check sites(Snopes etc); if you have the resources, then it’s also possible to pay someone to go look at an area being discussed. Sometimes misinformation propagation is more subtle. These are a good place to look for that too.
  • #24: Here are some of them, including hashtags, URLs, adverts. A simple media search with twitter, tweetdeck etc will find a lot of these. On the right are the artifacts tracked as part of the Canadian elections.
  • #27: You *can* report to platforms. So far this has been pretty underwhelming, but if we did it at scale, it could be interesting. What would be good in an ideal system includes: Realtime botnet removal Realtime troll dampening Etc But that’s not where we are, so here’s some others.
  • #28: Two things: advertising works by putting adverts into slots on pages. We can track unlabelled political ads, we can see the fakenews pages and pages associated with them, and we can see botnets going to pages to drive up their ad revenue. For communities, you can report ads on fake pages to brands.
  • #29: And as an individual, there are still things you can do. One of these is to work with other people to block misinformation sources and channels. Many anti-harassment apps can be repurposed for this.
  • #31: My favourite communities are the Lithuanian elves. Formed as an anonymous online group. They fight back every day against Russian misinformation, using a combination of humour and facts. It seems to be working. Other cool things to do include overwhelming misinformation hashtags with other content, and hacking search terms to make disambiguation pages appear above misinformation sites. Another group that’s got some traction is VOST (Virtual Operation Support Team), a team that supports responders in disasters: VOST Panama also used humour and “fake stamps” to counter misinformation, and helped me run a deployment on this during Hurricane Irma (when people also reported misinformation to Fema and Buzzfeed).
  • #32: You can also help in rebuilding damaged communities: this is The Commons Project, that uses a combination of bots, humans and peace techniques for this.
  • #37: Image: SANS sliding scale of cyber security
  • #39: This is a mock-up of the Global Disinformation Index
  • #40: I’m leading a team working on writing a misinformation equivalent to the ATT&CK TTP framework.
  • #41: There are still a lot of bots out there, but tactics, techniques and procedures are changing rapidly: we’re starting to see an early-infosec-style split into script-kiddie style crude botnets and more carefully crafted responsive bots. image: https://medium.com/@MediaManipulation/tracking-disinformation-by-reading-metadata-320ece1ae79b