Content Weapons Primer: Automated Laser Phishing

--

While in the old day days, a war involved troops fighting on the field, this is not what is occurring right now. The truth is that instead, governments are making use of other types of attacks: they are acquiring sensitive data and they are then waging deceptive influence campaigns or simply strategically leaking it.

The reality is that unfortunately, this is not new today. In fact, one of the best examples we can provide is how Russians were able to stage information attacks so that they could influence the outcome of the 2016 US presidential election. At the time, Russian cyber troops hacked and leaked different email communications that were sensitive from the Democratic National Committee. With this, they started to conduct their own online campaign as a way to influence American voters.

This was made using Facebook. According to the social media company, they believe that IRA (Internet Research Agency) was the unit contracted by the Russian government, to expose foreign propaganda to about two-thirds of the electorate.

It is important to make a clear distinction here. The reality is that not all information leaks can be seen as acts of war. After all, in some specific cases, these leaks may only have the goal of establishing transparency or accountability just like what happened with what was known as the Pentagon Papers.

Read: Content Weapons the book #contentweapons by Michael Stattelman

How to lead “Next Practices” initiatives like this in Meta Leadership also by Michael Stattelman

Taking A Deeper Look At Leaks

Due to his difference, it is crucial that each leak is examined in detail to determine if it is a declared act of war or not. But we have no doubts that targeted disinformation campaigns aren’t a grey area. In fact, they are corrosive and malicious.

The reality is that we believe that this is only the beginning. After all, there is no UN or Geneva Convention that details how a nation or country defines digital information attacks or retaliates. Besides, with new technologies coming up every day, it is crucial to understand the circumstances and tactics that can define the future.

One of the most common themes in digital information wars is usually regarded with the intentional spreading of fear and uncertainty. So, with this in mind, Aviv Ovadya, the chief technology officer for the University of Michigan’s Center for Social Media Responsibility stated that there are three main tactics that will play a crucial role:

#1: Automated Laser Phishing:

Simply put, this is the hyper-targeted use of malicious Artificial Intelligence to mimic all those trustworthy entities. This may lead to the release of secrets.

#2: Diplomacy And Reputational Manipulation:

This is the use of advanced digital deception technologies that will falsely de-legitimize an adversary influencer or leader or to incite unfounded military or diplomatic reactions in the adversary.

#3: Computational Propaganda:

This makes use of algorithms, gossips, rumors, human psychology, and social media to manipulate public opinion.

From words to images and even videos are being manipulated to create a sense of fear, to make other leaders take action when there really isn’t anything “real” to act against.

#contentweapons

#metaleadership

--

--

No responses yet