PB00001 Game Mechanics: show examples of fake news and train the user to identify them on the basis of various types of indicators
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary: Questions: - Is the account compromised? - Is it known to be associated with threat actors - common/random name - Names violate terms of service - Dormant account - Change of country IP - Social network growth patterns (number of friends etc) - Evidence of linguistic artifacts (multiple fingerprints, terms/idiosyncrasies ) - Community vs. narrative vs. individuals
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary: -Identify non-committed actors (ie. IRA 2$/h employees) -Identify where they reside (ie. postal code level) -Send a viral message that clarifies the risk of working in influence ops.
Summary:
Summary:
Summary:
Summary: Determine: a) Moderation Method (global, subcommunity level, none -ie. twitter, reddit, 8chan) b) Access Model (friend request, open, real-life identity) c) Communication Model (global, friends only, subcommunity, hybrid) Determine how the combination of the above (and other characteristics) allow different technical methods to communicate and influence various audiences This will allow to adapt playbooks to specific platforms
Summary:
Summary:
Summary:
Summary:
Summary:
Summary: Look at Ad trackers, Tracking ids, Tracking ads, Re-use of as features (language, name, themes, plug-in, re-use/versions)
Summary:
Summary:
Summary:
Summary: