I don’t know why I’m receiving this or if it’s legit but the concepts could be meaningful.

---------- Forwarded message ---------
From: Threat Intelligence Academy <hub@threatintel.academy>
Date: Mon, Nov 27, 2023 at 08:01
Subject: Friday's Debate: Attribution vs. Narrative in Information Operations
To: <0xloem@gmail.com>


FRIDAY! Charity Wright

Attribution or Narrative? Which is more important?

On Friday, December 1st, Threat Intelligence Academy will host Charity Wright, Principal Threat Intelligence Consultant at Recorded Future, in the Advanced Cyber Threat Seminar with a lecture and debate on attribution vs. narrative in combatting information operations.

 

About The Debate

We will discuss the challenges of attribution in influence operations analysis, especially those campaigns on social media platforms. What changes will we see in Influence Operations over the next 5 to 10 years? What technologies might become obsolete? What new technological threats will we face in the future that could impact influence operations and audiences specifically? Should we continue analyzing IO the way we do today? What can we do to prepare for and defend against future IO?

 

About Charity

Charity Wright is a Principal Threat Intelligence Consultant at Recorded Future. Charity has over 17 years of experience in the US intelligence community, including a career in the US Army and the National Security Agency (NSA), where she served as a Chinese Linguist (35P) and Intelligence Analyst (35N). She has analyzed cyber threats in the private sector since 2015, focusing on Chinese state-sponsored threats, cybercrime, malign influence operations, and strategic intelligence. Charity has consulted on espionage and intelligence topics on C-SPAN, Bloomberg, NBC, CBS, and many more media outlets worldwide.

 

Find Charity on LinkedIn

Find Charity on Twitter @CharityW4CTI

 

Resources

To prepare for the lecture, we recommend familiarizing yourself with the following selected resources from the Cyber Learning Library:


Frameworks for analyzing influence operations:
SCOTCH Framework
DISARM Framework
The Kill Chain for Influence Operations
The Diamond Model for Influence Operations Analysis
Attribution in IO:
Bellingcat Video
Microsoft White Paper
Examples of IO campaigns that may be useful in this lecture:
Graphika: Spamouflage Dragon
Google: Dragonbridge
Recorded Future: Empire Dragon
Recorded Future: Maui Wildfire Influence Operations
Recorded Future: JokerDPR and the Information War
The Future of IO:
Stanford Internet Observatory: Generative Language Models and Automated Influence Operations: Emerging Threats and Potential Mitigations

Missed a Debate and Want to Watch?

All of our lectures and debates are recorded

Students of TIA-811 can watch all previous debates and continue the discussion in our community.  Not yet a student?  Join here.

Students can view debates here:

Every week, we invite a recognized expert in their craft to discuss and debate an essential and timely topic in cybersecurity.

    Our Exciting Next Speaker

    Threat Intelligence Academy, 10809 Arrowtree Blvd, Clermont, FL 34715, USA

    Unsubscribe Manage preferences