DeepSec 2024 Press Release: Manipulation on Social Media is dangerous for Democracies

Sanna/ September 24, 2024/ Conference, Press/ 0 comments

DeepSec conference publishes schedule and focuses on disinformation algorithms

The original purpose of introducing Social Media was to provide individuals with a platform for expressing their own views. However, its increasing popularity has led to a creeping appropriation. Texts generated by algorithms, robot farms and dubious decisions by platform operators have turned social media into a hotbed of disinformation. The casual click on share, like buttons or the insertion of arbitrary comments, creates efficiency in mass manipulation. Political commentator Randahl Fink will analyse these practices at the opening of the DeepSec conference.

Information and disinformation

Most people think of technical implementations when they hear the terms information technology (IT) or information security. Of course, the foundation comprises networks, server systems, storage media and connections to the Internet. In addition, there are many end devices that have constant access to a steady flow of brief messages. The technology here is a means to an end. Protecting the data involved is the focus of IT security. Years ago, the DeepSec conference highlighted the dangers of disinformation campaigns. The potential for manipulation has now reached the dimensions of national elections, and thus of influencing governments for entire legislative periods. The evidence is now visible to investigating authorities.

Earlier this year, Germany, France and Poland discovered a structured and coordinated network of hundreds of websites spreading Russian propaganda. The network bears the name ‘Portal Kombat’, which is a reference to a computer game. This summer, the US Justice Department disrupted a Russian propaganda campaign that has been operating since 2022. The technical means in this case were robot farms coupled with ‘artificial intelligence’ algorithms (‘AI’, more precisely, language generators). Such tools are extremely effective for controlling public debate or an election campaign in a country.

Denied Reality without Sources – The Mind Bomb

Randahl Fink uses the term Mind Bomb to describe the effect of influencing the masses. An important feature of this is the decoupling of human interaction from the real world. People are talking about so-called reality bubbles, where views are being discussed that are not actually found in the real world. This begins with conspiracy theories about the earth as a disc world, continues with confused claims about scientifically proven models and culminates in the exclusion of and threats to individuals or parts of the population. Using algorithms intensifies the manipulation. Anyone who reads something more often in different places gives more weight to a repeated statement. Those who originally had naïve intentions to recommend the same interests are now using it to spread artificially defined opinions. Although some platforms have an editorial team that marks or deletes some of the false reports, other platforms completely ignore legal requirements. Usually, the reasons for this include saving resources, deliberately ignoring legislation, or using unfiltered content as a business model.

Another observation is attacks against any attempt to verify statements. Fact checks and sources are discredited using the same methods. This pattern was clearly evident during the COVID-19 pandemic, and it still exists today. In debates on political positions, the grey area is larger, as party platforms do not necessarily have to be scientifically correct. Nevertheless, all statements can always be linked to the supposed or actual reality. The destructive power of the Mind Bomb lies in the manipulation of mindsets.

Relation to Information Security

Disinformation campaigns have a clear and strong link to information security. Social engineering, the manipulation of the psyche, is a classic tool in fraud campaigns. Although attacks against employees bypass technical filters, they exploit the digital infrastructure to deliver the message. Strong authentication and cross-checks are therefore in place to ensure the authenticity of critical messages, such as instructions for logins or money transfers. Social media and, in particular, the currently celebrated voice and image generators are used both for so-called ‘cyber attacks’ and for disinformation. In all cases, those responsible need to think about how to counter this manipulation.

The DeepSec conference has a two-day workshop in its programme for a thorough deepening of knowledge about countermeasures. Christina Lekati will explain the psychology behind social engineering and human intelligence (HUMINT) operations. As soon as people are involved, it is unfortunately not possible to intervene with only completely technical measures. The psychological level must always be considered.

Programme and Booking

The DeepSec 2024 conference days are on 21 and 22 November. The DeepSec trainings will take place on the two preceding days, 19 and 20 November. All trainings (with announced exceptions) and presentations are intended as face-to-face events, but can be held partially or completely virtually if necessary. For registered participants, there will be a stream of the presentations on our internet platform.

The DeepINTEL Security Intelligence Conference will take place on 20 November.

As this is a closed event, please send direct enquiries about the programme to our contact addresses. We provide strong end-to-end encryption for communication:

https://deepsec.net/contact.html

You can order tickets for the DeepSec conference and training sessions online at any time via the link: https://deepsec.net/register.html

Discount codes from sponsors are available. If you are interested, please contact deepsec@deepsec.net. Please note that we depend on timely ticket orders because of planning security.

Share this Post

Leave a Comment

Your email address will not be published. Required fields are marked *

*
*

This site uses Akismet to reduce spam. Learn how your comment data is processed.