It has nothing to do with Facebook – The Quint

A very contrarian piece for The Quint: https://www.thequint.com/voices/opinion/facebook-politics-hate-speech-controversy-indian-government-modi-freedom-of-speech-activism.

The recent investigative reports by TIME and the Wall Street Journal on Facebook’s content handling and lobbying activities have triggered an intense political debate in India.

On the one hand, Facebook’s moderation of hateful content in India seems to have been influenced by business and political imperatives; on the other, it appears as if the relationship between its public policy team and the ruling political dispensation was too close for comfort.

Continue reading “It has nothing to do with Facebook – The Quint”

An observation on the Debbins affair

An observation on the Debbins affair:

Continue reading “An observation on the Debbins affair”

A ‘perfect’ disinformation op during the India-China-Australia tensions?

“Almost all disinformation operations are imperfect by design, run not by perfectionists, but pragmatists.”

— Thomas Rid in Active Measures: The Secret History of Disinformation and Political Warfare

As Thomas Rid quips in his book Active Measures, cyber-enabled information operations are more active but less measured. So, it is rare to see the instance of an old-school disinformation operation that seems to have served its purpose quite effectively.

Active Measures, in the general sense of the term, are rarely this successful, so the operation I am going to discuss certainly stands out.

Continue reading “A ‘perfect’ disinformation op during the India-China-Australia tensions?”

Keep an eye out for the Misinfosec Working Group

Check out this thread by Sara-Jayne Terp of the Misinfosec Working Group.

Last year, Sara proposed the ingenious idea that, like cyber operations, cyber-enabled information operations (and disinformation) are also pivoted around the foundational triad of cybersecurity: confidentiality, integrity and availability (C-I-A).

I thought that was a phenomenal statement as it allowed us to define cyber-enabled information operations in machine-to-machine taxonomies and ontologies.

Continue reading “Keep an eye out for the Misinfosec Working Group”