Information Infrastructure and Control

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What distinguishes informational infrastructure from communications critical infrastructure?

  • Communications infrastructure refers to physical transmission elements, while informational infrastructure encompasses the data transmitted and its platforms. (correct)
  • Informational infrastructure is managed by private companies, while communications infrastructure is strictly government controlled.
  • Informational infrastructure includes physical elements like wires, while communications focuses on social media.
  • They are the same thing and the terms are interchangeable.

How did the U.S. government manage news information during World War II, as illustrated by the case study of Hiroshima?

  • By allowing only international journalists to report on the war to ensure unbiased coverage.
  • By funding news outlets that promoted specific narratives favorable to the war.
  • By encouraging unrestricted reporting from the front lines to boost public morale.
  • By requiring news outlets to operate under the 'Office of Censorship' to control information that could threaten the war effort. (correct)

Which principle is most likely to be compromised in authoritarian regimes regarding information control?

  • The peaceful transition of power.
  • The need for public support of the government.
  • The freedom of expression and access to diverse information. (correct)
  • The use of public votes to elect leaders.

According to the 'democratic peace hypothesis,' why are democracies theoretically less likely to engage in conflict with one another?

<p>Public support is crucial for wars in democracies, and citizens are less likely to support wars against other democracies. (C)</p> Signup and view all the answers

What was the primary aim of the U.S. and the Soviet Union during the Cold War in their 'fight for hearts and minds'?

<p>To influence global public opinion in favor of their respective ideologies. (D)</p> Signup and view all the answers

What key factor has amplified the spread of misinformation and disinformation in recent decades?

<p>The rapid expansion of the internet, social media, and the capabilities of AI. (D)</p> Signup and view all the answers

How do algorithms contribute to the spread of misinformation?

<p>By using user data to suggest content likely to be interacted with, which can include misinformation. (A)</p> Signup and view all the answers

In the context of homeland security, why is foreign interference in U.S. elections considered a significant threat?

<p>It can undermine public trust in democracy and sow political division for foreign gains. (D)</p> Signup and view all the answers

How has Russia used disinformation tactics in the conflict with Ukraine?

<p>By controlling their citizens' access to information, spreading narratives favorable to Russia, and detaining dissidents. (A)</p> Signup and view all the answers

What factors have amplified the seriousness of modern-day information attacks compared to previous eras?

<p>The combination of instant and widespread information availability with advanced technology. (C)</p> Signup and view all the answers

What is a 'deepfake', and why is it a concern?

<p>A form of maliciously altered media that is virtually indistinguishable from reality. (C)</p> Signup and view all the answers

What is the primary function of bots on the internet?

<p>To perform automated, repetitive tasks, including faking social media engagement or spreading malware. (A)</p> Signup and view all the answers

According to the lecture on non-traditional homeland security threats, what is a primary characteristic that defines a threat as 'non-traditional'?

<p>It is new or emerging, or requires responses outside typical law enforcement behavior. (D)</p> Signup and view all the answers

Although death tolls relating to storms are decreasing, what factor has amplified the impact of natural disasters in recent years?

<p>Increased severity of storms and the vulnerability of impoverished communities. (C)</p> Signup and view all the answers

What is a key role of the Federal Emergency Management Agency (FEMA) in responding to natural disasters?

<p>To prepare communities, offer online tools and information, and be the 'boots on the ground' response during disasters. (A)</p> Signup and view all the answers

What characterizes climate refugees, and what factor typically causes them to migrate?

<p>Individuals forced to leave their homes due to unlivable conditions created by climate change. (A)</p> Signup and view all the answers

Before Covid-19, the US was looked at as the public health "god", but this was undermined by the reaction to which threat?

<p>An attack on our informational infrastructure. (A)</p> Signup and view all the answers

What best describes a key difference between anthrax and ricin as potential biological weapons?

<p>Anthrax involves bacteria, while ricin is a toxin derived from castor beans and is not contagious. (D)</p> Signup and view all the answers

What is key characteristic that differentiates radiological incidents from nuclear incidents?

<p>Radiological incidents produce radiation without detonation, whereas nuclear incidents involve a detonation. (A)</p> Signup and view all the answers

Following World War II, why did some U.S. scientists reportedly leak information to the Soviet Union regarding nuclear weapons?

<p>To create a disincentive for the U.S. to use nuclear weapons, promoting a concept of Mutually Assured Destruction (MAD). (D)</p> Signup and view all the answers

What is a 'dirty bomb' primarily designed to do?

<p>Contaminate an area with radioactive material, causing disruption and anxiety. (A)</p> Signup and view all the answers

What was the apparent reason for the attempt to hide certain truths about the Chernobyl disaster?

<p>The US downplayed it because they were facing their own domestic anti-nuclear movement due to Three Mile Island and giving bad news was bad. (B)</p> Signup and view all the answers

In the context of cybersecurity, what is a 'zero-day'?

<p>A newly discovered vulnerability in software for which there is no existing patch. (C)</p> Signup and view all the answers

Why did the US and other agencies begin hoarding zero-day vulnerabilities?

<p>To use them to attack foreign adversaries, but this created a global cyber arms race that it could not control. (C)</p> Signup and view all the answers

What is ANOM, and what security concepts does it illustrate?

<p>An FBI operated device, that was promoted by syndicates, and resulted in arrests. (C)</p> Signup and view all the answers

What is weak AI?

<p>An AI that focuses solely on a singular task. (B)</p> Signup and view all the answers

What is the ‘NOBUS’ rule?

<p>Where an agency (like the NSA) believes it is the only one capable of exploiting the vulnerabilties, so it was fine to not let the vendors know about them. (B)</p> Signup and view all the answers

How did Russia test things in Ukraine before using them elsewhere?

<p>They shut down power in Ukraine before the 2015 election. (C)</p> Signup and view all the answers

How does Russian disinformation connect to the War in Ukraine?

<p>Russian disinformation can undermine the US support for Ukraine. (B)</p> Signup and view all the answers

Flashcards

Informational Infrastructure

People, programs, outlets, and stakeholders involved in the creation, use, and distribution of information.

Communications Critical Infrastructure

Physical elements through which information is transmitted (wires, poles, satellites)

Informational Infrastructure

Information being transmitted, platforms used to disseminate and access info.

Office of Censorship

During wars, news outlets required to run information through this office.

Signup and view all the flashcards

Morale during war

Crucial to maintain, especially in democracies, during war.

Signup and view all the flashcards

Censorship during wars

System was easier to control because information was sent back limited means

Signup and view all the flashcards

Democracies

Public votes for a leader, leaders can be voted out, peaceful transitions, public support.

Signup and view all the flashcards

Authoritarianism

Leaders self-imposed, serve for life, power transitions violently, public suppressed.

Signup and view all the flashcards

Democratic Peace Hypothesis

A perspective arguing democracies are less likely to fight each other.

Signup and view all the flashcards

Cold War (1945-1990)

This is when the US and Soviet Union fought for global influence.

Signup and view all the flashcards

Disinformation

Purposefully wrong information

Signup and view all the flashcards

Misinformation

Accidentally wrong information

Signup and view all the flashcards

Disinformation

Deliberate and malicious content that spreads fear and suspicion

Signup and view all the flashcards

Synthetic Media

AI algorithms to artificially produce multimedia to mislead or change original meaning.

Signup and view all the flashcards

Bots

Pre-defined repetitive task software that imitates human behavior

Signup and view all the flashcards

Harmony Square Game

Game developed to teach individuals how misinformation is spread.

Signup and view all the flashcards

Nontraditional Homeland Security Threat

Threats to citizens' lives, economic security, or national security.

Signup and view all the flashcards

FEMA

Agency responsible for natural disaster response.

Signup and view all the flashcards

Climate Refugees

People forced to flee home due to inhospitable conditions from climate change.

Signup and view all the flashcards

What are bots?

Software program that performs automated, repetitive tasks

Signup and view all the flashcards

Threat to US

Disease can spread quickly and be difficult to contain

Signup and view all the flashcards

Human Trafficking

Involves force, fraud, or coercion to obtain labor or commercial sex act.

Signup and view all the flashcards

Fentanyl

100 times more potent than morphine

Signup and view all the flashcards

CBRN incident threats

Can cause high injuries/fatalities, difficult to detect/avoid, injure responders, long-lasting damage

Signup and view all the flashcards

FEMA CBRN Office

Prepares US to respond/recover from CBRN events.

Signup and view all the flashcards

Chlorine Gas

Greenish-yellow, irritates eyes, nose, lungs, throat

Signup and view all the flashcards

Iraq Tabun use against Iran

Nerve agent dispersed via aerosol/vapors, lethal on skin

Signup and view all the flashcards

Sarin Gas

Prevents proper operation of enzymes for glands/muscles

Signup and view all the flashcards

Current vulnerabilities to US

Individuals not screened when entering

Signup and view all the flashcards

Zero-days

Software/code flaw with no existing patch

Signup and view all the flashcards

Study Notes

  • Informational infrastructure encompasses the people, programs, outlets, and stakeholders involved in the creation, use, and distribution of information, be it real or fake
  • Communications critical infrastructure refers to the physical elements used to transmit information like wires, telephone poles, and satellites
  • Informational infrastructure refers to the information being transmitted, the platforms used to disseminate it, social media, and tools used to manipulate information.

History of Information Control

  • Leaders have always desired to control the information the public knows
  • Freedom of expression is a foundational principle in the U.S. However, during wars, the U.S. and other countries have enacted temporary laws to limit or edit information
  • This impacts everyone, from soldiers communicating with loved ones to journalists

Case Study: Hiroshima

  • During World War II, the U.S. government required news outlets to run information through the "Office of Censorship"
  • Information that threatened the war effort or morale was suppressed
  • After the atomic bombing of Hiroshima, news outlets were prevented from sharing information about the consequences, including radiation and the death toll
  • The government restricted access, intercepted information, and used the Office of Censorship

Key Ideas

  • Morale is crucial during war, especially in democracies
  • Censorship was easier when information was limited in scope
  • Control of communication sectors and informational infrastructures was achievable

Democracy vs. Authoritarianism

  • Democracies involve public voting for leaders, leaders being voted out, peaceful transitions of power, and the government needing public support
  • Authoritarianism involves self-imposed leaders through military coups or rigged elections, leaders serving for life, violent power transitions, and suppression of public opinion
  • Democracies rely on informed citizens to decide who to give power to

Democratic Peace Hypothesis

  • Argues that democracies are less likely to fight each other
  • Public support for wars is necessary; anti-war sentiment can lead to leaders being voted out, similar to the response to the Vietnam War

Conflict and Information

  • Various entities might seek to influence U.S. citizens' views
  • The Soviet Union, and now Russia, have historically been major influencers of U.S. public opinion
  • During the Cold War (1945-1990), the U.S. and the Soviet Union competed for global influence, using information and its manipulation as a key tool in the capitalism vs. communism battle

Delicate Balance

  • Major powers used to undermine other governments
  • The spread of information and misinformation now allows such actions to happen to them
  • Election security requires trust in results, but political division poses a challenge
  • Protecting America's sovereignty is more than physical; it involves safeguarding public trust in democracy

Rapid Change and Susceptibility

  • Rapid change in recent decades contributes to susceptibility
  • The internet's explosion from the 1990s onward
  • Cell phones becoming computers since the 2000s
  • Social media, algorithms, and big data have transformed information
  • Understanding the impact of these changes and preparing for them is difficult due to cybercrime

Disinformation vs. Misinformation

  • Disinformation is purposefully wrong; misinformation is accidentally wrong
  • Misinformation is false or inaccurate information
  • Disinformation is deliberate content that spreads fear and suspicion
  • AI has created synthetic media, involving artificial production, manipulation, and modification of data and multimedia to mislead/change original meaning

Spreading Mis/Disinformation

  • Mis/disinformation spreads because it is often more "clickable" than the truth
  • Algorithms play a huge role in spreading it
  • Algorithms use data to train and suggest content that you are more likely to interact with, with data being sold and tracked across apps
  • Confirmation bias plays a significant role

The 2016 Election

  • Russia used bots to spread disinformation and invested in Trump's candidacy by discrediting Hilary Clinton
  • Russia's interference in the election posed a threat to homeland security; undermining democracy and creating political division, with Russia previously deterred by a less divided US

War in Ukraine

  • Russia is using disinformation tactics on its own people
  • Authoritarian states control information and limit access to websites and platforms
  • Russia told its citizens there was no war, but a liberation from Nazis
  • Russia detains those who question the war
  • Ukraine is a former Soviet state important to Russia
  • Russia has always wanted Ukraine back, considering parts of it Russian, and Ukraine's desire to join NATO poses a huge threat to Russia

Attacks on Information

  • Technological advances and instant information availability exacerbate the problem
  • It is now possible to create evidence indistinguishable from reality
  • Those who get their news from social media are more likely to believe false claims

Deepfakes and Distrust

  • Deepfakes are manipulated media
  • Conspiracies, especially after events like 9/11, contribute to distrust
  • There is a fear surrounding forged pictures, fake videos, and their potential impact on evidence and trust in government

Bots

  • Bots are software programs that perform automated tasks
  • They often imitate human behavior, with up to half of internet traffic being bots used for various purposes, with lots of it faking social media engagement/malware
  • Bots can be purchased and used to push topics toward trending positions
  • Twitter claims less than 5% of accounts are bots, but researchers estimate 0-15%
  • The FBI and CISA have issued alerts about Russian bots spreading disinformation

Harmony Square Game

  • Developed by the University of Cambridge
  • Models how misinformation is spread
  • Aims to improve people's ability to spot manipulation techniques in social media posts, increase confidence, and reduce willingness to share manipulative content

Disinformation Globally

  • Facebook is the only form of the internet in some countries
  • WhatsApp is a main form of communication in India, where chain messages with false information have been shared billions of times, prompting policy changes

Nontraditional Threats Lecture

Introduction

  • Nontraditional homeland security threats include threats to the lives of citizens, economic security, and the security of the country
  • Nontraditional threats require responses outside typical law enforcement behavior
  • Examples include: the COVID-19 pandemic, natural disasters, and trafficking

Natural Disasters Overview

  • Natural disasters are a threat to homeland security as they cause death and severe economic damage
  • FEMA is the agency under DHS responsible for natural disaster response

Types of Natural Disasters

  • Fires, floods, hurricanes, tornadoes, and earthquakes
  • Risks vary by region in the U.S., with Georgia being at risk for hurricanes and earthquakes
  • Tsunamis are less likely

Death Toll of Natural Disasters

  • Natural disasters kill around 45,000 people a year globally.
  • They account for about 0.1% of deaths over the last decade
  • Although storms are increasing in severity, death tolls are decreasing due to improved building infrastructure, prevention, and early detection
  • Historically, droughts and floods were the most fatal events, but now earthquakes tend to be more deadly due to unpredictability and the ability to ship food

Impact of Natural Disasters

  • Disasters disproportionately affect those in poverty due to unsafe buildings and limited infrastructure
  • The 1931 & 1887 China floods were respectively the 1st & 2nd worst natural disasters in history, with a combined death toll of nearly 6 million people
  • The 1900 Galveston TC hurricane was the deadliest in U.S. history, killing 6,000-8,000 people

US Natural Disaster Response

  • FEMA employs more than 20,000 people and provides tools and information for preparedness, along with grants.
  • FEMA is responsible for preparing communities and on-the-ground response
  • Criticism faced includes Hurricane Katrina (2005)
  • The agency identified three key areas for attention: climate change resilience, reducing risks to critical infrastructure, and increasing equity in preparedness

Local Response

  • State/local officials are responsible for preparing, evacuating/search and rescue, and providing shelters/food

Climate Refugees

  • Climate refugees are individuals forced to flee due to inhospitable conditions created by climate change
  • Inhospitable conditions include droughts, heatwaves, flooding/landslides, and a lack of food/resources

Key Takeaways on Climate

  • Think about the number of people in at-risk areas who might need to relocate, and consider the moral impacts of who is contributing to climate change the most

Threat of Disease

  • Reflecting on the Covid-19 pandemic may provide insights into the preparedness of the U.S. and the world

Disease Outbreaks

  • The SARS outbreak in Toronto in 2003 had a 10% death rate
  • In the last decade, the world had potential mass diseases

Emerging Pathogens

  • Climate change thaws the Arctic permafrost
  • Unknown pathogens are discovered in frozen ground

Current Vulnerabilities To The US

  • Frequent movement of individuals/goods make disease spread more rapid
  • Lack of supply such as PPE
  • Division and misinformation
  • Lack of trust
  • Lack of coordination

Human Trafficking

  • Human trafficking involves force, fraud, or coercion to obtain labor or sex acts;
  • This happens globally, affecting people of all demographics, with traffickers using violence/manipulation

Multi-Phase Process of Human Trafficking

  • Recruitment, transport, coercion, fraud, and force

Types of Human Trafficking

  • Forced labor, contract slavery, domestic servitude, and sex trafficking are included
  • Bonded labor involves using debt to control victims; that can be inherited. Migrant farm workers are are especially vulnerable

Drug Trafficking

  • Combating drug use focuses on either supply reduction or demand reduction
  • In the 1970s and 1980s, the U.S. poured billions of dollars to the "War on Drugs" including attacking the supply in Latin America
  • The "War on Drugs" resulted in increased drug prices, made cartels wealthy, and led to mass incarceration

Current State of Drug Crime

  • Cartels and organized crime are powerful in Latin America, destabilizing countries
  • Many illicit drugs are imported into the U.S., and some are manufactured locally
  • Main sources include China, Mexico, other Latin American countries, and Afghanistan

Fentanyl

  • Is 100x more potent than morphine, causing the opioid epidemic to drastically increase
  • Before the pandemic, China produced Fentanyl cleanly
  • Shutdowns shifted the trade to Mexico
  • Cartels are making it impure so its mixed with chemicals

CBRN Overview

  • CBRN incidents are one of the worst-case scenarios for homeland security, including both intentional attacks and accidents
  • Causes many deaths, injuries, difficult to detect, and injures first responders

Potential Perpetrators

  • Governments/terrorist groups but unlikely for the latter
  • Would need lots of resources, unlikely to be lone wolves unless specific individuals with access and know-how like scientists

Potential Weapon Sources

  • Theft from labs, companies, and military
  • Loose Soviet Nukes

FEMA CBRN Office

  • The FEMA CBRN Office prepares the nation to respond to and recover from CBRN events ranging from mass destruction to HAZMAT spills
  • They also provide standardized CBRN response capabilities to federal, state, local, tribal, and territorial emergency responders and planners

First Use of Chemical Weapons

  • Chlorine gas was used in WW1: A greenish-yellow cloud that irritates eyes/noses/lungs- Causes potential asphyxiation at high dosages
  • Phosgene Gas: Colorless gas that smelled like moldy hay that took days to kill but was 6x more deadly than chlorine and responsible for 85% of war kills in WW1
  • Mustard gas smelled terrible or like dead horses that caused blindness and boils

Chemical Warfare

  • After WW1, the world signed an agreement not to use chemical weapons
  • Nerve agents are released through aerosol sprays or vapors, in the water, or into food
  • Syria used Sarin Gas on citizens
  • Union Carbide Incident in Bhopal: Industrial accidents are concerning today

Most People Think of Anthrax As...

  • A white powder that can be contracted through breathing it in or getting a cut. It is non-contagious and is naturally rare
  • Toxin is naturally occurring in castor beans, poising can be made from waste material and can be a powder, mist, or pallet
  • Ricin is non-contagious

Radiological vs. Nuclear Emergencies

  • Difference between radiological and nuclear emergencies is that nuclear incidents involve detonation of a nuclear device whereas radiological incidents produce radiation without detonation of a nuclear device
  • Radiological: Victims can be contaminated and exposed, with examples being an RDD
  • Nuclear: Involves a nuclear explosion

Nuclear Attacks

  • Only nuclear bombs dropped: Hiroshima and Nagasaki (1945) with death toll estimates starting at 70k and ending at 140k
  • After WW2 US scientists leaked nuke intel to the Soviets
  • We are afraid of the government launching nuclear weapons, not a lone wolf
  • Radiation would impact critical infrastructure

Cybersecurity History

  • Early computers have advanced to devices that are now cell phones
  • Tech disrupts traditional markets

Whitehouse Current Strategy

  • Shift the burden of responsibility away from individuals and towards organizations capable of protecting
  • In 2015 companies started sharing cyberthreats; legislation now mandates companies in critical sectors must alert the government when hit

Cybersecurity

  • Pervious legislation protected data being stolen and now focuses on reporting

Cybercrimes Most Common In The US

  • Business emails, data breaches, denial of service, distributed denial of service, and ransomware
  • Most likely way for the world to be detroyed is by accident

Cyber Pentagon

  • Pentagon's 5 Ds: deny, degrade, disrupt, deceive, destroy and its used on the US

Market Manipulation and Zero-Days

  • AI programs are not innovative, but they replicate existing actions that cause flawed code
  • Cybersecurity and intelligence agencies engage in unregulated recordless operations
  • Companies buy zero-days in order exploit those bugs
  • Feds use apps to hunt cyber criminals and terroritsts

9/11 And CyberwarFare

  • Exploitation/spy programs became heavily targeted
  • Capabilities of the NSA are far bigger than Snowden

AI's Role

  • AI trains on existing algorithms
  • Can create errors
  • The code has gotten too large

Infiltration

  • China uses intel against their own people
  • People in the Uighur muslim community
  • Saudis use spies get jobs at twitter to collect info
  • If the cyber tool is being developed, then what does that mean for the US?

Geneva and The US

  • We sign treaties and then break them
  • We are unpredictable right now

Ukraine Invasion And Cyberwarfare

  • Russia has a long history of playing with cyberwarefare
  • There are cyber risks

Miss Disinformation

  • Miss information is accidents,
  • Disinformation is purposeful

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Use Quizgecko on...
Browser
Browser