Unrelenting high-speed global information attacks that fragment adversary populations into antagonistic tribal factions share many characteristics with information security operations: reach, distribution, adaptation and attack styles. This exercise continues and tests work on the mapping of misinformation campaigns onto information security response frameworks, investigating the techniques, tactics, and procedures (TTPs) used in them, the synergies from this approach, and the infrastructure that we need for CERT-style alerts and updates.
What sets this May convening apart is the wicked problem our adversaries have long recognized -- that software code by itself will not determine outcomes. This battlespace is for minds. It’s about trust, as well as truth. How do we build resilience? How do we inoculate? How do we build herd immunity? The deepest question is how do we change and unite minds. All to say – first, it’s about the humans.