SlideShare uma empresa Scribd logo
1 de 43
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
The business(es) of cognitive
security
SJ Terp, NYU Computational Disinformation Symposium, Dec 2021
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Cognitive Security is Infosec applied to disinformation
“Cognitive security is the application of information security principles, practices, and tools
to misinformation, disinformation, and influence operations.
It takes a socio-technical lens to high-volume, high-velocity, and high-variety forms of
“something is wrong on the internet”.
Cognitive security can be seen as a holistic view of disinformation from a security
practitioner’s perspective
“Cognitive Security is the
application of artificial intelligence
technologies, modeled on human
thought processes, to detect
security threats.” - XTN
“Cognitive Security (COGSEC) refers to
practices, methodologies, and efforts
made to defend against social
engineering attempts‒intentional and
unintentional manipulations of and
disruptions to cognition and sensemaking”
- cogsec.org
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Cognitive Security is risk management
Confidentiality, integrity, availability
■ Confidentiality: data should only be visible
to people who authorized to see it
■ Integrity: data should not be altered in
unauthorized ways
■ Availability: data should be available to be
used
Possession, authenticity, utility
■ Possession: controlling the data media
■ Authenticity: accuracy and truth of the
origin of the information
■ Utility: usefulness (e.g. losing the
encryption key)
3
Image: Parkerian Hexad, from
https://www.sciencedirect.com/topics/computer-
science/parkerian-hexad
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Response frameworks
4
Campaigns
Incidents
Narratives and
behaviours
Artifacts
WHAT WHEN
Image: WHO emergency cycle - see
https://www.euro.who.int/en/health-topics/health-
emergencies/pages/about-health-emergencies-in-the-
european-region/emergency-cycle
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Behaviour models: AMITT Red, AMITT Blue
5
Planning
Strate
gic
Plann
ing
Obje
ctive
Plann
ing
Preparation
Devel
op
Peopl
e
Devel
op
Netw
orks
Micro
targe
ting
Devel
op
Cont
ent
Chan
nel
Selec
tion
Execution
Pump
Primi
ng
Expos
ure
Prebu
nking
Humoro
us
counter
narrativ
es
Mark
content
with
ridicule /
deceler
ants
Expire
social
media
likes/
retweets
Influenc
er
disavow
s misinfo
Cut off
banking
access
Dampe
n
emotion
al
reaction
Remove
/ rate
limit
botnets
Social
media
amber
alert
Etc
Go
Physi
cal
Persis
tenc
e
Eval
uati
on
Meas
ure
Effect
ivene
ss
Have
a
disinfor
matio
n
respon
se
plan
Improve
stakehol
der
coordin
ation
Make
civil
society
more
vibrant
Red
team
disinfor
mation,
design
mitigati
ons
Enhanc
ed
privacy
regulati
on for
social
media
Platform
regulati
on
Shared
fact
checkin
g
databas
e
Repair
broken
social
connect
ions
Pre-
emptive
action
against
disinfor
mation
team
infrastru
cture
Etc
Media
literac
y
throug
h
games
Tableto
p
simulati
ons
Make
informat
ion
provena
nce
availabl
e
Block
access
to
disinfor
mation
resourc
es
Educate
influenc
ers
Buy out
troll
farm
employ
ees /
offer
jobs
Legal
action
against
for-profit
engage
ment
farms
Develop
compelli
ng
counter
narrativ
es
Run
competi
ng
campai
gns
Etc
Find
and
train
influen
cers
Counter
-social
enginee
ring
training
Ban
incident
actors
from
funding
sites
Address
truth in
narrativ
es
Margina
lise and
discredit
extremis
t groups
Ensure
platform
s are
taking
down
account
s
Name
and
shame
disinfor
mation
influenc
ers
Denigra
te
funding
recipien
t /
project
Infiltrate
in-
groups
Etc
Remo
ve old
and
unuse
d
accou
nts
Unravel
Potemki
n
villages
Verify
project
before
posting
fund
requests
Encoura
ge
people
to leave
social
media
Deplatf
orm
messag
e
groups
and
boards
Stop
offering
press
credenti
als to
disinfor
mation
outlets
Free
open
library
sources
Social
media
source
removal
Infiltrate
disinfor
mation
platform
s
Etc
Fill
inform
ation
voids
Stem
flow of
advertisi
ng
money
Buy
more
advertisi
ng than
disinfor
mation
creators
Reduce
political
targetin
g
Co-opt
disinfor
mation
hashtag
s
Mentors
hip:
elders,
youth,
credit
Hijack
conte
nt and
link to
inform
ation
Honeyp
ot social
commu
nity
Corpora
te
researc
h
funding
full
disclosur
e
Real-
time
updates
to
factche
ck
databas
e
Remove
non-
relevant
content
from
special
interest
groups
Content
modera
tion
Prohibit
images
in
political
Chanels
Add
metada
ta to
original
content
Add
warning
labels
on
sharing
Etc
Rate-
limit
engag
ement
Redirect
searche
s away
from
disinfo
Honeyp
ot: fake
engage
ment
system
Bot to
engage
and
distract
trolls
Strength
en
verificati
on
method
s
Verified
ids to
comme
nt or
contribu
te to
poll
Revoke
whitelist
/
verified
status
Microt
arget
likely
targets
with
count
er
messa
ges
Train
journalist
s to
counter
influenc
e moves
Tool
transpar
ency
and
literacy
in
followed
channel
s
Ask
media
not to
report
false
info
Repurpo
se
images
with
counter
messag
es
Engage
payload
and
debunk
Debunk
/ defuse
fake
expert
credenti
als
Don’t
engage
with
payload
s
Hashtag
jacking
Etc
DMCA
taked
own
reques
ts
Spam
domesti
c actors
with
lawsuits
Seize
and
analyse
botnet
servers
Poison
monito
ring
and
evalu
ation
data
Bomb
link
shorten
ers with
calls
Add
random
links to
network
graphs
https://github.com/cogsec-collaborative/AMITT
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Rapid Sharing: Cognitive Security Operations Centers
Cognitive
ISAO
ISAC/
ISAO
Infosec
SOC
Comms
Legal
COG
SOC Trust&
Safety
Platform
ORG
Infosec
SOC
Comms
Legal
COG
Desk Trust&
Safety
Platform
Comms
Legal
COG
Desk
Trust&
Safety
Platform
ORG
ORG
ORG
ORG
ORG
ORG
ORG
COG
SOC
6
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Cognitive Security Ecosystem Mapping
Information
Landscape
• Information seeking
• Information sharing
• Information sources
• Information voids
Threat
Landscape
• Motivations
• Sources/ Starting points
• Effects
• Misinformation Narratives
• Hateful speech narratives
• Crossovers
• Tactics and Techniques
• Artifacts
Response
Landscape
• Monitoring organisations
• Countering organisations
• Coordination
• Existing policies
• Technologies
• etc
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Business
We’ve already been talking
about the business of
disinformation…
8
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Business questions
● Is there a market here?
● Does the market pay enough to
sustain businesses?
● Where’s the money coming from?
● What’s it paying for?
● Who is already in this space?
● Who is likely to move into this
space?
● Who is the customer base?
● What features and restrictions do
we have?
9
FOLLOW THE MONEY
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Where is the money in a threat landscape?
• Motivations
• Geopolitics mostly absent
• Party politics (internal, inter-party)
• Actors
• Political parties
• Nationstates
• Entrepreneurs
• Activities
• Manipulate faith communities
• Discredit election process
• Discredit/discourage journalists
• Attention (more drama)
• Potential harms / severities
• Assassination
• Voting reduction
• Sources
• WhatsApp
• Blogs
• Facebook pages
• Online newspapers
• Media
• Routes
• Hijacked narratives
• Whatsapp to blogs, vice versa
• Whatsapp forwarding
• facebook to whatsapp
• Social media to traditional media
• Social media to word of mouth
10
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Adjacent markets for creation: ransomware, infosec
11
Image: https://sec.okta.com/articles/2020/08/crimeops-operational-art-cyber-crime
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Adjacent/ feeder market: Marketing lumascapes
12
Image: https://chiefmartec.com/2020/04/marketing-technology-landscape-2020-martech-5000/
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Adjacent market for response: Cybersecurity lumascapes
13
Image: https://momentumcyber.com/docs/CYBERscape.pdf
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
CogSec creator
business landscape
Disinformation creators etc
14
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation Actors
Persistent
Manipulators
Advanced teams
• Internet Research Agency
• China, Iran teams etc
For-profit website networks
• Antivax websites
• Pink slime sites
• “Stolen” US election sites
Nationstate media
• Sputnik
• Russia Today
Service
Providers
Disinformation as a Service
• Factories
• Ex-marketing, spam etc
Ad-Hoc paid teams
• EBLA Ghana
• PeaceData USA
Opportunists
Wares Sellers
• Clicks
• T-shirts
• Books etc.
Groups
• Conspiracy groups
• Extremists
Individuals
• Attention-seekers
• Jokers etc
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
DAAS: disinfo as a service companies
16
Image: https://www.recordedfuture.com/disinformation-service-campaigns
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation as a service
“Doctor Zhivago’s services were priced very specifically, as seen below:
● $15 for an article up to 1,000 characters
● $8 for social media posts and commentary up to 1,000 characters
● $10 for Russian to English translation up to 1,800 characters
● $25 for other language translation up to 2,000 characters
● $1,500 for SEO services to further promote social media posts and traditional media articles, with a time frame of 10 to 15
days
Raskolnikov, on the other hand, had less specific pricing:
● $150 for Facebook and other social media accounts and content
● $200 for LinkedIn accounts and content
● $350–$550 per month for social media marketing
● $45 for an article up to 1,000 characters
● $65 to contact a media source directly to spread material
● $100 per 10 comments for a given article or news story”
Image: https://www.recordedfuture.com/disinformation-service-campaigns/
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
DaaS examples
Internet Research Agency
● Russian “troll farm”
● Well organised
● Ex marketing
● Not quite official
Satellite organisation: EBLA
● Cut-out organisation based in Ghana
● Kids round a kitchen table model
Troll farms in the Philippines
● PR experts plus younger social media influencers
● Philippines because English-speaking workforce, used to call center, content moderation work
PR firms, various locations
● US-based: operating in other countries (Venezuela, Bolivia etc)
● MAS Agency (Ukraine-based PR firm)
● Saudi digital marketing firm
18
Image: https://en.wikipedia.org/wiki/Internet_Research_Agency
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation Creation Actors: Self-Serve
Image: https://gijn.org/2020/07/08/6-tools-and-6-techniques-reporters-can-use-to-unmask-the-actors-behind-covid-19-disinformation/
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Antivax Superspreaders
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Also making money: fake experts
Image: https://7news.com.au/travel/coronavirus/plandemic-the-concerning-virus-conspiracy-documentary-goes-viral--c-1028000
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Secondary money: Freedom To Breathe Agency
Images: various
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
CogSec creator
support business
landscape
Disinformation suppliers etc
23
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Tools
● Bots/ botnets
● IFTTT variants
● Personas
● Network analysis
● Marketing tools
● Deepfake
generators
Image: https://twitter.com/conspirator0/status/1249020176382779392
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Suppliers: Account sets, Astroturfers etc
Image: https://knowyourmeme.com/photos/923510-wikipedia
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
AdTech industry
Image: https://www.adexchanger.com/venture-capital/ecosystem-map-luma-partners-kawaja/
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Customer segmentation and targetting
Image: https://commons.wikimedia.org/wiki/File:Customer_Segmentation.png
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation Creation Lumascape
Disinformation as a service
Public relations
Digital strategy
28
Tools
Audience growth
Botnet supply
Advertising
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation Response Lumascape
Advanced Threat Protection
Botnet detection and removal
Disinformation research
Fact checking
Training (inc exercises)
Information monitoring
Tools
Consultancy
30
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
CogSec Response
Business landscape
How the response business is
shaping up
31
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Response Actors
Disinformation SOCs
Large actors
• ISAOs
• Platforms
• Other large actors
Event-specific
• War rooms
• Agencies
Disinformation
Teams
Disinformation “desk"
• In existing SOC
• Standalone unit
Investigators
• Journalists
• Academics
• Independent journalists
Other Responders
Policymakers
Law enforcement
Corporations
Influencers
Nonprofits
Educators
Individual researchers
Concerned citizens
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Example Response Landscape (Needs / Work / Gaps)
Risk Reduction
● Media and influence
literacy
● information
landscaping
● Other risk reduction
Monitoring
● Radio, TV, newspapers
● Social media platforms
● Tips
Analysis
● Tier 1 (creates tickets)
● Tier 2 (creates
mitigations)
● Tier 3 (creates reports)
● Tier 4 (coordination)
Response
● Messaging
○ prebunk
○ debunk
○ counternarratives
○ amplification
● Actions
○ removal
○ other actions
● Reach
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Where’s the money?
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Where’s the money?
35
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation Response Lumascape
Advanced Threat Protection
Botnet detection and removal
Disinformation research
Fact checking
Training (inc exercises)
Information monitoring
Tools
Consultancy
36
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
AfricaCheck / Meedan
37
Image: https://africacheck.org/fact-checks/fbchecks/no-vaccines-wont-make-you-seedless
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Alethea Group: threat assessments
● DC-based disinformation
consultancy
● Techniques rooted in
intelligence methods
● Aimed at businesses
Image: aletheagroup.com
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Fiveby: Adapting supply chain risk management
● Seattle-based risk
consultancy
● Techniques rooted in
fraud risk assessment
● Aimed at platforms and
other online businesses
Image: https://www.fiveby.com/wp-content/uploads/2021/05/Fiveby_disinformation_whitepaper_032921_final-1.pdf
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
CogSec Response
Support Business
landscape
Tools for responders etc
40
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Disinformation tools market
41
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Tool: Builtwith
42
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
DROG: Training
43
SJ
Terp|
The
business
of
cognitive
security
|
NYU
Dec
2021
Card games - do try this at home…
44

Mais conteúdo relacionado

Mais procurados

disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...Sara-Jayne Terp
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksUsing AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksSara-Jayne Terp
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspacemark-smith
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security MonitoringSysomos
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
SocialmediapublicsavetyFrank Smilda
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Pukhraj Singh
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationStephen Cobb
 
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...Chuck Brooks
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks
 

Mais procurados (20)

disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
2020 09-01 disclosure
2020 09-01 disclosure2020 09-01 disclosure
2020 09-01 disclosure
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksUsing AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworks
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security Monitoring
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
 

Semelhante a The Business(es) of Disinformation

Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...g8briel
 
Threat Sharing for Human Rights
Threat Sharing for Human RightsThreat Sharing for Human Rights
Threat Sharing for Human RightsMegan DeBlois
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingijtsrd
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposedNumaan Huq
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecuritySaqib Chaudhry
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkillijtsrd
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking PresentationDoug Cornelius
 
CSW2022_03_threat_environment.pptx.pdf
CSW2022_03_threat_environment.pptx.pdfCSW2022_03_threat_environment.pptx.pdf
CSW2022_03_threat_environment.pptx.pdfSaraJayneTerp
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 

Semelhante a The Business(es) of Disinformation (20)

Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
 
Threat Sharing for Human Rights
Threat Sharing for Human RightsThreat Sharing for Human Rights
Threat Sharing for Human Rights
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Why_TG
Why_TGWhy_TG
Why_TG
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking Presentation
 
CSW2022_03_threat_environment.pptx.pdf
CSW2022_03_threat_environment.pptx.pdfCSW2022_03_threat_environment.pptx.pdf
CSW2022_03_threat_environment.pptx.pdf
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 

Mais de Sara-Jayne Terp

BSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideBSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideSara-Jayne Terp
 
Social engineering at scale
Social engineering at scaleSocial engineering at scale
Social engineering at scaleSara-Jayne Terp
 
engineering misinformation
engineering misinformationengineering misinformation
engineering misinformationSara-Jayne Terp
 
Online misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowOnline misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowSara-Jayne Terp
 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSara-Jayne Terp
 
Belief: learning about new problems from old things
Belief: learning about new problems from old thingsBelief: learning about new problems from old things
Belief: learning about new problems from old thingsSara-Jayne Terp
 
risks and mitigations of releasing data
risks and mitigations of releasing datarisks and mitigations of releasing data
risks and mitigations of releasing dataSara-Jayne Terp
 
Session 10 handling bigger data
Session 10 handling bigger dataSession 10 handling bigger data
Session 10 handling bigger dataSara-Jayne Terp
 
Session 09 learning relationships.pptx
Session 09 learning relationships.pptxSession 09 learning relationships.pptx
Session 09 learning relationships.pptxSara-Jayne Terp
 
Session 08 geospatial data
Session 08 geospatial dataSession 08 geospatial data
Session 08 geospatial dataSara-Jayne Terp
 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptxSara-Jayne Terp
 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptxSara-Jayne Terp
 
Session 06 machine learning.pptx
Session 06 machine learning.pptxSession 06 machine learning.pptx
Session 06 machine learning.pptxSara-Jayne Terp
 
Session 05 cleaning and exploring
Session 05 cleaning and exploringSession 05 cleaning and exploring
Session 05 cleaning and exploringSara-Jayne Terp
 
Session 04 communicating results
Session 04 communicating resultsSession 04 communicating results
Session 04 communicating resultsSara-Jayne Terp
 
Session 03 acquiring data
Session 03 acquiring dataSession 03 acquiring data
Session 03 acquiring dataSara-Jayne Terp
 
Session 02 python basics
Session 02 python basicsSession 02 python basics
Session 02 python basicsSara-Jayne Terp
 
Session 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSession 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSara-Jayne Terp
 
Evolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data EcosystemEvolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data EcosystemSara-Jayne Terp
 

Mais de Sara-Jayne Terp (19)

BSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideBSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guide
 
Social engineering at scale
Social engineering at scaleSocial engineering at scale
Social engineering at scale
 
engineering misinformation
engineering misinformationengineering misinformation
engineering misinformation
 
Online misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowOnline misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz now
 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_belief
 
Belief: learning about new problems from old things
Belief: learning about new problems from old thingsBelief: learning about new problems from old things
Belief: learning about new problems from old things
 
risks and mitigations of releasing data
risks and mitigations of releasing datarisks and mitigations of releasing data
risks and mitigations of releasing data
 
Session 10 handling bigger data
Session 10 handling bigger dataSession 10 handling bigger data
Session 10 handling bigger data
 
Session 09 learning relationships.pptx
Session 09 learning relationships.pptxSession 09 learning relationships.pptx
Session 09 learning relationships.pptx
 
Session 08 geospatial data
Session 08 geospatial dataSession 08 geospatial data
Session 08 geospatial data
 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptx
 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptx
 
Session 06 machine learning.pptx
Session 06 machine learning.pptxSession 06 machine learning.pptx
Session 06 machine learning.pptx
 
Session 05 cleaning and exploring
Session 05 cleaning and exploringSession 05 cleaning and exploring
Session 05 cleaning and exploring
 
Session 04 communicating results
Session 04 communicating resultsSession 04 communicating results
Session 04 communicating results
 
Session 03 acquiring data
Session 03 acquiring dataSession 03 acquiring data
Session 03 acquiring data
 
Session 02 python basics
Session 02 python basicsSession 02 python basics
Session 02 python basics
 
Session 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSession 01 designing and scoping a data science project
Session 01 designing and scoping a data science project
 
Evolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data EcosystemEvolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data Ecosystem
 

Último

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 

Último (20)

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 

The Business(es) of Disinformation