Category Archives: History

U.S. Fighting DisInformation? Look at 1932 Presidential Election

Regulation and targeted response strategies to fight disinformation worked after FDR took office in 1932, and it’s likely to work again today when someone will muster the national trust of residents ready to take action.

Without that kind of popular support, and by instead making conciliation to technology companies, it’s unlikely we’ll see any progress today.

DefenseOne writes there’s been a necessary shift in security from a focus entirely on confidentiality towards more integrity. They then propose three steps to get there.

First is better, faster understanding by the U.S. government of what disinformation American adversaries are spreading—or, ideally, anticipation of that spread before it actually happens. […]

Second is, in appropriate circumstances, the swift, clear, and direct intervention of U.S. government spokespersons to expose falsities and provide the truth. […]

Third is an expanded set of U.S. government partnerships with technologies companies to help them identify disinformation poised to spread across their platforms so that they can craft appropriate responses.

What this article misses entirely is what has worked in the past. Unless they address why that wouldn’t work today, I’m skeptical of their suggestions to try something new and untested.

Point one sounds like a call for more surveillance, which will obviously run into massive resistance before it even gets off the ground. So there’s a tactical and political headwind. Points two and three are unlikely to work at all.

The most effective government spokesperson in past typically was the President. That’s not possible today for obvious reasons. In the past the partnerships with technology companies (radio, newspaper) wasn’t possible, and it’s similarly not possible today. Facebook’s CEO has repeatedly said he will continue to push disinformation for profit.

I’ve been openly writing and presenting on this modern topic since 2012 (e.g. BSidesLV presentation on using data integrity attacks on mobile devices to foment political coups), with research going back to my undergraduate and graduate degrees in the mid-1990s.

What worked in the past? Look at the timeline after the 1932 Presidential election to 1940, which directly addressed Nazi military disinformation campaigns (e.g. America First) promoting fascism.

  1. Breakup of the organizations disseminating disinformation (regulation).
  2. Election of a President that can speak truth to power, who aligns a government with values that block attempts to profit on disinformation/harms (regulation).
  3. Rapid dissemination of antidotes domestically, and active response abroad with strong countermeasures.
Roosevelt defeats Nazis at the ballot box: “By 1932, Hearst was publishing articles by Adolf Hitler, whom Hearst admired for keeping Germany out of, as Hitler put it in a Hearst paper, “the beckoning arms of Bolshevism.” Hitler instead promoted a transcendent idea of nationalism—putting Germany first—and, by organizing devoted nationalist followers to threaten and beat up leftists, Hitler would soon destroy class-based politics in his country. Increasingly, Hearst wanted to see something similar happen in the United States.”

The question today thus should be not about cooperating with those who have been poisoning the waters. The question should be whether regulation is possible in an environment of get-rich-quick fake-it-til-you-make-it greedy anti-regulatory values.

Take Flint, Michigan water disaster as an example, let alone Facebook/Google/YouTube/WellsFargo.

After officials repeatedly dismissed claims that Flint’s water was making people sick, residents took action.

America has a history of bottom-up (populist) approaches to governance solving top-down exploitation (It’s the “United” part of USA fighting the King for independence). A bottom-up approach isn’t likely to come from the DefenseOne strategy of partnerships between big government and big technology companies.

In fact, with history as our guide, we can see how President Reagan’s concept of partnership with big technology was to remove protection of American children from predators (promoting “ideological child abuse” for profit), as I explained in my 2018 OWASP talk “Unpoisoned Fruit“.

I’m not saying it will be easy to rotate to populist solutions. It will definitely be hard to take on broad swaths of corrupt powerful leaders who repeatedly profit from poisoning large populations for personal gains.

Yet that’s the obvious fork in our road today, and even outside entities know they can’t thrive if Americans choose to be united again in their take-down of selfish profiteers who now brazenly argue for their right to unregulated harms in vulnerable populations.

If Zuckerberg were CEO of Juul… right now he’d be trying to excite investors by saying ten new fruity tobacco flavors are coming next quarter for freedom-loving children.

The boss of e-cigratte maker Juul stepped down on Wednesday in the face of a regulatory backlash and a surge in mysterious illnesses linked to vaping products.

I wrote in 2012 about the immediate need for regulation of vaping. Seven years later that regulation finally is happening, sadly after dozens have been dying suddenly and without explanation. A partnership with tobacco companies was never on the table.

Bottom line is if you ever wonder why a Republican party today would undermine FCC and CIA authority, look at FDR’s creation of them to understand how and why they were designed to block and tackle foreign fascist military and domestic disinformation campaigns.


Update November 11, 2020:

First, a new story reports during the Reagan administration big oil founded large fraudulent disinformation campaigns to poison American thinking about environmental health and safety.

As part of its services to the industry, FTI monitored environmental activists online, and in one instance an employee created a fake Facebook persona — an imaginary, middle-aged Texas woman with a dog — to help keep tabs on protesters. Former FTI employees say they studied other online influence campaigns and compiled strategies for affecting public discourse. They helped run a campaign that sought a securities rule change, described as protecting the interests of mom-and-pop investors, that aimed to protect oil and gas companies from shareholder pressure to address climate and other concerns…

Founded in 1982 in Annapolis, Md., as a firm that provided expert witnesses and presentations for litigation, FTI has grown into a multinational firm that employs almost 5,000 people in 28 countries. Its business spans a wide range of services, from business consulting to crisis communications.

Second, the FTC calls out Zoom for being a fraud, yet neither penalizes them nor compensates their victims.

Use of Zoom software…

‘increased users risk of remote video surveillance by strangers and remained on users’ computers even after they deleted the Zoom app, and would automatically reinstall the Zoom app—without any user action—in certain circumstances,’ the FTC said. The FTC alleged that Zoom’s deployment of the software without adequate notice or user consent violated US law banning unfair and deceptive business practices.

And they basically lied for years and years about security.

…Zoom claimed it offers end-to-end encryption in its June 2016 and July 2017 HIPAA compliance guides… also claimed it offered end-to-end encryption in a January 2019 white paper, in an April 2017 blog post, and in direct responses to inquiries from customers and potential customers… In fact, Zoom did not provide end-to-end encryption for any Zoom Meeting…

I’ve written before about Zoom’s egregious bad-faith business practices here and here.

Drones With Lasers Reveal Human Secrets

Archaeologists are only a few steps removed from forensic scientists looking for crime scenes, if you know what I mean.

Rewriting history now is even easier than ever because drones can speed the discovery of buried things:

…airborne laser scan of the area has found 900 previously unknown archaeological sites on Arran, promising to rewrite the 6,000-year human history of the island…

Given how much can be revealed and how fast, the next technology shift may have to be artificially intelligent archaeologists that can keep up with laser workloads:

Francisco Estrada-Belli, another member of the archaeological team, told National Geographic: “The fortified structures and large causeways reveal modifications to the natural landscape made by the Maya on a previously unimaginable scale.

“Lidar is revolutionising archaeology the way the Hubble Space Telescope revolutionised astronomy.

“We’ll need 100 years to go through all the data and really understand what we’re seeing.”

One group that isn’t waiting any time to jump (pun not intended) to conclusions are the operators on military missions.

The operators use a tablet and special software to designate an area of interest, dispatch a drone to scan it, and then – in a matter of hours – automatically compile the sensor readings into a 3D map so detailed you can even distinguish different species of trees.

I guess you could say operators are seeking places to hide that others could use as much as themselves.

The next step from 3D maps is to attach photo-realistic data. Nearly five years ago AutoDesk boasted of their ability to 3D map anything on their cloud using drone photography. Earlier this year Here engineers said pushing photographic-level details to operators at city-wide scale is hitting performance bottlenecks, yet already is being done.

This opens up huge new ethical issues, including adversarial response and countermeasures to seeing and being seen, as the geospatial experts in the defense industry already have been flagging:

Efforts to correct mistakes, respond to disasters, or map poverty warm the heart. But other aspects of geospatial intelligence are rife with ethical challenges, from potential invasions of privacy to the violation of the confidentiality of individuals who agree to provide income or other demographic information. “Don’t expect lawyers to catch up,” warned Schwartz. “There are going to be guidelines that need to be created by those who are doing the work.”

[…]

“The reason we exist is to give advantage to our country,” said Munsell, “and as director [Robert] Cardillo used to say, ‘to never allow a fair fight.’”

Never allow a fair fight.

Austria Espionage Card Index 1849-1868

The neo-absolutist state secret service kept an espionage card index for surveillance of Vienna residents 1849-1868.

Here’s an example I captured from a museum’s archive:

Encyclopedia Britannica explains the living conditions during this period, also called “centralization with a vengeance“, not terribly far from where some in the U.S. want things to go today:

Freedom of the press as well as jury and public trials were abandoned, corporal punishment by police orders restored, and internal surveillance increased. The observation of the liberal reformer Adolf Fischhof that the regime rested on the support of a standing army of soldiers, a kneeling army of worshippers, and a crawling army of informants was exaggerated but not entirely unfounded. One of the more backward developments was the concordat reached with the papacy that gave the church jurisdiction in marriage questions, partial control of censorship, and oversight of elementary and secondary education. Priests entrusted with religious education in the schools had the authority to see to it that instruction in any field, be it history or physics, did not conflict with the church’s teachings.

California Posts CCPA Proposed Regulations

The California Attorney General (AG) Xavier Bacerra has posted Proposed Regulations to implement the California Consumer Privacy Act of 2018 (CCPA). Bacerra also has posted a Notice of Proposed Rulemaking Action (NOPA) and an Initial Statement of Reasons (ISOR).

Critics already are playing up that they can’t do business if they have to follow regulations set to protect privacy of consumers. These lobbying types are, of course, peddling risk management nonsense in the face of far too many breaches and a long slide downward of consumer confidence in data platforms.

The current round of criticism reminds me of those opposed to food safety regulations even after Upton Sinclair’s 1906 book The Jungle pointed out how rats and workers’ body parts were being ground up and shipped as sausage.

Cloud providers are like sausage factories, especially the largest ones, and for far too long have been allowed to operate without basic duties of care, deliberately avoiding innovation investment because avoiding accountability for harms. And yes, Facebook is the wurst.

Those of us actively innovating in information technology see regulations such as CCPA as welcome guard rails, which spur long overdue innovations in data platform controls and help the data platform market grow more safely.

The proposed regulations set out some clear “shall not” of consumer personal information:

(3) A business shall not use a consumer’s personal information for any purpose other than those disclosed in the notice at collection. If the business intends to use a consumer’s personal information for a purpose that was not previously disclosed to the consumer in the notice at collection, the business shall directly notify the consumer of this new use and obtain explicit consent from the consumer to use it for this new purpose.
(4) A business shall not collect categories of personal information other than those disclosed in the notice at collection. If the business intends to collect additional categories of personal information, the business shall provide a new notice at collection.
(5) If a business does not give the notice at collection to the consumer at or before the collection of their personal information, the business shall not collect personal information from the consumer.

They also set out clear timelines for requests to delete data:

(a) Upon receiving a request to know or a request to delete, a business shall confirm receipt of the request within 10 days and provide information about how the business will process the request. The information provided shall describe the business’s verification process and when the consumer should expect a response, except in instances where the business has already granted or denied the request.
(b) Businesses shall respond to requests to know and requests to delete within 45 days. The 45-day period will begin on the day that the business receives the request, regardless of time required to verify the request.