Disinformation and Misinformation with Morgan Wright
Easy Prey7 Okt 2020

Disinformation and Misinformation with Morgan Wright

With the 2020 elections right around the corner, do you know who is trying to influence you and how they're doing it? Listen on to learn about the ins and outs of disinformation, misinformation, interference, and influence.

Morgan Wright is an internationally recognized expert on cybersecurity strategy, cyberterrorism, and advanced technology. His landmark testimony before Congress on healthcare.gov changed how the government collected personally identifiable information. He has made hundreds of appearances on national news - radio, print, and web - and has spoken to audiences around the world.

Show Notes:
  • [1:21] - Morgan Wright shares his background, including his childhood in a military family and his original college major as music. He moved into law enforcement and then shifted in computer crime.
  • [3:26] - Morgan moved into cybercrime because of his interest in both people and technology.
  • [4:40] - On 9/11, Morgan was supposed to be in the Pentagon but was in the Reagan building instead. Because of the attacks on 9/11, he was thrown into cyberterrorism as well.
  • [6:11] - Morgan also worked for Cisco and was the technical advisor for the show America's Most Wanted.
  • [7:35] - Another facet of Morgan's career is even working on cold case homicide files.
  • [8:36] - The next generation of leadership needs to be educated in technology. Every company is a software company whether you like it or not.
  • [10:36] - Disinformation is information that is intentionally changed to achieve a particular objective. The person spreading the information knows it isn't true, but wants to incite public outrage against someone.
  • [11:06] - Misinformation is when someone hears something and believes it to be correct and shares it, to then later find out that it wasn't accurate information.
  • [11:40] - Twitter was monitored to see how quickly disinformation and misinformation spread and it spread faster than legitimate truthful news.
  • [12:23] - Russia has been targeting people's biases by spreading disinformation since 1917 and they understand how to take advantage of how a system works.
  • [14:56] - The real danger is when people or organizations understand how news spreads and take advantage of these algorithms to influence major decisions, events, and even human lives.
  • [16:42] - Chris and Morgan discuss Pizzagate as an example of spreading disinformation and misinformation and how the use of social media spreads it extremely fast.
  • [17:35] - Interference is a sovereignty issue. Morgan gives an example of how interference is even considered an act of war in some places.
  • [17:59] - The United States has spent a great deal of money in the influence field.
  • [18:58] - Influence is a massive social engineering operation.
  • [21:03] - Disinformation runs so deep that sometimes even trained professionals miss it.
  • [21:52] - You do not have to react to every single post you see. Take a moment to digest what you are seeing before you react to it as truth.
  • [22:44] - Parents have to be vigilant about what their kids see and read on the internet. You need to curate what your kids view and what you yourself view as well.
  • [24:08] - It is important for adults to be adults. Even with opposing views, you need to be able to be an adult and have a respectful conversation with others.
  • [25:13] - It seems that we have lost the ability to get things done with others who have opposing views.
  • [27:31] - It is a capital mistake to theorize before one has all the data. What happens is you twist facts to fit theories instead of twisting theories to fit the facts.
  • [28:13] - Nobody wants to do their own research. They just want information spoon fed to them.
  • [29:31] - The danger of conspiracy theories is that you are fed just enough kernels of truth to make it believable.
  • [32:00] - Chris and Morgan discuss a few 9/11 conspiracy theories and why it is easier to believe them than to believe the truth.
  • [33:47] - If you listen to the news, don't believe a thing you hear. Do your own independent research before you share something on social media.
  • [35:00] - The oxygen this disinformation and influence operation needs to spread is you. It's you clicking that link and sharing it.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Avsnitt(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Apr 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mars 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mars 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mars 45min

Populärt inom Politik & nyheter

aftonbladet-krim
rss-krimstad
p3-krim
svenska-fall
spar
aftonbladet-daily
flashback-forever
politiken
rss-sanning-konsekvens
rss-expressen-dok
motiv
rss-vad-fan-hande
rss-krimreportrarna
blenda-2
ett-rent-noje
grans
kungligt
rss-aftonbladet-krim
svd-ledarredaktionen
rss-frandfors-horna