Heading to the University of Pennsylvania next week to attend the Democracy in the Crosshairs: Cyber Interference, Dark Money and Foreign Influence conference. The two-day event is a closed session. The conference is organized by the Center for Ethics & Rule of Law and the UPenn Law School. I co-authored a paper with Atif Ahmad  (University of Melbourne) for the conference.

Weaponizing Information Systems for Political Disruption: The Actor, Lever,Effects, and Response Taxonomy (ALERT)

Information systems continue to be used by actors who want to undermine public institutions and disrupt political systems. In recent times, actors have engaged in acts of cyber warfare ranging from attempts to compromise voting systems, spread false propaganda, use dark networks to illicitly fund campaigns, and even attack public infrastructure via technologies. Initial analysis points to the fact that most of these attempts have been successful in achieving their intended objectives. Given this reality, we expect them to intensify and be more creative in the future. In this paper, we take a critical look at the concept of weaponizing information systems for political disruption. Our analysis focuses on two specific forms of information systems enabled disruption. The first is direct attacks on information systems infrastructures employed in various facets of political campaigns and the election processes. The second is attacks that target public infrastructure and services, which impact trust in government and public institutions of the nation and indirectly impact political stability and governance regimes. We outline an Actor, Lever, Effects, and Response Taxonomy (ALERT) to understand the nuances associated with various types of options individuals, organizations, and nations have when it comes to weaponizing information systems for political gain and to cause public unrest.

Conference schedule is available here.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.