Fwd: Friday's Debate: Attribution vs. Narrative in Information Operations

Karl Semich 0xloem at gmail.com
Fri Dec 1 19:27:02 PST 2023


I don’t know why I’m receiving this or if it’s legit but the concepts could
be meaningful.

---------- Forwarded message ---------
From: Threat Intelligence Academy <hub at threatintel.academy>
Date: Mon, Nov 27, 2023 at 08:01
Subject: Friday's Debate: Attribution vs. Narrative in Information
Operations
To: <0xloem at gmail.com>


Charity Wright will debate the importance of attribution and narrative in
information operations analysis and defense.
FRIDAY! Charity Wright Attribution or Narrative? Which is more important?
[image: 2023-12-01 Guest Lecture Charity Wright]
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3m9W6bcySg7db5bpW2f-znj2_4PsyW3mGVqR76NYjlW3m4gKm7r1CSbW5sGQXq1qxmstW8sJt7f1-gd09W4w9f0X89FXsmW9130zL4L68_8V4Y5H05bZZcVW3JncKf4dr6BvV6Nzfp378grjW91xX8M8plFhXW4zx9WZ2Y5TxJW8hLvrf1WNJbtW8rvMY062MK-WW82Kvfc2mTxNvW2pxrvr9bqD7HW9h7wk54Gp3YLW4nPf-n7wjgfZMHyfl44g5gcW1xYPVF5n7mWWVrqV0d7MXnsYW5Phxql7y5VZFW7Jbg5h8T8lJGf1kMwLb04>

On Friday, December 1st, Threat Intelligence Academy will host Charity
Wright, Principal Threat Intelligence Consultant at Recorded Future, in the
Advanced Cyber Threat Seminar with a lecture and debate on attribution vs.
narrative in combatting information operations.


About The Debate

We will discuss the challenges of attribution in influence operations
analysis, especially those campaigns on social media platforms. What
changes will we see in Influence Operations over the next 5 to 10 years?
What technologies might become obsolete? What new technological threats
will we face in the future that could impact influence operations and
audiences specifically? Should we continue analyzing IO the way we do
today? What can we do to prepare for and defend against future IO?


About Charity

Charity Wright is a Principal Threat Intelligence Consultant at Recorded
Future. Charity has over 17 years of experience in the US intelligence
community, including a career in the US Army and the National Security
Agency (NSA), where she served as a Chinese Linguist (35P) and Intelligence
Analyst (35N). She has analyzed cyber threats in the private sector since
2015, focusing on Chinese state-sponsored threats, cybercrime, malign
influence operations, and strategic intelligence. Charity has consulted on
espionage and intelligence topics on C-SPAN, Bloomberg, NBC, CBS, and many
more media outlets worldwide.



Find Charity on LinkedIn
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3pSW5qZNYm33xZX8W8LQJ3X8MQ4YfVsMS583_n9-4N1q_DhjG6s9FMgLZpmdv023W1F3Y_n7rJJ8lN6W1nVVMbnQDW85yJgl2dBv_gW3C6TXS20k3kGW4n8vs41fC1mGW4M5TWv1nHHyzW4hnghJ59q-njW3jX5Ng9hlyCFW2-_x4182wQfwW2-K8S-1Hl3XWW2xLZ-L7kk9-2VjhW8F8ZfSdsW4dpPQ41Ndyq0W5sl7H35_skf3W8zxxr56XRw9XW3C_Nyw7VbZSVW6nDWZ64xLBPjW14CbKt2nPcYGW3k55Lr8tNkh4f6TMNx-04>

Find Charity on Twitter @CharityW4CTI
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3nqW6lVQjD3JN2XKW6B8tdZ3-4S_GW4Xmtsg1HrWmZN6vKcNXS4-htW8D3QDM8fl-9CN2-HmkCWlhFlW1__VvH1s26B3W52d5ff7BzKqYN1qdc1SPf5HgW23m2LW4NXYh1W88rS2k4HM2cdW41nkWg8w-PksW6pxQTb2FJNnHW5MJl1T2DB7j4W3ZRlbD6ZKBpJW5qN-yK1Crj1lW8dKMm08v6753W4XbmFg5fpKTvW1NDMNs6pWY6yW7Z7LTl1rn3PmW2nDJ8x2bBnyMW3f3pyT1LDs2-W4B_7Lq89tqb_W67rskj1N_zhpd_Gtq004>


Resources

To prepare for the lecture, we recommend familiarizing yourself with the
following selected resources from the Cyber Learning Library:
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFY3qn9gW7Y8-PT6lZ3pfN1fXZHsdWWJQW934Rgq1jcfc8W154lqW5SPyVhW6NmvrT3Js9FMVtkD-45fYVNbN2XPhQZsz7xNVDtst65HqVDDW6fzbBq2dWMryW5QxQlX1tWXghW5SGxCx7rmYD8W3v-RjQ4Jym2gVtL4Rv6rz_BYVBDYKt8hFwfmW2PldYp8Fj99CW9cZpQv6tpz5bW5dMxWC6v8VJ2W9j8bp38jB9RmW1SLyzm4H4zZ7W4yt_zW3p7b5PW3WmK2f8QNQxMN1wGgWjVnpSjN3DKGQbr5QpXW3w03ts68TkFbW39stn14JKnJ7N3WYdWQwSHg1W1SJhLy5dS6DQf7Gw1_q04>


Frameworks for analyzing influence operations:
SCOTCH Framework
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDM5nXHsW5BWr2F6lZ3nGW6FJXwP5JptG3W6h_11N2gLqcjW7FpBN61nynx5W8JYVSP3W38fMW2QQ-Rv9frRkHW5Gm_0Q4xShmMW99-dFd5r19WHN401L5NHHJM6W6QmLcm4rbgSlW44_GCD1sxN_CW5lY6C-84jmxRW79x3K24vY4cnW5rbq235l8SqCW4B_4Rz74zhy3N5JmlXpM-d6tW4fnWcz1hSGMWW9cp_MW31TbLZW5nrmYN3LfQqyW6MpgPL8Tbx_JW2bNk_t8CnLG2W1K2lsF3pGh_9W2GkhLl5NtMkYW8qjkXc7rNrsHW3Z--LN89v9GyN44g1q1KGfwbW8-5bhg7DCY-GW5dWvL27JH5F1W6qwfsv5SQrH0VxdlN_13yB_JW8chr3g7hWCdfN8BCW5wydF8jW1f_mbB3vXJt8W65NZwx3Lgkz6W7_-W0r3q8hP0f1jJwH404>
DISARM Framework
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3l7N4381J6nyMPZW3-SV651HXq63W4_5rFC4lDkb5W7018q66B56TpW39BtPn3Qr1P9V8PgHm4RBd-zVbgnDq8_tr6MW65m0281v_tszW3-hS-X6l6jbKN8t06gBMf_vqW7dwn_G30YgvyLj2C4HYsVBW95ZrlT8DWRmKW97WBmx7D5sQLW1DcVzq702VMZW3kLPtq3vCG0FW1xZrbM3NZWyDW8R8x6s4pxjVbW3YxLt87p5KnKW2NwjF13ChzMGN2twBGXLFX5jW7qxyWJ1RTGtdN7Qv1kTc4d9_W42wxM09bMpfrf5-ndWW04>
The Kill Chain for Influence Operations
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDs5nXHsW50kH_H6lZ3kTW6bn89L59bmVDW8WK9Sk2JqK1mW92y2w34m81cFVYt9GV8wJ2lPW9d3PHH4ZwWGxW7b9TTp583g27W18r8Jd2YdQBkW2KlZCK3tQnFhW2v7WkS93JjVPW153dfS3GFP3tN6wFbdcP0B4SW4RDgVz5ng54kW5yV64g3Y_2nBW6FcLJ81rrXJrW6bNFzW94Mg4zW2gQg8C4BB4NcW6dLr6p8s_0MYW999Psr6wcm2sW7_GywT2h1_6VW2-DSdd3yMlx3W4lwWVY2czp56W88fzld3Rfq5qW4bHf2K6PtPf1W7Ny9PL4YD5XGN3bQ11C8rqgnW3MPJsj2nG3-WW8yZw9Q3-hGplVB7qYJ8v5-H3W8wF-Lz6-Wy5WW70zhb73jqnwPW1xvTPX7FlGD2W1Wy3sq3VJ6JSf4t79Z204>
The Diamond Model for Influence Operations Analysis
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDs5nXHsW50kH_H6lZ3n0W5J_JCy30cj_NW1lcnpL3jt0WTW7CfC2X1fyP9YW5yJJtQ5TmNBbVwbZ3n6bT4p2W32B-Pk2mDgwTW51QCBd6WcZkbN1kvnFYNP2WWW2hpQjZ1ZjBBBN4X62JPhchGnW5lfC6v8B-fr7W4bdtMr2dBNTgW16nz252-spnHW8qnkmc117J2_W2t4Gg38-GtBfW6TRFH53k7BZsW5SBth74WKnlyW9fvMb58FpnXDN3kz230ZhrdNW7ml3mc4_BBHbW5gL7LT2Fs8TDW98tMs06K3GD8W3lZh9P8bFWJyW5crCNQ4rwsgJW8nDr7J8l0G_hN8NsjpNb0H8wW6Gz5YV6wHxpHVQJvVG75rKbVW1pr88-6BQ038W6GM5qh4KCFYfW93tYv0804pwnW8lyqGn8yY6P4f8z7ZjR04>
Attribution in IO:
Bellingcat Video
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3lgW7l-vHZ57Y4srW176x9d2Px-WzW4H_r1F8nLk7pW7X9l3X1cxv5BW3y9jCw4BNQMwW68Bqw16vPk_8W7m7M-15KdTy7W3qr0Dz84DLCKW3SPc1r5BSh56N1rcdH2J3dRbW2n_nm264kL-7V7qFPb6tJ07bW74GtMl9hWCbhW2T-BNM7B3PYGW21Vfqz3MJkBTVdWXg85Bw1JPW7lmWsq3N_BY8W88KDs94PtL_0W6yps-C1Lzjk_W8DcX122DLPFDN20P2hDjPL0WW2ZW1nd6mRy47N1NLHHcWP4pnW2RlLm98tfsHbf6jZWQK04>
Microsoft White Paper
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDs5nXHsW50kH_H6lZ3k_W6SQQBt4Yq9tcW1gDFZR4C3xPCW8Z9wzP923bXnW6MFjHT7T8908N8n2nZLXy7jXW2HT_vZ2g8c79W38vZ1S2DJQrGW24YBs_2cmv4bW4ZR6jv49CPYHW7GQP6-3P0V42W4Zz-SG5B6cMSW4wN6hv8yTcPMW54w-DV18G8k2VHs4vM6vDgVLW7MRG7144Jms7W9911Q1109YlfW8Kt9Jd16zKX0N73d45l_xRPfW3cWtv_1MMK13W1GX_TK6czmWVVPdWHN16H6K7W193LNl2mB1qFW3XKNvf3QP9TXV30r6_7bwCV8W4nQh545Z244YW6rtWpj2Zf6HhW1cFpqg4LfcB0W5548Z66xVcVzW98r1wG2jtNHzW7-wksX2kbG2yW93WMmg2pRThYW4lZHDj8TbGhpf71HPd004>
Examples of IO campaigns that may be useful in this lecture:
Graphika: Spamouflage Dragon
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3nZVH5XjJ8R6Yk0W42vPl62_gSVmW3xw1z_1CHBBDW2GF63v6FmvKgW34htXK6Sn-FdW6d2qhf6X6QtLW3V-7mt7Fy2Z9W36fY7G5cbCf1W6XmTFY6g1sRXW3cm6fJ3qQGYsW4wJcMv6vjHDCW5TPkJT9c8Y_6W1pjDgH4cm734W8Pv4fQ6Cx_G_W17Hkr-3hngfDW6jqB-74mKCXqVwbZhx598tjBW8NG7mq4xWZwvW3gCXpD6jM_P-W7BlPs47ftCKWN5V5xZzFPgSdW98n7QG5G1cbjW1Rn_q42cbdHlW7CJKY-12C4qLf1PJmVY04>
Google: Dragonbridge
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDs5nXHsW50kH_H6lZ3lHN3VvTg9FM8NJW4F-rTb507q51VKZJQ95cl_7KW1V98Jl8MtTqyW1PXV5y1Z7S04W727xfv5fRrnhW3rxZml5f2ry9W22M6sQ7VvP5sW3Bf4FF6gBY-dW15frnl25KqdQN3ThzJHpf9rvW4-4fgN3-JlW8W3FxpBG5K7YLXW4dvGkj6RjgPtW3HH5rK2WksSJW31llMX9gHbbPVNyQ-W7jxfVlW5vz_XJ4RlT5gW8vg7cg3RfZrhW3VjH-m1G4RBSVxDzdM81qFZ7W3956T99b4bTqW2TsM824DnrW4W47HvZ23X8gKxVMQx274JlqBxW311bm32qkNZ7W210Sf11zWSgNW1GJXnD8Ykj-nW8Pnfww6ysC3fW8shB3F3h9sdRW77hrTT6Yh4gNW20J1h77mz7PRf8JnF7g04>
Recorded Future: Empire Dragon
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDM5nXHsW5BWr2F6lZ3mxN3G2GbHWVQnTW4bVPRF71SvGYW9d1VFg8JCknqVJnJC197XzzRW4c5pTy2WvBnmW9dZfVh87V453W34FwBN6h3BmCTgJKl1PVgrwW8smJp651xtzyW2x0Vvm9lmmmyVGPf705CLYc7N41p9ZLr698WW2H_lmK8hYyjmW1T2_CT43whmcW4xMjHY9ggV1sW1tQ47K9ckWh0W59r1S41rMt9kVZysg81nx2NbW26GZ3P7bGL7nW3KBK9r7hdMjjW7c-4ZS4Pn6p-W3p4p6S4wjshsW98PGFz6TlHC0W2sDMn_169W5KW8RYVfq1T3hBBW94Y-mZ1g1GsNW8bNRFJ6hP_22W3TJn__7qpxL6W94Dhdr6d91fyW5hgmrX6DbZS5W1-DHcS8Tt5Y9W7Z-FMK2M7CghVzYh8_2jwpmbW96C3g31mqSRtf7KCW_l04>
Recorded Future: Maui Wildfire Influence Operations
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDs5nXHsW50kH_H6lZ3p9W8rdQQV1RXvV4N91-PNZDYxMqW6Bc3RZ2QBZWWN44PkwPGss9pW4PhGVM74G_t5W6GxrjC8lxRJDW599c_S8GrT96W8_2qrj2W7DqsVHF8zt59mGvsW3QLqW337C7rzW1zm3ms72YsjbW6TtKS-3MBDRsW9dMWH_64kvqJW7qTzQ85PWcN1W22RFrC2wp5pbW1j3vZy38XPFBW1WNlqJ2f1zFlW7bZGZ84F8wHBW6qYWzD5bdwbVW2rSKR97KSs8PW4Nxh-t4yx7G1W5ShqM-6KZP7pN4jfC-HnY1N1W8qRMqS63Gcx2VjPrZZ4p0HDWW5Ql0tF8NRHLjW4d2h6C8D5HBNVhfsY08CkTz1VHWCcn1MnDFSW3XlVwh9dQmplW1qX0ly3Q06tNW6FB-mt3lQ6bWf5BYP0s04>
Recorded Future: JokerDPR and the Information War
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqGd3qn9gW8wLKSR6lZ3pVN15RvWD9hHjSW29Nnbg2dxsBzW5Sq7RQ9dw0SrW6P06F546R_9zN2ls--sXbTv-W7Hvtxs8Hm7F5W6c5dDz4vPk9ZW2mnW936zKbRPW55JHQh2Dxh_MW2g6xgH8nkWz2W4YPPPG53xXRcW8m89rd80vQ-ZW7515dt2gH14mW6RtSPV7lDr3jW6_nP1t3RvZrcN7Mj2JVVtGFkW79j1DH64_qx8W28bTlc7BGZ51W1HCJbF3Sk7XtW7t7sCm4kz_HCW5LFK4J4-m20-W7TwtGb2fPg__W86dn3y6wvfLHW91QkZV6QJpVYW2jcMq25-XDkkW6xv7zw14vnjLW1G839K2fLX4yW7LvD-Y3_lL0Jf4bCfCd04>
The Future of IO:
Stanford Internet Observatory: Generative Language Models and Automated
Influence Operations: Emerging Threats and Potential Mitigations
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3kLW6hYKsM6fRwSyN31HkP31_vy4W3R8qxk1jKwX6W18D52S1Tz4WbW5PTp_x8-GB-1W42d7rY75VZZRW8yGgG24VcD1bW5y9qv87RSCLCW93nFdQ7M4pcSN7m7v1P5dGStW8RVS6W3cLtnlW8pkJf14MjnyLN38TXc2qtjKqW3YxL8K4rDRh7W7W4wmK633pp-W6hzNN22GFqFYW8vR5Vs7F_ZpVN1g6w521JqzWW2201jZ7lQJj0W93B48477tNh5W2Rr_rY7NF5f5W1WkyBp7cTlRYW92bmHR39bjchW3trK1M4b31n7f1mdvyb04>
Missed a Debate and Want to Watch? All of our lectures and debates are
recorded

Students of TIA-811 can watch all previous debates and continue the
discussion in our community.  Not yet a student?  Join here
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3kJM2frDb_-006VpwwmS19nLM8W19BHp72mwWRPW8xvNHn4Q88TpW87z3F77SzJyHW2r0b1f9fvdpvW1YTBS_8mC_3GW2j1py_3hJf3RW23kjBG3sJ-McW5J7NB-3h-tt8W7ZXchz4fFPClW7Cg76n3ynF3mW1fG3sN2-7zqcVGjH5W7MXk0qW8wh6gp5L-_c-W491-cc91lrlTV2g32c97nCl4W1z81pR2Spcq0W2ppjNg7PKzHnW4r_6gr4k_bXhW6TZMC66hfy-wW6DS6b61FxStQW1-1d-28fPNd-N5WmBmthPsn0f5k-RDb04>
.

Students can view debates here:

   - Robert M. Lee on Attribution
   <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDM5nXHsW5BWr2F6lZ3ntW4TG9Yy2sQD2rW7kgtn15ZLfCcW4XqwTB7J193BW1JRM-h422LVwW8fGCs-7zNP_PW6d5YZ65VRSK3W7G_k1V4Cf633W3ZMrmY7rXfgBW5cdn_c3k7Z2HW1yXn-2159ZCbW7RbLl-3JvsbLW74pw3n39T-RxW5x1mJD6dn-V1N5Zlk23RShmCW4tZ2-L19QnG7W3wF7wq5nqsJyW5PSN6t5sr10mW41rPCN5xcmDLW2Wb7B-8w7STvN8jkKzCQZkQNW7BxcP245Z7RJW1Y-Ktq5CdD_1W2t2P7t7PYjK0W82Xjk17YcdGgW2qZt1K2gpHVbW1bBmnF9dkz_PW2-y3Yj5D-KS6VLT7H18HK5w3W61c-sV1hljs3N8DZKX57x5RjW1pWwzl35mR-DW9jFVVM38fVb_W3px36b1-LSYLV8sKVS67JV_yf4ctJVv04>
   - Dr. Thomas Rid on Deception
   <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDM5nXHsW5BWr2F6lZ3p5W92B3n43D4KGsW2zsBjS3NMR_WW2Xc-WJ5--q-XW67NcK48pc4xHMBPmKrBgryRN4JpxfcCqJmhW7kqYfp2hkw_sW3sSqpN94vbt5W8vXjd74XvZFxW1tnQYM8vGl9QW2drgcr6Z8DhmW7pxX5B8qW5Z3N2f9tcNCJwRmN1ZL1-Wt0THhW3w7xYV7G1CkQW5cpkp166hmkMW4DJySQ4dKh9YW1pw9tC1lhDz4W1mgHcG52sq8MW8HNmM33lY_vLW5l5m6x6WWyvNW30t17X1NKvdDW2Ml40S9cWHtPW93c9YM1jV_VjW2x6XHP5_KTZwW1Jj5Jb2CFw5LW1mZq3p6x4G5BW4YgKrb7fn6qTV_WffS46cdmzW6ks3Pt1KMV3QVJgMWg98J88mN9hdslmBQjrJW7x2lz95g0DjlW5-_R7g7nSdJrf5WGBT804>
   - Rick Holland on Strategic Intelligence
   <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDM5nXHsW5BWr2F6lZ3nBW4Fc8Bk3PD7FYW7qXt0X7GP6W8W2p34341HHdwlN2td-TTLm5MSW8MHbqK95pcYVW5bQFcW8cqsYCW1hRCVT779DchVt3bd76Z78ghW8YtMFC80-CdgW8xH2G71-lDrCW8-qfbb2Dc8z4W592t7c63tWG5W8FwkWv4k0-VzW1xm2dl5X3dPvW5v924L9gSDXYN8DRlYQvmMcvVJFT7l7jg40DW105t8y2BCzdPW8BqK865GcqGwW160xKC748b_gW19Fp473JVjC5W5N4NDL7WG2FsW3XpC1t4_Dc3RW5YxMQW41SSS6VL76CT5c6SDXW5vJx2197VHXkW5qTZ3c8y8t6LW502mzq24G3cwW73z0Dy3JFSGzW44s_x84HhF-zW5wNYTQ4VycrmW4DZ7C166nb9mW5PJPpK3XXZLHN5XCS8qNV2jbf28KyCx04>
   - Matt Edmondson on OSINT and Artificial Intelligence
   <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFl5nXHsW6N1X8z6lZ3nLW8s0PtV8vl7p3W7BnfK93LFR79W4-yCd82RbLbdW814l_B3-sm_2W6zMnts92dBhqW6r8Qy51-hyRlW3yGSlg6DvcW8W5wSxs14KbFNRW8WJ59W3fXnWzW3f0Tnz5kwhZFW8T325v3CqgYmW3JT2C_5FnbXHW7yqz_J7VLs24W1zZyJ95ZC8pQW4CrnFy4k1c3jW2RF-1m1PZ6BcW9fq6LS968XX9W7GKSzf49dntyW3MLgR76Yn4BlW6ZNNHJ8wFPd_VrxZ6L5BnRN2W47XgFb7Dg1rzW594K8K2SSg2tW3lZvYV6D78j2W97lkLR4HSYlCW8dKfN32Qnn7zW1Rhf__14GVwjW7CF_r74hv1xQVCKGpZ3zJwrHW4MR23X3PC1bnW8wvz7w6NSQVXTNjhd5ZS8KQVqhwls1X7Jn9W3rMt9Y1J5XRGW8tTqV-31Rkt5W3vL05v64sZ_gW6t3rF47qMqtsW8fBTYt7lvbDQf8WpZVY04>
   - Kurt Waller on Cybersecurity Game Theory
   <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqF25nXHsW69t95C6lZ3mFW4NfdDr4Zl_LwW1G7GRj3Vf_wlVQS2mB3XRnmCVddlv83QBDH2W25Nfmm8lw0B3W4HVBwf5RBFvvN4p-XJQL1H8VMjwyh2F2XYfW8kVtRl153hPjW3J7t3N29T_SpW9bH4ny540M4DN2DxyQynGM8_W50x6Bx6b10YkW5HXszD1-NDqSW3sZq0t2scTKDN2p_FMB1HjRkW4BrN5V5T9LdtW2y8jM97_g0DZW8j3_7Q6qhhPDW4G27382QxLDFW62v_7d5BR2PfW52nQc24rL4y1W1fr76s9l47sZW129Bqk7dzrLwW7ShJJQ3FBdWrMFjn4MBXbM2W362hr38KPTBsW8Qfs734DL4fgW2Wv57S8k00zPN20R4stxnKXDVTzVTg3D1HfqW29-KJT5N81-yW4g4gM98Hm4xJN3BccPcF0bY2N8mdr2k50-GRW1nMjjk5Yn6dhf7XzX1K04>
   - Josiah Dykstra on Cybersecurity Metrics
   <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqF25nXHsW69t95C6lZ3p5W60GN018wNNNHW2bD1Zy3P3qzDW8W9zl62SrnBqW2zkKTJ7-44rHW1yRQzB4sC5J3W2-H9Xj4hgnDKW6WvjBT2SvYjFVcV_DY3qGMHWW9b0clW14GS2ZW5y06p96gJffdW8fHgHD2TJnFsW1NDt_C35dYlfW6qSd_C5cgWgJW6-qk3P1vZv5vVrXwNJ3pPXpQW8hYMjH6Lt4nwW7gcKRD6GckrhW617K1w1ltk9lW7Wc6pG2Y7sKBVjMlBG19pLMTW1JkRt-73sq5PW1Kxbwh26qW1RVJCbb49d7Yj6N10sWRMC63HKW7gGrnV3M344pW5QFN7l7X50ytW5_g0rH3gKHqyN4bq6kxwlBYmW1wrVB-2g_48jW3T0ny944XrYPV7C-101p-LmcW7CVWmF3vPQtbW5gS6yM4-T1WpW3-JWZX50lqMWW4mPlLW2S0bCZW3K4z_956CPMWdN1mPj04>

Every week, we invite a recognized expert in their craft to discuss and
debate an essential and timely topic in cybersecurity.


Our Exciting Next Speaker
[image: 2023-12-05 Guest Lecture Scott Small]
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3mrVMqCWN91sTKzW5K8T402NcKsPW8TL_SS6v05dMW5T-Rz35RpQzvW1_HSmg3tfC27W5mVkLj4KhGPQW1fCfx84TYCB-W2ZjyFg5gpdV6W53-6D65XMNkxW2z4RBl6vK-QJW4wcsMf2F6DhpW8H3Mlq7L4zkyW9bFxG246LnC0W8S2Sr25GSF_LW7_GTCn8BJ08FW56cckx7PzvYKW69194Q5FyJqfW2y46RM1Bx5HtW64v1_S8sLtT2N7y7-JjHllPjW4R5_dG5tMMFfW3wR24d4PmtXCW1SyYLK2dHg5JW1mYrHr7QDzb8f8wJQ9K04>
*Join The Debate*
<https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3nMW3zv2nR34-Nn8W8s-NCb2WKKCpW8tgTBk7879yYW71GXtX8vCvZVW19tTQj8ky_C4W55FVgW99P5ffW1JfDDF8cySptW2M1VQQ76qwgqV57yrf7KCYDyW82c_CB5skBd4N6Z4kmxDdbzRW1sD_YP8JHPT3W4PfhZC3dB9cHW2npX6q5KprTjW54mhd75R6zQyW2qyg474d6_vDW6Fr2Nd4ZtH-tVKbJfn8hLNW5W3g2Htp4DGdHcW8KFqzT2ltrVMW21LP2d47b93XW5whsJK57yMzCVPhSYh24HJ6lW56HPWS538z9Jf3qc73v04>

Threat Intelligence Academy, 10809 Arrowtree Blvd, Clermont, FL 34715, USA

Unsubscribe
<https://hs-23565686.s.hubspotemail.net/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=VnbTNM6dFGysVBYXq443PTq4W3P3Q7w3ZsjYmW3_fTFj5x9VbVVmWFfN5rsFfmN6KjqDf25sdmW59Q7NJ65lR7rVX51m94XVDm-MXk_7Qbw1LzW2gTx4N16z-Z-W1q3yqM2RvG573nvD2&v=3&utm_campaign=TIA811%20First%20Year&utm_source=hs_email&utm_medium=email&utm_content=282323931&_hsenc=p2ANqtz-_7atbE7QyocjzvjfI9TAgQQMbPoSTNIXWfqQ9qQht0b7IrRU8qrWxw5OhYIAP5S_zAx1ssnPV7eokFPQgki2OgmbMhiQ&_hsmi=284022805>
Manage
preferences
<https://hs-23565686.s.hubspotemail.net/hs/manage-preferences/unsubscribe?languagePreference=en&d=VnbTNM6dFGysVBYXq443PTq4W3P3Q7w3ZsjYmW3_fTFj5x9VbVVmWFfN5rsFfmN6KjqDf25sdmW59Q7NJ65lR7rVX51m94XVDm-MXk_7Qbw1LzW2gTx4N16z-Z-W1q3yqM2RvG573nvD2&v=3&utm_campaign=TIA811%20First%20Year&utm_source=hs_email&utm_medium=email&utm_content=282323931&_hsenc=p2ANqtz-_7atbE7QyocjzvjfI9TAgQQMbPoSTNIXWfqQ9qQht0b7IrRU8qrWxw5OhYIAP5S_zAx1ssnPV7eokFPQgki2OgmbMhiQ&_hsmi=284022805>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 36146 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20231201/d6262a39/attachment.txt>


More information about the cypherpunks mailing list