SlideShare una empresa de Scribd logo
1 de 11
HackingCT - Week 8
Anusha Balakrishnan, Gloria Chua, Hyeryung Chloe Chung, Jianyang Lum,
Vinaya Polamreddi
Online communication networks play a huge role in
spreading violent extremist propaganda, and these networks
are exploited by terrorist groups to recruit fighters. Our goal
is to bring together technology, government, and at-risk
communities to combat extremist messaging in a bottom-
up, community-driven fashion.
# Interviews: 12
# Total: 90
Sponsor: CT/CVE Bureau
Mentors: Andrew Moore,
Tom Bedecarre
Customer Discovery
Principles/Hypotheses Who we talked to New things we learnt
Former extremists are a credible
source for at-risk individuals to listen
to.
Radicalization Awareness
Network (EU), Oxford
DPhil student
‘Formers’ perceived as ‘traitors’ by at-risk
individuals
Bystanders (e.g. friends and family)
have a strong desire to intervene
but currently don’t have enough
support to do so.
Booz Allen Hamilton
(security consulting,
similar CVE projects),
Jeremy, CVE Task Force
Shift space into friends/family - possibly easier to
reach out to captive audience
Hotlines might not be effective for
CVE.
WORDE, RAN In Austria, the CVE hotline had 115 calls in the first
50 days of launch.
Our resources step into tricky
liability territories.
Booz Allen Hamilton Include Terms of Service that emphasize
anonymity and non-liability
We can learn a lot from suicide
interventions as analogous
situations.
Lean on Me, RAN, Jeremy Consider peer counsellors as effective messenger,
and to scale.
MVP - Redirect peers and family of at-risk individuals to anonymous, 2-way
communication with experts (former extremists, families of radicalized individuals,
peer counsellors) to seek help on how to help their peers / family members
Text TALK to +1 (800) 727 8255
Preventing Radicalization Textline - Minneapolis
You will not be asked to reveal personal information at any point.
how to stop a friend from joining isis
Mission Model Canvas
Key Partners
Moonshot CVE,
Jigsaw, Google Ads
ISD(Institute of
Strategic
Dialogue)/SCN(Stron
g Cities Network)
Previous extremists,
Families of
former/current
fighters, former ISIS
hostages
Key Activities
Find previous
extremists and other
actors (parents of
fighters, people held
hostage by ISIS, etc.)
Establish credibility as
a source of unbiased
information
Key Resources
Previous Extremists
CVE-specific groups
with CVE networks
Support staff to update
platform and maintain
response time and
anonymity
Mission Budget/Costs
Cost of maintaining platform
Value Proposition
Provide information about effective
and safe intervention mechanisms to
intervene into their loved one’s life
and coping strategies to deal with
the process; information given
directly from those that have been
through similar ordeal
Provide thorough information from
credible sources to individuals that
are considering radicalization to
prevent them from continuing down
that path.
Can understand the questions and
perspectives of individuals at risk
and empower previous extremists to
share their stories and information
Deployment:
Identify NGOs that have
connections to networks of actors
Partner with NGOs:to maintain and
curate safe spaces, and bridge gap
between individuals and actors
Repurpose existing platforms
Pilot a project in a specific region
Deploy in other regions
Buy-In/Support
CT/CVE Bureau
Previous Extremists and CVE
groups with strong networks:
Quilliam, Hayat-Deutschland, AVE
Individuals at risk for radicalization
Peer counselling groups
Beneficiaries
Family and friends of those
at risk of recruitment
Individuals at risk of
recruitment
CT/CVE Bureau, S/R of the
Muslim Communities in
State and other possible
sponsors invested in
extremism
Mission Achievement
High clickthrough rate to our service, high usage of service and most importantly how many
conversations result in a better than alternative outcome for friends and families of individuals at
risk of recruitment.
Critical Resources
- Technical: Online messaging system that connects individuals in an
encrypted way
- Work with Lean on Me, Crisis Text Line to figure out how they do it
- Human: Committed expert pool (e.g. peer counsellors, former extremists,
parents of extremists etc.)
- If ISIS can engage individuals one-on-one to recruit them to come to Syria, there must be
motivation from our side to dissuade them
- Human: Staff to coordinate efforts
- Filter and redirect relevant questions and monitor harmful narratives
- Intellectual: Standard intervention protocol
- E.g. in Suicide Prevention, there is Question - Persuade - Refer
- Legal: Liability and terms of service
Critical Activities
Now +1 mth +2 mths +3 mths
Legal: Terms
of Service
Messenger:
Commit 5 people
Technology:
Find and test tech platform
Protocol: Determine v1
intervention protocol
Distribution: Work with
Google on white box / ads
Pilot: In 2 geographic
locations (Minneapolis, Luton)
Experiment:
Clickthrough
rates for fake
website/
interest form?
Critical Partners
Category Who They provide We provide
Technical Jigsaw & Lean on Me
(Tech side)
Established anonymous
messaging tech + protocol
This project - a (possibly)
successful CVE effort that
aligns with their aims + gives
them CSR
Human (Committed
expert pool)
‘Formers’ + CVE experts Know-hows on deradicalization
pathways
Targeted channel to push their
CVE messaging across
SAVE / ISD First-hand experience and they
are our deployers
Ways to reach out to the
vulnerable population
Legal State Department Legal Legal advice on terms of service A S/D project that requires
support
Next steps: Validate + Secure Resources
- Experiment: Run experiment
- Tech + Protocol: Learn from current peer counselling networks
- E.g. (Suicide) Lean on Me, Stanford Bridge Peer Counselling
- E.g. (CVE) Austrian Deradicalization hotline (115 calls in first 50 days)
- Legal: Figure out Terms of Service
- Messenger: Convince former extremists, women against violent extremism etc.
to provide their help
Other U.S.
Government
Agencies and
Departments
U.S. Government
Countering Violent Extremism Efforts
Global Engagement
Center (GEC)
Bureau of Counterterrorism and CVE/
Office of CVE (CT/CVE)
Shared Activities:
• External
Partnerships
• Capacity Building
to Empower
Local Partners
to Develop
Strategic
Messaging
Specific Activities:
• Data Analytics
• Content
• Internal Government
Coordination on
Messaging
Mission Statement: Work
to address the life cycle of
radicalization.
Key Differences:
• GEC: international CT messaging. It is
a pillar of the U.S. government’s
Counter-ISIL strategy. It is an
interagency body housed in the State
Department that reports to R created
by (WH) Executive Order.
• CT/CVE is focused on international CT
and CVE and serves as the central
coordination point for CVE within the
Department of State and with other
agencies as an integral part of the
U.S. government’s CT and CVE
strategies. It works with local
partners to alleviate the
conditions conducive to the spread of
violent extremism and focuses on
mobilizing international engagement,
promoting best practices, and
empowering credible, local voices to
speak out against violence.
Specific Activities:
• Expand International Efforts
• Encourage Better Policies
Globally
• Use Foreign Assistance to
Address Drivers of Violent
Extremism
• Empower Credible Voices
Against Violent Extremism
• Strengthen Partner
Capabilities
Mission Statement:
Leads coordination of
U.S. Government-wide
communications
directed at foreign
audiences to counter
and diminish the
influence of terrorist
organizations.
U.S. Department of State

Más contenido relacionado

La actualidad más candente

2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_secSara-Jayne Terp
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
Big Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro SistiBig Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro SistiData Driven Innovation
 
Fact Checking & Information Retrieval
Fact Checking & Information RetrievalFact Checking & Information Retrieval
Fact Checking & Information RetrievalMatthew Lease
 
Examining the Big Data Frontier
Examining the Big Data FrontierExamining the Big Data Frontier
Examining the Big Data FrontierGovLoop
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicTyrone Grandison
 
GovLoop Story - Presentation to Rutgers
GovLoop Story - Presentation to RutgersGovLoop Story - Presentation to Rutgers
GovLoop Story - Presentation to RutgersGovLoop
 
Open data for aid and development
Open data for aid and developmentOpen data for aid and development
Open data for aid and developmentmysociety
 
Issue Tracking: How News 'Moves' Through the Media
Issue Tracking: How News 'Moves' Through the MediaIssue Tracking: How News 'Moves' Through the Media
Issue Tracking: How News 'Moves' Through the Mediaevolve24
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesPetter Bae Brandtzæg
 
Layman's Talk: Entities of Interest --- Discovery in Digital Traces
Layman's Talk: Entities of Interest --- Discovery in Digital TracesLayman's Talk: Entities of Interest --- Discovery in Digital Traces
Layman's Talk: Entities of Interest --- Discovery in Digital TracesDavid Graus
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Jim Adler
 
How to get open data into the hands of activists
How to get open data into the hands of activistsHow to get open data into the hands of activists
How to get open data into the hands of activistsAslam Khan
 

La actualidad más candente (18)

2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
Big Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro SistiBig Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro Sisti
 
Fact Checking & Information Retrieval
Fact Checking & Information RetrievalFact Checking & Information Retrieval
Fact Checking & Information Retrieval
 
Examining the Big Data Frontier
Examining the Big Data FrontierExamining the Big Data Frontier
Examining the Big Data Frontier
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
 
GovLoop Story - Presentation to Rutgers
GovLoop Story - Presentation to RutgersGovLoop Story - Presentation to Rutgers
GovLoop Story - Presentation to Rutgers
 
Open data for aid and development
Open data for aid and developmentOpen data for aid and development
Open data for aid and development
 
Issue Tracking: How News 'Moves' Through the Media
Issue Tracking: How News 'Moves' Through the MediaIssue Tracking: How News 'Moves' Through the Media
Issue Tracking: How News 'Moves' Through the Media
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sites
 
Layman's Talk: Entities of Interest --- Discovery in Digital Traces
Layman's Talk: Entities of Interest --- Discovery in Digital TracesLayman's Talk: Entities of Interest --- Discovery in Digital Traces
Layman's Talk: Entities of Interest --- Discovery in Digital Traces
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud
 
How to get open data into the hands of activists
How to get open data into the hands of activistsHow to get open data into the hands of activists
How to get open data into the hands of activists
 

Destacado

Team 621 Hacking for Diplomacy week 8
Team 621 Hacking for Diplomacy week 8Team 621 Hacking for Diplomacy week 8
Team 621 Hacking for Diplomacy week 8Stanford University
 
Space Evaders Hacking for Diplomacy week 8
Space Evaders Hacking for Diplomacy week 8Space Evaders Hacking for Diplomacy week 8
Space Evaders Hacking for Diplomacy week 8Stanford University
 
Team 621Week 6 Hacking for Diplomacy
Team 621Week 6 Hacking for DiplomacyTeam 621Week 6 Hacking for Diplomacy
Team 621Week 6 Hacking for DiplomacyStanford University
 
Peacekeeping Week 6 Hacking for Diplomacy
Peacekeeping Week 6 Hacking for DiplomacyPeacekeeping Week 6 Hacking for Diplomacy
Peacekeeping Week 6 Hacking for DiplomacyStanford University
 
Space Evaders Hacking for Diplomacy week 6
Space Evaders Hacking for Diplomacy week 6Space Evaders Hacking for Diplomacy week 6
Space Evaders Hacking for Diplomacy week 6Stanford University
 
Aggregate db Week 6 Hacking for Diplomacy
Aggregate db Week 6 Hacking for DiplomacyAggregate db Week 6 Hacking for Diplomacy
Aggregate db Week 6 Hacking for DiplomacyStanford University
 
Fatal journeys (Team 621) Lessons Learned H4Dip Stanford 2016
Fatal journeys (Team 621) Lessons Learned H4Dip Stanford 2016Fatal journeys (Team 621) Lessons Learned H4Dip Stanford 2016
Fatal journeys (Team 621) Lessons Learned H4Dip Stanford 2016Stanford University
 
Trace Lessons Learned H4Dip Stanford 2016
Trace Lessons Learned H4Dip Stanford 2016 Trace Lessons Learned H4Dip Stanford 2016
Trace Lessons Learned H4Dip Stanford 2016 Stanford University
 
Aggregate db Lessons Learned H4Dip Stanford 2016
Aggregate db Lessons Learned H4Dip Stanford 2016Aggregate db Lessons Learned H4Dip Stanford 2016
Aggregate db Lessons Learned H4Dip Stanford 2016Stanford University
 
Space Evaders Lessons Learned H4Dip Stanford 2016
Space Evaders Lessons Learned H4Dip Stanford 2016Space Evaders Lessons Learned H4Dip Stanford 2016
Space Evaders Lessons Learned H4Dip Stanford 2016Stanford University
 
Peacekeeping Lessons Learned H4Dip Stanford 2016
Peacekeeping Lessons Learned H4Dip Stanford 2016Peacekeeping Lessons Learned H4Dip Stanford 2016
Peacekeeping Lessons Learned H4Dip Stanford 2016Stanford University
 
Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017Stanford University
 
Surgency Hacking for Defense 2017
Surgency Hacking for Defense 2017Surgency Hacking for Defense 2017
Surgency Hacking for Defense 2017Stanford University
 
Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017Stanford University
 
21st Century Frogman Lessons Learned H4D Stanford 2017
21st Century Frogman Lessons Learned H4D Stanford 201721st Century Frogman Lessons Learned H4D Stanford 2017
21st Century Frogman Lessons Learned H4D Stanford 2017Stanford University
 
Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Stanford University
 
Fronteer Strategy - Co-creation's 5 Guiding Principles
Fronteer Strategy - Co-creation's 5 Guiding PrinciplesFronteer Strategy - Co-creation's 5 Guiding Principles
Fronteer Strategy - Co-creation's 5 Guiding PrinciplesFronteer Strategy
 
Givemodo Berkeley Final Presentation
Givemodo Berkeley Final PresentationGivemodo Berkeley Final Presentation
Givemodo Berkeley Final PresentationStanford University
 

Destacado (20)

Team 621 Hacking for Diplomacy week 8
Team 621 Hacking for Diplomacy week 8Team 621 Hacking for Diplomacy week 8
Team 621 Hacking for Diplomacy week 8
 
Space Evaders Hacking for Diplomacy week 8
Space Evaders Hacking for Diplomacy week 8Space Evaders Hacking for Diplomacy week 8
Space Evaders Hacking for Diplomacy week 8
 
Team 621Week 6 Hacking for Diplomacy
Team 621Week 6 Hacking for DiplomacyTeam 621Week 6 Hacking for Diplomacy
Team 621Week 6 Hacking for Diplomacy
 
Relentlessly Direct
Relentlessly DirectRelentlessly Direct
Relentlessly Direct
 
Peacekeeping Week 6 Hacking for Diplomacy
Peacekeeping Week 6 Hacking for DiplomacyPeacekeeping Week 6 Hacking for Diplomacy
Peacekeeping Week 6 Hacking for Diplomacy
 
Space Evaders Hacking for Diplomacy week 6
Space Evaders Hacking for Diplomacy week 6Space Evaders Hacking for Diplomacy week 6
Space Evaders Hacking for Diplomacy week 6
 
Aggregate db Week 6 Hacking for Diplomacy
Aggregate db Week 6 Hacking for DiplomacyAggregate db Week 6 Hacking for Diplomacy
Aggregate db Week 6 Hacking for Diplomacy
 
Fatal journeys (Team 621) Lessons Learned H4Dip Stanford 2016
Fatal journeys (Team 621) Lessons Learned H4Dip Stanford 2016Fatal journeys (Team 621) Lessons Learned H4Dip Stanford 2016
Fatal journeys (Team 621) Lessons Learned H4Dip Stanford 2016
 
Trace Lessons Learned H4Dip Stanford 2016
Trace Lessons Learned H4Dip Stanford 2016 Trace Lessons Learned H4Dip Stanford 2016
Trace Lessons Learned H4Dip Stanford 2016
 
Aggregate db Lessons Learned H4Dip Stanford 2016
Aggregate db Lessons Learned H4Dip Stanford 2016Aggregate db Lessons Learned H4Dip Stanford 2016
Aggregate db Lessons Learned H4Dip Stanford 2016
 
Space Evaders Lessons Learned H4Dip Stanford 2016
Space Evaders Lessons Learned H4Dip Stanford 2016Space Evaders Lessons Learned H4Dip Stanford 2016
Space Evaders Lessons Learned H4Dip Stanford 2016
 
Peacekeeping Lessons Learned H4Dip Stanford 2016
Peacekeeping Lessons Learned H4Dip Stanford 2016Peacekeeping Lessons Learned H4Dip Stanford 2016
Peacekeeping Lessons Learned H4Dip Stanford 2016
 
Xplomo Hacking for Defense 2017
Xplomo Hacking for Defense 2017Xplomo Hacking for Defense 2017
Xplomo Hacking for Defense 2017
 
Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017
 
Surgency Hacking for Defense 2017
Surgency Hacking for Defense 2017Surgency Hacking for Defense 2017
Surgency Hacking for Defense 2017
 
Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017
 
21st Century Frogman Lessons Learned H4D Stanford 2017
21st Century Frogman Lessons Learned H4D Stanford 201721st Century Frogman Lessons Learned H4D Stanford 2017
21st Century Frogman Lessons Learned H4D Stanford 2017
 
Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017
 
Fronteer Strategy - Co-creation's 5 Guiding Principles
Fronteer Strategy - Co-creation's 5 Guiding PrinciplesFronteer Strategy - Co-creation's 5 Guiding Principles
Fronteer Strategy - Co-creation's 5 Guiding Principles
 
Givemodo Berkeley Final Presentation
Givemodo Berkeley Final PresentationGivemodo Berkeley Final Presentation
Givemodo Berkeley Final Presentation
 

Similar a HackingCT Week 8 CVE Textline MVP

Tavaana Webinar: Prevention Tactics
Tavaana Webinar: Prevention TacticsTavaana Webinar: Prevention Tactics
Tavaana Webinar: Prevention TacticsTavaana
 
Disinformation challenges tools and techniques to deal or live with it
Disinformation challenges tools and techniques to deal or live with itDisinformation challenges tools and techniques to deal or live with it
Disinformation challenges tools and techniques to deal or live with itnsarris
 
Tavaana/New Tactics Webinar 1: Prevention Tactics (English)
Tavaana/New Tactics Webinar 1: Prevention Tactics (English)Tavaana/New Tactics Webinar 1: Prevention Tactics (English)
Tavaana/New Tactics Webinar 1: Prevention Tactics (English)Tavaana
 
Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportarchiejones4
 
Acg Terr Sand2004 2130w
Acg Terr Sand2004 2130wAcg Terr Sand2004 2130w
Acg Terr Sand2004 2130wNKHAYDEN
 
Threat Sharing for Human Rights
Threat Sharing for Human RightsThreat Sharing for Human Rights
Threat Sharing for Human RightsMegan DeBlois
 
Cogniware in #2019
Cogniware in #2019Cogniware in #2019
Cogniware in #2019Martin Cerny
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docx250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docxwrite12
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipSloane Joie Trugman
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...ElmeBaje
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...friendscb
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and TerrorismAmanda Tapp
 
5 Steps to Tactical innovation - Nancy Pearson
5 Steps to Tactical innovation - Nancy Pearson5 Steps to Tactical innovation - Nancy Pearson
5 Steps to Tactical innovation - Nancy PearsonMADskills
 

Similar a HackingCT Week 8 CVE Textline MVP (20)

Small Ideas for ICRC
Small Ideas for ICRCSmall Ideas for ICRC
Small Ideas for ICRC
 
Tavaana Webinar: Prevention Tactics
Tavaana Webinar: Prevention TacticsTavaana Webinar: Prevention Tactics
Tavaana Webinar: Prevention Tactics
 
2020 09-01 disclosure
2020 09-01 disclosure2020 09-01 disclosure
2020 09-01 disclosure
 
Disinformation challenges tools and techniques to deal or live with it
Disinformation challenges tools and techniques to deal or live with itDisinformation challenges tools and techniques to deal or live with it
Disinformation challenges tools and techniques to deal or live with it
 
Tavaana/New Tactics Webinar 1: Prevention Tactics (English)
Tavaana/New Tactics Webinar 1: Prevention Tactics (English)Tavaana/New Tactics Webinar 1: Prevention Tactics (English)
Tavaana/New Tactics Webinar 1: Prevention Tactics (English)
 
War-of-Keywords
War-of-KeywordsWar-of-Keywords
War-of-Keywords
 
Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_report
 
Acg Terr Sand2004 2130w
Acg Terr Sand2004 2130wAcg Terr Sand2004 2130w
Acg Terr Sand2004 2130w
 
Threat Sharing for Human Rights
Threat Sharing for Human RightsThreat Sharing for Human Rights
Threat Sharing for Human Rights
 
Cogniware 2019
Cogniware 2019Cogniware 2019
Cogniware 2019
 
Cogniware in #2019
Cogniware in #2019Cogniware in #2019
Cogniware in #2019
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docx250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docx
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society Fellowship
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and Terrorism
 
5 Steps to Tactical innovation - Nancy Pearson
5 Steps to Tactical innovation - Nancy Pearson5 Steps to Tactical innovation - Nancy Pearson
5 Steps to Tactical innovation - Nancy Pearson
 

Más de Stanford University

Team Networks - 2022 Technology, Innovation & Great Power Competition
Team Networks  - 2022 Technology, Innovation & Great Power CompetitionTeam Networks  - 2022 Technology, Innovation & Great Power Competition
Team Networks - 2022 Technology, Innovation & Great Power CompetitionStanford University
 
Team LiOn Batteries - 2022 Technology, Innovation & Great Power Competition
Team LiOn Batteries  - 2022 Technology, Innovation & Great Power CompetitionTeam LiOn Batteries  - 2022 Technology, Innovation & Great Power Competition
Team LiOn Batteries - 2022 Technology, Innovation & Great Power CompetitionStanford University
 
Team Quantum - 2022 Technology, Innovation & Great Power Competition
Team Quantum  - 2022 Technology, Innovation & Great Power CompetitionTeam Quantum  - 2022 Technology, Innovation & Great Power Competition
Team Quantum - 2022 Technology, Innovation & Great Power CompetitionStanford University
 
Team Disinformation - 2022 Technology, Innovation & Great Power Competition
Team Disinformation  - 2022 Technology, Innovation & Great Power CompetitionTeam Disinformation  - 2022 Technology, Innovation & Great Power Competition
Team Disinformation - 2022 Technology, Innovation & Great Power CompetitionStanford University
 
Team Wargames - 2022 Technology, Innovation & Great Power Competition
Team Wargames  - 2022 Technology, Innovation & Great Power CompetitionTeam Wargames  - 2022 Technology, Innovation & Great Power Competition
Team Wargames - 2022 Technology, Innovation & Great Power CompetitionStanford University
 
Team Acquistion - 2022 Technology, Innovation & Great Power Competition
Team Acquistion  - 2022 Technology, Innovation & Great Power Competition Team Acquistion  - 2022 Technology, Innovation & Great Power Competition
Team Acquistion - 2022 Technology, Innovation & Great Power Competition Stanford University
 
Team Climate Change - 2022 Technology, Innovation & Great Power Competition
Team Climate Change - 2022 Technology, Innovation & Great Power Competition Team Climate Change - 2022 Technology, Innovation & Great Power Competition
Team Climate Change - 2022 Technology, Innovation & Great Power Competition Stanford University
 
Altuna Engr245 2022 Lessons Learned
Altuna Engr245 2022 Lessons LearnedAltuna Engr245 2022 Lessons Learned
Altuna Engr245 2022 Lessons LearnedStanford University
 
Invisa Engr245 2022 Lessons Learned
Invisa Engr245 2022 Lessons LearnedInvisa Engr245 2022 Lessons Learned
Invisa Engr245 2022 Lessons LearnedStanford University
 
ānanda Engr245 2022 Lessons Learned
ānanda Engr245 2022 Lessons Learnedānanda Engr245 2022 Lessons Learned
ānanda Engr245 2022 Lessons LearnedStanford University
 
Gordian Knot Center Roundtable w/Depty SecDef
Gordian Knot Center Roundtable w/Depty SecDef Gordian Knot Center Roundtable w/Depty SecDef
Gordian Knot Center Roundtable w/Depty SecDef Stanford University
 
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Stanford University
 
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Stanford University
 
Team Catena - 2021 Technology, Innovation & Great Power Competition
Team Catena - 2021 Technology, Innovation & Great Power CompetitionTeam Catena - 2021 Technology, Innovation & Great Power Competition
Team Catena - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Team Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power CompetitionTeam Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Team Drone - 2021 Technology, Innovation & Great Power Competition
Team Drone - 2021 Technology, Innovation & Great Power CompetitionTeam Drone - 2021 Technology, Innovation & Great Power Competition
Team Drone - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Team Short Circuit - 2021 Technology, Innovation & Great Power Competition
Team Short Circuit - 2021 Technology, Innovation & Great Power CompetitionTeam Short Circuit - 2021 Technology, Innovation & Great Power Competition
Team Short Circuit - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionTeam Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...Stanford University
 
Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - CyberLecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - CyberStanford University
 

Más de Stanford University (20)

Team Networks - 2022 Technology, Innovation & Great Power Competition
Team Networks  - 2022 Technology, Innovation & Great Power CompetitionTeam Networks  - 2022 Technology, Innovation & Great Power Competition
Team Networks - 2022 Technology, Innovation & Great Power Competition
 
Team LiOn Batteries - 2022 Technology, Innovation & Great Power Competition
Team LiOn Batteries  - 2022 Technology, Innovation & Great Power CompetitionTeam LiOn Batteries  - 2022 Technology, Innovation & Great Power Competition
Team LiOn Batteries - 2022 Technology, Innovation & Great Power Competition
 
Team Quantum - 2022 Technology, Innovation & Great Power Competition
Team Quantum  - 2022 Technology, Innovation & Great Power CompetitionTeam Quantum  - 2022 Technology, Innovation & Great Power Competition
Team Quantum - 2022 Technology, Innovation & Great Power Competition
 
Team Disinformation - 2022 Technology, Innovation & Great Power Competition
Team Disinformation  - 2022 Technology, Innovation & Great Power CompetitionTeam Disinformation  - 2022 Technology, Innovation & Great Power Competition
Team Disinformation - 2022 Technology, Innovation & Great Power Competition
 
Team Wargames - 2022 Technology, Innovation & Great Power Competition
Team Wargames  - 2022 Technology, Innovation & Great Power CompetitionTeam Wargames  - 2022 Technology, Innovation & Great Power Competition
Team Wargames - 2022 Technology, Innovation & Great Power Competition
 
Team Acquistion - 2022 Technology, Innovation & Great Power Competition
Team Acquistion  - 2022 Technology, Innovation & Great Power Competition Team Acquistion  - 2022 Technology, Innovation & Great Power Competition
Team Acquistion - 2022 Technology, Innovation & Great Power Competition
 
Team Climate Change - 2022 Technology, Innovation & Great Power Competition
Team Climate Change - 2022 Technology, Innovation & Great Power Competition Team Climate Change - 2022 Technology, Innovation & Great Power Competition
Team Climate Change - 2022 Technology, Innovation & Great Power Competition
 
Altuna Engr245 2022 Lessons Learned
Altuna Engr245 2022 Lessons LearnedAltuna Engr245 2022 Lessons Learned
Altuna Engr245 2022 Lessons Learned
 
Invisa Engr245 2022 Lessons Learned
Invisa Engr245 2022 Lessons LearnedInvisa Engr245 2022 Lessons Learned
Invisa Engr245 2022 Lessons Learned
 
ānanda Engr245 2022 Lessons Learned
ānanda Engr245 2022 Lessons Learnedānanda Engr245 2022 Lessons Learned
ānanda Engr245 2022 Lessons Learned
 
Gordian Knot Center Roundtable w/Depty SecDef
Gordian Knot Center Roundtable w/Depty SecDef Gordian Knot Center Roundtable w/Depty SecDef
Gordian Knot Center Roundtable w/Depty SecDef
 
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
 
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
 
Team Catena - 2021 Technology, Innovation & Great Power Competition
Team Catena - 2021 Technology, Innovation & Great Power CompetitionTeam Catena - 2021 Technology, Innovation & Great Power Competition
Team Catena - 2021 Technology, Innovation & Great Power Competition
 
Team Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power CompetitionTeam Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power Competition
 
Team Drone - 2021 Technology, Innovation & Great Power Competition
Team Drone - 2021 Technology, Innovation & Great Power CompetitionTeam Drone - 2021 Technology, Innovation & Great Power Competition
Team Drone - 2021 Technology, Innovation & Great Power Competition
 
Team Short Circuit - 2021 Technology, Innovation & Great Power Competition
Team Short Circuit - 2021 Technology, Innovation & Great Power CompetitionTeam Short Circuit - 2021 Technology, Innovation & Great Power Competition
Team Short Circuit - 2021 Technology, Innovation & Great Power Competition
 
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionTeam Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power Competition
 
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
 
Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - CyberLecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
 

Último

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 

Último (20)

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 

HackingCT Week 8 CVE Textline MVP

  • 1. HackingCT - Week 8 Anusha Balakrishnan, Gloria Chua, Hyeryung Chloe Chung, Jianyang Lum, Vinaya Polamreddi Online communication networks play a huge role in spreading violent extremist propaganda, and these networks are exploited by terrorist groups to recruit fighters. Our goal is to bring together technology, government, and at-risk communities to combat extremist messaging in a bottom- up, community-driven fashion. # Interviews: 12 # Total: 90 Sponsor: CT/CVE Bureau Mentors: Andrew Moore, Tom Bedecarre
  • 2. Customer Discovery Principles/Hypotheses Who we talked to New things we learnt Former extremists are a credible source for at-risk individuals to listen to. Radicalization Awareness Network (EU), Oxford DPhil student ‘Formers’ perceived as ‘traitors’ by at-risk individuals Bystanders (e.g. friends and family) have a strong desire to intervene but currently don’t have enough support to do so. Booz Allen Hamilton (security consulting, similar CVE projects), Jeremy, CVE Task Force Shift space into friends/family - possibly easier to reach out to captive audience Hotlines might not be effective for CVE. WORDE, RAN In Austria, the CVE hotline had 115 calls in the first 50 days of launch. Our resources step into tricky liability territories. Booz Allen Hamilton Include Terms of Service that emphasize anonymity and non-liability We can learn a lot from suicide interventions as analogous situations. Lean on Me, RAN, Jeremy Consider peer counsellors as effective messenger, and to scale.
  • 3. MVP - Redirect peers and family of at-risk individuals to anonymous, 2-way communication with experts (former extremists, families of radicalized individuals, peer counsellors) to seek help on how to help their peers / family members
  • 4. Text TALK to +1 (800) 727 8255 Preventing Radicalization Textline - Minneapolis You will not be asked to reveal personal information at any point. how to stop a friend from joining isis
  • 5.
  • 6. Mission Model Canvas Key Partners Moonshot CVE, Jigsaw, Google Ads ISD(Institute of Strategic Dialogue)/SCN(Stron g Cities Network) Previous extremists, Families of former/current fighters, former ISIS hostages Key Activities Find previous extremists and other actors (parents of fighters, people held hostage by ISIS, etc.) Establish credibility as a source of unbiased information Key Resources Previous Extremists CVE-specific groups with CVE networks Support staff to update platform and maintain response time and anonymity Mission Budget/Costs Cost of maintaining platform Value Proposition Provide information about effective and safe intervention mechanisms to intervene into their loved one’s life and coping strategies to deal with the process; information given directly from those that have been through similar ordeal Provide thorough information from credible sources to individuals that are considering radicalization to prevent them from continuing down that path. Can understand the questions and perspectives of individuals at risk and empower previous extremists to share their stories and information Deployment: Identify NGOs that have connections to networks of actors Partner with NGOs:to maintain and curate safe spaces, and bridge gap between individuals and actors Repurpose existing platforms Pilot a project in a specific region Deploy in other regions Buy-In/Support CT/CVE Bureau Previous Extremists and CVE groups with strong networks: Quilliam, Hayat-Deutschland, AVE Individuals at risk for radicalization Peer counselling groups Beneficiaries Family and friends of those at risk of recruitment Individuals at risk of recruitment CT/CVE Bureau, S/R of the Muslim Communities in State and other possible sponsors invested in extremism Mission Achievement High clickthrough rate to our service, high usage of service and most importantly how many conversations result in a better than alternative outcome for friends and families of individuals at risk of recruitment.
  • 7. Critical Resources - Technical: Online messaging system that connects individuals in an encrypted way - Work with Lean on Me, Crisis Text Line to figure out how they do it - Human: Committed expert pool (e.g. peer counsellors, former extremists, parents of extremists etc.) - If ISIS can engage individuals one-on-one to recruit them to come to Syria, there must be motivation from our side to dissuade them - Human: Staff to coordinate efforts - Filter and redirect relevant questions and monitor harmful narratives - Intellectual: Standard intervention protocol - E.g. in Suicide Prevention, there is Question - Persuade - Refer - Legal: Liability and terms of service
  • 8. Critical Activities Now +1 mth +2 mths +3 mths Legal: Terms of Service Messenger: Commit 5 people Technology: Find and test tech platform Protocol: Determine v1 intervention protocol Distribution: Work with Google on white box / ads Pilot: In 2 geographic locations (Minneapolis, Luton) Experiment: Clickthrough rates for fake website/ interest form?
  • 9. Critical Partners Category Who They provide We provide Technical Jigsaw & Lean on Me (Tech side) Established anonymous messaging tech + protocol This project - a (possibly) successful CVE effort that aligns with their aims + gives them CSR Human (Committed expert pool) ‘Formers’ + CVE experts Know-hows on deradicalization pathways Targeted channel to push their CVE messaging across SAVE / ISD First-hand experience and they are our deployers Ways to reach out to the vulnerable population Legal State Department Legal Legal advice on terms of service A S/D project that requires support
  • 10. Next steps: Validate + Secure Resources - Experiment: Run experiment - Tech + Protocol: Learn from current peer counselling networks - E.g. (Suicide) Lean on Me, Stanford Bridge Peer Counselling - E.g. (CVE) Austrian Deradicalization hotline (115 calls in first 50 days) - Legal: Figure out Terms of Service - Messenger: Convince former extremists, women against violent extremism etc. to provide their help
  • 11. Other U.S. Government Agencies and Departments U.S. Government Countering Violent Extremism Efforts Global Engagement Center (GEC) Bureau of Counterterrorism and CVE/ Office of CVE (CT/CVE) Shared Activities: • External Partnerships • Capacity Building to Empower Local Partners to Develop Strategic Messaging Specific Activities: • Data Analytics • Content • Internal Government Coordination on Messaging Mission Statement: Work to address the life cycle of radicalization. Key Differences: • GEC: international CT messaging. It is a pillar of the U.S. government’s Counter-ISIL strategy. It is an interagency body housed in the State Department that reports to R created by (WH) Executive Order. • CT/CVE is focused on international CT and CVE and serves as the central coordination point for CVE within the Department of State and with other agencies as an integral part of the U.S. government’s CT and CVE strategies. It works with local partners to alleviate the conditions conducive to the spread of violent extremism and focuses on mobilizing international engagement, promoting best practices, and empowering credible, local voices to speak out against violence. Specific Activities: • Expand International Efforts • Encourage Better Policies Globally • Use Foreign Assistance to Address Drivers of Violent Extremism • Empower Credible Voices Against Violent Extremism • Strengthen Partner Capabilities Mission Statement: Leads coordination of U.S. Government-wide communications directed at foreign audiences to counter and diminish the influence of terrorist organizations. U.S. Department of State