The Trojan Horse in Your Head: Cognitive Threats and How to Counter Them

Total Page:16

File Type:pdf, Size:1020Kb

The Trojan Horse in Your Head: Cognitive Threats and How to Counter Them Old Dominion University ODU Digital Commons Graduate Program in International Studies Theses & Dissertations Graduate Program in International Studies Summer 2019 The Trojan Horse in Your Head: Cognitive Threats and How to Counter Them Lora Pitman Old Dominion University, [email protected] Follow this and additional works at: https://digitalcommons.odu.edu/gpis_etds Part of the Cognitive Psychology Commons, Defense and Security Studies Commons, and the Political Science Commons Recommended Citation Pitman, Lora. "The Trojan Horse in Your Head: Cognitive Threats and How to Counter Them" (2019). Doctor of Philosophy (PhD), Dissertation, International Studies, Old Dominion University, DOI: 10.25777/ dafa-tb52 https://digitalcommons.odu.edu/gpis_etds/111 This Dissertation is brought to you for free and open access by the Graduate Program in International Studies at ODU Digital Commons. It has been accepted for inclusion in Graduate Program in International Studies Theses & Dissertations by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. THE TROJAN HORSE IN YOUR HEAD: COGNITIVE THREATS AND HOW TO COUNTER THEM by Lora Pitman LL.M. May 2014, Sofia University, Bulgaria M.A. May 2016, Old Dominion University A Dissertation Submitted to the Faculty of Old Dominion University in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY GRADUATE PROGRAM IN INTERNATIONAL STUDIES OLD DOMINION UNIVERSITY August 2019 Approved by: Regina Karp (Director) Bryan Porter (Member) Matthew DiLorenzo (Member) ABSTRACT THE TROJAN HORSE IN YOUR HEAD: COGNITIVE THREATS AND HOW TO COUNTER THEM Lora Pitman Old Dominion University, 2019 Director: Regina Karp Vulnerabilities of the human mind caused by the way it is designed to processes information have always been exploited in warfare, since the dawn of humanity. History is marked with frequent use of deceits and manipulations over the centuries, with examples ranging from the use of the Trojan Horse to Facebook’s user-profiling. While largely used over time, these tactics, that I call cognitive threats, have not been collectively examined. I hypothesize that they pose a security issue to which prevention strategies on different levels could be successfully applied. The research questions that this study asks are what the characteristics of these cognitive threats, and what specific techniques could be employed to counter them. To respond to them and to contribute to filling the gap in the literature, I describe four case studies that illustrate some of the most common types of cognitive threats in the 21st century - the case with Maria Butina, the case with Russian disinformation, the case with ISIS recruitment, and the case with Cambridge Analytica. Then I analyze them and suggest different approaches that are fit to respond to the contemporary political and psychological features of these cognitive threats. The findings from the study, the policy recommendations, and the additional measures I propose are grouped into six categories: creating alternatives, narrative change, official government statements, legislative measures, education, and awareness. iii Copyright, 2019, by Lora Pitman, All Rights Reserved. iv This dissertation is dedicated to Dr. Steve Yetiv who we lost in 2018 but who will always live in the minds of his students, mentees, colleagues and friends. v ACKNOWLEDGMENTS There are many people who have contributed to the successful completion of this dissertation. First, I would like to thank my advisor – Dr. Regina Karp for teaching me to think critically, assess world events and facts analytically, and last but not least, for always believing in me in every step of my graduate studies at Old Dominion University. I would also like to thank Dr. Bryan Porter for introducing me to social psychology and for encouraging my interest to its application in politics. I am also very appreciative of the efforts of Dr. DiLorenzo for agreeing to share his valuable feedback for this work. vi TABLE OF CONTENTS Page Chapter 1. INTRODUCTION .................................................................................................................1 2. COGNITION AND COGNITIVE THREATS ....................................................................11 2.1 The emerging cognitive threat: a result of political moves and processes ....................12 2.2 The individual in the study of politics ...........................................................................20 2.3 What is cognition and how does it work ........................................................................27 2.4 Social cognition .............................................................................................................40 2.5 The dual meaning of perception, emotions and actions in politics ................................56 3. HISTORY OF COGNITIVE THREATS ............................................................................71 3.1 Chronicle of cognitive threats through the ages ............................................................71 3.2 Evolution of cognitive threats: from the Trojan Horse to Facebook .............................89 3.3 The fight against cognitive threats ...............................................................................101 4. THE FOUR HORSEMEN OF THE COGNITIVE APOCALYPSE .................................121 4.1 Stories about cognitive threats .....................................................................................121 4.2 The case with Maria Butina .........................................................................................122 4.3 The case with Russian Disinformation ........................................................................134 4.4 The case with ISIS recruitment ....................................................................................154 4.5 The case with Cambridge Analytica ............................................................................173 5. CONNECTING THE DOTS: STRATEGIES FOR COUNTERING COGNITIVE THREATS ..........................................186 5.1 Countering cognitive threats in Russian espionage cases ............................................187 5.2 Countering cognitive threats in Russian Disinformation cases ...................................200 5.3 Countering cognitive threats in recruitment by radical Islamic organizations ............218 5.4 Countering cognitive threats in cases of political profiling by companies ..................231 6. CONCLUSIONS, POLICY IMPLICATIONS AND THE ROAD AHEAD ....................245 BIBLIOGRAPHY ..................................................................................................................257 VITA ......................................................................................................................................290 1 CHAPTER 1 INTRODUCTION The Trojan War, one of the most emblematic events in the ancient civilization still fascinates scholars and practitioners. It begins with the abduction of the Spartan queen Helen, by Paris – a Trojan prince. As a response, Menelaus, Helen’s husband and the king of Sparta asked his brother Agamemnon, king of Mycenae to join him for a campaign aiming to return Helen to Sparta and to punish the brazen Trojans. This mission was, reportedly joined by various of the ancient Greek heroes, including Odysseus, Achilles, and Ajax. Writers and historians in the antiquity claim that the siege of Troy lasted for ten whole years. Desperate from the lack of success, the Greeks knew that traditional military means would not ensure completion of their goal. Instead, they decided to implement a well-developed plan intended to make the Trojans open their own gates since the efforts to do so with force were hopeless. It is claimed that the Greeks built a giant wooden horse in only ten days. This creature was left in front the Trojan gates, with only one person around it, as the Greek ships were seen to slowly sail away from Troy, leaving their tents surrounding Troy in flames as a sign of retreat. Sinon, a Greek soldier, who was the only person around the horse, pretended to be abandoned by his people. He explained to the Trojans that the horse was a gift to the goddess Athena and symbolized entreaty of the Greeks for a safe return home in an act of remorse for destroying one of her temples in Troy. Perceived as a truthful story, the Trojans let the colossal horse figure inside the gates thinking it was a souvenir of their victory. What they did not know was that inside of the horse, there were 30 of the best Greek soldiers, waiting for the enemy to bring them effortlessly inside the gates. Not a single casualty marked the penetration of Greeks inside Troy, not a single sword 2 or a single weapon was used to get beyond the gates. When the night came, the Greeks returned with their ships to Troy. In the meantime, the Greek soldiers left the horse and opened the gates to the Greek army who defeated the Trojans, brought back Helen to Menelaus, and ended the war. Some claim that this story is a legend more than a historical fact, although Homer, Sophocles, Herodotus and Virgil all contribute with some details about the Trojan War that testify for its potential authenticity. Legend or not, the conflict in Troy ended with the victory of the Greeks only to open the door to other types of wars – those of the mind. What appeared to be the key to the Greek success was not military superiority but a simple trick that
Recommended publications
  • 2020 Identity Theft Statistics | Consumeraffairs
    2020 Identity Theft Statistics | ConsumerAffairs Trending Home / Finance / Identity Theft Protection / Identity theft statistics Buyers Guides Last Updated 01/16/2020 News Write a review 2020Write a review Identity theft statistics Trends and statistics about identity theft Learn about identity theft protection by Rob Douglas Identity Theft Protection Contributing Editor In 2018, the Federal Trade Commission processed 1.4 million fraud reports totaling $1.48 billion in losses. According to the FTC’s “Consumer Sentinel Network Data Book,” the most common categories for fraud complaints were imposter scams, debt collection and identity theft. Credit card fraud was most prevalent in identity theft cases — more than 167,000 people reported a fraudulent credit card account was opened with their information. Identity theft trends in 2019 In the next year, the Identity Theft Resource Center (ITRC) predicts identity theft protection services will primarily focus on data breaches, data abuse and data privacy. ITRC also predicts that https://www.consumeraffairs.com/finance/identity-theft-statistics.html 2020 Identity Theft Statistics | ConsumerAffairs consumers will become more knowledgeable about how data breaches work and expect companies to provide more information about the specific types of data breached and demand more transparency in general in data breach reports. Cyber attacks are more ambitious According to a 2019 Internet Security Threat Report by Symantec, cybercriminals are diversifying their targets and using stealthier methods to commit identity theft and fraud. Cybercrime groups like Mealybug, Gallmaker and Necurs are opting for off-the-shelf tools and operating system features such as PowerShell to attack targets. Supply chain attacks are up 78% Malicious PowerShell scripts have increased by 1,000% Microsoft Office files make up 48% of malicious email attachments Internet of Things threats on the rise Cybercriminals attack IoT devices an average of 5,233 times per month.
    [Show full text]
  • Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote
    Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote Mobile Threats Are Increasing Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses, and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published earlier this year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones.1 One example is this year’s Valentine’s Day attack, in which attackers distributed a mobile picture- sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent.2 The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security. Technical security measures, such as firewalls, antivirus, and encryption, are uncommon on mobile phones, and mobile phone operating systems are not updated as frequently as those on personal computers.3 Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers.4 Meanwhile, mobile phones are becoming more and more valuable as targets for attack.
    [Show full text]
  • Minority Views
    MINORITY VIEWS The Minority Members of the House Permanent Select Committee on Intelligence on March 26, 2018 submit the following Minority Views to the Majority-produced "Repo11 on Russian Active Measures, March 22, 2018." Devin Nunes, California, CMAtRMAN K. Mich.J OI Conaw ay, Toxas Pe1 or T. King. New York F,ank A. LoBiondo, N ew Jersey Thom.is J. Roonev. Florida UNCLASSIFIED Ileana ROS·l chtinon, Florida HVC- 304, THE CAPITOL Michnel R. Turner, Ohio Brad R. Wons1 rup. Ohio U.S. HOUSE OF REPRESENTATIVES WASHINGTON, DC 20515 Ou is S1cwart. U1ah (202) 225-4121 Rick Cr.,w ford, Arka nsas P ERMANENT SELECT C OMMITTEE Trey Gowdy, South Carolina 0A~lON NELSON Ellsr. M . S1nfn11ik, Nnw York ON INTELLIGENCE SrAFf. D IREC f()ti Wi ll Hurd, Tcxa~ T11\'10l !IV s. 8 £.R(.REE N At1am 8 . Schiff, Cohforn1a , M tNORllV STAFF OtR ECToq RANKIN G M EMtlER Jorncs A. Himes, Connec1icut Terri A. Sewell, AlabJma AndrC Carso n, lncli.1 na Jacki e Speier, Callfomia Mike Quigley, Il linois E,ic Swalwell, California Joilq u1 0 Castro, T exas De nny Huck, Wash ington P::iul D . Ry an, SPCAl([ R or TH( HOUSE Noncv r c1os1. DEMOC 11t.1 1c Lr:.11.orn March 26, 2018 MINORITY VIEWS On March I, 201 7, the House Permanent Select Commiltee on Intelligence (HPSCI) approved a bipartisan "'Scope of In vestigation" to guide the Committee's inquiry into Russia 's interference in the 201 6 U.S. e lection.1 In announc ing these paramete rs for the House of Representatives' onl y authorized investigation into Russia's meddling, the Committee' s leadership pl edged to unde1take a thorough, bipartisan, and independent probe.
    [Show full text]
  • 'Countering Russian Influence in Europe and Eurasia', November 2019
    Countering Russian Influence in Europe and Eurasia November 2019 Countering Russian Influence in Europe and Eurasia IFES White Paper November 2019 Anthony Clive Bowyer International Foundation for Electoral Systems Countering Russian Influence in Europe and Eurasia Copyright © 2019 International Foundation for Electoral Systems. All rights reserved. Permission Statement: No part of this publication may be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system without the written permission of IFES. Requests for permission should include the following information: • A description of the material for which permission to copy is desired. • The purpose for which the copied material will be used and the manner in which it will be used. • Your name, title, company or organization name, telephone number, fax number, email address, and mailing address. Please send all requests for permission to: International Foundation for Electoral Systems 2011 Crystal Drive, 10th Floor Arlington, VA 22202 Email: [email protected] Fax: 202.350.6701 Table of Contents Synopsis ........................................................................................................................................................ 2 Fighting the Information War ....................................................................................................................... 3 Authoritarian and Populist Vectors .............................................................................................................
    [Show full text]
  • Disertation V4
    Errors in Judgment: Status, Values, and Morals Influence on Judgments of Guilt and Punishment By Jessica Dawson Department of Sociology Duke University Date:_____________________ Approved: ___________________________ Stephen Vaisey, Supervisor __________________________ Lynn Smith-Lovin, Chair __________________________ Edward Tiryakian __________________________ Kenneth Spenner Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Sociology in the Graduate School of Duke University 2016 ABSTRACT Errors in Judgment: Status, Values, and Morals Influence on Judgments of Guilt and Punishment By Jessica Dawson Department of Sociology Duke University Date:_____________________ Approved: ___________________________ Stephen Vaisey, Supervisor __________________________ Lynn Smith-Lovin, Chair __________________________ Edward Tiryakian __________________________ Kenneth Spenner An abstract of a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Sociology in the Graduate School of Duke University 2016 Copyright by Jessica Dawson 2016 Abstract This study investigates how actor status, moral foundations, and individual values influence the moral judgments of guilt and punishment. I argue that the consequences of individual values for actions can be understood only if considered alongside organizational values and larger frameworks of institutional logics. Building on Zerubavel’s (1999) conception of a three-level cognition, I argue for a tri-level conception of values and morality in order to more fully understand how moral judgments work within the social context that shapes them. Zerubavel (1999) argued that cognition operated at the individual, social, and macro levels. Based on original research, I offer evidence of three levels of morality. I evaluate individual level morality two ways.
    [Show full text]
  • The Champ Readies for Belmont Breeders= Cup
    TUESDAY, JUNE 2, 2015 732-747-8060 $ TDN Home Page Click Here THE CHAMP READIES FOR BELMONT GLENEAGLES, FOUND TO BYPASS EPSOM GI Kentucky Derby and GI Preakness S. winner The Coolmore partners= dual Guineas winner American Pharoah (Pioneerof the Nile) registered his last Gleneagles (Ire) (Galileo {Ire}) and Group 1-winning filly serious work before Saturday=s GI Belmont S. under Found (Ire) (Galileo {Ire}) are no longer under cloudy skies Monday at consideration for Saturday=s Churchill Downs. The bay G1 Epsom Derby, and both covered five panels in will target mile races at 1:00.20 (video) with Royal Ascot. Martin Garcia in the irons Gleneagles was removed shortly after the from the Classic at renovation break. Monday=s scratching stage Churchill clocker John and will head to the G1 St. Nichols recorded 1/8-mile James=s Palace S. on the opening day of the Royal fractions in :13, :25 meeting June 16. Found, (:12), :36.60 (11.60) and who has been second in :48.60 (:12). He galloped Gleneagles winning the Irish both starts this year out six furlongs in 1:13, 2000 Guineas including the G1 Irish 1000 seven-eighths in 1:26 and Racing Post Photo Guineas May 24, will a mile in 1:39.60. contest the G1 Coronation Baffert noted how S. June 19. Found would have had to be supplemented pleased he was with the to the Derby at a cost of ,75,000. Coolmore and American Pharoah work later in the morning. trainer Aidan O=Brien are expected to be represented in Horsephotos AEverything went really the Derby by G3 Chester Vase scorer Hans Holbein well today,@ Hall of Fame (GB) (Montjeu {Ire}), owned in partnership with Teo Ah trainer Bob Baffert said outside Barn 33.
    [Show full text]
  • Received by NSD/FARA Registration Unit 06/04/2021 10:43:23 AM
    Received by NSD/FARA Registration Unit 06/04/2021 10:43:23 AM 06/03/21 Thursday This material is distributed by Ghebi LLC on behalf of Federal State Unitary Enterprise Rossiya Segodnya International Information Agency, and additional information is on file with the Department of Justice, Washington, District of Columbia. Beijing, Hanoi Agree to Establish Naval Hotline to Resolve Emergencies in South China Sea by Morgan Artvukhina While the two nations have a history of sometimes-violent border disputes, China and Vietnam have emphasized the increasing importance of political and economic cooperation since normalizing relations in 1991. Nonetheless, Washington has tried to pry Vietnam and other Southeast Asian nations away from working with China. Chinese and Vietnamese naval leaders have agreed to set up a naval hotline as part of a larger effort to defuse tensions in the South China Sea. This comes after their respective heads of state recently agreed to improve diplomatic and trade relations, too. Rear Admiral Tran Thanh Nghiem, Commander of the Vietnam People’s Navy, held an online talk with Admiral Shen Jinlong, Commander of the People's Liberation Army Navy last week to discuss military relations between the two socialist nations, which are sometimes fraught with dispute and confrontation over competing claims to parts of the South China Sea. According to the Vietnamese defense ministry’s official People’s Army Newspaper, “the two sides agreed to enhance the sharing of information related to situations at sea and issues of mutual concern, study the possibility of setting up a hotline to connect the two navies, and maintain the joint patrol mechanism in the Gulf of Tonkin.” The People’s Army Newspaper further notes that Nghiem hailed previous efforts at improving bilateral defense cooperation and the regular meetings between naval leaders, organization of patrols, and joint drills at sea.
    [Show full text]
  • NL-Spring-2020-For-Web.Pdf
    RANCHO SAN ANTONIO Boys Home, Inc. 21000 Plummer Street, Chatsworth, CA 91311 (818) 882-6400 Volume 38 No. 1 www.ranchosanantonio.org Spring 2020 God puts rainbows in the clouds so that each of us - in the dreariest and most dreaded moments - can see a possibility of hope. -Maya Angelou A REFLECTION FROM BROTHER JOHN CONNECTING WITH OUR COMMUNITY I would like to share with you a letter from a parent: outh develop a sense of identity and value “Dear All of You at Rancho, Ythrough culture and connections. To increase cultural awareness and With the simplicity of a child, and heart full of sensitivity within our gratitude and appreciation of a parent…I thank Rancho community, each one of you, for your concern and giving of Black History Month yourselves in trying to make one more life a little was celebrated in Febru- happier… ary with a fun and edu- I know they weren’t all happy days nor easy days… cational scavenger hunt some were heartbreaking days… “give up” days… that incorporated impor- so to each of you, thank you. For you to know even tant historical facts. For entertainment, one of our one life has breathed easier because you lived, this very talented staff, a professional saxophone player, is to have succeeded. and his bandmates played Jazz music for our youth Your lives may never touch my son’s again, but I during our celebratory dinner. have faith your labor has not been in vain. And to each one of you young men, I shall pray, with ACTIVITIES DEPARTMENT UPDATE each new life that comes your way… may wisdom guide your tongue as you soothe the hearts of to- ancho’s Activities Department developed a morrow’s men.
    [Show full text]
  • We Are All Rwandans”
    UNIVERSITY OF CALIFORNIA Los Angeles “We are all Rwandans”: Imagining the Post-Genocidal Nation Across Media A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Film and Television by Andrew Phillip Young 2016 ABSTRACT OF DISSERTATION “We are all Rwandans”: Imagining the Post-Genocidal Nation Across Media by Andrew Phillip Young Doctor of Philosophy in Film and Television University of California, Los Angeles, 2016 Professor Chon A. Noriega, Chair There is little doubt of the fundamental impact of the 1994 Rwanda genocide on the country's social structure and cultural production, but the form that these changes have taken remains ignored by contemporary media scholars. Since this time, the need to identify the the particular industrial structure, political economy, and discursive slant of Rwandan “post- genocidal” media has become vital. The Rwandan government has gone to great lengths to construct and promote reconciliatory discourse to maintain order over a country divided along ethnic lines. Such a task, though, relies on far more than the simple state control of media message systems (particularly in the current period of media deregulation). Instead, it requires a more complex engagement with issues of self-censorship, speech law, public/private industrial regulation, national/transnational production/consumption paradigms, and post-traumatic media theory. This project examines the interrelationships between radio, television, newspapers, the ii Internet, and film in the contemporary Rwandan mediascape (which all merge through their relationships with governmental, regulatory, and funding agencies, such as the Rwanda Media High Council - RMHC) to investigate how they endorse national reconciliatory discourse.
    [Show full text]
  • A Dynamic Model of Idiosyncrasy Credit in Top Management Team Behavior Bill Provaznik Central Washington University
    Journal of Business & Leadership: Research, Practice, and Teaching (2005-2012) Volume 5 Article 2 Number 2 Journal of Business & Leadership 1-1-2009 Pushing The aM rgins: A Dynamic Model of Idiosyncrasy Credit In Top Management Team Behavior Bill Provaznik Central Washington University Larry W. Hughes Central Washington University James B. Avey Central Washington University Follow this and additional works at: http://scholars.fhsu.edu/jbl Part of the Business Commons, and the Education Commons Recommended Citation Provaznik, Bill; Hughes, Larry W.; and Avey, James B. (2009) "Pushing The aM rgins: A Dynamic Model of Idiosyncrasy Credit In Top Management Team Behavior," Journal of Business & Leadership: Research, Practice, and Teaching (2005-2012): Vol. 5 : No. 2 , Article 2. Available at: http://scholars.fhsu.edu/jbl/vol5/iss2/2 This Article is brought to you for free and open access by FHSU Scholars Repository. It has been accepted for inclusion in Journal of Business & Leadership: Research, Practice, and Teaching (2005-2012) by an authorized editor of FHSU Scholars Repository. Provaznik et al.: Pushing The Margins: A Dynamic Model of Idiosyncrasy Credit In To Provaznik, Hughes, and Avey Journal of Business & Leadership: Research, Practice and Teaching 2009, Vol. 5, No. 2, 1-9 PUSHING THE MARGINS: A DYNAMIC MODEL OF IDIOSYNCRASY CREDIT IN TOP MANAGEMENT TEAM BEHAVIOR Bill Provaznik, Central Washington University Larry W. Hughes, Central Washington University James B. Avey, Central Washington University Top management teams (TMT) behave both conventionally and unconventionally to implement strategic change in organizations. These behaviors are information used by organizational stakeholders to evaluate the TMT. However, because of limited cognitive resources, the cost of cognitive changes and the inherent variability of environments and relationships, stakeholders operate using the “latitude of norms,” which provides thresholds to measure the need for reappraisal and change.
    [Show full text]
  • Trojans and Malware on the Internet an Update
    Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY Abstract This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet - throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses the status of hostile active content on the Internet, including threats from Java and ActiveX, and re-examines the impact of these types of threats to Internet users in the real world. Observations related to the role of the antivirus industry in solving the problem are considered. Throughout the paper, technical and policy based strategies for minimizing the risk of damage from various types of Trojan horses on the Internet are presented This paper represents an update and summary of our research from Where There's Smoke There's Mirrors: The Truth About Trojan Horses on the Internet, presented at the Eighth International Virus Bulletin Conference in Munich Germany, October 1998, and Attitude Adjustment: Trojans and Malware on the Internet, presented at the European Institute for Computer Antivirus Research in Aalborg, Denmark, March 1999. Significant portions of those works are included here in original form. Descriptors: fidonet, internet, password stealing trojan, trojanized system, trojanized application, user behavior, java, activex, security policy, trojan horse, computer virus Attitude Adjustment: Trojans and Malware on the Internet Trojans On the Internet… Ever since the city of Troy was sacked by way of the apparently innocuous but ultimately deadly Trojan horse, the term has been used to talk about something that appears to be beneficial, but which hides an attack within.
    [Show full text]
  • Malware Types
    What is Malware? As a catch-all term, these are the the top 10 and how they work. TROJANS 10 It takes its name from the ancient trojan horse and tries to blend in with other applications to open up a backdoor. This allows access to a host of undetectable malicious software. 9 WORMS There are several types of malicious computer worms. They propagate themselves to carry a payload of malware, such as a viruses, that can spread to other programs or systems. PHISHING 8 These are emails that are essentially con jobs in that someone has to convince you they are credible and can be trusted. They try to trick you in to a reply or to click on a link or an attachment used for identity or financial theft or fraud. 7 KEYLOGGERS This is an insidious form of spyware. As you enter sensitive data onto your keyboard the, keylogging software is hard at work logging everything that you type, including usernames and passwords. BACKDOORS 6 Backdoors are where unauthorized users are able to bypass normal security measures and gain high level user access on a computer system, network or software application to "HEART, SMARTS, GUTS, AND LUCK" Read more at stBeY aAlN TpHeONrYs,o RnICaHlA RaDn, AdN Df TinSUaNn-YcAiNal data, instarlelallygreatsite.com. additional malware and hijack devices. 5 EXPLOITS An exploit is a piece of code or a program that takes advantage of any application or system vulnerabilities in an attempt to attempt to install and execute malware. ADVANCED PERSISTENT THREAT (A4PT) As the name suggests, this malware uses continuous, clandestine and sophisticated hacking techniques to sneak its way into a system and remain for a prolong time to monitor it and persistently steal data.
    [Show full text]