The Dark Space Project

Total Page:16

File Type:pdf, Size:1020Kb

The Dark Space Project The Dark Space Project Dave McMahon Rafal Rohozinski Bell Canada Scientific Authority Rodney Howes DRDC Centre for Security Science The scientific or technical validity of this Contract Report is entirely the responsibility of the Contractor and the contents do not necessarily have the approval or endorsement of Defence R&D Canada. Defence R&D Canada – Centre for Security Science Contractor Report DRDC CSS CR 2013-007 July 2013 The Dark Space Project Dave McMahon Rafal Rohozinski Bell Canada Scientific Authority Rodney Howes DRDC Centre for Security Science The scientific or technical validity of this Contract Report is entirely the responsibility of the Contractor and the contents do not necessarily have the approval or endorsement of Defence R&D Canada. Defence R&D Canada – Centre for Security Science Contractor Report DRDC CSS CR 2013-007 July 2013 Scientific Authority Rodney Howes Rodney Howes eSecurity Portfolio Manager Approved by Original signed by Andrew Vallerand DRDC Centre for Security Science Director S&T Public Security Approved for release by Dr. Mark Williamson DRDC Centre for Security Science DRP Chair © Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2013 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2013 THE Dark Space Project 1 | Page Privacy and Ethics Statement The methodology used in this research was based on guidance and precedence provided by the Privacy Commissioner of Canada and Auditor General of Canada for conducting cyber security research from primary data sources. No personal information has been used in this project. The research was conducted on aggregate data only no personally identifiable information (PII) was collected. In addition, all research activities related to this project complied with applicable laws and regulations in Canada and the following policies and procedures: the Bell Canada Code of Business Conduct, Bell Canada Corporate Policies and Ethics, the Bell Competition Law Compliance Handbook, the Bell Code of Fair Information Practices and the Privacy Statement and Ethical Principles Regarding Cyber Security Research at the Citizen Lab, Munk School of Global Affairs, University of Toronto. All such documents are publicly available. Bell Canada research, including this project, was subject to an independent audit under Sarbanes– Oxley Act, regulatory oversight by the Canadian Radio-television and Telecommunications Commission (CRTC), and review by privacy organizations and law enforcement agencies. This report is derived exclusively from commercial and open sources. No public sector information was used or consulted. In the interests of academic independence, no government information or intellectual property was used in the study, nor has the Canadian government influenced the scientific findings of this report in any way. 2 | Page TABLE OF CONTENTS Contents PREFACE ......................................................................................................................................... 9 HISTORICAL CONTEXT ............................................................................................................... 9 THE GENESIS OF THE DARK SPACE PROJECT ......................................................................... 10 COURSE CORRECTION NECESSITATED BY COMPELLING EVENTS ......................................... 11 CHALLENGES, OBSERVATIONS AND BREAKTHROUGHS ....................................................... 12 CENTRAL THEMATIC EMPHASIS .............................................................................................. 12 THE DARK SPACE PROJECT - START ........................................................................................ 14 THE PHOENIX ‘CLEAN PIPES’ IS REBORN ................................................................................ 16 ABSTRACT ..................................................................................................................................... 17 EXECUTIVE SUMMARY ................................................................................................................. 18 THE PLAN ...................................................................................................................................... 23 INTRODUCTION ......................................................................................................................... 23 RESEARCH BACKGROUND ....................................................................................................... 24 METHODOLOGY AND APPROACH .......................................................................................... 26 ACTIVITIES AND FINDINGS ....................................................................................................... 27 TECHNICAL DEVELOPMENT - REFERENCE ARCHITECTURE © .............................................. 29 INDUSTRY BEST PRACTICE ...................................................................................................... 29 ALL SOURCE FUSION ............................................................................................................... 30 APPLIED EXPERIMENTATION .................................................................................................. 31 METHODOLOGY AND SOURCES: ............................................................................................. 32 INVESTIGATIVE RESULTS......................................................................................................... 33 3 | Page INITIAL RECOMMENDATIONS ................................................................................................ 33 THE PROBLEM.............................................................................................................................. 35 E-SPIONAGE, CYBER TERRORISM AND 5TH DIMENSION WARFARE IN 2011 ........................ 36 AGENTS OF CHAOS ...................................................................................................................37 ROBOT NETWORKS IN THE LITERATURE AND RECENT RESEARCH .................................... 38 LAST YEAR 2010 ........................................................................................................................ 43 CONDUCTANCE OF RISK .......................................................................................................... 43 ATTACK VECTORS AND INADEQUATE SAFEGUARDS ........................................................... 43 CYBER- INTELLIGENCE LED DECISION MAKING ..................................................................... 44 CURRENT SITUATION REPORT................................................................................................ 45 GLOBAL THREAT INTELLIGENCE ............................................................................................. 48 TRADITIONAL WAR-FIGHTING VS NETCENTRIC WARFARE ................................................. 49 HISTORICAL CONTEXT TO E-SPIONAGE AND CYBERWAR .................................................... 53 THE PROBLEM SET ................................................................................................................... 55 E-TELLIGENCE ........................................................................................................................... 56 THE BAD ACTORS ..................................................................................................................... 60 OPERATIONS AND INVESTIGATIONS ..................................................................................... 62 ROBOT SPYNETS ...................................................................................................................... 69 VICTIMIZATION ........................................................................................................................ 70 HOW TO APPROACH THE THREAT .......................................................................................... 71 SHUNS AND STUNS .................................................................................................................. 76 THE PROACTIVE GAME ............................................................................................................. 77 DNS INFRASTRUCTURE THREATS ........................................................................................... 79 EVIDENCE AND EXPERIMENTATION .......................................................................................... 82 4 | Page INVESTIGATIVE METHODOLOGY AND SYSTEMS .................................................................. 83 BACKGROUND - ANTIVIRUS RESEARCH ................................................................................. 83 BACKGROUND - SECURITY RESEARCH ................................................................................... 84 BACKGROUND - ANTIVIRUS RESEARCH VERSUS SECURITY RESEARCH ............................. 85 WHAT IS THREAT INTELLIGENCE? .......................................................................................... 86 DATA FUSION METHODOLOGIES FOR CYBER SECURITY ..................................................... 88 TRADITIONAL CYBER SECURITY METHODS AND TOOLS ..................................................... 89 DATA FUSION METHODS ......................................................................................................... 91 DATA FUSION IN CYBER SECURITY ......................................................................................... 91 DATA
Recommended publications
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Ronald J. Deibert
    April 13, 2013 Ronald J. Deibert A. BIOGRAPHICAL INFORMATION 1. PERSONAL Ronald James Deibert, Munk School of Global Affairs, Observatory Site, 313, 416-946-8916 2. DEGREES - Phd 1995 University of British Columbia - Thesis: Hypermedia: Modes of Communication in World Order Transformation Supervisor Professor Mark Zacher. - MA 1990 Queen’s University 3. EMPLOYMENT Professor, Department of Political Science, University of Toronto, 2011-present Associate Professor 2001-2011 Assistant Professor 1996-2001 Director, The Canada Centre for Global Security Studies, 2010-present Director, The Citizen Lab (http://www.citizenlab.org/), 2001-present Vice President, Global Policy and Outreach, Psiphon Inc., 2008-2010 4. HONOURS 2013 – Order of Ontario and Queen Elizabeth II Diamond Jubilee Medal 2013 - Partners in Research Technology Ambassador Award 2013 -Canadian Library Association Award for the Advancement of Intellectual Freedom in Canada 2011 - UNESCO Press Freedom Award (awarded to Citizen Lab) 2010 - Canadian Journalists for Free Expression Vox Libera Award (awarded to Citizen Lab) 2010 - Carolyn Tuohy Award for Public Policy 2002 - University of Toronto Outstanding Teaching Award 2002 - The Northrop Frye Distinguished Teaching and Research Award 2002-2004 - Ford Foundation Research Scholar of Information and Communication Technologies 5. PROFESSIONAL AFFILIATIONS AND ACTIVITIES Editorial Board: International Political Sociology, International Studies Perspectives, Astropolitics, Explorations in Media Ecology; Security Dialogue. Advisory Boards: Human Rights in China, Access Now, Lake Ontario Waterkeepers, Privacy International. Steering Committee, World Movement for Democracy, National Endowment for Democracy B. ACADEMIC HISTORY 6. A. RESEARCH ENDEAVOURS Director, Citizen Lab, 2001-present Director, Canada Centre for Global Security Studies, 2010-present Founder, Principal Investigator, OpenNet Initiative, 2002-present Founder, Principal Investigator, Information Warfare Monitor, 2002-2012 Co-Inventor, Psiphon B.
    [Show full text]
  • Cyber Warfare a “Nuclear Option”?
    CYBER WARFARE A “NUCLEAR OPTION”? ANDREW F. KREPINEVICH CYBER WARFARE: A “NUCLEAR OPTION”? BY ANDREW KREPINEVICH 2012 © 2012 Center for Strategic and Budgetary Assessments. All rights reserved. About the Center for Strategic and Budgetary Assessments The Center for Strategic and Budgetary Assessments (CSBA) is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s goal is to enable policymakers to make informed decisions on matters of strategy, secu- rity policy and resource allocation. CSBA provides timely, impartial, and insight- ful analyses to senior decision makers in the executive and legislative branches, as well as to the media and the broader national security community. CSBA encour- ages thoughtful participation in the development of national security strategy and policy, and in the allocation of scarce human and capital resources. CSBA’s analysis and outreach focus on key questions related to existing and emerging threats to US national security. Meeting these challenges will require transforming the national security establishment, and we are devoted to helping achieve this end. About the Author Dr. Andrew F. Krepinevich, Jr. is the President of the Center for Strategic and Budgetary Assessments, which he joined following a 21-year career in the U.S. Army. He has served in the Department of Defense’s Office of Net Assessment, on the personal staff of three secretaries of defense, the National Defense Panel, the Defense Science Board Task Force on Joint Experimentation, and the Defense Policy Board. He is the author of 7 Deadly Scenarios: A Military Futurist Explores War in the 21st Century and The Army and Vietnam.
    [Show full text]
  • An Infection Control Educational Program an Infection Control Educational Program
    AN INFECTION CONTROL EDUCATIONAL PROGRAM AN INFECTION CONTROL EDUCATIONAL PROGRAM By NORICA STEIN RN, BScN A Project Submitted to the School of Graduate Studies in Partial Fulfilment of the Requirements for the Degree Master of Science (Teaching) McMaster University (c) Copyright by Norica Stein, March 1997 MASTER OF SCIENCE (TEACHING) (1997) McMASTER UNIVERSITY Hamilton, Ontario TITLE: AN INFECTION CONTROL EDUCATIONAL PROGRAM AUTHOR: Norica Stein RN, B.Sc.N. (McMaster University) SUPERVISORS: Dr. Alice Schutz Professor Muriel Westmorland NUMBER OF PAGES: vi, 174 ii ABSTRACT This project describes the development of a curriculum for an infection control liaison program to be implemented in a large, regional health care institution. A curriculum module was designed to both support and challenge practising nurses to utilize critical thinking skills to guide their decision making regarding infection control practices. The author describes the process of curriculum development and presents a final curriculum product. The implementation is presented to demonstrate that the teaching of factual knowledge and skills can be integrated with higher level skills such as critical thinking, problem solving and decision making. Throughout this project, emphasis is placed on educational theory and on the practising health professional as the learner. iii ACKNOWLEDGEMENTS With sincere gratitude, I wish to acknowledge the help of my supervisors throughout the completion of my project: Dr. Alice Schutz for encouraging and inspiring me to consider what critical thinking means to me, and Professor Muriel Westmorland who reviewed my project very thoroughly and critically and provided many helpful comments and suggestions. I am also grateful to my parents for their encouragement of my pursuit of higher education.
    [Show full text]
  • The German Army, Vimy Ridge and the Elastic Defence in Depth in 1917
    Journal of Military and Strategic VOLUME 18, ISSUE 2 Studies “Lessons learned” in WWI: The German Army, Vimy Ridge and the Elastic Defence in Depth in 1917 Christian Stachelbeck The Battle of Arras in the spring of 1917 marked the beginning of the major allied offensives on the western front. The attack by the British 1st Army (Horne) and 3rd Army (Allenby) was intended to divert attention from the French main offensive under General Robert Nivelle at the Chemin des Dames (Nivelle Offensive). 1 The French commander-in-chief wanted to force the decisive breakthrough in the west. Between 9 and 12 April, the British had succeeded in penetrating the front across a width of 18 kilometres and advancing around six kilometres, while the Canadian corps (Byng), deployed for the first time in closed formation, seized the ridge near Vimy, which had been fiercely contested since late 1914.2 The success was paid for with the bloody loss of 1 On the German side, the battles at Arras between 2 April and 20 May 1917 were officially referred to as Schlacht bei Arras (Battle of Arras). In Canada, the term Battle of Vimy Ridge is commonly used for the initial phase of the battle. The seizure of Vimy ridge was a central objective of the offensive and was intended to secure the protection of the northern flank of the 3rd Army. 2 For detailed information on this, see: Jack Sheldon, The German Army on Vimy Ridge 1914-1917 (Barnsley: Pen&Sword Military, 2008), p. 8. Sheldon's book, however, is basically a largely indiscriminate succession of extensive quotes from regimental histories, diaries and force files from the Bavarian War Archive (Kriegsarchiv) in Munich.
    [Show full text]
  • Nadzor in Zasebnost V Informacijski Družbi
    Matej Kovačič NADZOR IN ZASEBNOST V INFORMACIJSKI DRUŽBI Filozofski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu Znanstvena knjižnica Fakulteta za družbene vede Ljubljana, 2006 Matej Kovačič NADZOR IN ZASEBNOST V INFORMACIJSKI DRUŽBI Filozofski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu Izdajatelj: Univerza v Ljubljani, Fakulteta za družbene vede Kardeljeva ploščad 5, Ljubljana Zbirka: Znanstvena knjižnica 55 Urednik: dr. Niko Toš Uredniški odbor: dr. Vlado Benko, dr. Zdenko Roter, dr. Tomo Korošec, dr. Vlado Miheljak, dr. Niko Toš Recenzenta: dr. Slavko Splichal dr. Alenka Šelih Likovna oprema: Polona Mesec-Kurdija Lektura: Dora Mali CIP - Kataložni zapis o publikaciji Narodna in univerzitetna knjižnica, Ljubljana 342.721:004.738.5 004.738.5 KOVAČIČ, Matej, 1974- Nadzor in zasebnost v informacijski družbi [Elektronski vir] : filozofski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu / Matej Kovačič. - Ljubljana : Fakulteta za družbene vede, 2006. - (Znanstvena knjižnica / Fakulteta za družbene vede ; 55) Način dostopa (URL): http://dk.fdv.uni-lj.si/eknjige/EK_Kovacic_2006_Nadzor.pdf . - Opis temelji na verziji z dne 19.12.2006 ISBN-10 961-235-261-5 ISBN-13 978-961-235-261-5 230725632 Knjigo je sofinancirala Agencija za raziskovalno dejavnost Republike Slovenije. Knjiga je izdana pod Creative Commons licenco: “Priznanje avtorstva-Nekomercialno-Deljenje pod enakimi pogoji 2.5 Slovenija”. Celotno pravno besedilo licence je dostopno na spletni strani: <http://creativecommons.org/licenses/by-nc-
    [Show full text]
  • Psiphon User Guide
    PSIPHON USER GUIDE Psiphon is a free and open source web proxy that helps internet users bypass content-filtering systems used by governments in countries like China, Iran, Saudi Arabia, and Vietnam. It was developed by the Citizen Lab's CiviSec Project at the University of Toronto and was first released in December 2006. In this how to guide, learn how to provide a proxy service to someone behind a firewall with psiphon . If you are behind a firewall and want to learn how to connect to psiphon and access blocked content, check out this how to guide . Psiphon, unlike other circumvention services, is not intended to be a public, open proxy service. It’s based on a “web of trust” system so psiphon nodes are harder to block. What this means is that a person in an unrestricted location (one that is not behind a firewall) provides a psiphon proxy service to a person they are familiar with who is going online in a place where online access is limited. This is known as a psiphonode . A psiphonite is a psiphon user living in a censored country. The psiphonite connects to a psiphonode (set up by someone they know and trust) to access information freely. NOTE: Psiphon only works on Windows and Linux. There is no Mac version yet. Step 1. First, you should be in a location where you have open access to the internet. You should know someone in another location where access is limited. You will be providing a psiphonode for this person. Tip! If you do not know any psiphon users, but still want to provide a psiphonode, you can find users on psiphon’s Facebook page or Twitter page.
    [Show full text]
  • Zero Day Exploits and National Readiness for Cyber-Warfare
    Nigerian Journal of Technology (NIJOTECH) Vol. 36, No. 4, October 2017, pp. 1174 – 1183 Copyright© Faculty of Engineering, University of Nigeria, Nsukka, Print ISSN: 0331-8443, Electronic ISSN: 2467-8821 www.nijotech.com http://dx.doi.org/10.4314/njt.v36i4.26 ZERO DAY EXPLOITS AND NATIONAL READINESS FOR CYBER-WARFARE A. E. Ibor* DEPT. OF COMPUTER SCIENCE, CROSS RIVER UNIVERSITY OF TECHNOLOGY, CALABAR, CROSS RIVER STATE NIGERIA E-mail address: [email protected] ABSTRACT A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly reported or announced. But how should a nation react to a zero day? This question is a concern for most national governments, and one that requires a systematic approach for its resolution. The securities of critical infrastructure of nations and states have been severally violated by cybercriminals. Nation-state espionage and the possible disruption and circumvention of the security of critical networks has been on the increase. Most of these violations are possible through detectable operational bypasses, which are rather ignored by security administrators. One common instance of a detectable operational bypass is the non-application of periodic security updates and upgrades from software and hardware vendors. Every software is not necessarily in its final state, and the application of periodic updates allow for the patching of vulnerable systems, making them to be secure enough to withstand an exploit. To have control over the security of critical national assets, a nation must be “cyber-ready” through the proper management of vulnerabilities and the deployment of the rightful technology in the cyberspace for hunting, detecting and preventing cyber-attacks and espionage.
    [Show full text]
  • Cyber Law and Espionage Law As Communicating Vessels
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
    [Show full text]
  • Stephen's Guide to the Logical Fallacies by Stephen Downes Is Licensed Under a Creative Commons Attribution-Noncommercial-Share Alike 2.5 Canada License
    Stephen’s Guide to the Logical Fallacies Stephen Downes This site is licensed under Creative Commons By-NC-SA Stephen's Guide to the Logical Fallacies by Stephen Downes is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 2.5 Canada License. Based on a work at www.fallacies.ca. Permissions beyond the scope of this license may be available at http://www.fallacies.ca/copyrite.htm. This license also applies to full-text downloads from the site. Introduction ............................................................................................................................................ 3 How To Use This Guide ............................................................................................................................ 4 Fallacies of Distraction ........................................................................................................................... 44 Logical Operators............................................................................................................................... 45 Proposition ........................................................................................................................................ 46 Truth ................................................................................................................................................. 47 Conjunction ....................................................................................................................................... 48 Truth Table .......................................................................................................................................
    [Show full text]
  • Biased Argumentation and Critical Thinking
    Biased argumentation and critical thinking A man with a conviction is a hard man to change. Tell him you disagree and he turns away. Show him facts or figures and he questions your sources. Appeal to logic and he fails to see your point. Leon Festinger (1956: 3) 1. Introduction Although the problem of biased argumentation is sometimes reduced to the problem of intentional biases (sophistry, propaganda, deceptive persuasion)1, empirical research on human inference shows that people are often biased not because they want to, but because their emotions and interests insidiously affect their reasoning (Kunda 1990, Baron 1988, Gilovich 1991). Walton (forthcoming) highlights this aspect: Many fallacies are committed because the proponent has such strong interests at stake in putting forward a particular argument, or is so fanatically committed to the position advocated by the argument, that she is blind to weaknesses in it that would be apparent to others not so committed. This phenomenon is known as ‘motivated reasoning’ and typically occurs unintentionally, without the arguer’s awareness (Mercier & Sperber 2011: 58, Pohl 2004: 2). For example, a lawyer may be biased in the defense of a client because (s)he deliberately intends to manipulate the audience, to be sure, but also because the desire to win the case (or the sympathy toward the client, etc.) unconsciously distorts the way (s)he reasons and processes the relevant evidence. In such cases, the arguer is sincerely convinced that 1 See for example Herman & Chomsky 1988, Praktanis & Aronson 1991, Walton 2006. 2 Vasco Correia his or her arguments are fair and reasonable, while in fact they are tendentious and fallacious.
    [Show full text]