create account

Tools and Techniques for Cognitive Security by aagabriel

View this thread on: hive.blogpeakd.comecency.com
· @aagabriel · (edited)
$14.05
Tools and Techniques for Cognitive Security
> [CogSec (Cognitive Security) Collaborative](https://archive.is/78Fze)

### 1. Tools and Techniques for Cognitive Security
![Slide1.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23t74fZzxiHiW73Po2ePv1L9n1Ka6BKLqYtfobSme5CszXYxT6LfUPgCzKmnwJuHhSuTS.png)
Tools and Techniques for Cognitive Security
> by SJ Terp & Roger Johnstone
> CanSecWest, March 18th 2020

***

### 2. Who are These people?
![Slide2.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tGXrfzpTTktXGiUdfsj9XvAkd6YovJuGVdH2sC9qKpvGxjtyEXJJoxo4qDEhUbQYjzT.png)
> SJ Terp, Pablo Breuer, Grant Dobbe, grugq, Roger Johnston, CogSec Collab Community
***

### 3. CogSec Collab: Roots
![Slide3.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23uQLVYJiktAfY43MiZf6NctaCXGmWtc3Eji6UxndWJFgzwk2YQHn6SztoE9vL1BrPCjL.png)
> Credibility Coalition - m!s!nfosec 
> * Industry
> * Academia
> * Media
> * Community
> * Infosec
***

### 4. CogSec Collab: 2020 Mission
![Slide4.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23t75DL8NAYCkW73aNthC1PW8weD6Nes3ue7FJKzoLtrPB3nfwDh1TVc9k2GobzyavoZK.png)
   - bring together information security researchers, data scientists and other subject-matter experts. 
   - to create and improve resources
   - for the defense of the cognitive domain
***   

### 5. CogSec Collab: 2020 Milestones
![Slide5.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23swgNobQ7zak5RLkeMNS5ty2oWQidpDUSbSqsLUe6dUbk7x3SsB8H3FYm72peANyxA5G.png)

   * Milestone 1: April 2020
     * AM!TT Counters; Who, What, How
     * AM!TT Playbook PoC
   * Milestone 2: July 2020
     * AM!TT Playbook; Public, Social Media, ISPs, Government
     * Tooling; Threat Intelligence
   * Milestone 3: October 2020
     * AM!TT Playbook; refine
     * Tooling
     * Data Sets
***   

### 6. COGSEC COLLAB: END USERS
![Slide6.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wC1UeoC32Bc8fJFHiPtshyfcaRcyMbxyMCh8R6Hs6tXDqZrfGvrJWLkkWZEBJxzpg6G.png)
   *Who uses this stuff anyway?*
***

### 7. RESPONSE ACTORS
![Slide7.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23yTj8sJxd2RfeM5ECJpft9TyYrLcjddvzqvXYdNm4FiBLdFkGiRZGvr1ipvQmNLivZb9.png)
   * Platform
   * Government
   * Elves
   * Public
   * Influencer
   * Media
   * Nonprofit
   * Educator
   * Corporation
***
  
### 8. Elf Communities and Playbooks
![Slide8.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tRvaQWML4whAaFFpSS5vRy7eMRi4GWxcs5KSL3YYwpJ63rXb6FNUwkmdUh5xeWuJ2rq.png)
***

### 9. INFORMATION SHARING NETWORKS
![Slide9.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23x1DQ4CXf2vfaKTrmccedaSPh3bw5z9UQzmY9qiCaNCwUstCw6aESHt82ar1tvDcwhy3.png)
***

### 10. DISINFORMATION LANDSCAPE
![Slide10.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wC1Z6r4FAWjAVinNmAw3uijv7uZet7aRKX7diD3EVJCWjt554Fiv5hkeqmXBoMFRQV5.png)
> ##### *The Only defense against the world is a thorough knowledge of it.*
> -- John Locke
***

### 11. DISINFORMATION
![Slide11.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23swgNLbp7gKB8UdRQMGrt6ojaLZrpKL4idc5hHSDMRbrm5V6muoE4yaX5JMrmhpkfLxL.png)
> deliberate promotion... of false, misleading or mis-attributed information
>
> focus on creation, propagation, consumption of misinformation online
>
> We are especially interested in misinformation designed to change beliefs in a large number of people
***

### 12. DISINFORMATION 'LAYERS'
![Slide12.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wWP6jtb16xCjqyjtjGe9wS6UXkqm1GmjNb5xNaWUAMGPwxqvyd7yVQQmdUJuX3s7yGU.png)
***

### 13. NATIONAL INSTRUMENTS OF INFLUENCE
![Slide13.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tS2cHogQbE4YNQXXqY4F11PEuEM8DzixmFW5aqXgdX2z2UMSBNuF7hp8K7hZWqDAaQd.png)
Resources available in pursuit of national objectives...
> Diplomatic, Informational, Military, Economic

...and how to influence other nation-states.
***

### 14. BUSINESS INSTRUMENTS OF INFLUENCE
![Slide14.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tbRhGzDb5JDQLthJ144Zh8CW1UcSwyqR2BwfnJr28BMWiRMK5XuCGTXLyGUtQFUAqBP.png)
Resources available in pursuit of corporate objectives...
> Business Deals & Strategic Partnerships, PR and Advertising, Mergers and Acquisitions, R&D and Capital Investments
***

### 15. DESCRIBING DISINFORMATION
![Slide15.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wC1UeoC32Bc4GfPLUW55zCYoNWtHKFqFoJbZByWQ8Dzdk1yWWMpMQux9paVocEkpR5u.png)
> AM!TT and other models of WTF is happening

***

### 16. AM!TT FRAMEWORK
![Slide16.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tRvNGRFySpNt7NhQKxaydpuNxzrxLWZSPDDW2Y3vUgHSu3kuSb3ccDzLLNemUZFUCkK.png)
**A**dversarial **M**isinformation and **I**nfluence **T**actics and **T**echniques = (AM!TT)
* Credibility Coalition Misinfosec Working Group
* AM!TT is a framework for understanding organized communication attacks
***

### 17. AM!TT FRAMEWORK
![Slide17.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wgB6BkUUtezb9ua56YRKXTZV3DurRA2p1fd1us1JebBfsvb1iSm6XsnfbQySCVYeKns.png)
***

### 18. AM!TT - T0010
![Slide18.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23uFkkjG9MsU23UK2CeAjTmqcm3Utwj8vusELDz4dkXCKyNAvd6Zpu9FBtdXzuBBqXuH5.png)
***

### 19. AM!TT - T0010
![Slide19.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23uEqzMuAAkLGeCzEmV7yFz6EUt1XeTQRLGwiraJbLr7QnFBeSd8RiYLVYF7VoApSViqn.png)
*IRA IN GHANA: DOUBLE DECEIT*
Cultivate Ignorant Agents
* "EBLA" NGO local staff
* Attempt to co-opt US influencers
***

### 20. DISINFORMATION COUNTERMEASURES
![Slide20.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wC1Z6r4FAWj67Kb5FM9Q73cGnzd49owk8QQWqPxsoYgt6dJ4uJRXztBZ51Sy5NS97ig.png)
Moving from admiring the problem to action
***

### 21. MITIGATIONS AND COUNTERMEASURES
![Slide21.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tGVqvq8Q5LUxdpny7nY2qggAKK1AquahUv1Cpv2ekeZcXmPepv8LrMbT4rC4XWanb6K.png)
> Countermeasures are that form of military science that, by the employment of devices and/or techniques, is designed to **impair the operational effectives of enemy activity.** Countermeasures can be **active or passive** and can be deployed **preemptively or reactively.**
    >
    > -- JP 3-13.1, Information Operations - Joint Chiefs of Staff
***

### 22. FINDING COUNTERMEASURES
https://i.ibb.co/XJQXCkL/Slide22.png
* Existing
* Tactic-based
* Technique-based
* Doctrine-based
***

### 23. EXISTING COUNTERS
![Slide23.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wMgpz1ZPG4xjBhh2HBqpYNGmcgtQvWtfyjRj1XpPgUgqKXeHrxSrrCGixvwU4v5Xp6g.png)
***

### 24. TACTIC-BASED: COURSES OF ACTION MATRIX
![Slide24.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tkhmvPx1QLeyypQoTXbgR1bvShjzY9CGqyUfj5e6x3WC68jYmB3E6erqhPShi3DS8Tn.png)

    | AM!TT Phase           | Detect | Deny | Disrupt | Degrade | Deceive | Destroy | Deter |
    | --------------------- | ------ | ---- | ------- | ------- | ------- | ------- | ----- |
    | Strategic Planning    |        |      |         |         |         |         |       |
    | Objective Planning    |        |      |         |         |         |         |       |
    | Develop People        |        |      |         |         |         |         |       |
    | Develop Networks      |        |      |         |         |         |         |       |
    | Microtargeting        |        |      |         |         |         |         |       |
    | Develop Content       |        |      |         |         |         |         |       |
    | Channel Selection     |        |      |         |         |         |         |       |
    | Pump Priming          |        |      |         |         |         |         |       |
    | Exposure              |        |      |         |         |         |         |       |
    | Go Physical           |        |      |         |         |         |         |       |
    | Persistence           |        |      |         |         |         |         |       |
    | Measure Effectiveness |        |      |         |         |         |         |       |
***

### 25. EFFECTS
![Slide25.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wqaDaJ15Z9BoocBdtPNCLSF9q42ToF2f7MccB5GgUoG9bcx2phxSyMYS5aAevP7Kbtj.png)
- Detect: find them
- Deny: stop them getting in
- Disrupt: interrupt them
- Degrade: slow them down
- Deceive: divert them
- Destroy: damage them
- Deter: discourage them
***

### 26. ORGANISING COUNTERMEASURES
![Slide26.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23xyXbzjzJMUo7v3zUChYxXqBAMM1KdtmDd92TXZNJotYp5w1yb3afVbrUi74oeVwRxk9.png)
***

### 27. DOCTRINE-BASED COUNTERMEASURES
![Slide27.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23swgNobQ7zag4xbKNDsURDBCW7LT569tamZRkwfuhASFpgVFr48UCV9R3LrX7N81G67o.png)
> ###### *"A disinformation campaign is made up of resources and infrastructure and operates over time, with them as a universal scarcity."*
> -- Grugq
***

### 28. CRITICAL ELEMENTS
![Slide28.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23u5ZEbXJqRXW7nkhRbhBAbuBxtcUxsv8378GnoDU9JcgKpMXAZkoxmkY4YmWpxkic2zq.png)
- Resources
- Infrastructure
- Execution
- Time
***

### 29. DOCTRINE-BASED COUNTERMEASURES
![Slide29.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tRtWQyJYJeCu5fjhysVAzA9rPd44YRYG92vZNwdNp4GT9xqYvWsGMc3br86bqJVTc4n.png)
| Critical Element | Detect | Deny | Disrupt | Degrade | Deceive | Destroy | Deter |      |
| ---------------- | ------ | ---- | ------- | ------- | ------- | ------- | ----- | ---- |
| Resources        |        |      |         |         |         |         |       |      |
| Infrastructure   |        |      |         |         |         |         |       |      |
| Execution        |        |      |         |         |         |         |       |      |
| Time             |        |      |         |         |         |         |       |      |
* resource exhaustion
* cost-effectiveness
* time constraints
***

### 30. DOCTRINE-BASED COUNTERMEASURES
https://i.ibb.co/nBwRr1j/Slide30.png
*IRA IN GHANA: DOUBLE DECEIT*
* Resources
  - Staff ~16
  - Audience ~338k
  - Mobile D
![Slide44.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tbGsqZQaw9E6hsu4ihdKBoDyZfBbD3LaHFPrajx6ZBVmFVz7mkJ5kmi9gnYh162askN.png)
evices
* Infrastructure
  - NGO
  - Operator Content Pool
  - Twitter Analytics
* Execution
  - T0007, T0010, T0015, T0055, T0013
   - T0014, T0018, T0021, T0030, T0039
  - T0042, T0053
* Time
  - Direct Engagement
  - No Automation + Bots
  - 'Audience Building' Phase
***

### 31.  PLAYBOOKS
![Slide31.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wC1GAPtagS1KTyh6zuDtGvXK3HFoh1R9KtrbfU9nrQX2PUNjBdhUCc4n6SoGdqoRxVr.png)
***

### 32. RP_0003_fake_engagement
![Slide32.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tcAEsVQ5rtKvAsuGmxt5SmRVSB47JmrM44Gd2sDy7suEbQDAwgPVTDtNgfDfbHwZXi2.png)
***

### 33. THREAT INTELLIGENCE TOOLS AND TECHNIQUES
![Slide33.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23uEzR3Qy6y5Dqhm4pfsVKgApcNtRjnbLjDskYSE5jiUypn2yjLChGRkF2AXuTvxPfpjg.png)
things we borrowed from infosec
***

### 34. OASIS STIX™ 2
![Slide34.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wzzS2GDhzp5WaKnPCtzQvYs8AFK6467ZBcYzTcefUiyivPjKb6QuvNPbVyNJHW6QZdr.png)
* AM!TT needed a standard for data exchange
  - Relationships + Rich language
  - Extensible
  - Intelligence Sharing (ISACs & ISAOs)
  - Integration with community tooling
* AM!TT is now available as a STIX 2.0 bundle
  - https://github.com/cog-collaborative/amitt_cti
***

### 35. STIX AMITT
![Slide35.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tGXzsVkzsSFYfKLeVrz4oMr6Zs3BHbmvYwwech6E37KCCMm1G49EqB8pYQmWyJWyCm5.png)
| Misinformation STIX | Description                                                  | Level         | Infosec STIX      |
| ------------------- | ------------------------------------------------------------ | ------------- | ----------------- |
| Report              | communication to other responders                            | Communication | Report            |
| Campaign            | Longer attacks (Russia's interference in the 2016 US elections is a "campaign") | Strategy      | Campaign          |
| **Incident**        | **Shorter-duration attacks, often part of a campaign**       | **Strategy**  | **Intrusion Set** |
| Course of Action    | Response                                                     | Strategy      | Course of Action  |
| Identity            | Actor (individual, group, organisation etc): creator, responder, target, useful idiot etc. | Strategy      | Identity          |
| Threat actor        | Incident creator                                             | Strategy      | Threat Actor      |
| Attack pattern      | Technique used in incident (see framework for examples)      | TTP           | Attack patter     |
| **Narrative**       | **Malicious narrative (story, meme)**                        | **TTP**       | **Malware**       |
| Tool                | bot software, APIs, marketing tools                          | TTP           | Tool              |
| Observed Data       | artefacts like messages, user accounts, etc                  | Artefact      | Observed Data     |
| Indicator           | posting rates, follow rates, etc                             | Artefact      | Indicator         |
| Vulnerability       | Cognitive biases, community structural weakness etc          | Vulnerability | Vulnerability     |
https://github.com/cogsec-collaborative/amitt_cti
***

### 36. AM!TT + MITRE ATT&CK® Navigator
![Slide36.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23yJGgBuCdMcJTNMt3yT6NH4CGqo7VvoDUhBR8s132GP5qUWqDKwLnFfjdhXTovHs2kf7.png)
- Navigation of STIX formatted data
- Visualization
- Red + Blue team planning
- Exportable layers

https://www.cogsec-collab.org/project/amitt_navigator/
***

### 37. IRA IN GHANA: DOUBLE DECEIT
![Slide37.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23uFgAc3u6QG92ditu7hUHfMYEFwj99nFPABwoLHChLZ4YnQxyRmkvhLySM6t21wP5op7.png)
***

### 38. MISP - Open Source Threat Intelligence Platform
![Slide38.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wWpsYDLE4xfNnbBe1zkhqyPhkZLaMA37TWn6KVBZURMxiepb5U878vJK78WaNgSeuZn.png)
* Store and share structured data
* Enrichment + Automation
* Open + Extensible
* ISAO + ISAC + Elves

https://www.misp-project.org/
***

### 39. AM!TT + MISP
![Slide39.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wX9iGJftuMaUNpvr5fe2aQxL8Xsooz6qmknQ9HYBWXQt9pon3NNFfHfmGnacZQy81gM.png)
* MISP Misinformation Galaxy containing AM!TT Framework definitions
***

### 40. AM!TT + MISP
![Slide40.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23yTmdSEippg6GvgPs7yFbGKaGACKZzs6WAnmqusKug2s8UrubbdBSWAHJyD6bXR9icSt.png)
***

### 41. AM!TT + MISP
![Slide41.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23w2qCaExZTLHDXFcdsk5n4QMA5QGtvfcMvG2GDN6GzuxyQGFxZU5Y6xQjr63A5JWHDhw.png)
* AM!TT Techniques Galaxy
* DFRLab Dichotomies of Disinformation Taxonomy
* MISP Objects
  - forged-document
   - blog, meme-image
***

### 42. AM!TT + MISP
![Slide42.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wXA14uPpni31NMntWjSq4Pg8LAXEvYf1x4BBdTzt5eVNPWjfTjms927Qdv11bmYyAwA.png)
* MISP Event Graph
  * blog
  * microblog
  * forged-document
  * person
  * user-account
***

### 43. OpenCTI - OPEN THREAT INTELLIGENCE PLATFORM
![Slide43.png](https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wWpfU3Z1JSzSifz64bi1fjhu8ArJ213bfhXEW9VD6aycQxoVzxpEPaGUWxpD3Ydgd51.png)
* STIX 2.0
* Knowledge Graph
* Report based
* MISP integration

https://www.opencti.io
***

### 44. AM!TT + OpenCTI
https://i.ibb.co/d0X3X5b/Slide44.png
***

### 45. NEXT: AM!TT + Atomic Threat Coverage
https://i.ibb.co/MSBRffF/Slide45.png
* Done: AM!TT Techniques
* Next: AM!TT Counters
* Playbooks are assembled from sets of counters
* Markdown, Confluence, API, ...

https://github.com/atc-project/atomic-threat-coverage
***

### 46. COMMUNITY TOOLS AND TECHNIQUES
https://i.ibb.co/cXMLG75/Slide46.png
things we borrowed from data science
***

### 47. CogSec Collaborative - AM!TT m!s!nfosec
https://i.ibb.co/crv82F7/Slide47.png 
#### Join the Elves
##### *CogSec Collaborative helps communities counter disinformation.*
***

### 48. THANK YOU
https://i.ibb.co/vV1xB7N/Slide48.png
CogSec Collab
https://www.cogsec-collab.org
@bodaceacat
@VV_X_7
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 126 others
properties (23)
authoraagabriel
permlinktools-and-techniques-for-cognitive-security
categorycogsec
json_metadata"{"app":"peakd/2023.10.1","format":"markdown","author":"aagabriel","description":"Tools and Techniques for Cognitive Security - a slideshow presentation","tags":["cogsec","cogsect","informationwar","deepdives","5gw","mitre","misp","attack","infosec"],"users":["bodaceacat"],"image":["https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23t74fZzxiHiW73Po2ePv1L9n1Ka6BKLqYtfobSme5CszXYxT6LfUPgCzKmnwJuHhSuTS.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tGXrfzpTTktXGiUdfsj9XvAkd6YovJuGVdH2sC9qKpvGxjtyEXJJoxo4qDEhUbQYjzT.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23uQLVYJiktAfY43MiZf6NctaCXGmWtc3Eji6UxndWJFgzwk2YQHn6SztoE9vL1BrPCjL.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23t75DL8NAYCkW73aNthC1PW8weD6Nes3ue7FJKzoLtrPB3nfwDh1TVc9k2GobzyavoZK.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23swgNobQ7zak5RLkeMNS5ty2oWQidpDUSbSqsLUe6dUbk7x3SsB8H3FYm72peANyxA5G.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wC1UeoC32Bc8fJFHiPtshyfcaRcyMbxyMCh8R6Hs6tXDqZrfGvrJWLkkWZEBJxzpg6G.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23yTj8sJxd2RfeM5ECJpft9TyYrLcjddvzqvXYdNm4FiBLdFkGiRZGvr1ipvQmNLivZb9.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tRvaQWML4whAaFFpSS5vRy7eMRi4GWxcs5KSL3YYwpJ63rXb6FNUwkmdUh5xeWuJ2rq.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23x1DQ4CXf2vfaKTrmccedaSPh3bw5z9UQzmY9qiCaNCwUstCw6aESHt82ar1tvDcwhy3.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wC1Z6r4FAWjAVinNmAw3uijv7uZet7aRKX7diD3EVJCWjt554Fiv5hkeqmXBoMFRQV5.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23swgNLbp7gKB8UdRQMGrt6ojaLZrpKL4idc5hHSDMRbrm5V6muoE4yaX5JMrmhpkfLxL.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wWP6jtb16xCjqyjtjGe9wS6UXkqm1GmjNb5xNaWUAMGPwxqvyd7yVQQmdUJuX3s7yGU.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tS2cHogQbE4YNQXXqY4F11PEuEM8DzixmFW5aqXgdX2z2UMSBNuF7hp8K7hZWqDAaQd.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23tbRhGzDb5JDQLthJ144Zh8CW1UcSwyqR2BwfnJr28BMWiRMK5XuCGTXLyGUtQFUAqBP.png","https://files.peakd.com/file/peakd-hive/n0m0refak3n3ws/23wC1UeoC32Bc4GfPLUW55zCYoNWtHKFqFoJbZByWQ8Dzdk1yWWMpMQux9paVocEkpR5u.png"]}"
created2023-11-18 18:52:45
last_update2023-11-18 18:54:06
depth0
children3
last_payout2023-11-25 18:52:45
cashout_time1969-12-31 23:59:59
total_payout_value7.038 HBD
curator_payout_value7.008 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length16,502
author_reputation80,740,211,631,517
root_title"Tools and Techniques for Cognitive Security"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id128,974,633
net_rshares30,761,043,170,079
author_curate_reward""
vote details (190)
@hivebuzz ·
Congratulations @aagabriel! You have completed the following achievement on the Hive blockchain And have been rewarded with New badge(s)

<table><tr><td><img src="https://images.hive.blog/60x70/http://hivebuzz.me/@aagabriel/upvotes.png?202311220750"></td><td>You distributed more than 36000 upvotes.<br>Your next target is to reach 37000 upvotes.</td></tr>
</table>

<sub>_You can view your badges on [your board](https://hivebuzz.me/@aagabriel) and compare yourself to others in the [Ranking](https://hivebuzz.me/ranking)_</sub>
<sub>_If you no longer want to receive notifications, reply to this comment with the word_ `STOP`</sub>

properties (22)
authorhivebuzz
permlinknotify-aagabriel-20231122t075922
categorycogsec
json_metadata{"image":["http://hivebuzz.me/notify.t6.png"]}
created2023-11-22 07:59:21
last_update2023-11-22 07:59:21
depth1
children0
last_payout2023-11-29 07:59:21
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length635
author_reputation369,403,566,491,342
root_title"Tools and Techniques for Cognitive Security"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id129,074,688
net_rshares0
@valued-customer · (edited)
Fascinating and inspirational examination and consideration of how to free our minds and prevent Machiavellian manipulation of humanity, avoid the malevolent hazards inherent to Space Age technology, and enable absolute freedom prophesied millennia ago, or suffer the twisted hellscapes madmen willing to commit any atrocity intend.

Thanks!
👍  
properties (23)
authorvalued-customer
permlinkre-aagabriel-s4cuqz
categorycogsec
json_metadata{"tags":["cogsec"],"app":"peakd/2023.10.1"}
created2023-11-19 05:14:30
last_update2023-11-23 18:26:03
depth1
children1
last_payout2023-11-26 05:14:30
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length341
author_reputation358,546,010,418,003
root_title"Tools and Techniques for Cognitive Security"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id128,985,048
net_rshares2,792,617,296
author_curate_reward""
vote details (1)
@aagabriel ·
$0.02
Thanks 2 u too!
👍  
properties (23)
authoraagabriel
permlinkre-valued-customer-s4klsg
categorycogsec
json_metadata{"tags":["cogsec"],"app":"peakd/2023.10.1"}
created2023-11-23 09:45:51
last_update2023-11-23 09:45:51
depth2
children0
last_payout2023-11-30 09:45:51
cashout_time1969-12-31 23:59:59
total_payout_value0.010 HBD
curator_payout_value0.010 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length15
author_reputation80,740,211,631,517
root_title"Tools and Techniques for Cognitive Security"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id129,102,720
net_rshares43,047,335,649
author_curate_reward""
vote details (1)