SECVRITAS CONTRA MENDACIA REPVGNANDO

"security by fighting back against lies"

Disinformation, botnets, sock puppets, deepfakes, propaganda, information disorder: We are all painfully aware of these burgeoning threats to democratic elections and the information ecosystem. But anyone who can hack an election, can just as easily hack a market. The Internet has democratized psychological warfare. Bad actors of all kinds now have a low-cost asymmetric advantage in undermining legitimate information and framing public discourse for targeted or antisocial ends. Whether you are in retail, investing, PR, or just a publicly-traded company, your bottom line depends critically on public sentiment—and the new tools of digital disinformation are readily available for anyone to use against you: competitors, disgruntled customers, conspiracy nuts, even hostile foreign governments.  

CogSec Technologies Inc. is a unique and extraordinary team of seasoned veterans (some of us are literally veterans) from the trenches of information warfare and disinformation. We provide your business with the expertise and support you need to:

  • Stay informed about the deepest layers of the information ecosystem: Threat intelligence and Sediment Analysis™
  • Understand how hostile disinformation could harm your business and minimize your exposure: Misinfosec Threat Modeling™ and DevCogSecOps™
  • Respond rapidly and effectively in the case of a disinformation attack: Misinfosec Incident Response™  
dperlman-photo-profile


Meet David

David M. Perlman, Ph.D. left his job at Twitter to build a team to fight back against disinformation, market manipulation, and digital deception. He saw that conventional tools like content moderation, user sanctions, fact checking, and even legislation and public education were failing to turn the tide of information disorder. Since 2016 he has developed a multidisciplinary approach to studying online propaganda and misinformation, combining data science, psychology, systems theory, and human-computer interaction in novel models. This holistic view led to the strategy of "information aikido", where instead of confronting disinformation campaigns head-on, they are deflected and undermined. He has presented to defense officials and business leaders on social networks and psychological influence, led a workshop for NATO officials in London, co-authored a chapter on digital disinformation for SOCOM and Lawrence Livermore, and presented on corporate risks of misinformation security at the Black Hat cybersecurity conference. In his previous incarnations he studied physics, electrical engineering, information technology, and game theory, and received his doctorate in cognitive science. He used functional brain imaging, psychophysiology, and behavioral economics to study attention, emotion, and identity. His personal career highlight was presenting his research one-one-one to HH The Dalai Lama at a monastery in India.  

Our Process

Adapting STIX and TAXII means we can connect low-level data science objects, incident objects (analogous to intrusion objects), narratives (analogous to malware objects), etc. to standard security database architecture and describe relationships between them. This is designed to maximally facilitate the difficult task of attribution of disinformation campaigns, and ultimately prevention of harm to your business interests.  

Long story short...

Our technology is designed to maximally facilitate the difficult task of attribution of disinformation campaigns, and ultimately prevention of harm to your business interests.

Let's work together

Our mission is to improve our clients cybersecurity posture by identifying systems and services for robust and effective analysis related to cybersecurity risks.

FREE CONSULTATION