<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The News | Dan Patterson]]></title><description><![CDATA[Technology reporting at the intersection of politics, business, and culture. ]]></description><link>https://news.danpatterson.com</link><image><url>https://substackcdn.com/image/fetch/$s_!3U66!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a980a2b-1dd7-47d3-8943-4c2d5cc87067_1000x1000.png</url><title>The News | Dan Patterson</title><link>https://news.danpatterson.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 16:28:01 GMT</lastBuildDate><atom:link href="https://news.danpatterson.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Dan Patterson]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[danpatterson@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[danpatterson@substack.com]]></itunes:email><itunes:name><![CDATA[Dan Patterson]]></itunes:name></itunes:owner><itunes:author><![CDATA[Dan Patterson]]></itunes:author><googleplay:owner><![CDATA[danpatterson@substack.com]]></googleplay:owner><googleplay:email><![CDATA[danpatterson@substack.com]]></googleplay:email><googleplay:author><![CDATA[Dan Patterson]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Webinar: The 2026 State of Disinformation Narrative Intelligence Report]]></title><description><![CDATA[Generative AI has dramatically compressed the cost and scale of narrative manipulation.]]></description><link>https://news.danpatterson.com/p/webinar-the-2026-state-of-disinformation</link><guid isPermaLink="false">https://news.danpatterson.com/p/webinar-the-2026-state-of-disinformation</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Wed, 25 Feb 2026 20:04:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vanj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://blackbird.ai/webinars/2026-disinformation-narrative-intelligence-report/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vanj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vanj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vanj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vanj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vanj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg" width="1402" height="726" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:726,&quot;width&quot;:1402,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:172211,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://blackbird.ai/webinars/2026-disinformation-narrative-intelligence-report/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/189168538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vanj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vanj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vanj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vanj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fab88db-844c-411c-8871-6b5751596153_1402x726.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I recently had a <a href="https://blackbird.ai/webinars/2026-disinformation-narrative-intelligence-report/">LinkedIn Live conversation</a> with Wasim Khaled, Blackbird.AI CEO, about the key takeaways of our recently-published <a href="https://blackbird.ai/resources/2026-state-of-disinformation-narrative-intelligence-report/">RAV3N Report: 2026 State of Disinformation Narrative Intelligence</a> and the landscape is stark: Generative AI has compressed the cost and scale of narrative manipulation to the point where a single operator can execute what once required large teams, and the legacy monitoring tools most organizations still depend on (keyword tracking, sentiment analysis) are trivial to manipulate. Nearly 60% of surveyed organizations report that narrative attacks have affected them, yet fewer than 20% of leaders express strong confidence in their ability to detect them. Wasim argued that narrative risk is equivalent to, and sometimes greater than, ransomware and data breaches. </p><p>The full report is <strong><a href="https://blackbird.ai/resources/2026-state-of-disinformation-narrative-intelligence-report/">here</a></strong>, and the LinkedIn Live conversation is <strong><a href="https://blackbird.ai/webinars/2026-disinformation-narrative-intelligence-report/">here</a></strong>.</p><p>Thanks for watching.</p>]]></content:encoded></item><item><title><![CDATA[Four critical AI vulnerabilities are being exploited faster than defenders can respond]]></title><description><![CDATA[From prompt injection to deepfake fraud, threat actors weaponize the same capabilities that make AI systems useful. Security researchers say several flaws have no known fix.]]></description><link>https://news.danpatterson.com/p/four-ai-cybersecurity-vulnerabilities</link><guid isPermaLink="false">https://news.danpatterson.com/p/four-ai-cybersecurity-vulnerabilities</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Wed, 18 Feb 2026 17:23:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DjIP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.zdnet.com/article/ai-security-threats-2026-overview/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DjIP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DjIP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DjIP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DjIP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DjIP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg" width="1280" height="629" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:629,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:116497,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://www.zdnet.com/article/ai-security-threats-2026-overview/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/188397067?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DjIP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DjIP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DjIP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DjIP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c32822e-6b74-44da-8de3-20f57417b7b8_1280x629.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I recently published a <a href="https://www.zdnet.com/article/ai-security-threats-2026-overview/">story on ZDNet</a> about AI hacking that examines four critical vulnerabilities threatening AI systems across industries and explains why most have no known fixes.</p><p><strong>Autonomous AI agents</strong> are being <a href="https://blackbird.ai/blog/openclaw-moltbook-agentic-ai-amplified-cyber-narrative-attack-risk/">hijacked to conduct cyberattacks</a> without human intervention. In September, Anthropic disclosed that Chinese state-sponsored hackers weaponized its Claude Code tool to autonomously conduct reconnaissance, write exploit code, and exfiltrate data from approximately 30 targets. Security researcher Bruce Schneier put it plainly: we have zero agentic AI systems that are secure against these attacks.</p><p><strong>Prompt injection</strong>, identified as a vulnerability several years ago, remains a <a href="https://www.theregister.com/2023/04/26/simon_willison_prompt_injection/">significant architectural challenge</a> for many modern AI systems, with few solutions. A <a href="https://papers.academic-conferences.org/index.php/iccws/article/view/3292">recent study</a> found that a significant percentage of attacks succeeded across all tested large language models, with larger and more capable models performing no better than smaller ones. There is no parameterized query equivalent for AI, the way there is for SQL injection. The flaw is structural.</p><p><strong>Training data can be poisoned</strong> for as little as $60, with just 250 corrupted documents enough to backdoor any LLM regardless of its size. Unlike prompt injection, which exploits a model at inference time, <a href="https://arxiv.org/abs/2302.10149">data poisoning corrupts the model itself</a>. The backdoor may already be sitting in production systems, dormant until triggered.</p><p><strong>Deepfake fraud</strong> has already stolen tens of millions of dollars. A finance worker at Arup wired $25.6 million after a video call during which everyone on screen, including his CFO, appeared to be AI-generated. <a href="http://blackbird.ai/resources/2026-state-of-disinformation-narrative-intelligence-report">Detection technology</a> can help, but the problem scales as the technology becomes more sophisticated and lower-cost. And recent research found that humans correctly identify high-quality deepfakes only 24.5% of the time.</p><p>The common problem across all four threats is that the capabilities that make AI useful are the ones attackers exploit. Organizations are deploying systems with fundamental flaws while threat actors are already weaponizing them at scale, and the gap between adoption and security is only widening.</p><p><strong><a href="https://www.zdnet.com/article/ai-security-threats-2026-overview/">Read the full story on ZDNet</a></strong></p>]]></content:encoded></item><item><title><![CDATA[Narrative Attacks: Amplified by Agents]]></title><description><![CDATA[Disinformation narrative intelligence is an emerging discipline that examines how weaponized information forms, spreads, and causes societal harm.]]></description><link>https://news.danpatterson.com/p/disinformation-narrative-intelligence</link><guid isPermaLink="false">https://news.danpatterson.com/p/disinformation-narrative-intelligence</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Wed, 11 Feb 2026 13:05:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GWca!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://blackbird.ai/blog/disinformation-narrative-intelligence/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GWca!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg 424w, https://substackcdn.com/image/fetch/$s_!GWca!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg 848w, https://substackcdn.com/image/fetch/$s_!GWca!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!GWca!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GWca!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg" width="1428" height="802" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:802,&quot;width&quot;:1428,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:65052,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://blackbird.ai/blog/disinformation-narrative-intelligence/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/187562532?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GWca!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg 424w, https://substackcdn.com/image/fetch/$s_!GWca!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg 848w, https://substackcdn.com/image/fetch/$s_!GWca!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!GWca!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a0d1b76-d042-4090-829a-ecf34cf06cdc_1428x802.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Coordinated narrative attacks destabilize elections, erode public trust in institutions, and give nation-state actors a low-cost, scalable weapon. Agentic AI has accelerated the problem. Autonomous systems can now plan, generate, and iterate platform manipulation with minimal human oversight, manufacturing viral crises from fabricated content faster than governments, organizations, companies, or leaders can respond.</p><p><a href="https://blackbird.ai/blog/disinformation-narrative-intelligence/">Disinformation narrative intelligence</a> focuses on understanding these threats. It combines network analysis, manipulation detection, threat actor attribution, and influence measurement to map how harmful narratives form, the cohorts driving them, and how they spread across platforms. The core work is determining whether amplification is organic or engineered, identifying the actors behind coordinated campaigns, and assessing narrative risk before they cause real-world harm. The field is evolving fast, shaped by agentic AI by attackers and defenders.</p><p><strong><a href="https://blackbird.ai/blog/disinformation-narrative-intelligence/">Learn More</a></strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://news.danpatterson.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The News | Dan Patterson! Subscribe for free to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Blackbird.AI's The RAV3N Report: 2026 State of Disinformation Narrative Intelligence]]></title><description><![CDATA[Organizations face a growing gap between manipulated narrative exposure and detection, a critical vulnerability adversaries are actively exploiting.]]></description><link>https://news.danpatterson.com/p/blackbirdais-the-rav3n-report-2026</link><guid isPermaLink="false">https://news.danpatterson.com/p/blackbirdais-the-rav3n-report-2026</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Tue, 03 Feb 2026 16:02:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!nF89!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://blackbird.ai/blog/rav3n-report-2026-state-of-disinformation-narrative-intelligence/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nF89!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nF89!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nF89!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nF89!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nF89!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:996582,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://blackbird.ai/blog/rav3n-report-2026-state-of-disinformation-narrative-intelligence/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/186745927?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nF89!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nF89!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nF89!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nF89!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57eae34-e322-4e99-b80b-a01460331d90_1536x1024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>My work at Blackbird.AI positions me between artificial intelligence engineers, intelligence analysts, and executives. <strong><a href="https://blackbird.ai/blog/rav3n-report-2026-state-of-disinformation-narrative-intelligence/">The RAV3N Report: 2026 State of Disinformation Narrative Intelligence</a></strong> draws from our latest narrative intelligence research, AI analysis of online social manipulation, and a survey of top security executives about emerging threats. The findings confirm what many of us have suspected: narrative attacks have crossed from theoretical concern to operational reality.</p><p>You can download and read the report <strong><a href="https://blackbird.ai/resources/2026-state-of-disinformation-narrative-intelligence-report/">here</a></strong>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://news.danpatterson.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The News | Dan Patterson. Subscribe for free to receive new posts. Thanks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Year AI Became a Hacker]]></title><description><![CDATA[Blackbird.AI's top research stories of 2025 reveal how narrative attacks evolved, targeting execs, banks, aviation, Hollywood and pop culture, and sunscreen. Yes, sunscreen.]]></description><link>https://news.danpatterson.com/p/the-year-ai-became-a-hacker</link><guid isPermaLink="false">https://news.danpatterson.com/p/the-year-ai-became-a-hacker</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Mon, 22 Dec 2025 16:55:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ff_L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://blackbird.ai/blog/biggest-narrative-attacks-2025/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ff_L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic 424w, https://substackcdn.com/image/fetch/$s_!Ff_L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic 848w, https://substackcdn.com/image/fetch/$s_!Ff_L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic 1272w, https://substackcdn.com/image/fetch/$s_!Ff_L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ff_L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic" width="1340" height="896" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:896,&quot;width&quot;:1340,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:239043,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://blackbird.ai/blog/biggest-narrative-attacks-2025/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/182338588?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ff_L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic 424w, https://substackcdn.com/image/fetch/$s_!Ff_L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic 848w, https://substackcdn.com/image/fetch/$s_!Ff_L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic 1272w, https://substackcdn.com/image/fetch/$s_!Ff_L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc508d772-112d-418e-9c34-18808d9e9d6d_1340x896.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Narrative intelligence emerged as one of the fastest-growing cybersecurity categories this year. I work as the fulcrum between Blackbird.AI&#8217;s RAV3N research intelligence team and our AI engineers. In 2025, we watched as AI systems evolved from criminal tools to autonomous operators capable of executing complete attack campaigns without human oversight. Narrative attacks also targeted executives, </p><p>Blackbird.AI&#8217;s Narrative Intelligence platform detects these attacks by analyzing manipulated narratives, identifying threat actors, mapping amplification networks, flagging bot and autonomous behavior, and documenting the communities that connect them. And our RAV3N research team interprets data in granular detail for high-profile partners. Their analysis revealed coordinated campaigns, synthetic media, and influence networks that moved faster than crisis communications teams could respond.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://news.danpatterson.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The full scope of RAV3N research is documented in our <strong><a href="https://blackbird.ai/blog/biggest-narrative-attacks-2025/">annual Narrative Intelligence roundup blog post</a></strong>. These are some of the most significant narrative attacks of 2025:</p><p><strong><a href="https://blackbird.ai/blog/hijacked-ai-agent-signals-new-normal/">Hijacked AI Agent Signals New Normal</a></strong></p><p>Chinese state-sponsored hackers hijacked Anthropic&#8217;s Claude AI and weaponized it against 30 organizations. The AI agent scanned networks, identified high-value databases, wrote exploit code, harvested credentials, and exfiltrated data. Human operators intervened at only four to six junctures across the entire operation. Claude performed thousands of operations per second, something human hackers could never match. The attackers tricked the AI by breaking malicious objectives into small, innocuous-looking requests and instructing Claude to behave as a cybersecurity employee conducting authorized penetration testing.</p><p><strong><a href="https://blackbird.ai/blog/ai-led-cyberattacks/">AI Is Now the Operator: The End of Human-Led Cyberattacks</a></strong></p><p>AI systems now conduct reconnaissance, identify vulnerabilities, craft exploitation strategies, and execute complete extortion campaigns without human intervention. Hospitals received demands exceeding half a million dollars from AI-generated ransomware that adapted its approach based on network topology. North Korean operators use AI to secure legitimate positions at major corporations, handling technical interviews, submitting code reviews, and participating in team communications while harvesting intelligence. Ransomware construction kits sell for several hundred dollars and include military-grade encryption and endpoint detection bypass mechanisms.</p><p><strong><a href="https://blackbird.ai/blog/disinformation-security-and-narrative-intelligence/">Disinformation Security and Narrative Intelligence</a></strong></p><p>Narrative intelligence became one of the fastest-growing cybersecurity categories in 2025. Executives recognized that narrative attacks targeting their companies and leaders represent a critical threat vector that traditional security tools cannot detect. Publicly traded companies lose approximately $39 billion annually to narrative-attack-related stock market losses. Most organizations still treat narrative attacks as communications problems rather than security threats. Firewalls do not stop deepfakes. Endpoint detection cannot identify coordinated bot campaigns. Security information and event management systems lack visibility into perception manipulation occurring on social platforms.</p><p><strong><a href="https://blackbird.ai/blog/ai-actor-tilly-hollywood-manipulated-narratives/">AI Actor Tilly and Hollywood&#8217;s Manipulated Narratives</a></strong></p><p>An AI-generated actor named Tilly Norwood debuted and triggered seven distinct manipulated narratives. Blackbird.AI found 36 percent of actor posts emphasized identity theft concerns. 28 percent of conversations targeted agencies as traitors. Significant bot-like activity amplified debates about labor displacement, training data ethics, and union governance. SAG-AFTRA condemned the synthetic performer. The case demonstrates how AI-driven controversy generates overlapping narrative attacks across multiple vectors simultaneously. Questions arose about intellectual property, likeness rights, and contractual frameworks governing synthetic talent.</p><p><strong><a href="https://blackbird.ai/blog/narrative-attacks-threaten-to-hijack-the-taylor-swift-travis-kelce-engagement/">Narrative Attacks Threaten to Hijack the Taylor Swift Travis Kelce Engagement</a></strong></p><p>The celebrity announcement became a manipulation study. Blackbird.AI identified five coordinated narratives: PR-stunt allegations, NFL conspiracy theories, misogynistic attacks, prediction-market exploitation, and partisan political framing. Traders wagered more than $250,000 on engagement-related bets. Probability markets surged from 25 percent to 45 percent hours before the public announcement. Individual traders reportedly made more than $3,000 in a single day buying shares just before the news broke. The incident triggered debates about profiting from private relationship milestones and raised regulatory questions about information leakage.</p><p><strong><a href="https://blackbird.ai/blog/how-coordinated-narrative-attack-shook-us-bank-trust/">How a Coordinated Narrative Attack Shook U.S. Banking Trust</a></strong></p><p>The #TheBanksAreOutOfMoney hashtag flooded social media following new tariff announcements. Blackbird.AI analysis found 17.2 percent of accounts displayed bot-like behavior. Coordinated actors circulated doctored Bloomberg-style screenshots showing false liquidity crises. Non-attributable burner accounts shared repetitive meme-style content with overlapping hashtags. A single post calling for people to withdraw funds while they still can was widely circulated by both real users and bots. The campaign triggered genuine withdrawal concerns before banks could respond and demonstrated how brittle trust can be when subjected to well-timed narrative attacks.</p><p><strong><a href="https://blackbird.ai/blog/narrative-attacks-manipulate-public-perception-aviation-safety/">Narrative Attacks Manipulate Public Perception of Aviation Safety</a></strong></p><p>High-profile incidents triggered coordinated reputation attacks against airlines. False claims spread about maintenance practices, regulatory failures, and negligence. Following the midair collision between a Blackhawk helicopter and an airliner at DCA, Blackbird.AI detected a 60 percent spike in fear-of-flying mentions. Negative narratives on social media spiked 64 percent. News reports on aviation safety concerns rose 30 percent. Bad actors exploited public fear to damage industry reputation, demonstrating how safety-sensitive industries face coordinated reputation attacks during crisis events.</p><p><strong><a href="https://blackbird.ai/blog/how-sunscreen-became-a-target-of-narrative-attacks-summer-2025/">How Sunscreen Became a Target of Narrative Attacks in Summer 2025</a></strong></p><p>An unlikely product became a narrative attack target. Coordinated campaigns spread claims about health risks, environmental harm, and misleading product standards. Consumer trust eroded. Regulatory scrutiny increased. Brands found themselves defending not just their products but scientific consensus itself. The case demonstrated how information campaigns can weaponize health and safety concerns against entire product categories. Consumer products companies learned that narrative vulnerability extends beyond corporate reputation to the fundamental trust consumers place in product safety.</p><p>Traditional security tools cannot detect these narrative attacks and won&#8217;t prevent deepfakes or identify coordinated amplification campaigns. The attack surface is now public perception. Organizations still treating narrative threats as communications problems will find themselves responding to crises that began and ended before anyone registered an alert.</p><p><strong><a href="https://blackbird.ai/blog/biggest-narrative-attacks-2025/">LEARN MORE</a></strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://news.danpatterson.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The News. Subscribe now for free to receive new posts and support my work. Thanks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Webinar: From #Trending to #Targeted – When Brand Ambassadors Become Reputation Risks Overnight]]></title><description><![CDATA[WATCH: Influencers fuel growth but can pull brands into culture wars. Narrative intelligence helps teams spot risks early, filter signal from noise, and choose when to engage, pause, or exit.]]></description><link>https://news.danpatterson.com/p/webinar-from-trending-to-targeted</link><guid isPermaLink="false">https://news.danpatterson.com/p/webinar-from-trending-to-targeted</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Fri, 05 Dec 2025 12:33:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VAbk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://blackbird.ai/blog/linkedin-live-influencer-risk/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VAbk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic 424w, https://substackcdn.com/image/fetch/$s_!VAbk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic 848w, https://substackcdn.com/image/fetch/$s_!VAbk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic 1272w, https://substackcdn.com/image/fetch/$s_!VAbk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VAbk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic" width="1456" height="750" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:750,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:93654,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://blackbird.ai/blog/linkedin-live-influencer-risk/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/180792375?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VAbk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic 424w, https://substackcdn.com/image/fetch/$s_!VAbk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic 848w, https://substackcdn.com/image/fetch/$s_!VAbk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic 1272w, https://substackcdn.com/image/fetch/$s_!VAbk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68027448-678a-47a9-9e32-e3d1653d97f8_1600x824.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>During a <a href="https://blackbird.ai/blog/linkedin-live-influencer-risk/">recent Blackbird.AI LinkedIn Live</a>, <a href="https://www.linkedin.com/in/gregoryyoungr/">Greg Young</a> and I explored how organizations can detect early warning signals of narrative emergencies and determine when to engage versus stay silent.</p><p>The key insight: effective response requires understanding not just what narratives exist, but who drives them. Organizations must distinguish whether criticism comes from actual customers or external groups with separate agendas.</p><p>Traditional vetting fails to capture the full spectrum of influencer risk. Technology must augment human analysis to monitor niche podcasts, alternative forums, and dark web spaces where controversial views often surface.</p><p>Nike&#8217;s Kaepernick partnership demonstrates this approach. Despite boycott calls, Nike understood their core customers supported Kaepernick and emerged with strengthened brand loyalty.</p><p>Organizations that shift from reactive monitoring to proactive narrative intelligence transform reputation management from desperate defense to strategic advantage.</p><p><strong><a href="https://blackbird.ai/webinars/linkedin-live-from-trending-to-targeted-the-viral-side-of-influncer-risk/">WATCH</a></strong></p>]]></content:encoded></item><item><title><![CDATA[The Top 5 Strangest Narratives of All Time ]]></title><description><![CDATA[WATCH: Narrative intelligence reveals how seemingly harmless stories can evolve into tools of manipulation that influence institutions, societies, and the broader information landscape.]]></description><link>https://news.danpatterson.com/p/top-5-strangest-narratives</link><guid isPermaLink="false">https://news.danpatterson.com/p/top-5-strangest-narratives</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Fri, 31 Oct 2025 15:13:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tydf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.linkedin.com/events/top5strangestnarrativesofalltim7381366343368933376/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tydf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic 424w, https://substackcdn.com/image/fetch/$s_!tydf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic 848w, https://substackcdn.com/image/fetch/$s_!tydf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic 1272w, https://substackcdn.com/image/fetch/$s_!tydf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tydf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic" width="1456" height="732" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:732,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:225650,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/events/top5strangestnarrativesofalltim7381366343368933376/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/177662161?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tydf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic 424w, https://substackcdn.com/image/fetch/$s_!tydf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic 848w, https://substackcdn.com/image/fetch/$s_!tydf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic 1272w, https://substackcdn.com/image/fetch/$s_!tydf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d0b17a8-b113-4d1c-a301-7400953d4034_3774x1898.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Some stories appeared so bizarre that they initially seemed harmless. Yet across history, even the most implausible narratives have shaped collective belief systems, influenced social and political behavior, and produced tangible real-world outcomes.</p><p>In this <strong><a href="https://www.linkedin.com/events/top5strangestnarrativesofalltim7381366343368933376/">Halloween special</a></strong>, Blackbird.AI&#8217;s Dan Patterson examined how unconventional narratives emerged, circulated, and evolved into forces capable of affecting both private enterprises and national stability. What often began as parody or satire could rapidly transform into an influence mechanism that undermined institutional trust and disrupted social cohesion.</p><p>The session offered a critical, research-driven discussion that combined analytical insight with healthy skepticism, illustrating why the study of narrative intelligence had become an essential discipline for organizations seeking to remain informed, adaptable, and resilient amid today&#8217;s complex information environment.</p><p><strong><a href="https://www.linkedin.com/events/top5strangestnarrativesofalltim7381366343368933376/">WATCH</a></strong></p>]]></content:encoded></item><item><title><![CDATA[ZDNet: Don't fall for AI-powered narrative attacks online - here's how to stay sharp]]></title><description><![CDATA[AI is already challenging our reality. Here are expert tools and tips that anyone can use to spot manipulation, verify information, and protect their organization from narrative attacks.]]></description><link>https://news.danpatterson.com/p/zdnet-ai-narrative-attacks</link><guid isPermaLink="false">https://news.danpatterson.com/p/zdnet-ai-narrative-attacks</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Fri, 15 Aug 2025 15:50:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IIKw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.zdnet.com/article/dont-fall-for-ai-powered-disinformation-attacks-online-heres-how-to-stay-sharp/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IIKw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!IIKw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!IIKw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!IIKw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IIKw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1363392,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.zdnet.com/article/dont-fall-for-ai-powered-disinformation-attacks-online-heres-how-to-stay-sharp/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/171061246?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IIKw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!IIKw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!IIKw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!IIKw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff625b3-bef0-4697-9f44-ab45cb7d3bb6_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I recently published a story for <a href="https://www.zdnet.com/article/dont-fall-for-ai-powered-disinformation-attacks-online-heres-how-to-stay-sharp/">ZDNet about narrative attacks</a>, with practical tips and tools to help spot online information manipulation.</p><blockquote><h2>Why 'narrative attacks' matter more than ever</h2><p>Narrative attacks, as research firm Forrester <a href="https://cc.zdnet.com/v1/otc/00hQi47eqnEWQ6T9d4QLBUc?element=BODY&amp;element_label=defines+them&amp;module=LINK&amp;object_type=text-link&amp;object_uuid=8ad6a026-b1b0-4739-a515-a85cbda0e4ac&amp;position=1&amp;template=article&amp;url=https%3A%2F%2Fwww.forrester.com%2Fwhat-it-means%2Fep365-top-threats-2024%2F&amp;view_instance_uuid=dc1cbb0e-44e6-4bed-b901-30dd02843336&amp;track_code=__COM_CLICK_ID__-oo">defines them</a>, are the new frontier of cybersecurity: AI-powered manipulations or distortions of information that exploit biases and emotions, like disinformation campaigns on steroids.</p><p>I use the term "narrative attacks" deliberately. Terms like "disinformation" feel abstract and academic, while "narrative attack" is specific and actionable. Like cyberattacks, narrative attacks demonstrate how bad actors exploit technology to inflict operational, reputational, and financial harm.</p><p>Think of it this way: A cyber attack exploits vulnerabilities in your technical infrastructure. A narrative attack exploits vulnerabilities in your information environment, often causing <a href="https://www.weforum.org/stories/2025/07/financial-impact-of-disinformation-on-corporations/">financial</a>, <a href="https://unglobalriskreport.org/UNHQ-GlobalRiskReport-WEB-FIN.pdf">operational</a>, or <a href="https://www.forrester.com/report/the-external-threat-intelligence-service-providers-landscape-q1-2025/RES181939">reputational</a> harm. This article provides you with practical tools to identify narrative attacks, verify suspicious information, and safeguard yourself and your organization. We'll cover detection techniques, verification tools, and defensive strategies that work in the real world.</p><h2>A perfect storm of technology, tension, and timing</h2><p>Several factors have created the ideal conditions for narrative attacks to flourish. These dynamics help explain why we're seeing such a surge right now:</p><ul><li><p><strong>AI tools have democratized content creation</strong>. Anyone can generate convincing fake images, videos, and audio clips using freely available software. The technical barriers that once limited sophisticated narrative campaigns have largely disappeared.</p></li></ul><ul><li><p><strong>Social media platforms fragment audiences</strong> into smaller, more isolated communities. Information that might have been quickly debunked in a more diverse media environment can circulate unopposed within closed groups. Echo chambers amplify false narratives while insulating curated groups.</p></li></ul><ul><li><p><strong>Content moderation systems struggle to keep pace</strong> with the volume and sophistication of synthetic media. Platforms rely heavily on automated detection, which consistently lags behind the latest manipulation techniques. Human reviewers cannot examine every piece of content at scale.</p></li></ul><p>Meanwhile, bad actors are testing new playbooks, combining traditional propaganda techniques with cutting-edge technology and cyber tactics to create faster, more targeted, and more effective manipulation campaigns.</p></blockquote><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.zdnet.com/article/dont-fall-for-ai-powered-disinformation-attacks-online-heres-how-to-stay-sharp/&quot;,&quot;text&quot;:&quot;READ&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.zdnet.com/article/dont-fall-for-ai-powered-disinformation-attacks-online-heres-how-to-stay-sharp/"><span>READ</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[This Week in Tech: Wu Wei Meets Wu Tang]]></title><description><![CDATA[Patrick Beja, Daniel Rubino, Leo Laporte and I talk XBox Game Pass, AI regulation, and Stingray warnings on Android on TWi]]></description><link>https://news.danpatterson.com/p/this-week-in-tech-wu-wei-meets-wu</link><guid isPermaLink="false">https://news.danpatterson.com/p/this-week-in-tech-wu-wei-meets-wu</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Mon, 30 Jun 2025 13:05:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1tjx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1tjx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1tjx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png 424w, https://substackcdn.com/image/fetch/$s_!1tjx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png 848w, https://substackcdn.com/image/fetch/$s_!1tjx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png 1272w, https://substackcdn.com/image/fetch/$s_!1tjx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1tjx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png" width="1456" height="815" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:815,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2014217,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/170692569?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1tjx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png 424w, https://substackcdn.com/image/fetch/$s_!1tjx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png 848w, https://substackcdn.com/image/fetch/$s_!1tjx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png 1272w, https://substackcdn.com/image/fetch/$s_!1tjx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73f84c0-8885-4585-b0b5-299a0648dd7d_2012x1126.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Last week, on <a href="https://twit.tv/shows/this-week-in-tech/episodes/1038?autostart=false">This Week in Tech</a>, we talked about the business of video games, Apple&#8217;s decision to include an ad tied to their F1 movie promotion in the Wallet app, and AI regulation policy. The Supreme Court delivered two significant rulings that will reshape internet policy, allowing low-income broadband funding to continue while simultaneously upending established internet law in ways that raise serious questions. Meanwhile, Meta and Anthropic scored victories in copyright lawsuits, though the wins come with important limitations and don't resolve the bigger question of when AI-generated content might actually infringe on copyrights. </p><p><a href="https://twit.tv/shows/this-week-in-tech/episodes/1038?autostart=false">WATCH</a> </p>]]></content:encoded></item><item><title><![CDATA[Webinar: Why Narrative Attacks Are the New Cybersecurity Crisis]]></title><description><![CDATA[Watch Dr. Bilyana Lilly and Blackbird.AI CEO Wasim Khaled detail how narrative attacks are weaponized to target execs, brands, and governments.]]></description><link>https://news.danpatterson.com/p/webinar-narrative-attacks-cyber-attacks</link><guid isPermaLink="false">https://news.danpatterson.com/p/webinar-narrative-attacks-cyber-attacks</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Wed, 21 May 2025 14:21:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!w0Rt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://blackbird.ai/resources/on-demand-from-outrage-to-impact-understanding-and-mitigating-narrative-threats" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!w0Rt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg 424w, https://substackcdn.com/image/fetch/$s_!w0Rt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg 848w, https://substackcdn.com/image/fetch/$s_!w0Rt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!w0Rt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!w0Rt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg" width="1260" height="566" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:566,&quot;width&quot;:1260,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:99147,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://blackbird.ai/resources/on-demand-from-outrage-to-impact-understanding-and-mitigating-narrative-threats&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/164085196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!w0Rt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg 424w, https://substackcdn.com/image/fetch/$s_!w0Rt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg 848w, https://substackcdn.com/image/fetch/$s_!w0Rt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!w0Rt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ac636-98be-4793-9ad5-18d920dc4e58_1260x566.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Last week, I hosted a <a href="https://blackbird.ai/blog/why-narrative-attacks-are-the-new-cybersecurity-crisis-webinar/">webinar conversation</a> between cybersecurity expert and author <a href="https://www.linkedin.com/in/dr-bilyana-lilly-983b8119/">Dr. Bilyana Lilly</a> and Blackbird.AI co-founder and CEO Wasim Khaled about narrative attacks targeting executives and influencers, brands, and government organizations.</p><p>Unlike traditional hacks, these attacks weaponize perception, using bots, deepfakes, and AI-generated content to erode trust and trigger real-world consequences like stock drops and reputational collapse.</p><p>The key takeaway? Organizations must treat narrative threats like cyber threats: with detection tools, incident playbooks, and cross-functional response teams. As Khaled said, &#8220;Soon, no org will operate without narrative defense&#8212;just like no one runs without a firewall.&#8221;</p><p><a href="https://blackbird.ai/resources/on-demand-from-outrage-to-impact-understanding-and-mitigating-narrative-threats">Watch the full webinar here &#8594;</a></p><p></p>]]></content:encoded></item><item><title><![CDATA[ZDNet: 7 ways to lock down your phone's security - before it's too late]]></title><description><![CDATA[From border crossings to data breaches, there are more reasons than ever to protect your smartphone. Here's a practical guide to securing your device and your digital life.]]></description><link>https://news.danpatterson.com/p/secure-your-phone-zdnet</link><guid isPermaLink="false">https://news.danpatterson.com/p/secure-your-phone-zdnet</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Mon, 05 May 2025 13:11:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_Im_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23515344-4c99-41ff-8398-816698a36306_1280x720.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.zdnet.com/article/7-ways-to-lock-down-your-phones-security-before-its-too-late/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_Im_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23515344-4c99-41ff-8398-816698a36306_1280x720.heic 424w, https://substackcdn.com/image/fetch/$s_!_Im_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23515344-4c99-41ff-8398-816698a36306_1280x720.heic 848w, https://substackcdn.com/image/fetch/$s_!_Im_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23515344-4c99-41ff-8398-816698a36306_1280x720.heic 1272w, https://substackcdn.com/image/fetch/$s_!_Im_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23515344-4c99-41ff-8398-816698a36306_1280x720.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_Im_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23515344-4c99-41ff-8398-816698a36306_1280x720.heic" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/23515344-4c99-41ff-8398-816698a36306_1280x720.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:95343,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.zdnet.com/article/7-ways-to-lock-down-your-phones-security-before-its-too-late/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/162884601?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23515344-4c99-41ff-8398-816698a36306_1280x720.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_Im_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23515344-4c99-41ff-8398-816698a36306_1280x720.heic 424w, https://substackcdn.com/image/fetch/$s_!_Im_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23515344-4c99-41ff-8398-816698a36306_1280x720.heic 848w, https://substackcdn.com/image/fetch/$s_!_Im_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23515344-4c99-41ff-8398-816698a36306_1280x720.heic 1272w, https://substackcdn.com/image/fetch/$s_!_Im_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23515344-4c99-41ff-8398-816698a36306_1280x720.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I recently wrote an article for ZDNet with <a href="https://www.zdnet.com/article/7-ways-to-lock-down-your-phones-security-before-its-too-late/">easy-to-understand advice to lock down your phone&#8217;s security and privacy</a>.</p><p>In June 2017, as <a href="https://www.zdnet.com/article/a-massive-cyberattack-is-hitting-organisations-around-the-world/">NotPetya malware</a> ripped through Ukraine's business and government technology infrastructure, I <a href="https://news.danpatterson.com/p/ukraine-is-a-testbed-for-global-cyberattacks?utm_source=publication-search">reported</a> from the capital, Kyiv, for ZDNET's then-sibling publication <a href="https://www.techrepublic.com/article/cyberweapons-are-now-in-play-from-us-sabotage-of-a-north-korean-missile-test-to-hacked-emergency/">TechRepublic</a>, moderating panel discussions about geopolitical cyber defense at the Global Cybersecurity Summit. The city was a charming, modern startup hub with innovative thinkers and smart technology.</p><p>It was also a hacker trap. The town itself was safe, but targeted with a blend of kinetic and digital attacks by hyper-polarized geopolitical actors. Key hacks included blackouts from <a href="https://www.zdnet.com/article/how-hackers-attacked-ukraines-power-grid-implications-for-industrial-iot-security/">power grid attacks in 2015</a> and <a href="https://www.zdnet.com/article/us-report-confirms-ukraine-power-outage-caused-by-cyberattack/">2016</a> and the NotPetya malware, which started in Ukraine and spread globally. Ukraine's State Treasury was also targeted, which infected military systems and <a href="https://www.zdnet.com/article/a-massive-hacking-attack-has-hit-government-websites-in-ukraine/">disrupted government sites</a>, especially during the 2022 invasion.</p><p>From taking notes to shooting video and audio, I needed my phone to report. Smartphones are essential tools; they're also security and privacy liabilities. In today's expanding surveillance and threat environment, which is full of opportunistic cyberattacks, corporate tracking, and invasive government scrutiny, locking down your phone is smart and often necessary.</p><p><strong>Read on ZDNet: <a href="https://www.zdnet.com/article/7-ways-to-lock-down-your-phones-security-before-its-too-late/">7 ways to lock down your phone's security - before it's too late</a>.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://news.danpatterson.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Dan Patterson | The News</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Blackbird.AI + Combatting the global information crisis with NarrativePULSE]]></title><description><![CDATA[I now lead communications at Blackbird.AI]]></description><link>https://news.danpatterson.com/p/blackbirdai-combatting-the-global</link><guid isPermaLink="false">https://news.danpatterson.com/p/blackbirdai-combatting-the-global</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Wed, 16 Apr 2025 15:28:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!O24y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://blackbird.ai/blog/narrativepulse-help-organizations-combat-narrative-attacks-blackbird-ai/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!O24y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic 424w, https://substackcdn.com/image/fetch/$s_!O24y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic 848w, https://substackcdn.com/image/fetch/$s_!O24y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic 1272w, https://substackcdn.com/image/fetch/$s_!O24y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!O24y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic" width="1456" height="715" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:715,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:136566,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://blackbird.ai/blog/narrativepulse-help-organizations-combat-narrative-attacks-blackbird-ai/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/161469848?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!O24y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic 424w, https://substackcdn.com/image/fetch/$s_!O24y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic 848w, https://substackcdn.com/image/fetch/$s_!O24y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic 1272w, https://substackcdn.com/image/fetch/$s_!O24y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddcfb4c-164e-4fc0-b300-fdab9d56c5ea_2426x1192.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;m now lead comms at Blackbird.AI. If you&#8217;re covering disinformation, narrative manipulation, or deepfakes, please reach out. I&#8217;m happy to share research data and use cases or set up a briefing with our CEO, Wasim Khaled, or one of our narrative intelligence analysts.</p><p>We just launched <a href="https://blackbird.ai/narrative-pulse/">NarrativePULSE</a>, a fast, AI-powered tool designed to help organizations monitor and understand harmful narratives and deepfakes. It offers a clear starting point for teams looking to assess emerging risks without the overhead of a full-scale threat intelligence platform.</p><p>For more info, here&#8217;s the <a href="http://blackbird.ai/wp-content/uploads/2025/03/BB-narrativepulse.pdf">datasheet</a> and the <a href="https://blackbird.ai/blog/narrativepulse-help-organizations-combat-narrative-attacks-blackbird-ai/">blog</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://news.danpatterson.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Dan Patterson | The News</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[ZDNet: 4 expert security tips for navigating AI-powered cyber threats]]></title><description><![CDATA[AI-powered cyber threats are reshaping security landscapes. Businesses that don't evolve will be vulnerable to increasingly sophisticated attacks - here's how to stay ahead.]]></description><link>https://news.danpatterson.com/p/zdnet-security-tips-for-artificial-intelligence</link><guid isPermaLink="false">https://news.danpatterson.com/p/zdnet-security-tips-for-artificial-intelligence</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Thu, 13 Mar 2025 15:03:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!p7_5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.zdnet.com/article/4-expert-security-tips-for-navigating-ai-powered-cyber-threats/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p7_5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!p7_5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!p7_5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!p7_5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p7_5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:266227,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://www.zdnet.com/article/4-expert-security-tips-for-navigating-ai-powered-cyber-threats/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/158998106?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p7_5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!p7_5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!p7_5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!p7_5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd09b0ba8-f3d0-41f6-b2e0-4382097d5749_1280x720.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I recently published an article for <strong>ZDNet</strong> about the rapid growth of <a href="https://www.zdnet.com/article/4-expert-security-tips-for-navigating-ai-powered-cyber-threats/">artificial intelligence as a cyber weapon</a>.</p><p>Cybercriminals are weaponizing <a href="https://www.zdnet.com/article/what-is-ai-heres-everything-you-need-to-know-about-artificial-intelligence/">artificial intelligence</a> (AI) across every attack phase. Large language models (LLMs) craft hyper-personalized phishing emails by scraping targets' social media profiles and professional networks. Generative adversarial networks (GAN) produce deepfake audio and video to bypass multi-factor authentication. Automated tools like <a href="https://www.zdnet.com/article/wormgpt-what-to-know-about-chatgpts-malicious-cousin/">WormGPT</a> enable script kiddies to launch polymorphic malware that evolves to evade signature-based detection.</p><p>These cyber attacks aren't speculative, either. Organizations that fail to develop their security strategies risk being overrun by an onslaught of hyper-intelligent cyber threats -- in 2025 and beyond.</p><p><strong><a href="https://www.zdnet.com/article/4-expert-security-tips-for-navigating-ai-powered-cyber-threats/">Read the full story at ZDNet</a></strong></p>]]></content:encoded></item><item><title><![CDATA[Muck Rack: The State of AI in PR and Communications ]]></title><description><![CDATA[The communications and public relations industry experienced a surge in AI adoption, with professionals utilizing tools for drafting pitches and press releases.]]></description><link>https://news.danpatterson.com/p/muck-rack-the-state-of-ai-in-pr-and</link><guid isPermaLink="false">https://news.danpatterson.com/p/muck-rack-the-state-of-ai-in-pr-and</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Mon, 24 Feb 2025 19:07:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gkCT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://muckrack.com/webinars/takeaways-state-of-ai-2025/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gkCT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic 424w, https://substackcdn.com/image/fetch/$s_!gkCT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic 848w, https://substackcdn.com/image/fetch/$s_!gkCT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic 1272w, https://substackcdn.com/image/fetch/$s_!gkCT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gkCT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic" width="800" height="605" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:605,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:60248,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://muckrack.com/webinars/takeaways-state-of-ai-2025/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/157828965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gkCT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic 424w, https://substackcdn.com/image/fetch/$s_!gkCT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic 848w, https://substackcdn.com/image/fetch/$s_!gkCT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic 1272w, https://substackcdn.com/image/fetch/$s_!gkCT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab5f500e-9cc7-4fa6-a70f-76b2f693df66_800x605.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Last week, I joined four communication experts&#8212;Qualcomm's Kristin Stiles, Mozilla's Sarah Vasquez, and VCA Animal Hospital's Joseph Campbell&#8212;for <a href="https://muckrack.com/webinars/takeaways-state-of-ai-2025/">Muck Rack&#8217;s &#8220;State of AI 2025</a>&#8221; podcast. Our panel discussed the rapid integration of generative AI in public relations and corporate communications. We explored the adoption of AI and practical applications, like tools for drafting pitches and press releases. We addressed concerns like the environmental impact of artificial intelligence and the necessity for clear AI usage policies.</p><p><a href="https://muckrack.com/webinars/takeaways-state-of-ai-2025/">WATCH NOW</a></p>]]></content:encoded></item><item><title><![CDATA[This Week in Tech: Yellow-Bellied Marmots]]></title><description><![CDATA[In a move to enhance scientific research and bolster nuclear security OpenAI collaborates with U.S. National Laboratories, new streaming prices, and the return of the iconic Pebble smartwatch.]]></description><link>https://news.danpatterson.com/p/twit-yellow-bellied-ai</link><guid isPermaLink="false">https://news.danpatterson.com/p/twit-yellow-bellied-ai</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Sun, 23 Feb 2025 18:27:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!E0mk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://twit.tv/shows/this-week-in-tech/episodes/1017?autostart=false" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!E0mk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic 424w, https://substackcdn.com/image/fetch/$s_!E0mk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic 848w, https://substackcdn.com/image/fetch/$s_!E0mk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic 1272w, https://substackcdn.com/image/fetch/$s_!E0mk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!E0mk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic" width="1456" height="967" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:967,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:218573,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://twit.tv/shows/this-week-in-tech/episodes/1017?autostart=false&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/157826880?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!E0mk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic 424w, https://substackcdn.com/image/fetch/$s_!E0mk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic 848w, https://substackcdn.com/image/fetch/$s_!E0mk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic 1272w, https://substackcdn.com/image/fetch/$s_!E0mk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5f15310-1957-43b4-9b89-5b2c4fc21d17_2036x1352.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Last week on <strong><a href="https://twit.tv/shows/this-week-in-tech/episodes/1017?autostart=false">This Week in Tech</a></strong> I joined host Leo Laporte with guests Shoshana Weissmann and Christina Warren to discuss emerging technology headlines, including OpenAI&#8217;s latest model, O3-Mini, and CEO Sam Altman&#8217;s reflections on open-source practices. We also explore the European Union&#8217;s ban on AI systems deemed to have &#8216;unacceptable risk&#8217; and OpenAI&#8217;s collaboration with U.S. National Laboratories on scientific research and nuclear security. Bonus: The return of my favorite smartwatch, the Pebble!</p><p><strong><a href="https://twit.tv/shows/this-week-in-tech/episodes/1017?autostart=false">Watch Now</a></strong></p>]]></content:encoded></item><item><title><![CDATA[ZDNet: How AI will transform cybersecurity in 2025 - and supercharge cybercrime]]></title><description><![CDATA[Cybersecurity experts forecast key 2025 trends: AI-generated deepfakes and narrative attacks, innovative social engineering, and new ransomware strategies.]]></description><link>https://news.danpatterson.com/p/ai-transform-cybersecurity-2025-zdnet</link><guid isPermaLink="false">https://news.danpatterson.com/p/ai-transform-cybersecurity-2025-zdnet</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Fri, 10 Jan 2025 17:17:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!o8eh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.zdnet.com/article/how-ai-will-transform-cybersecurity-in-2025-and-supercharge-cybercrime/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o8eh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!o8eh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!o8eh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!o8eh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o8eh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/af70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:261815,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://www.zdnet.com/article/how-ai-will-transform-cybersecurity-in-2025-and-supercharge-cybercrime/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/154549577?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!o8eh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!o8eh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!o8eh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!o8eh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf70619f-c0f4-4496-be6f-7fe16050b70b_1280x720.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In 2025, AI will reshape cybersecurity. Ransomware is evolving from mere extortion to targeted data manipulation, AI-driven narrative threats are proliferating across the social web, and supply chain attacks are rising due to our hyperconnected global economy. Yet AI also powers transformative opportunities, with agentic systems automating work and accelerating innovation. </p><p>I spoke with a broad spectrum of enterprise cybersecurity experts about how AI will transform cybersecurity in 2025.</p><p><strong><a href="https://www.zdnet.com/article/how-ai-will-transform-cybersecurity-in-2025-and-supercharge-cybercrime/">Read now at ZDNet</a></strong></p>]]></content:encoded></item><item><title><![CDATA[This Week in Tech: $125,000 in Baguettes]]></title><description><![CDATA[The legacy of Apple&#8217;s iPod, the rapid growth of crypto, OpenAI's new domain, and the growth of YouTube as a streamer: This Week in Tech]]></description><link>https://news.danpatterson.com/p/125000-baguettes-this-week-in-tech</link><guid isPermaLink="false">https://news.danpatterson.com/p/125000-baguettes-this-week-in-tech</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Tue, 12 Nov 2024 15:59:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_Ios!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d9d10c2-b695-46a7-8a67-941d89d9a2e4_2022x1132.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://twit.tv/shows/this-week-in-tech/episodes/1005?autostart=false" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_Ios!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d9d10c2-b695-46a7-8a67-941d89d9a2e4_2022x1132.png 424w, https://substackcdn.com/image/fetch/$s_!_Ios!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d9d10c2-b695-46a7-8a67-941d89d9a2e4_2022x1132.png 848w, https://substackcdn.com/image/fetch/$s_!_Ios!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d9d10c2-b695-46a7-8a67-941d89d9a2e4_2022x1132.png 1272w, https://substackcdn.com/image/fetch/$s_!_Ios!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d9d10c2-b695-46a7-8a67-941d89d9a2e4_2022x1132.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_Ios!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d9d10c2-b695-46a7-8a67-941d89d9a2e4_2022x1132.png" width="1456" height="815" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5d9d10c2-b695-46a7-8a67-941d89d9a2e4_2022x1132.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:815,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2991863,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://twit.tv/shows/this-week-in-tech/episodes/1005?autostart=false&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_Ios!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d9d10c2-b695-46a7-8a67-941d89d9a2e4_2022x1132.png 424w, https://substackcdn.com/image/fetch/$s_!_Ios!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d9d10c2-b695-46a7-8a67-941d89d9a2e4_2022x1132.png 848w, https://substackcdn.com/image/fetch/$s_!_Ios!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d9d10c2-b695-46a7-8a67-941d89d9a2e4_2022x1132.png 1272w, https://substackcdn.com/image/fetch/$s_!_Ios!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d9d10c2-b695-46a7-8a67-941d89d9a2e4_2022x1132.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This week on <a href="https://twit.tv/shows/this-week-in-tech/episodes/1005?autostart=false">TWiT</a>, our panel&#8212;an unofficial CNET reunion featuring <strong><a href="https://twit.tv/people/abrar-al-heeti">Abrar Al-Heeti</a> </strong>and<strong> <a href="https://twitter.com/lisaeadicicco">Lisa Eadicicco</a></strong>&#8212;rhapsodized about Apple&#8217;s iPod 23rd anniversary, and an AI-powered painting selling for $1.1 million. Other topics include AI&#8217;s influence on election polarization, YouTube&#8217;s dominance on Election Day, Dogecoin&#8217;s rise, Detroit&#8217;s acceptance of crypto for taxes, and OpenAI&#8217;s recent legal victory. We also chatted about AI and cybersecurity partnerships, changes on platforms like Roblox.</p><p><strong><a href="https://twit.tv/shows/this-week-in-tech/episodes/1005?autostart=false">WATCH</a></strong></p>]]></content:encoded></item><item><title><![CDATA[ZDNet: How the 2024 US presidential election will shape the future of tech policy]]></title><description><![CDATA[The two candidates have starkly different approaches to regulation and privacy. Here's what each administration could mean for the industry and individuals.]]></description><link>https://news.danpatterson.com/p/zdnet-election-tech-policy</link><guid isPermaLink="false">https://news.danpatterson.com/p/zdnet-election-tech-policy</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Tue, 05 Nov 2024 11:05:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!95Ek!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.zdnet.com/article/how-the-2024-us-presidential-election-will-determine-techs-future/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!95Ek!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg 424w, https://substackcdn.com/image/fetch/$s_!95Ek!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg 848w, https://substackcdn.com/image/fetch/$s_!95Ek!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!95Ek!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!95Ek!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg" width="1280" height="719" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:719,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:210204,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://www.zdnet.com/article/how-the-2024-us-presidential-election-will-determine-techs-future/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://news.danpatterson.com/i/151162931?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!95Ek!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg 424w, https://substackcdn.com/image/fetch/$s_!95Ek!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg 848w, https://substackcdn.com/image/fetch/$s_!95Ek!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!95Ek!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F036d9831-10b7-4af8-a73b-b2d3fc90dddc_1280x719.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The outcome of the 2024 U.S. presidential election will significantly impact the technology industry, shaping policies around AI regulation, cybersecurity, privacy, Big Tech antitrust, crypto, and more. </p><p>For ZDNet, I wrote about how voters will select how the U.S. navigates the challenges, disruption, and opportunities of emerging tech.</p><p><strong><a href="https://www.zdnet.com/article/how-the-2024-us-presidential-election-will-determine-techs-future/">Read now at ZDNet</a></strong></p>]]></content:encoded></item><item><title><![CDATA[Election Tech 2024: How Deepfakes and Narrative Attacks Disrupted 70+ Elections This Year]]></title><description><![CDATA[Our Blackbird.AI analysis shows how AI-enabled narrative attacks&#8212;deepfakes, bot networks, social flooding&#8212;disrupted the democratic processes in 70+ nations this year.]]></description><link>https://news.danpatterson.com/p/election-tech-deepfakes-disinformation</link><guid isPermaLink="false">https://news.danpatterson.com/p/election-tech-deepfakes-disinformation</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Mon, 04 Nov 2024 15:29:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!q-F9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c41b020-25a9-4b58-bb1a-382af566196c_1236x738.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://blackbird.ai/blog/top-disinformation-attacks-disrupting-global-elections/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q-F9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c41b020-25a9-4b58-bb1a-382af566196c_1236x738.jpeg 424w, https://substackcdn.com/image/fetch/$s_!q-F9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c41b020-25a9-4b58-bb1a-382af566196c_1236x738.jpeg 848w, https://substackcdn.com/image/fetch/$s_!q-F9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c41b020-25a9-4b58-bb1a-382af566196c_1236x738.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!q-F9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c41b020-25a9-4b58-bb1a-382af566196c_1236x738.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q-F9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c41b020-25a9-4b58-bb1a-382af566196c_1236x738.jpeg" width="1236" height="738" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c41b020-25a9-4b58-bb1a-382af566196c_1236x738.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:738,&quot;width&quot;:1236,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:70665,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://blackbird.ai/blog/top-disinformation-attacks-disrupting-global-elections/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!q-F9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c41b020-25a9-4b58-bb1a-382af566196c_1236x738.jpeg 424w, https://substackcdn.com/image/fetch/$s_!q-F9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c41b020-25a9-4b58-bb1a-382af566196c_1236x738.jpeg 848w, https://substackcdn.com/image/fetch/$s_!q-F9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c41b020-25a9-4b58-bb1a-382af566196c_1236x738.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!q-F9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c41b020-25a9-4b58-bb1a-382af566196c_1236x738.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>More than 70 nations&#8212;about <a href="https://www.cnn.com/2024/07/08/world/global-elections-2024-maps-charts-dg/index.html">half the world&#8217;s population</a>&#8212;conducted an election in 2024.</p><p>Blackbird.AI&#8217;s RAV3N team examined how AI-enabled disinformation tactics&#8212;deepfakes, bot networks, and social flooding, for example&#8212;reshape elections worldwide by exploiting societal vulnerabilities, amplifying false narratives, and eroding public trust in democratic institutions. Analyzing millions of posts, our teams identified coordinated attacks designed to sway voter perception and destabilize elections. Bad actors leverage emerging technologies to overwhelm fact-checkers and target audiences with emotionally charged, misleading content. </p><p>I collaborated with our RAV3N intelligence team and AI engineers throughout the year to identify and understand narrative attack and disinformation tactics. What's fascinating is that bad actors worldwide use the same techniques. TLDR: artificial intelligence and disinformation are reshaping democracy in real-time.</p><p><strong><a href="https://blackbird.ai/blog/top-disinformation-attacks-disrupting-global-elections/">Read more</a></strong>.</p>]]></content:encoded></item><item><title><![CDATA[Blackbird.AI: Secure Your Organization]]></title><description><![CDATA[Narrative attack solutions for cybersecurity leaders]]></description><link>https://news.danpatterson.com/p/blackbird-ai-cyber-attack-narrative-attack</link><guid isPermaLink="false">https://news.danpatterson.com/p/blackbird-ai-cyber-attack-narrative-attack</guid><dc:creator><![CDATA[Dan Patterson]]></dc:creator><pubDate>Mon, 26 Aug 2024 10:05:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/pzf078YpOa8" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div id="youtube2-pzf078YpOa8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;pzf078YpOa8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/pzf078YpOa8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>My friend and producer <a href="https://www.linkedin.com/in/katherinemarie/">Katherine Niemczyk</a> produced a handful of <a href="https://www.youtube.com/@BlackbirdAI">new video clips</a> for Blackbird AI. The videos look great and help articulate the cybersecurity challenges of narrative attacks created by misinformation and disinformation. The script and VO is pretty good too. &#128540;</p><p><a href="http://blackbird.ai/blog">Narrative attacks</a> spread rapidly, causing significant financial and reputational damage. Traditional cybersecurity and threat intelligence systems often fail to detect these attacks. Constellation and Compass by Blackbird.AI are designed to help companies and public-sector organizations detect and understand these emerging threats.</p>]]></content:encoded></item></channel></rss>