All posts by chasenfratz

St. Catherine Victory Garden

Tom and I have been volunteering at a new community garden, named St. Catherine Victory Garden, at our parish, St. Catherine Laboure in Sappington. Organizer Deanna Violette compared the challenges of recent history to World War II, when people grew extra produce to support the nation through a trying time.

The St. Louis Review has published an excellent article that explains the goals and benefits that the new garden provides. Read about it here: Parish gardeners aim to share healthy food with pantry

At the end of this blog post are scans of the printed article.

Several organizations within the St. Catherine Laboure parish are collaborating on the garden, with support and knowledge from the following outside regional organizations:

On Saturday, I’m scheduled to volunteer at another community garden affiliated with Gateway Greening, Fresh Starts Community Garden which is led by Rosie Willis and affiliated with the North Newstead Association in St. Louis, the Regional Business Council and possibly others.

Photos from volunteering at Fresh Starts Community Garden – click right arrow to scroll through.

A blog post I wrote after our last volunteer session at Fresh Starts – Community Gardens, Health, and Food Security

When we as a society are tested with hardship, the kinds of leaders I want to follow are those who bring Americans together rather than separating them into opposing factions for the divide-and-conquer type of political power. I will be continuing to help at both gardens with whatever work is needed at the time I volunteer and also special projects that I’m taking on. I’ll be writing about these activities on my blog as they happen. I’m looking forward to a summer full of sharing, teaching, learning and growing!

St. Louis Review clipping from June 7-13 edition, page 6.
St. Louis Review clipping from June 7-13 2021 edition, page 6.
Clipping from St. Louis Review, June 7-13 2021 edition, page 7
Clipping from St. Louis Review, June 7-13 2021 edition, page 7.

I finished the quilted sleeping bag for dolls

In a past blog post, A little weekend quilting, I showed a narrow quilt top remnant that I was given and described how I was quilting it for practice.

A long narrow quilt top remnant that I decided to turn into a doll sleeping bag.

I used new cotton batting for the middle layer and a piece of a ripped gray bed sheet as the backing. I took parts of the waistband from an old pair of jeans and sewed them to each end, then used gray quilting seam binding to finish the edges. I used a piece of the seam binding to make a loop for hooking on a carabiner to hold the doll’s adventure camping gear.

The poor beat up Raggedy Ann doll was mine when I was young. I am pretty sure my Grandma Hasenfratz made it for me. She was an expert at sewing and crochet. She made me a lot of great things, many which I still have! I don’t know what happened to this poor doll’s clothes, but I’m thinking of making some new ones for her for the heck of it!

I sewed a lot of doll clothes when I was young – they were not well done. A lot of them were just draped fabric scraps that I sewed on and then ripped off when I got tired of them! In my mind my Barbie doll was an explorer and archaeologist by day but she must have had a very active night life as well – I sure did make her a lot of evening gowns! I had a kit to help me make good Barbie clothes but I don’t think I ever mastered it. I’d like to get some practice at making some that look reasonable, if there is time someday.

For the finishing touches on the sleeping bag, I made a two-sided pillow. I sewed one side of the bag together only about halfway up to that it’s easy to get a doll in and out, and put in snaps for a snug fit on cold nights!

I didn’t write down my process while making this, but I did take a lot of pictures so I can remember what I did if I ever want to make another.

Another one from the #whydidntyouwarnme desk: Phishing and Framing

Q. Explain the concept of social engineering Framing. Why is it a key fundamental in a social engineering plan? Provide an example of Framing in your own context of a work or social setting.

Framing is how a Social Engineering target dynamically reacts to a situation based on life experiences and their own traits and characteristics (Hadnagy 159-160). Social Engineers use a technique called frame bridging to close the gap between the scenario a Social Engineer wants the target to respond to and personal facts about the target. A pretext is a strategy the Social Engineer has prepared to bridge the frame – in other words overcome resistance to the scenario.

Today I received the following phishing email. A screenshot of the email is below, and text with the link removed follows. The links are not live because it is a graphic, and no one should click on them if they were live.

“Hi!

My name is Veronica.

Your website or a website that your company hosts is infringing on a copyright-protected images owned by myself.

Take a look at this document with the links to my images you used at www.chasenfratz.com and my earlier publications to obtain the evidence of my copyrights.

Download it now and check this out for yourself:

(url probably leading to something bad was here)

I believe you have willfully infringed my rights under 17 U.S.C. Section 101 et seq. and could be liable for statutory damages as high as $150,000 as set forth in Section 504(c)(2) of the Digital Millennium Copyright Act (”DMCA”) therein.

This letter is official notification. I seek the removal of the infringing material referenced above. Please take note as a service provider, the Digital Millennium Copyright Act requires you, to remove or disable access to the infringing materials upon receipt of this notice. If you do not cease the use of the aforementioned copyrighted material a lawsuit will be commenced against you.

I have a good faith belief that use of the copyrighted materials described above as allegedly infringing is not authorized by the copyright owner, its agent, or the law.

I swear, under penalty of perjury, that the information in the notification is accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

Best regards,
Veronica Garcia

05/11/2021″

It’s possible that whoever sent this message, whether a person or a bot, distributed them to anyone they could get to who has a blog. Social Engineers deliberately choose words that evoke emotions in the receiver (Hadnagy 163). Clearly fear is what I’m supposed to feel while reading a message like this. There are a lot of scary-sounding legal terms and phrases thrown around, and the dollar amount of possible damages that supposedly could result if I don’t act is high.

The purpose of invoking strong emotions in a target is to get the amygdala in the brain to compel the target to act and click the link before the logical part of the brain says “wait that might be a phishing email” (Hadnagy 184-185). The basic human emotions of anger, surprise, fear, disgust, contempt, sadness or happiness are tools that Social Engineers exploit for different purposes (Hadnagy 163).

If I wasn’t sure about the authenticity of the above email, I could look up the law that has been cited and the name of the artist or designer claiming infringement to see if there is any possibility it might be real. I’m not even bothering to do that, because there are several things about my particular framing that this pretext did not succeed in bridging even that far.

  1. I’m currently enrolled in a Social Engineering class and the kind of activity represented in this email is foremost in my mind and has been for weeks.
  2. I’ve actually received a genuine email recently regarding trademark infringement. The allegation of trademark infringement was about an adhesive dots product I had been selling in my Etsy shop. I had used the phrase “glue dots” as a tag to help describe the product when another company claims the phrase “glue dots” as a registered trademark. In my opinion “glue dots” is way too generic a phrase to legitimately claim a trademark on, but my opinion means nothing. For one thing I’m not even an attorney. Etsy informed me that they had removed my listing for that product. Just to make sure the issue was real, I contacted the law firm mentioned in the email and the manufacturer of the product in question. The law firm did not answer my inquiry but I did confirm it actually exists and specializes in that type of law. Today’s phishing email is extra suspicious because there is no law firm mentioned. The manufacturer of the adhesive dots product responded to me and confirmed it was a real issue that they were trying to resolve. In short, I have some idea what a real email of this nature looks like and this is NOT it.
  3. I’ve been involved with business blogging as part of my work for nearly 20 years, possibly since before the term “blogs” was even in wide use, and I have a pretty good idea about what copyright violation and fair use are. If I was actually guilty of this I would know! At least I think I would. Humility is important, because while people like us are busy working at something legitimate, malicious Social Engineers are planning new schemes instead. We can never let our guard down or assume that we know everything and will easily catch every scam.

Additional Framing Techniques

The Social Engineer who created this phishing example could have used the technique of reinforcing the frame, that is causing me to think about it and therefore strengthen it, if they had done even a little bit of OSINT (Open Source Intelligence) on me (Hadnagy 166). But it’s clear they did none, other than to use my web site url which may have been scraped by a bot.

For example the phrase “Your website or a website that your company hosts” is kind of a giveaway. I would have done a little more digging if they had said “the Fiber Arts section” or something like that indicating it might not be a generic scam email. Creating an email with a more personal and specific pretext via the knowledge gained by OSINT is called spear phishing.

Negating the frame is a way of inadvertently undermining the operation by reminding the target of what they should be suspicious about (Hadnagy 165). The phishers in this case avoided that blunder – they didn’t say anything like “Beware, this is not a scam email!”

Another way of leveraging the framing of a target is hinting at or insinuating something without directly coming out and saying it. This is called evoking the frame (Hadnagy 164). I would have known what the implied threat was if the phishers had said something like “if you don’t stop using our copyrighted material we will be forced to take serious action“. Kind of like a gangster in a movie or TV show saying “this is a nice place you got here, it would be a shame if something happened to it!

Works Cited

Hadnagy, Christopher. Social Engineering: The Science of Human Hacking. John Wiley & Sons, Inc. 2018.

Influence, Manipulation and Social Engineering

My final exam for Social Engineering class is due at 5 pm on Friday. When I’m answering questions, it’s useful to write as though I’m explaining the concepts to a general audience. I’m going to publish these answers on this blog as I write them, before they are turned in and graded, to keep me on track to work long enough to explain completely but not so long that I run out of time and skimp on the last couple of questions (that’s what happened at the midterm exam!). A lot of people have been asking me what Social Engineering is since I’ve been in this class. I do think it’s something everyone needs to know about as part of life skills so I’ll explain the best I can. Enjoy!

Q. Discuss the art and method of Influence and Manipulation.

First I’ll define the terms according to Christopher Hadnagy, author of our textbook “Social Engineering: The Science of Human Hacking”.

Social Engineering – “Social engineering is any act that influences a person to take an action that may or may not be in his or her best interests” (Hadnagy 7).

Influence – “Getting someone to want to do what you want them to do” (Hadnagy 123).

Manipulation – “Getting someone to do what you want them to do” (Hadnagy 151).

Social engineering is part art and part science, and method is where they come together (Hadnagy 157). Hadnagy brings up cooking as an example of a pursuit that combines art and science to create a satisfactory outcome. Gardening and aquatic animal keeping are a couple of my pursuits that are similar – science knowledge is needed to keep the organisms alive, and artistry helps make the environments harmonious and attractive. There are certain needs the organisms have that must be met but I have choices in what colors I can have, quantities, how I arrange the elements, how much splashing or bubbling do I want to create a soothing sound, and other aesthetic choices that affect the total presentation.

Part of the science of SE is framing and elicitation (Hadnagy 158). Framing is how someone dynamically reacts to a situation based on life experience and internal makeup (Hadnagy 159-160). Depending on the reaction you want, artistry helps to create an approach to the frame that is appropriate to achieve the objective. Social Engineers may be called on to create characters and costumes, choose words, use props, practice acting skills, storytelling and other creative enhancements. Preparation and practice are important, as is the ability to adjust to changing situations.

Elicitation is getting a target to volunteer information (Hadnagy 168). In order to cultivate the target to be open and trusting enough to share, artistry will again be used in a planned way as well as dynamically as conversation progresses. A social engineer might plan a scenario ahead of time or create one just by observing a target. Methods such as Ego Appeals, Mutual Interest, Deliberate False Statements, displays of Knowledge and the Use of Questions are methods Social Engineers can use to subtly direct the interaction (Hadnagy 168-182). There is art in how these methods are used, and also in choosing embellishments such as the above mentioned characters, costumes, props, etc.

Q. How are each applied to a social engineering plan?

Influence – Cialdini’s Six Principles of Influence are as follows (ChangingMinds.org):

Reciprocity: Obligation to repay.” Both wanted and unwanted gifts will create an urge to reciprocate, but if we appeal to what the target really values, we will get a greater concession in return. Gifts don’t have to be material things – good feelings in the target aroused by gifts of compliments and humor are also effective (Hadnagy 125-128).

Consistency and Commitment: Need for personal alignment.” We have a powerful drive to meet commitments because the consistency of ideals and behavior gives us a feeling confidence and strength. I’m adding my own assumption here that this may not apply to people with psychopathy and personality disorders (“Psychopathy”). You can appeal to the urge for internal consistency in other people by getting them to agree to a small request initially then a larger one later. Victimizers use your integrity and need to make your actions match your beliefs as a weapon against you. Keeping this in mind might help us to know when it’s ok to change our minds about a commitment that is no longer serving us. Consistency and commitment can also be good defenses against attacks, since that is a good protection against people looking for examples of hypocrisy as a Social Engineering weapon against us.

Social Proof: The power of what others do.” When we are unsure about what is safe or acceptable we often look at the behavior of others as a guide (Hadnagy 149-150).

Liking: The obligations of friendship.” Hadnagy explains different meanings of the word “like”. We tend to like people who are “like” us in some way, that we see as a member of our tribe, and we “like” people who we think like us (Hadnagy 146-148).

Authority: We obey those in charge.” Possessing actual authority or knowledge gives a Social Engineer more confidence to act with authority, but faking it, implying it or transferring it by seeming to associate with a genuine authority will work also (Hadnagy 140-141).

Scarcity: We want what may not be available.” We can be Social Engineered to respond to a perceived or real scarcity of goods, sale prices, time or any kind of resources (Hadnagy 134-136).

Manipulation

Hadnagy lists 6 principles of manipulation (Hadnagy 153):

  1. “Increased susceptibility.”

2. “Environmental control.”

3. “Forced reevaluation.”

4. “Removal of power.”

5. “Punishment.”

6. “Intimidation.”

It’s not an accident that these tactics are synonymous with types of abuse, emotional and sometimes even physical. Abusers abuse because they want the power and control it gives them (Davenport). It isn’t only individuals who might try to abuse us – organizations can do it too. I’ve written passionately and repeatedly on this subject in my class assignments, as you know, and in other writings, because of my theory that we as a culture tend to give far too much trust to institutions that have devoted vast research and resources to manipulate, and yes, abuse.

Q. What is the difference between the two?

Hadnagy’s definitions of influence and manipulation are nearly the same in terms of wording. In both cases, the social engineer wants the target to take an action that the social engineer wants. In an influence situation, the target wants to go along with the engineer (Hadnagy 151). That is a very slight difference, and Hadnagy acknowledges that not all will agree with his chosen definitions. When I first read “How to Win Friends and Influence People” by Dale Carnegie, a friend of mine didn’t want me to read it because in his words “It teaches you how to manipulate people”. My reply to him was my interpretation of a couple of the points I thought Carnegie was trying to make – the transactions and deals you make should benefit both parties, and whatever social techniques you use to get the results you want should be sincere (Winkelmann “My Opinion of…”).

I think Hadnagy is of a similar opinion. Manipulators don’t care about the feelings or well-being of the target, and the interaction will not be remembered fondly by the target (Hadnagy 151, 153). That’s detrimental to getting future business. In Hadnagy’s case, since part of his job is to educate clients, negative feelings interfere with the learning process and are to be avoided. I think he and Carnegie would agree that it is more important for both parties to come out of an interaction both feeling good about it than for the SE to “win” the transaction by getting the better of the target.

Of course many social engineers don’t mind harming the target, or they fully intend to harm the target – that’s when their actions become manipulation. For example the same male friend who was uneasy about me reading “How to Win Friends and Influence People” used manipulation on me and another woman to try to keep us from becoming friends. All three of us were part of a group that was going on a week long backpacking and camping trip. In preparation, he told me she didn’t like me and told her I didn’t like her. So for the first day of the trip we avoided each other. Due to the way the tents worked out, we were forced to share one the first night and weren’t happy about it. The next day we both had the same thought. “She’s not so bad.” We both decided to confide in each other what the male (now former) friend had told us. We had a good laugh and became best friends until she passed away in 2003. I was Maid of Honor at her wedding!

Q. Which method is more effective (give examples of circumstances/settings to be applied)?

I think it depends a lot on the circumstances. For example, if your goal is to have a productive future relationship with a target, you will take their welfare and emotions into account so that they associate you with a pleasant experience and are open to be influenced by you because they “like” you, as Cialdini teaches. If you plan to just use and discard the target when they are no longer needed, you don’t have to consider their well-being at all.

The archetype of the “snake oil salesman” is depicted in a music video I loved and watched a lot when I was a teenager, “Say Say Say” by Paul McCartney and Michael Jackson. The protagonists are con artists who travel from town to town in a wagon selling a bogus “strength potion”. They use pre-planned pretexts, such as a script and audience plants to Social Engineer the people in a town into buying a lot of the fake potion. By the time the customers realize it’s no good, the con artists are long gone and in another town sporting a different identity. When the law catches up to them, they use a distraction to evade (Giraldi). As long as they can get away quickly enough, they are not accountable and don’t have to make a good product. They only have to create the impression long enough to get the money.

Paul and Linda McCartney and Michael Jackson portraying Social Engineers of the manipulative variety

Here is a personal example of when I experienced manipulation in an airport when being solicited for a donation. A man greeted me and offered me a free paperback copy of a vegetarian cookbook. I love to cook and I love vegetables so I said “sure, thanks” and took it. I was young and this was my first time encountering this particular SE situation in an airport so was not looking for it and not prepared with defenses. The man said “Aren’t you going to give a donation?” I thought a moment and gave him a dollar. He said that isn’t enough. I was not pleased about being manipulated, so I said “I think that’s pretty good for a free book. If you disagree, you can have it back and I’ll take back the dollar”. He just looked disgusted and waved me away. I was not unhappy about giving a dollar for the book, even though it’s not something I sought out. But I love recipe books, so a free book or a dollar book, either was fine with me. But I would have balked at any more than that. Neither of us was concerned about ever seeing each other again, so it was a very low stakes situation. Since he had correctly concluded he had gotten all he was ever going to get out of me, he didn’t bother to be civil one second longer than was productive.

The larger and more powerful an organization or individual is, the more they can insulate themselves from backlash caused by self-serving, fraudulent, unkind or unfair manipulations of people. For example last summer there were large corporations taking out television ads that put their brand in a good light, showing warm and positive scenes of how they were helping their employees and customers cope with the pandemic. News stories about those brands were sometimes in direct contrast to the images in the ads. Organizations can use their money and power to “buy” morality credits by performing certain good deeds and publicizing them or just artfully appearing to. In the “Say Say Say” video we see that the fictional con artists give their ill-gotten gains to an orphanage and stop to entertain the kids, so the viewers of the video will root for them (Giraldi). This tactic works in real life too.

Marketing and Public Relations are subsets of Social Engineering, according to Hadnagy’s definition. If organizations don’t even do good deeds but claim they want to someday, or are generally in favor of good things for society and they’d love it if YOU would do them, that is enough to counteract actual corporate hypocrisy in some situations (Chen 487-490, 517-518). Influential people and organizations have the money and power to buy a lot of Marketing and PR, so they are potentially not as accountable as the less powerful. For example, from years of selling art supplies online, with Amazon being one of the platforms I sold on, I’m personally acquainted with how Amazon treats people with no power and only the most infinitesimal trace of usefulness. Admittedly already skeptical about their corporate culture, I am not the only one to ponder the disconnect between Amazon’s paid feel-good ads and news stories about how workers are treated (Barrickman and Smith). In a paper I wrote last fall about Corporate Social Responsibility and Irresponsibility I speculated about the meaning behind the amounts of corporate public donations to social justice causes by Netflix, WalMart and Amazon (Winkelmann “Corporate Social Responsibility…”). Do these amounts reflect genuine commitment to the causes, a branding technique, the amount of resources available, or the amount of morality credits they feel they need to buy to compensate for their actual activities?

A malicious Social Engineer might intend to not only evade accountability, but plan to leave the target in a weakened condition as part of the strategy. Sometimes the goal is not merely profit but total defeat of the enemy.

Works Cited

Barrickman, Nick and Patrick Smith. “Amazon violates its own health and safety rules in COVID-19 coverup.” World Socialist Web Site, 2020, www.wsws.org/en/articles/2020/08/05/amzn-a05.html. Accessed 10 May 2021.

ChangingMinds.org. “Cialdini’s Six Principles of Influence”. Changing Works, 2002-2021, changingminds.org/. Accessed 16 March 2021.

Chen, Zhifeng, et al. “Corporate Social (Ir)Responsibility and Corporate Hypocrisy: Warmth, Motive and the Protective Value of Corporate Social Responsibility.” Business Ethics Quarterly, vol. 30, no. 4, Oct. 2020, pp. 486–524. EBSCOhost, doi:10.1017/beq.2019.50. Accessed 28 September 2020.

Davenport, Barrie. “61 Devastating Signs Of Emotional Abuse In A Relationship.” Live Bold and Bloom, 2021, liveboldandbloom.com/02/relationships/signs-of-emotional-abuse/. Accessed 11 May 2021.

Giraldi, Bob, director. “Say Say Say.” YouTube, Paul McCartney and Michael Jackson, uploaded by Giraldi Media, 1983, www.youtube.com/watch?v=aLEhh_XpJ-0. Accessed 10 May 2021.

Hadnagy, Christopher. Social Engineering: The Science of Human Hacking. John Wiley & Sons, Inc. 2018.

“Psychopathy.” Psychology Today, 2021, www.psychologytoday.com/us/basics/psychopathy. Accessed 11 May 2021.

Winkelmann, Carolyn Hasenfratz. “My Opinion of What Marketing is About”. Carolyn Hasenfratz Design. 2020. www.chasenfratz.com/wp/my-opinion-of-what-marketing-is-about/. Accessed 10 May 2021.
— “Corporate Social Responsibility and Irresponsibility”. Carolyn Hasenfratz Design. 2020. www.chasenfratz.com/wp/corporate-social-responsibility/. Accessed 11 May 2021.

From the #whydidntyouwarnme desk

This is my last week of Social Engineering class at Webster University. The textbook we have been using is “Social Engineering: The Science of Human Hacking” by Christopher Hadnagy. This book is full of powerful personal ancedotes that help me understand Social Engineering better. They also resonate deeply because so many of the anecdotes are relatable to experiences from my own life.

An example of a story that really made me think is on page 260. Hadnagy tells of talking with a friend whose family had been personally affected by a common scam. The friend was angry with him for not warning him sooner and exclaimed “If you knew these things existed, why didn’t you warn your friends?”

I have had friends get angry with me and stop speaking with me for warning them about social media and other media scams and trying to explain media literacy concepts when I saw that they were being trolled. Part of good Social Engineering is to help the people you are trying to warn become more receptive to what you are trying to teach them so they can take in the information to protect themselves against harmful Social Engineering. If someone is your friend and you care about them, you want them to know these concepts. If my attempts are too clumsy and I arouse their defenses instead of concern and I fail to warn because of that, I need to do better. That’s one of the things I’m learning in this class and others. The more I learn about media and technology as I work on a Advertising and Marketing Communications Master’s degree, the more I feel the need to warn.

I’m going to be writing a LOT this week to finish the course, and some of it is going to end up on this blog immediately and farther in the future. Hadnagy advises us not to “assume that the knowledge about these attacks is just common sense”. There are techniques in Hadnagy’s book, in our class, and in lots of other course material I’m learning that is also in classic books, around for many decades, such as “How to Win Friends and Influence People” by Dale Carnegie and “The Hidden Persuaders” by Vance Packard. I have owned those books a long time and have read them several times and I still have to work to master the material in them.

As I learned on a podcast this morning, the concept and term “Social Engineering” has been around since the late 1800s. With every new technological advance that comes along, there are new skills to learn to avoid exploitation through Social Engineering combined with other types of attacks. In order to help people find information on this blog that I think everyone should know as a life skill, I’m going to apply the hashtag #whydidntyouwarnme/ to relevant past and future blog posts.

I have also started listening to a couple of excellent podcasts that are free to listen to if you want more information about the types of media and security issues I’m trying to warn about. I think every Internet user who has something to lose, whether for personal or business reasons, needs to be informed as well as possible.

The Social-Engineer Podcast – hosted by Christopher Hadnagy himself with a variety of co-hosts as they interview leaders in the Social Engineering field.

Hacking the Humans – information about “social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a heavy toll on organizations around the world”.

What types of scams are you the most concerned about?

Homework, art journaling and stencils!

Art journaling is an activity that helps me a lot with self care, artistic expression and just general management of life. Lately I’ve been experimenting with combining some artistic expression with material I’m learning in Social Engineering class. There are a lot of acronyms and concepts to remember – things that lend themselves well to bullet journals, art journals and chart and graph type graphics.

These pairs of pages you will see are in progress. I made them to have something to do adult coloring and other paper craft based activities on when I want to relax and be creative for a bit. As I work I can study and memorize the “bullet points”. I’m going to erase some of these pencil lines as I go. For a couple of the more complicated layouts I made drawings on tracing paper and chipboard templates to help cut the paper pieces to the right sizes and shapes.

Some of the stencils I used are commercial products I sell in my online Etsy shop. If you would like to see the selection, it’s at this link: Stencils and Stenciling Supplies.

I hope these pages in progress will give you some ideas for organizing information in a creative and fun way!

Two-page spread for MAPP – Mitigation and Prevention Plan.
Here is a pair of pages I began to create my rendition of “Curtis’ Triad of Disruption”. I love geometric shapes, and trios. This will be fun to work on!
I finally finished “Triad of Disruption” on 12/30/22! I did a couple of things a bit different than I planned.
Social Engineering Pyramid two-page spread on tracing paper and then started in the art journal.
Finished coloring these two art journal pages.
Finally finished coloring these two art journal pages.

I finally finished “Experimental Art Quilt #1!”

A little over two years ago, I was sick for quite awhile with an awful sinus problem. I didn’t have much energy, so to prevent too much boredom I looked for some simple tasks to do. First I sorted all my small fabric scraps by color and organized them into containers. While doing that, I thought it would be fun to challenge myself to see how small a fabric scrap could get before I couldn’t make something out of it. I wanted to upgrade my hand-sewing skills and learn the rudiments of piecing for quilt making.

I started sewing fabric pieces into strips to combine into a scrap quilt later, after seeing some beautiful examples on Pinterest. As I accumulated strips, I combined them with other leftover fabrics such as a jean pocket, a waistband from some corduroy pants, a seam from blue jeans, old clothing tags, ribbon, binding strips, selvage pieces and some rather primitive embroidered panels I made a long time ago for use on a tote bag which has since been retired.

Over the last couple of years, every once in awhile I’d add a little bit more on. Then I finished it with blanket seam binding from JoAnn Fabrics and Crafts where I taught classes in hand sewing, general crafts and jewelry making before the pandemic.

Following are some close-ups of sections of the quilt.

At the top is part of a waistband from some Lime Green corduroy pants.
Here is the top seen a little closer.
Here is a close-up of some stitching. I had some fun adding on some pieces with raw edges and treating some of my stitches like I was drawing on abstract collages in one of my art journals.
On some sections I used the pattern on the fabric as inspiration for how to do the quilting stitching. There are fabrics in this section from one of my old sheets and even a couple of pieces that I printed on with rubber stamps of my own design.
Here is the pocket. The jeans they came from were not mine – I’ve had them in my fabric stash for so long I’m not sure where they came from. The light colored denim pieces tie-dyed with black are from a pair of jeans I dyed and wore in college.
Here is the bottom end. There are fabrics in this section from sewn items my late Mom made in the early 1980s, some more fabric I printed and fabric from the ties and table runners from my wedding! My quilting friend Kate also gave me a lot of beautiful scraps I used in this section.

“Experimental Art Quilt #1” is for sale on Etsy. Here is a link to the listing:

Experimental Art Quilt #1 – Green, Aqua, Blue

A fictional organization: “Artists for Media Literacy”

For our Social Engineering class, we were asked to propose to work on behalf of a real cause or a fictional one. Using ISIS as an example, how could we use similar social engineering tactics to win converts over to our cause? I decided to create a fictional organization called “Artists for Media Literacy”.

Media literacy is something I was taught in both grade school and high school, although I didn’t know then what it was called. Ever since I’ve been old enough and aware enough to realize what it was, I’ve thought it had the potential to heal many of the ills of our culture if more people acquired the skills. I felt strongly enough about it in 1998 that my first solo art show included a group project in which I encouraged people to send me postcards in the mail based on the theme “Turn Off Your Television”. Here are photos showing this project on the wall at my show, and a graphic for a postcard I sent out to help promote it.

On the left is a view of the gallery showing the TV project on the wall, and on the right is a postcard I made to promote the project.

So this is where my inspiration comes from for “Artists for Media Literacy”. Artists are trained communicators and often have a lot to say about the media and consumerism.

What techniques successfully employed by ISIS would be suitable for our group?

Category: Intimidation

Isis intimidates opponents via well-produced videos, mass executions and hashtag hijacking.

“Artists for Media Literacy” is a philanthropic organization, so there will obviously be no violence or threat of violence. We have no ambition to intimidate anyone to force them to participate – we believe in individual rights and freedom and want people to voluntarily choose to adopt the media literacy techniques we propose. We do want to raise the alarm about propaganda and abusive media – so we will try to influence people to fear the consequences of not using media in a healthy way. We can use well crafted videos to promote the positive benefits of media literacy as well as the dangers of being uninformed.

Hashtag hijacking would lend itself extremely well to our cause because there are trending media-related topics going on all the time that we could hitch an awareness piece too. For example, I can check Twitter right now to see what topics are trending at this url – twitter.com/explore/tabs/trending. #Antifa and #RIP Twitter are trending right now. Those would both be great hashtags to hijack for a media literacy campaign.

Category: Reassurance

Documentaries: we would not have to coerce participation from hostages to produce documentaries touting the benefits of media literacy. The challenge would be making them engaging and accessible.

Press releases: our work would be of interest to many news outlets if we target the right ones.

Instagram: this is a social media platform particularly friendly to artists, so we’d benefit from heavy use. Here is the Instagram account for the Back To Our Roots Art Show last year promoted by Webster University students – www.instagram.com/back.to.our.roots.art/. As a participant in the show, I can vouch for it’s usefulness in helping me keep track of deadlines, inspiring my vision for the work I was producing, and helping me promote the show to my social networks via attractive, branded and shareable content.

Category: Coordination

Civic forum boards: unlike ISIS, our boards would not need to be encrypted necessarily, but they should be secure to protect us from hackers.

Secure messaging: normal consumer level communications platforms should be adequate.

Battlefield drones: We won’t have battlefields in the sense that ISIS would, but if we ever have any outdoor events we could use drones to get interesting footage for videos. I’ve seen drones used that way at historic preservation events to attract interest by showing how well attended the event was and the extent of support for our cause, preserving the Gasconade River Bridge in Hazelgreen, Missouri. The organizers have succeeded in attracting large crowds in multiple years, including international Route 66 fans.

Works Cited

P.W. Singer, and Emerson Brooking, “How ISIS Is Taking War to Social Media”, Popular Science Magazine, 2015. Accessed through course module, 16 April 2021.

Opinion: For those in favor of saving the Republic, here are some ideas

In my Social Engineering class we have been studying Russian and other foreign cyber attacks on the USA, Germany, France, Great Britain, Ukraine, and elsewhere. One of our recent assignments was to read the following reports:

The IRA, Social Media and Political Polarization in the United States, 2012-2018

The Tactics & Tropes of the Internet Research Agency

Report of the Select Committee on Intelligence United States Senate on Russian Active Measures Campaigns and Interference in the 2016 U.S. Election: Volume 2: Russia’s Use of Social Media, with Additional Views

After reading these reports, we were to consider the tactics in “On War” by Carl von Clausewitz and then answer the following question:

“So, what should the United States do about it? Think about the political, economic, and military weapons of war (Clausewitz) and share your thoughts about how to combat the Russian SE attacks.”

“I considered Clausewitz’s lessons of war (summarized by Pietersen) to see how they could help me create a strategy that makes sense.

Just the first step, Identify, I see as a huge challenge. I’m under the impression that most people who are angry about attempted Russian interference in recent elections are angry because their preferred candidate didn’t win, not because our Constitution and the Republic are under attack and hanging by a thread. A lot of people accept the premise that unethical and illegal acts are permissible if it helps your side. They may not be informed about the seriousness of the threat, or are informed and are rooting for the Constitution and the Republic to fall. This would be a good way for intelligence to precede operations. Do enough people even want the Republic saved to make it worth the effort to fight for it? The goal will have to be changed if there aren’t enough people on board. I’m going to write the rest of this assuming that there is enough support.

The decisive point: “Save the Constitution” would be my mission statement, at least internally. I’m not sure how to frame the campaign to get the support of enough of the public for success. It used to be considered self-evident in our culture that life, liberty and the pursuit of happiness were good things, but there are a lot of people who have been conditioned and trained to deny those rights to others that they think are beneath them and sometimes even to themselves – they don’t think they deserve it.

Concentrate: This includes physical resources as well as hearts and minds. I understand that the reports we read were based on a subset of all the existing information. The tech companies didn’t give everything they had to the Senate, and we don’t know if the Senate gave all of what they had to the analysts who wrote the reports. Nevertheless, the reports do contain enough information to have some idea of what might help on the technology side.

I would like consumers to have more choices of viable communications platforms so that they freely choose the ones they feel protect their rights and reflect their values the best. That probably means breaking up monopolies and holding corporations accountable for tortious business practices or unfair competition practices such as collusion or violations of the immunity clause in Section 230 of the Communications Decency Act. As others have pointed out in our discussion, communications companies sometimes have an incentive to allow content that harms their users but helps them financially. They’d be able to get away with this less if there were more choices.

I advocate re-instating the media based consumer protections that have been removed from our body of law such as the Fairness Doctrine, the personal attack rule and the political editorial rule, and I’d like to see them extended to online publishing and social media companies as well as broadcast and print. As I’ve stated before, I think it’s a human rights abuse to restrict information from people in order to control them. Can a “Right to Information” be added to our Constitution? I don’t know but that’s how important I think it is.

I would like to see all media companies compelled to run media literacy education content as a consumer protection measure.

I advocate media literacy training as a vital life skill in all levels of education.

Devote as least as many resources to the promotion of the Constitution and Democratic self-rule as the enemies do to undermining it.

US Consumers should have the choice to purchase physical products, software, and have access to technology platforms that are manufactured in the US and accountable to US consumers.

Resources that are vital to the security of the United States, such as medical supplies and media companies, should not be owned or controlled by foreigners.

Hold all levels of government to high standards of transparency and accountability to their constituents.

Remove: I would not want to see a repeat of excesses from the past such as McCarthy-style witch hunts or loyalty tests. I believe the most rational ideas will prevail if people are allowed to hear them and exercise their constitutional rights to assembly, free speech, freedom of the press and others. I also think internment camps for re-education or any other purpose should be off the table.

Ignore: I believe it’s important not to over-react to all the distractions that will be tried.”

I don’t consider my above suggestions as complete or comprehensive, but I think they’d be a good start. I welcome comments on this blog, pro and con, I think this is a discussion we need to have, openly and rationally, because, after all, this is war.

Works Cited

DiResta, Renee, Kris Shaffer, Becky Ruppel, David Sullivan, Robert Matney, Ryan Fox, Jonathan Albright, Ben Johnson. “The Tactics & Tropes of the Internet Research Agency”, New Knowledge, 2019, digitalcommons.unl.edu/senatedocs/2/. Accessed 11 April 2021.

Howard, Phillip N., Bharath Ganesh, Dimitria Liotsiou, John Kelly, Camille François. “The IRA, Social Media and Political Polarization in the United States, 2012-2018”, Computational Propaganda Research Project, University of Oxford, 2019, digitalcommons.unl.edu/senatedocs/1/. Accessed 11 April 2021.

Pietersen, Willie. “Von Clausewitz on War: Six Lessons for the Modern Strategist.” Columbia University, www8.gsb.columbia.edu/articles/ideas-work/von-clausewitz-war-six-lessons-modern-strategist. Accessed 12 April 2021.

Select Committee on Intelligence, United States Senate. “Report of the Select Committee on Intelligence United States Senate on Russian Active Measures Campaigns and Interference in the 2016 U.S. Election: Volume 2: Russia’s Use of Social Media, with Additional Views”, 2019, digitalcommons.unl.edu/senatedocs/4/. Accessed 11 April 2021.

Low tech transitional collage from the ’90s

Collage made from computer printouts and clip art.
Collage homage to the Beatles Anthology, from Lime Green News #16.

My current class in graduate school and other projects are pretty demanding right now, so I don’t have a lot of time to make new art. I do still enjoy looking at some of my old art from time to time. Here is a collage I made for my old ‘zine the Lime Green News #16, circa 1996-1997. It’s a tribute to the Beatles Anthology album covers, designed by Klaus Voorman. I was inspired by the use of torn images and how they can strategically reveal what’s underneath. On the Anthology 1 album cover, Voorman ripped out the head of Pete Best to reveal Ringo’s face underneath to “replace” him. This was a mean but clever technique so I did the same thing in my collage in approximately the same spot to enhance my “homage”, only I replaced John with John. If you want to see the Anthology 1 cover and the clever use of the torn out part on a Pete Best album cover, here is a link to an analysis – “The Beatles Anthology 1 Album Cover Cropped Out Original Drummer Pete Best”.

I made the above collage in the year between getting a computer with a black and white laser printer that would print up to 300 ppi, and taking my first class in Adobe Photoshop. At the time I was enjoying the novelty of being able to print out pictures to use in collages instead of just finding images. I printed out pictures of the Beatles that I found online, and printed out a bunch of clip art that I liked, and used those printouts to build the collage. A lot of the clip art came from my Corel Draw clip art library. How I used to love to pore over the printed book that came with it to get ideas!

The covers of Lime Green News 16, 17 and 18. I think those are the last three I published. The middle cover is an altered piece of art by Bill Whorrall. I don’t remember if I asked permission from him or not to do that. I might have, even though it’s very common in Mail Art and ‘zine culture to “remix” other people’s art work. I tried to get something lime green on each cover, so I used to carve a rubber stamp and hand-print it in lime green in a designated spot.

The black and white laser printer was a major step forward in the production quality of my ‘zine, even though by today’s standards it was still very primitive. It wasn’t until much later than I learned software like Publisher and InDesign to help me produce professional quality booklets. At the time of this image I was still following my old practice of printing out text on a printer and cutting and pasting the text among collaged elements. With the text coming from a laser printer instead of a Commodore 64 with a dot-matrix printer, it looked better and was a lot easier to read.

With access to what seemed like unlimited clip art and display fonts, I had tons of fun transitioning from low to high tech. For my ‘zine and collages, I printed elements for headers and body text along with images. Then in 1997, I learned Photoshop and how to make web pages, and that changed everything! But I still enjoy the old methods too and I like to make collages out of whatever is there, whenever I get a chance.