ethical-information-ops

Ethical Information Operations Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "ethical-information-ops" with this command: npx skills add hack23/homepage/hack23-homepage-ethical-information-ops

Ethical Information Operations Skill

Purpose

Guides ethical information operations, strategic communication, and counter-disinformation efforts that promote transparency, accountability, and democratic values without manipulation or deception.

Rules

Ethical Foundation (MUST Follow)

Core Principles:

  1. Truthfulness

    • MUST provide accurate, verifiable information
    • MUST NOT fabricate or distort facts
    • MUST correct errors promptly and transparently
    • MUST distinguish facts from opinions/analysis
  2. Transparency

    • MUST disclose information sources and methods
    • MUST identify sponsorship and affiliations
    • MUST be clear about advocacy positions
    • MUST NOT use sock puppets or fake personas
  3. Non-Manipulation

    • MUST respect audience autonomy
    • MUST NOT use psychological manipulation
    • MUST NOT exploit vulnerabilities or fears
    • MUST provide context for informed decisions
  4. Accountability

    • MUST take responsibility for content
    • MUST respond to legitimate criticism
    • MUST provide contact information
    • MUST comply with legal and ethical standards

Strategic Communication Framework

Information Operations Cycle:

  1. Situational Analysis

    • Assess information environment
    • Identify key actors and narratives
    • Understand audience perceptions
    • Map information flows
  2. Objective Setting

    • Define clear, measurable goals
    • Align with organizational values
    • Identify target audiences
    • Set success metrics
  3. Message Development

    • Craft truthful, compelling messages
    • Adapt to audience values and concerns
    • Use evidence-based arguments
    • Prepare supporting materials
  4. Channel Selection

    • Choose appropriate platforms
    • Consider audience media habits
    • Assess reach and credibility
    • Plan multi-channel approach
  5. Execution & Monitoring

    • Deploy content strategically
    • Track engagement and reach
    • Monitor counter-narratives
    • Adjust tactics as needed
  6. Evaluation & Learning

    • Measure against objectives
    • Analyze what worked and why
    • Document lessons learned
    • Refine future operations

Counter-Disinformation Tactics

Detection:

Disinformation Indicators:

  • Lack of credible sources
  • Emotional manipulation
  • Coordinated inauthentic behavior
  • Bot or fake account activity
  • Contradicts verified facts
  • Appeals to prejudice or fear
  • Uses deepfakes or manipulated media

Monitoring Tools:

  • Social media monitoring (TweetDeck, Hootsuite)
  • Bot detection (Botometer, Bot Sentinel)
  • Fact-checking services (Full Fact, Snopes)
  • Media manipulation detection (InVID, FotoForensics)

Response Strategy:

  1. Verification First

    • Confirm disinformation before responding
    • Document false claims with evidence
    • Identify source and spread patterns
    • Assess impact and urgency
  2. Strategic Response

    • Don't amplify false narrative
    • Provide factual correction with evidence
    • Use pre-bunking when possible
    • Coordinate with fact-checkers
  3. Audience Engagement

    • Address concerns underlying belief
    • Use trusted messengers
    • Provide easy-to-share corrections
    • Create inoculation against future disinfo
  4. Platform Coordination

    • Report policy violations
    • Request content removal if warranted
    • Coordinate with platform trust & safety teams
    • Track enforcement actions

Transparency Advocacy

Open Government Promotion:

Tactics:

  • Freedom of Information (FOI) requests
  • Public records advocacy
  • Open data initiatives
  • Parliamentary monitoring
  • Budget transparency campaigns

Tools:

  • FOI request templates
  • Public records databases
  • Document leak platforms (SecureDrop)
  • Data visualization tools
  • Transparency scorecards

Accountability Mechanisms:

  1. Public Pressure

    • Media coverage and investigations
    • Social media campaigns
    • Petitions and letter-writing
    • Peaceful protests and demonstrations
  2. Legal Action

    • FOI appeals
    • Judicial review
    • Whistleblower protections
    • Anti-corruption lawsuits
  3. Institutional Reform

    • Policy recommendations
    • Legislative advocacy
    • International standards adoption
    • Civil society coalitions

Audience Segmentation

Stakeholder Mapping:

Primary Audiences:

  • Decision-makers (elected officials, executives)
  • Opinion leaders (journalists, academics, influencers)
  • Organized groups (NGOs, activists, unions)
  • General public (voters, citizens, consumers)

Audience Analysis:

  • Information sources and consumption habits
  • Values, concerns, and motivations
  • Trust in institutions and messengers
  • Existing narratives and beliefs
  • Persuadability and mobilization potential

Message Development

Effective Messaging:

MUST Include:

  • Clear, simple language
  • Evidence-based claims
  • Emotional resonance (without manipulation)
  • Call to action
  • Shareable format

Message Testing:

  • Focus groups with target audience
  • A/B testing on small scale
  • Monitor engagement metrics
  • Refine based on feedback

Example Framework (Problem-Solution-Action): "[Problem]: Many citizens can't access government data. [Solution]: Open data initiatives make information accessible. [Action]: Support the Open Government Partnership commitment."

Campaign Planning

Campaign Structure:

Phase 1: Research & Planning

  • Background research on issue
  • Stakeholder mapping
  • Objective setting
  • Resource assessment

Phase 2: Message Development

  • Key messages and narratives
  • Supporting evidence and materials
  • Spokesperson training
  • Coalition building

Phase 3: Launch & Execution

  • Media outreach
  • Digital activation
  • Events and actions
  • Influencer engagement

Phase 4: Amplification

  • Earned media coverage
  • Social media momentum
  • Grassroots mobilization
  • Coalition coordination

Phase 5: Evaluation

  • Metrics analysis
  • Impact assessment
  • Lessons learned
  • Future planning

Digital Safety & Operational Security

MUST Protect:

Personal Security:

  • Use VPNs and encrypted communications
  • Practice good digital hygiene
  • Separate personal and operational accounts
  • Be aware of surveillance risks

Organizational Security:

  • Secure communication platforms (Signal, ProtonMail)
  • Regular security training
  • Incident response plans
  • Legal support arrangements

Source Protection:

  • Anonymous submission systems (SecureDrop)
  • Encryption and secure file handling
  • Metadata removal from documents
  • Legal protections for whistleblowers

Legal & Ethical Compliance

MUST Comply With:

Legal Requirements:

  • GDPR and data protection laws
  • Copyright and intellectual property
  • Defamation and libel laws
  • Electoral communication regulations
  • Transparency in political advertising

Ethical Standards:

  • Journalism ethics codes
  • PR professional standards
  • Academic research ethics
  • NGO accountability frameworks

Examples

Campaign Brief Template

Campaign: [Name]

Background

[Context and why this campaign is needed]

Objectives

  1. [Specific, measurable goal 1]
  2. [Specific, measurable goal 2]
  3. [Specific, measurable goal 3]

Target Audiences

Primary: [Main audience with key characteristics] Secondary: [Supporting audiences] Influencers: [Key opinion leaders to engage]

Key Messages

Core Message: [Main narrative in 1-2 sentences]

Supporting Messages:

  • For Policymakers: [Tailored message]
  • For Media: [Tailored message]
  • For Public: [Tailored message]

Tactics & Timeline

Week 1-2: Research and coalition building Week 3-4: Media outreach and content production Week 5-6: Launch and amplification Week 7-8: Sustained engagement and evaluation

Resources

  • Budget: [Amount]
  • Team: [Roles]
  • Partners: [Coalition members]
  • Materials: [Content and tools needed]

Success Metrics

  • [Metric 1 with target]
  • [Metric 2 with target]
  • [Metric 3 with target]

Counter-Disinformation Response

Disinformation Alert Response

False Claim: [Exact false statement] Source: [Where it originated] Spread: [Scale and channels] Impact: [Potential harm]

Factual Correction

[Accurate information with evidence]

Sources:

  • [Authoritative source 1]
  • [Authoritative source 2]
  • [Authoritative source 3]

Response Strategy

  • Timing: [When to respond]
  • Messenger: [Who should deliver correction]
  • Channels: [Where to publish]
  • Format: [Infographic, article, video]

Monitoring

  • Track further spread
  • Monitor response engagement
  • Report policy violations
  • Document for future reference

Related Policies

  • Hack23 ISMS-PUBLIC

  • GDPR Compliance SKILL

  • OSINT Methods SKILL

  • Content Marketing SKILL

Related Documentation

  • political-analyst Agent

Resources

Counter-Disinformation:

  • First Draft News

  • EU DisinfoLab

  • Atlantic Council's Digital Forensic Research Lab

  • Bellingcat investigations

Transparency Advocacy:

  • Open Government Partnership

  • Transparency International

  • Access Info Europe

  • Sunlight Foundation

Digital Rights:

  • Electronic Frontier Foundation

  • Access Now

  • Privacy International

  • Article 19

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Automation

agentic-workflow-orchestration

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

copilot-agent-patterns

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

github-actions-cicd

No summary provided by upstream source.

Repository SourceNeeds Review
General

product-documentation

No summary provided by upstream source.

Repository SourceNeeds Review