Tracking Russian Online Influence Operations and Possible Points of Disruption with Big Data Cross-Lingual Text Analysis

Size: px
Start display at page:

Download "Tracking Russian Online Influence Operations and Possible Points of Disruption with Big Data Cross-Lingual Text Analysis"

Transcription

1 Tracking Russian Online Influence Operations and Possible Points of Disruption with Big Data Cross-Lingual Text Analysis Kenneth Hacker, Peter Chew, Ahmed Abdelali Intelligence in the Non-English Speaking World Annual National Security Colloquium University of Texas, El Paso, National Security Studies Institute June, 20, 2018 In this analysis, we seek to expose some empirically identifiable patterns of Russian political warfare conducted online. This effort is done with big data analysis and automated text analysis. The analysis is presented in the context of published United States government (USG) and European ally concerns with Russian online information warfare. There is a great deal of news and political controversy today about Russian influence in American political communication, election campaign venues, and cyber-spatial aspects of national security operations. In totality, various indicators leave little room to doubt that that Russia is attacking the United States in what is called the information space. Clearly, the American military is aware of this and is using its own Information Operations (IO) machinery to protect American assets from Russian cyber invasion and interference. However, the Russian information warfare (IW) invading American news, social media, election campaigns, and general political communication appears to be much less recognized and less countered. The prevalence of Russian information operations and online information warfare has increased in the past 4 years ( ). The timing of this is no coincidence, as Russian general Valery Gerasimov wrote in 2013 about the necessity for Russia to learn the lessons of the Arab Spring (in which social media was used to mobilize protests), and engage in this kind of activity (Gerasimov, 2013), in what is widely referred to as the Gerasimov Doctrine. Russia, for many years, has sought promote its political narratives domestically and externally. Underpinning its efforts in cyber warfare and information warfare is its faith in information dominance (Jaitner & Mattsson, 2015). Information superiority is achieved with kinetic, information-based, and cyber weapons. While it is tempting to separate war from communication, the two are intertwined throughout history. Information and communication can be used in ways that make adversaries easier to defeat kinetically (Jaitner & Mattsson, 2015). As Sun Tzu, said, All warfare is based on deception. Current military doctrines address the need to gain footholds in cognitive space as well as physical space. 1

2 Russian national security strategy documents state that global information struggles are 1 increasing (Gerasimov 2013, Jaitner & Mattsson, 2015). Recent news indicates that Russia has exploited Facebook and other social media sites for spreading political disinformation and causing division among American citizens (Sheth, 2017). Phony Facebook accounts were created such as a supposed California organization known as United Muslims of America which seeded anti-american feelings among American Muslims (Sheth, 2017). Russian trolls used Facebook to push out false stories, for example that Hillary Clinton admitted that the United States created and trained Al Qaeda, or that John McCain was the founder of Daesh (Sheth, 2017). Twitter and Instagram can also be used to distribute dividing messages. The report released by the Office of the Director of National Intelligence in January 2017 stated that one of the goals that the Russians had was helping the Trump election in 2016, a conclusion which is borne out by what leading Russians such as Dmitry Kiselev and Aleksandr Dugin have 2 openly said. Like the Chinese, the Russians are focused on information and communication spaces as the new battlefield. Ironically, Trump was helped in this battle space to get elected, but now is under attack by the Russians who helped get him elected. While the interests of the Trump campaign and Russia may have aligned temporarily (due to Russian disdain for Hillary Clinton dating back to her questioning the legitimacy of the 2012 Russian presidential election when she was Secretary of State), much evidence points to longer-term Russian interests being simply to destabilize the American political system rather than to support any particular candidate, opening up the possibility that Trump was played in the short term by Russia. This would be consistent with the paradigm of the useful idiot, a phrase attributed to Lenin: a phrase which denoted an individual in the West who could be unwittingly used to advance the Soviet agenda. Since the 2016 US general election, Russia has used online influence operations to oppose U.S. ally, Syria and its leader, Bashar Assad (Sheth, 2017). Russia uses online messages that are targeted at specific communities. Those communities are linked with certain issues (Sheth, 2017). It is justifiable to say that Russia is doing these things, because Russian trolls doing all of this disinformation distribution are not lone wolves, but rather workers paid by the Kremlin (Sheth, 2017).The dezinformatsiya they create and spread is based on tactics rooted in Russian Cold War propaganda (Sheth, 2017). One easy tactic is planting political messages in non-political communication contexts. 1 Among the Russian population, there may be a perception that IW is defensive while other nations like the United States, NATO, and EU use IW aggressively. Similarly, some Russians may view Russia s efforts not as propaganda but as counter-propaganda and truth telling, and Russia itself as a target of Western IW (Jaitner & Mattsson, 2015). However, the view among leading Russians like Valery Gerasimov (ibid), Aleksandr Dugin, and others is quite clear: IW is to be used aggressively (Gerasimov, 2013, Dugin 2016), and IW consists of manipulation of the truth to serve Russian national interests (Dugin, 2016), in a way which would be consistent with classic Soviet dezinformatsiya (disinformation)

3 Russia s Full Spectrum Information Warfare Information operations (IO) is closely related to the concept of information warfare. Political and information warfare can occur at any level of political communication while IO is usually done only by military and intelligence agencies. IO is both informational and kinetic even if done in different domains. The National Security Strategy 2020 of Russia states that global information struggles will continue. Russia argues that it is being defensive. A simple narrative guides its IW (Jaitner & Mattsson, 2015). A key Russian narrative is that nations like the United States consistently conduct IO on other nations (Jaitner & Mattsson, 2015). This allegedly includes anti-messages and the instigation of the Euromaidan (anti-russian) uprising in Ukraine. The thrust of this narrative is essentially why shouldn t we do the same. Ironically, together with Russian narratives about US aggression, this serves to undermine the argument that Russia s actions are purely defensive. Russian military thinking and doctrine have long included information warfare. Some of this thinking divides historical Russia from the West as adversaries like the United States. This rift includes both ideological and cultural. The West is accused of being the antagonist of the historical Russian world. (Jaitner & Mattsson, 2015, p 41). The full-spectrum nature of Russian IW includes old media, new media, and various forms of cyber propaganda and IO. Overt and covert communication are all part of unified strategic communication. RIA Novosti is one media channel to other nations. Russia Today (RT), which is more well known, also does propaganda outreach. RT is more targeted to external audiences and is integrated with social media (Jaitner & Mattsson, 2015). Another major propaganda outlet is Sputnik. Some Russians claim that Sputnik was designed to disseminate counter-propaganda (Jaitner & Mattsson, 2015). With their social media channels, Russians use the term Runet to describe their overall online presence or interconnectedness (Jaitner & Mattsson, 2015). Runet is a worldwide network of nodes that are dedicated to Russian IW. Some content is produced within the nation and some by Russian speakers living abroad (Jaitner & Mattsson, 2015). Many in the Russian leadership fear the part of the information and communication space that works against them and which they cannot dominate. They know that since the early part of the 21st century, blogs, forums and other spaces online were used in demonstrations against Russian leader Vladimir Putin. Pro-Putin forces then used online communication to discredit the opposition (Jaitner & Mattsson, 2015). This started the emergence of Russian government trolls. Advertising was run by a Russian company seeking to hire Internet operators. (Jaitner & Mattsson, 2015). 3

4 Empirical Analysis of Russian IW/IO What is the currently identifiable online Russian information warfare reach and apparatus? The study and data analysis here reported examine online Twitter data. We employ big data and automated text analysis to identify matches between Russian political discourse and discourse that is allegedly not Russian, as American online messages. Discursive anchors and resonance terms are located in both Russian and English. The data analysis conducted here is multilingual and goes beyond looking for messages, themes, or frames in Russian discourse. The Twitter messages that are analyzed from from government sources (websites). The Tweets are general messages. The cross-lingual computational linguistics analysis shows both the Russian and English semantic spaces. Content similarities can then be examined. For example, the term democracy is likely to have differing semantic contexts and spaces in the two languages. The goals of the data analysis reported here are: 1. Show signals in online discourse are traceable by identifying differences between Russian and English discourse in Twitter messages. 2. Indicate some ways in which big data analysis can be useful in neutralizing some aspects of online Russian influence operations. 3. Identify what Twitters posts in our data correspond with Russian narratives emanating from the Kremlin. 4. Show what clusters of word co-occurrences indicate key similarities in online posts. 5. Demonstrate how data analytics can expose successful Russian online propaganda/influence by showing what messages or posts appear to be rapidly disseminated or going viral. 6. Show how unbiased data analytics can aid counter information warfare. 7. Display what statistical prevalence and significance exists in certain data patterns related to influencing posting in the Twitter posts. 8. Explain the importance of human coding and bias as an additional component of a big data analytics approach to studying influence operations online. 9. Argue how big data analysis can have a specific role in clarifying how Russian information warfares uses multiple strategies to affect political discourse. Our analysis also includes these focal points: 1. How propaganda spreads in social media like Twitter. 2. The ways in which Russian online influence operations appear to match the principles of information warfare articulated by Russian military leader, Valery Gerasimov (Gerasimov, 2013). 3. How propaganda can be observed in emerging propaganda vectors. 4. What topics in Twitter Tweets in our sample are skewed toward Russian or English language discussions. 4

5 5. How differences in Russian and English information spaces can indicate the movement of of propaganda from the former to the latter. 6. Which topics take the most hold in either Russian or English information spaces. Results of the Study In the study reported here, we explored how unsupervised analytics can be used in two ways to gain a top-down understanding of a previously unseen corpus of social media data, yielding useful insights to an analyst. Motivating this study is the premise that unsupervised techniques, such as those that underlie Google s search engine, automated translation, or Amazon s recommender systems (recommending products a purchaser like based on inter-account similarities of purchasing patterns), have attained a high level of commercial success and usefulness with big data. With Google, for example, the world wide web is constantly changing, yet Google s algorithms continue to work regardless of the language data is in or the overall quantity of data on the web. The question is raised therefore as to whether national security problems can be framed in such a way as to make them amenable to similar kinds of data-driven, unsupervised techniques that require a minimum of subject-specific tuning and recalibration. We believe that the strength of unsupervised techniques boils down to something very simple: they are good at finding groups of things that are similar (clustering), or individual things that stand out (anomaly detection). In Chew (2017), researchers set out a method by which unsupervised techniques can be used to look in a top-down fashion at how discourse in one language as a whole differs from that in another language. Such differences could result simply from differing parochial interests (say, there is more discussion of a Moscow metro shutdown in Russian than in English), or they could result from differing sentiment (e.g. negative sentiment towards NATO among Russian speakers versus positive sentiment among English speakers), or even differing narratives about the same entities. This is, in a sense, an attempt to reformulate other attempts to making sense of social media, which have to rely on supervised learning or labor-intensive tuning, in a way which plays to the strengths of unsupervised analysis. The approach, essentially, works as follows. A cross-language topic analysis is run on the corpus as a whole, using multilingual Latent Semantic Analysis (LSA). How this works is outlined in Chew (2017). Each topic s overall strength in one or another language can then be measured in aggregate (see figure below). 5

6 The topics do not need to be known in advance; they simply emerge with LSA, in the same way that Facebook can currently show a list of trending topics at any point in time. Topics cohere across languages, so if topic on say, NATO, is discussed in both Russian and English, albeit more in one language than in the other, this topic would show up in a single row in the table on the right of the above figure. This list of topics can then quickly be inspected to determine which topics are most skewed towards one rather than another language; these are the cases where the narratives, sentiment, or interests most differ. Note that because all topics emerge from the same integrated framework (in mathematical terms, the same signal processing decomposition of the original corpus), the skewedness of topics is comparable from one topic to the next. We should note that this method was inspired, in fact, by Valery Gerasimov s work (Gerasimov 2013), and other work which discusses the Gerasimov doctrine, e.g. Darczewska 2014). Gerasimov talks of the need for Russia to operate in the information space, and LSA gives us a natural way to measure, without bias, what is going on in an information space, and even to characterize mathematically what an information space is, when bounded by one or another language, e.g. Russian. Following 2014, the Gerasimov doctrine has, as we have already noted, been fully in evidence in the way in which Russia has sought to saturate, first and foremost, its own information space - that is, the space in which Russian is used, for example on Russian-language TV - with information favorable to the Kremlin s narratives. In this sense, we hypothesize that this kind of influence should lead to objectively measurable results in terms of 6

7 differences that will emerge between Russian-language media, and those media in other languages which are less subject to Russian influence. In a dataset of Twitter data from early 2016, for example, this kind of analysis revealed an interesting topic on the NATO Global Strike capability. Global Strike is envisioned by NATO as a defensive capability with the goal of being able to strike back at an adversary threatening a NATO country anywhere in the globe within a certain amount of time. In our dataset and the associated analysis, the analysis of information space differences revealed that this was one of the topics most skewed towards the Russian information space. A top-down analysis does not necessarily in itself provide answers ; what it does is quickly focus an analyst s attention on key aspects of the data that may warrant attention. It can thus be seen as a triaging mechanism that allows the analyst faced with big data to utilize the scarce resource of his time as efficiently as possible. Playing the role of the analyst, we therefore looked more closely at the tweets most representative of this topic, and it turned out some key posts in Russian (translated) were along the lines of NATO is preparing a global strike on Russia (see Figure below). This statement was in fact made not just by bloggers (though it was heavily amplified by them), but originated in the Russian Federation Council. It emerged therefore that what NATO envisages as defensive, a speaker in the Russian Federation Council had depicted as an offensive initiative specifically against Russia, and possibly even as a specific attack being planned. Clearly, this is a significant difference between 7

8 how global strike is discussed in the Russian-language space versus the English-language space, and the implications go to sentiment about NATO, and also to narratives about NATO. A key narrative this statement seems to invoke, for example, is that of Fortress Russia (Bouveng 2010), the narrative that Russia is surrounded by enemies just waiting for the chance to bring Russia down. The key here, however, is that we were able to pick up on this difference using the unsupervised data analytics techniques that have made Google, Amazon and others successful, without having to know to look for this particular narrative, or having to know anything about this particular dataset in setting up the computational analysis. To confirm that the phenomenon we noted was a reality, we ran a simple query to determine in what quantity of English-language versus Russian-language posts the words global and strike were used together. The results of this query (shown above) showed that indeed, the global strike topic was heavily amplified in Russian-language Twitter, whereas it sparked comparatively little interest in English Twitter. The effect is, moreover, disproportionate in that in the particular dataset in question, there were more English-language tweets to start with than Russian-language ones. In the second part of the first study, we turned our attention to another very topical area: that of bots or automated accounts. It has been known for some time (e.g. Nimmo 2017) that Russia s Internet Research Agency has not only been prolific in the use of bots on Twitter to lend artificial amplification to certain topics, but has set up bots in such a way as to make it appear that the 8

9 posts in these accounts are from real people, and, moreover, people in America (whereas the posts may be fully automated and controlled by someone in Russia). Using this as a starting point, we realized that Nimmo s (2017) twelve heuristics in essence again boil down to a more general point: it is an inescapable part of botness that bots behave similarly to other bots. This stems from the very reason that bots are set up in the first place: to automate the spreading of messages, thereby reducing the costs and increasing the return on investment of bot operators. When multiple bots are set up to repost certain approved content (say, news articles by RT or Sputnik), then what is observed en masse is that multiple different accounts have very similar patterns of posting, likes, retweets, etc., and that different accounts move in formation at similar times. What would fly under the radar when looked at in a bottom-up fashion becomes clear when looked at top-down. Bot identification, then, also is a task that we believe lends itself to unsupervised learning. The overview of our approach, which is similar to the survey of information space differences described above, is shown below. A Twitter (or other social media) dataset is the starting-point. This is cast as a term-by-account matrix, which, as above, is run through multilingual and language-agnostic Latent Semantic Analysis topic analysis. Note that terms are understood broadly and can include features such as the date and time of posts, elements of the account name, and so on. From this, one obtains a vector for each Twitter account. It is then possible to cluster the accounts by computing inter-account similarities. Based on the idea outlined above, we expect bots to be tightly 9

10 clustered together with other, similar bots (those that share the same patterns of posts, likes, retweets and so on), while humans, who naturally show more variation, will tend to be outliers. It is possible to establish a threshold of inter-account similarity, where pairs of accounts which exceed that threshold are judged likely to be bots. The full approach is described in Chew (2018). Running this algorithm on a dataset of tweets from around the US general election of 2016 (approximately three weeks prior to three weeks after), and using a threshold of 0.95 (where the maximum similarity is 1), we compiled a list of just over 1,000 bots. A review of a sample of around 40 of these showed that Twitter had already suspended a significant proportion of the sample (at least a quarter) for abusive posting patterns. Even if account suspensions after the fact tend to confirm the findings of an automated procedure, however, it is one thing to come up with a black box which generates lists of suspected bots, and it is another to provide an audit trail of evidence which is convincing to a human. We firmly believe that the place of the human in the loop must not be neglected in developing automated techniques, and that computer-generated analysis must be usable (in this case, provide convincing evidence of bot activity). For this, we use a technique related to LSA called PARAFAC. While Singular Value Decomposition, on which LSA is based, takes as input a two-dimensional matrix (rows and columns), PARAFAC is a generalization of SVD which takes as input a tensor with an arbitrary number of modes (or dimensions). Here, we cast the data for groups of suspected bots within the same botnet (i.e., that all tend to repost similar content) as a three-mode tensor: terms by accounts by time. With PARAFAC as with SVD, the tensor is decomposed, and as with SVD, the outputs include a set of topics. One of the issues that is notable with adversarial bots, and other adversarial activity on Twitter, is deliberate obfuscation. Obfuscation is, in effect, artificial noise which can be introduced into an already noisy dataset (many tweets include typos, say the same thing in slightly different ways, include different hashtags, etc.) to hide the fact that different accounts otherwise act in identical fashion. It is this noise, both deliberately introduced and that which is part of the background, that makes it a highly non-trivial problem to highlight groups of bots in botnets. PARAFAC, like SVD, abstracts away from the noise, cutting through to the signal. Once the PARAFAC topics are identified, it is then a relatively simple matter to pivot the output data as shown in the following figure, where it then becomes crystal clear that four accounts are basically posting the same tweets within seconds of one another. Note, however, that in the original tweets (prior to PARAFAC eliminating the noise), the account _deti_zhdut_ includes an extraneous character at the end of each tweet, while molodost bz prefixes each tweet with the hashtag #news. 10

11 As with the information space difference technique, it is important to note that none of the artificial or background noise need be stripped away by rules-based techniques; these patterns of botnet activity simply emerge from the data. This is key, because rules-based or heuristic-based techniques are easy for an adversary to defeat: once it becomes evident that bots with certain characteristics are being shut down or becoming ineffective, all that is necessary is to introduce new methods of obfuscation. Or, as Ben Nimmo pointed out to us in personal communication, when the heuristic was published, 72 tweets a day or more was considered suspicious, Nimmo noted that a number of accounts were then observed to drop down in output to just below 72. The key value of an unsupervised technique is that no heuristics are ever stated or programmed: all that is used is the accounts and their features. Features - such as words - cannot avoid being used, because these are what influence humans. And if bot creators are to capitalize on automation and attempt to propagate only certain types of content, it becomes hard to impossible to avoid bots being similar to other bots. 11

12 In this sense, an unsupervised approach holds the promise of always being able to stay ahead of the adversary, increasing his costs while decreasing the costs of those who are simply attempting to expose the patterns of abuse. Discussion and Conclusions The main findings from the two studies described above are: a. The techniques help an analyst very quickly gain a top-down down understanding of tens or hundreds of thousands of social media posts. What are the main topics being discussed? b. ATA systems provide insights about the how different communities perceive the same concept. c. Emergence of new natural language techniques can support ATA systems and fill the gap for language expertise. As some of the techniques work cross-lingually. d. These techniques work as a triaging system. They do not eliminate a human analyst from the loop, but they enable the analyst to spend his or her time much more effectively, and not miss the forest for the trees. e. The techniques bring to light high-level patterns that might escape notice if the source data were studied tweet by tweet. f. Specific findings from the data studied included: i. Key differences between narratives in the English-language and Russian-language information spaces - which in turn may indicate effects of propaganda. ii. Specific bots and botnets were revealed. I n this research, we shown the following: a. We have techniques that can be used on any social media dataset, because they re unsupervised. (Regardless of what the posts are about, what language they re in.) b. We demonstrate these techniques with a particular Twitter dataset. The demonstration shows what specific insights these techniques yield from this dataset. Other, but similar, insights will result from other datasets: c. Differences between the way Russian-speaking and English-speaking users talk about NATO Global Strike. These differences seem consistent with differences in national master narratives. d. Specific suspected bots/botnets, with examples of what topics they coalesce around. e. We can use the techniques to come up with these results very quickly and without prior knowledge of the dataset, because they re unsupervised. 12

13 Three possible areas of application for the research we are conducting are: 1. Identifying and tracking discourse that moves from one political discourse space to another. 2. Intelligence collection and analysis for social media. 3. Determining points of vulnerability in Russian IW for counter-propaganda IO. While it might be tempting to argue the truth-telling can undo lie-telling in cases of political propaganda, the history of political propaganda and political warfare shows that public often do not sort out truth from lies and often the lies looks like truths to them. Our age of speed-of-light fake news and phony social media site accounts makes all of this more of a challenge that ever before. The implications of the empirical analysis of Russian IW/IO are very important to the preservation of rational political discourse, intelligent decision making, and faith in democracy. It is apparent that Russia is dedicated to propaganda techniques that both continue and supersede the techniques used by the USSR during the Cold War. Before their annexation of Crimea, the Russians had succeeded in shutting down most of the free press in their nation. Full surveillance and censorship was tightened. After the annexation, however, Putin and other Kremlin leaders decided to take things to the next level, which was generating tidal waves of propaganda in social media (Soldatov & Borogan, 2015). As with other forms of communication in the past, Russia views social media as an information battlefield. This battlefield included Twitter, Facebook, and Youtube. The Russian weapons were words and people (trolls) seeding various narratives. For example, some trolls looked at forums online for negative comments about Putin and then posted comments praising Putin (Soldatov & Borogan, 2015). Comments like these commonly appeared in comment sections of both traditional and new media (Soldatov & Borogan, 2015).Russian IW online has included attacks on American policies, leaders, and its political system. It has also included abusive descriptions of European and American news sources. Now these nations are attempting to develop means of reistanting the online warfare. 13

14 References: Bartles, C. (2016). Getting Gerasimov right. Military Review, Jan/Feb, Bouveng, K. (2010). The Role of Messianism in Contemporary Russian Identity and Statecraft. Durham Theses, Durham University. Accessed at Chew, P. (2017). Understanding Russian information operations using unsupervised multilingual topic modeling. Lee D., Lin YR., Osgood N., Thomson R. (eds) Social, Cultural, and Behavioral Modeling. SBP-BRiMS Lecture Notes in Computer Science, vol Springer, Cham. Chew, P., & Turnley, J. (2018) Using big-data analytics to counter Russian information warfare. Galisteo Consulting Group. Albuquerque, NM. Darczewska, J. (2014) The Anatomy of Russian Information Warfare. Center for Eastern Studies. Dugin, A. (2016). Interview with BBC Newsnight. Accessed on June 15, 2018 at Gerasimov, V. (2013). Ценность науки в предвидении (The value of science in foresight). Военно-промышленный курьер. VPK News, 27 February 2013, available at Giles, K. (2009). Russia s National Security Strategy. NATO Defense College. Halpern, S. (2018). Cambridge Analytica, Facebook, and the revelations of open secrets. The New Yorker, Jaitner, M., & Matsson, P. (2015). Russian information warfare of th International Conference on Cyber Conflict. NATO. Matz, S., Kosinski, M., Nave, G., & Stillwell, D. (2017). Psychological targeting as an effective approach to digital mass persuasion. PNAS, 1-6. McDermott, R. (2016). Does Russia have a Gerasimov doctrine? Parameters, 46, Nimmo, B. (2017). #BotSpot: Twelve Ways to Spot a Bot. Atlantic Council Digital Forensic Research Lab. Accessed on June 3, 2018 at ODNI. (2017). Assessing Russian activities and intentions in recent US elections. Available at 14

15 Onuch, O. (2015). Brothers Grimm or Brothers Karamazov: The myth and the reality of how Russians and Ukrainians view the other. In A. Pikulicka-Wilczewska & R. Sakwa (Eds), Ukraine and Russia: People, Politics, Propaganda and Perspectives. Sanovich, S. (2017). Computational Propaganda in Russia The Origins of Digital Misinformation. University of Oxford Working Paper No Sheth, S. (2017). New evidence emerges that Russia infiltrated Facebook to sow political chaos in the U.S. Business Insider, Sept. 28, Available: on Soldatov, A., & Borogan, I. (2015). The Red Web. New York: Public Affairs. Tatham, S. (2015). The Solution to Russian Propaganda is Not EU or NATO Propaganda but Advanced Social Science to Understand and Mitigate Its Effect in Targeted Populations. National Defence Academica of Latvia Center for Security and Strategic Research. Kenneth Hacker is Professor and Department Head of Communication Studies at New Mexico State University. Peter Chew is President of Galisteo Consulting in Albuquerque, New Mexico. Ahmed Abdelali, PhD. Senior Software Engineer at Qatar Computing Research Institute. 15

Russian Information Warfare Trend Analysis

Russian Information Warfare Trend Analysis Joel Harding s blog https://toinformistoinfluence.com Joel Harding Russian Information Warfare Trend Analysis IW at the Three Levels of Warfare Strategic (national resources) Strategic information warfare

More information

The combination : an instrument in Russia s information war in Catalonia

The combination : an instrument in Russia s information war in Catalonia ARI 92/2017 20 November 2017 The combination : an instrument in Russia s information war in Catalonia Mira Milosevich-Juaristi Senior Analyst at the Elcano Royal Institute and Associate Professor of the

More information

Russian Disinformation War against Poland and Europe.

Russian Disinformation War against Poland and Europe. Current Security Challenge Russian Disinformation War against Poland and Europe. International Conference, 23 June 2017, Warsaw, Poland Click here to access the Programme of the event Click here to access

More information

The StratCom-Security Nexus

The StratCom-Security Nexus The StratCom-Security Nexus Alina Bârgăoanu, Dean - College of Communication and Public Relations Eveline Mărășoiu, Researcher Center for EU Communication Studies Contents Context What is Strategic Communication?

More information

Can You Spot the Deceptive Facebook Post?

Can You Spot the Deceptive Facebook Post? Can You Spot the Deceptive Facebook Post? By KEITH COLLINS and SHEERA FRENKEL SEPT. 4, 2018 Facebook, Twitter and Google executives have been invited to testify in Washington on Wednesday about foreign

More information

ROBOTROLLING ISSUE 2 ROBOTROLLING CENTRE OF EXCELLENCE CENTRE OF EXCELLENCE

ROBOTROLLING ISSUE 2 ROBOTROLLING CENTRE OF EXCELLENCE CENTRE OF EXCELLENCE ROBOTROLLING 2017. ISSUE 2 ROBOTROLLING PREPARED AND BY THE PREPARED BYPUBLISHED THE NATOSTRATEGIC STRATEGIC COMMUNICATIONS NATO COMMUNICATIONS CENTRE OF EXCELLENCE CENTRE OF EXCELLENCE Executive Summary

More information

Conspiracist propaganda

Conspiracist propaganda Conspiracist propaganda How Russia promotes anti-establishment sentiment online? Kohei Watanabe LSE/Waseda University Russia s international propaganda Russia has developed its capability since the early

More information

Executive Summary. The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies. By Jamie Fly, Laura Rosenberger, and David Salvo

Executive Summary. The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies. By Jamie Fly, Laura Rosenberger, and David Salvo The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies By Jamie Fly, Laura Rosenberger, and David Salvo 2018 In 2014, Russian government operatives began attacking American democracy

More information

RUSSIAN INFORMATION AND PROPAGANDA WAR: SOME METHODS AND FORMS TO COUNTERACT AUTHOR: DR.VOLODYMYR OGRYSKO

RUSSIAN INFORMATION AND PROPAGANDA WAR: SOME METHODS AND FORMS TO COUNTERACT AUTHOR: DR.VOLODYMYR OGRYSKO RUSSIAN INFORMATION AND PROPAGANDA WAR: SOME METHODS AND FORMS TO COUNTERACT AUTHOR: DR.VOLODYMYR OGRYSKO PREPARED BY THE NATO STRATEGIC COMMUNICATIONS CENTRE OF EXCELLENCE Russia s aggression against

More information

RUSSIAN CYBER STRATEGY AS PART OF FOREIGN POLICY

RUSSIAN CYBER STRATEGY AS PART OF FOREIGN POLICY 1 RUSSIAN CYBER STRATEGY AS PART OF FOREIGN POLICY WHAT YOU NEED TO KNOW 2 MAIN POINTS Russian cyberwarfare policy is not entirely NEW, but is rather a continuation of existing strategies and tactics New

More information

Canada s NATO Mission: Realism and Recalibration. by Hugh Segal

Canada s NATO Mission: Realism and Recalibration. by Hugh Segal A POLICY August PAPER 2018 POLICY PERSPECTIVE CANADA S NATO MISSION: REALISM AND RECALIBRATION CGAI Fellow Prepared for the Canadian Global Affairs Institute 1800, 421 7th Avenue S.W., Calgary, AB T2P

More information

On Cyber-Enabled IWIO (Information Warfare and Influence Operations)

On Cyber-Enabled IWIO (Information Warfare and Influence Operations) On Cyber-Enabled IWIO (Information Warfare and Influence Operations) DECADAL SURVEY OF SOCIAL AND BEHAVIORAL SCIENCES FOR APPLICATIONS TO NATIONAL SECURITY Board on Behavioral, Cognitive, and Sensory Sciences

More information

CyOP: Cyber-Enhanced Influence Operations and Propaganda

CyOP: Cyber-Enhanced Influence Operations and Propaganda CyOP: Cyber-Enhanced Influence Operations and Propaganda Cybersecurity in the world of psychology, political economics, and social choice theory David M. Perlman, Ph.D. SOFWERX 2018-12-04 How powerful

More information

RUSSIA'S FOOTPRINT IN THE NORDIC-BALTIC INFORMATION ENVIRONMENT PREPARED BY THE NATO STRATEGIC COMMUNICATIONS CENTRE OF EXCELLENCE

RUSSIA'S FOOTPRINT IN THE NORDIC-BALTIC INFORMATION ENVIRONMENT PREPARED BY THE NATO STRATEGIC COMMUNICATIONS CENTRE OF EXCELLENCE IN THE NORDIC-BALTIC INFORMATION ENVIRONMENT PREPARED BY THE NATO STRATEGIC COMMUNICATIONS CENTRE OF EXCELLENCE PREPARED AND PUBLISHED BY THE NATO STRATEGIC COMMUNICATIONS CENTRE OF EXCELLENCE Aim of the

More information

Statement Prepared for the U.S. Senate Committee on Armed Services Subcommittee On Cybersecurity

Statement Prepared for the U.S. Senate Committee on Armed Services Subcommittee On Cybersecurity Clint Watts Robert A. Fox Fellow, Foreign Policy Research Institute Senior Fellow, Center for Cyber and Homeland Security, the George Washington University Statement Prepared for the U.S. Senate Committee

More information

Countering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary

Countering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary Countering Adversary Attacks on Democracy Thought Leader Summary In 2016, Russia, in an unprecedented way, massively interfered with our elections in a way that was better organized, better coordinated

More information

THE GOP DEBATES BEGIN (and other late summer 2015 findings on the presidential election conversation) September 29, 2015

THE GOP DEBATES BEGIN (and other late summer 2015 findings on the presidential election conversation) September 29, 2015 THE GOP DEBATES BEGIN (and other late summer 2015 findings on the presidential election conversation) September 29, 2015 INTRODUCTION A PEORIA Project Report Associate Professors Michael Cornfield and

More information

5 Key Facts. About Online Discussion of Immigration in the New Trump Era

5 Key Facts. About Online Discussion of Immigration in the New Trump Era 5 Key Facts About Online Discussion of Immigration in the New Trump Era Introduction As we enter the half way point of Donald s Trump s first year as president, the ripple effects of the new Administration

More information

Countering Information War Lessons Learned from NATO and Partner Countries. Recommendations and Conclusions

Countering Information War Lessons Learned from NATO and Partner Countries. Recommendations and Conclusions Countering Information War Lessons Learned from NATO and Partner Countries Recommendations and Conclusions 1 Credits Globsec Policy Institute, Klariská 14, Bratislava, Slovakia www.globsec.org GLOBSEC

More information

How Russia Depicts the Czech Republic

How Russia Depicts the Czech Republic How Russia Depicts the Czech Republic Contextual content analysis based on big data from the Internet 26 August 2016 Introduction This unique study was created on the initiative of Semantic Visions, who

More information

Issue Overview: Are social networking sites good for our society?

Issue Overview: Are social networking sites good for our society? Issue Overview: Are social networking sites good for our society? By ProCon.org, adapted by Newsela staff on 11.29.16 Word Count 897 A girl browses the social networking site Facebook on July 10, 2007

More information

The 'Hybrid War in Ukraine': Sampling of a 'Frontline State's Future? Discussant. Derek Fraser

The 'Hybrid War in Ukraine': Sampling of a 'Frontline State's Future? Discussant. Derek Fraser US-UA Security Dialogue VII: Taking New Measure of Russia s Near Abroad : Assessing Security Challenges Facing the 'Frontline States Washington DC 25 February 2016 Panel I The 'Hybrid War in Ukraine':

More information

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks Policy Paper The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks I Context The writing of the new European Union

More information

CISS Analysis on. Obama s Foreign Policy: An Analysis. CISS Team

CISS Analysis on. Obama s Foreign Policy: An Analysis. CISS Team CISS Analysis on Obama s Foreign Policy: An Analysis CISS Team Introduction President Obama on 28 th May 2014, in a major policy speech at West Point, the premier military academy of the US army, outlined

More information

RUSSIA, UKRAINE AND THE WEST: A NEW 9/11 FOR THE UNITED STATES

RUSSIA, UKRAINE AND THE WEST: A NEW 9/11 FOR THE UNITED STATES RUSSIA, UKRAINE AND THE WEST: A NEW 9/11 FOR THE UNITED STATES Paul Goble Window on Eurasia Blog windowoneurasia2.blogspot.com 540-886-1222 41 N. Augusta St., Apt. 203 Staunton, VA 24401 WHY CRIMEA AND

More information

Statement Prepared for the U.S. Senate Committee on Armed Services Subcommittee On Cybersecurity

Statement Prepared for the U.S. Senate Committee on Armed Services Subcommittee On Cybersecurity Clint Watts Robert A. Fox Fellow, Foreign Policy Research Institute Senior Fellow, Center for Cyber and Homeland Security, the George Washington University Statement Prepared for the U.S. Senate Committee

More information

Den Haag October 2016

Den Haag October 2016 Den Haag October 2016 Russia s view of modern conflict: Info Phase Zero 2 New Generation Warfare (& Peace)? The entry for Information war...makes a clear distinction between the Russian definition all-encompassing,

More information

Internet Governance Forum Guadalajara, Mexico

Internet Governance Forum Guadalajara, Mexico Internet Governance Forum 2016 2016-12-05 Guadalajara, Mexico DC on Internet Rights and Principles Workshop Room 10 Day 2, IGF2016 This meeting marked seven years since of the Internet Rights and Principles

More information

The Former Soviet Union Two Decades On

The Former Soviet Union Two Decades On Like 0 Tweet 0 Tweet 0 The Former Soviet Union Two Decades On Analysis SEPTEMBER 21, 2014 13:14 GMT! Print Text Size + Summary Russia and the West's current struggle over Ukraine has sent ripples throughout

More information

DRONES VERSUS SECURITY OR DRONES FOR SECURITY?

DRONES VERSUS SECURITY OR DRONES FOR SECURITY? DRONES VERSUS SECURITY OR DRONES FOR SECURITY? Anton MANDA, PhD candidate * Abstract: Drones represent the most controversial subject when it comes to the dimension of national security. This technological

More information

Twitter Topic Modeling and the 2016 Presidential Campaigns

Twitter Topic Modeling and the 2016 Presidential Campaigns Twitter Topic Modeling and the 2016 Presidential Campaigns Kelsey S. O Neill and Thomas W. Miller Northwestern University School of Professional Studies July 5, 2016 Introduction Many organizations today

More information

Can Hashtags Change Democracies? By Juliana Luiz * Universidade Estadual do Rio de Janeiro, Rio de Janeiro, Rio de Janeiro, Brazil

Can Hashtags Change Democracies? By Juliana Luiz * Universidade Estadual do Rio de Janeiro, Rio de Janeiro, Rio de Janeiro, Brazil By Juliana Luiz * Universidade Estadual do Rio de Janeiro, Rio de Janeiro, Rio de Janeiro, Brazil (Sunstein, Cass. #Republic: Divided Democracy in the Age of Social Media. New Jersey: Princeton University

More information

Fake Polls as Fake News:

Fake Polls as Fake News: Fake Polls as Fake News: The Challenge for Mexico s Elections By Jorge Buendía Global Fellow, Mexico Institute April 2018 Fake Polls as Fake News: The Challenge for Mexico s Elections By Jorge Buendía

More information

U.S. House Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats

U.S. House Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats U.S. House Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats "Strategic Communication and Countering Ideological Support for Terrorism" Statement of Duncan MacInnes Principal

More information

Introduction to the Cold War

Introduction to the Cold War Introduction to the Cold War What is the Cold War? The Cold War is the conflict that existed between the United States and Soviet Union from 1945 to 1991. It is called cold because the two sides never

More information

Security Implications of Russian Strategic Communication and Information Warfare in the Eastern Partnership Countries

Security Implications of Russian Strategic Communication and Information Warfare in the Eastern Partnership Countries Security Implications of Russian Strategic Communication and Information Warfare in the Eastern Partnership Countries Vineta Mēkone Operational Support Branch NATO Strategic Communication Centre of Excellence

More information

Latvia struggles with restive Russian minority amid regional tensions

Latvia struggles with restive Russian minority amid regional tensions Visit Al Jazeera English (/) INTERNATIONAL (/TOPICS/TOPIC/CATEGORIES/INTERNATIONAL.HTML) Latvia struggles with restive Russian minority amid regional tensions ILMARS ZNOTINS / AFP One country, two di erent

More information

Preparing for NATO s 2014 Summit Under the Spell of the Ukraine Crisis

Preparing for NATO s 2014 Summit Under the Spell of the Ukraine Crisis Report Preparing for NATO s 2014 Summit Under the Spell of the Ukraine Crisis Friday, 20 June 2014 Press Centre Nieuwspoort, The Hague In light of the upcoming NATO summit in Wales (in September of this

More information

Lies, Damned Lies and Russian Disinformation. The Russian Federation. Paul Goble. Executive Summary

Lies, Damned Lies and Russian Disinformation. The Russian Federation. Paul Goble. Executive Summary Lies, Damned Lies and Russian Disinformation Paul Goble Executive Summary The Russian Federation uses extensive propaganda, outright lies, and most importantly disinformation as part of the hybrid warfare

More information

Topline questionnaire

Topline questionnaire 47 Topline questionnaire Election 2016 Website Analysis Campaign website audit topline July 2016 Pew Research Center Post frequency Average # of original or externally produced news items posted per day

More information

Russia, Ukraine, and the West: Social Media Sentiment in the Euromaidan Protests

Russia, Ukraine, and the West: Social Media Sentiment in the Euromaidan Protests Russia, Ukraine, and the West: Social Media Sentiment in the Euromaidan Protests The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters.

More information

Draft Accra Declaration

Draft Accra Declaration Draft Accra Declaration World Press Freedom Day 2018 Keeping Power in Check: Media, Justice and the Rule of Law We, the participants at the UNESCO World Press Freedom Day International Conference, held

More information

Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010

Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010 Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010 The U.S. and China are in the process of redefining their bilateral relationship, as China s new strengths means it has

More information

Roundtable to Discuss Russian Involvement in Ukraine s Elections

Roundtable to Discuss Russian Involvement in Ukraine s Elections Ewan Lawson Royal United Services Institute for Defence and Security Studies Conference Report Roundtable to Discuss Russian Involvement in Ukraine s Elections Ewan Lawson cmxcix Roundtable to Discuss

More information

College of Arts and Sciences. Political Science

College of Arts and Sciences. Political Science Note: It is assumed that all prerequisites include, in addition to any specific course listed, the phrase or equivalent, or consent of instructor. 101 AMERICAN GOVERNMENT. (3) A survey of national government

More information

CALL FOR ARTICLES THE CARIBBEAN SECURITY AND STRATEGY CONFERENCE. and

CALL FOR ARTICLES THE CARIBBEAN SECURITY AND STRATEGY CONFERENCE. and CALL FOR ARTICLES THE CARIBBEAN SECURITY AND STRATEGY CONFERENCE and THE CARIBBEAN JOURNAL OF STRATEGIC AND SECURITY STUDIES (INCORPORATING THE MONEAGUE PAPERS) VOLUME 1 ISSUE 2 General Information Theme:

More information

Propaganda and Challenges to the Russian Regime

Propaganda and Challenges to the Russian Regime Propaganda and Challenges to the Russian Regime April 4, 2017 Moscow is trying to maintain an image of strength. By Xander Snyder A bomb was detonated on a Russian subway train Monday afternoon, killing

More information

Logan McHone COMM 204. Dr. Parks Fall. Analysis of NPR's Social Media Accounts

Logan McHone COMM 204. Dr. Parks Fall. Analysis of NPR's Social Media Accounts Logan McHone COMM 204 Dr. Parks 2017 Fall Analysis of NPR's Social Media Accounts Table of Contents Introduction... 3 Keywords... 3 Quadrants of PR... 4 Social Media Accounts... 5 Facebook... 6 Twitter...

More information

Armageddon Proportions

Armageddon Proportions Armageddon Proportions By J. Speer-Williams For they are the spirits of devils The duly democratically elected president of Syria, Bashar al-assad, asked Russian president Vladimir Putin to come to his

More information

ANNUAL SURVEY REPORT: REGIONAL OVERVIEW

ANNUAL SURVEY REPORT: REGIONAL OVERVIEW ANNUAL SURVEY REPORT: REGIONAL OVERVIEW 2nd Wave (Spring 2017) OPEN Neighbourhood Communicating for a stronger partnership: connecting with citizens across the Eastern Neighbourhood June 2017 TABLE OF

More information

Kremlin Watch Monitor ǀ August 1, 2016

Kremlin Watch Monitor ǀ August 1, 2016 Last week's events concerning the pro-kremlin disinformation campaign Can't see images? http://bit.ly/1ucxf8g Kremlin Watch Monitor ǀ August 1, 2016 New publication Jakub Janda, Head of the Kremlin Watch

More information

Vocabulary Activities

Vocabulary Activities I. READING #1 - A. Fill in the definitions below with the missing words or phrases. In the Example box, write a sentence using the vocabulary word. Word Definition Example Arab Spring* a wave of pro-democracy

More information

Thought Leader Summary. Heather Conley SVP for Europe, Eurasia, and the Arctic; and Director, Europe Program, CSIS

Thought Leader Summary. Heather Conley SVP for Europe, Eurasia, and the Arctic; and Director, Europe Program, CSIS Prospects and Priorities for U.S. Gray Zone Competition Center for Strategic and International Studies Tuesday, November 27, 2018 Heather Conley SVP for Europe, Eurasia, and the Arctic; and Director, Europe

More information

Fake news on Twitter. Lisa Friedland, Kenny Joseph, Nir Grinberg, David Lazer Northeastern University

Fake news on Twitter. Lisa Friedland, Kenny Joseph, Nir Grinberg, David Lazer Northeastern University Fake news on Twitter Lisa Friedland, Kenny Joseph, Nir Grinberg, David Lazer Northeastern University Case study of a fake news pipeline Step 1: Wikileaks acquires hacked emails from John Podesta Step 2:

More information

Information for the 2017 Open Consultation of the ITU CWG-Internet Association for Proper Internet Governance 1, 6 December 2016

Information for the 2017 Open Consultation of the ITU CWG-Internet Association for Proper Internet Governance 1, 6 December 2016 Summary Information for the 2017 Open Consultation of the ITU CWG-Internet Association for Proper Internet Governance 1, 6 December 2016 The Internet and the electronic networking revolution, like previous

More information

Panel: Norms, standards and good practices aimed at securing elections

Panel: Norms, standards and good practices aimed at securing elections Panel: Norms, standards and good practices aimed at securing elections The trolls of democracy RAFAEL RUBIO NÚÑEZ Professor of Constitutional Law Complutense University, Madrid Center for Political and

More information

NATIONAL: FAKE NEWS THREAT TO MEDIA; EDITORIAL DECISIONS, OUTSIDE ACTORS AT FAULT

NATIONAL: FAKE NEWS THREAT TO MEDIA; EDITORIAL DECISIONS, OUTSIDE ACTORS AT FAULT Please attribute this information to: Monmouth University Poll West Long Branch, NJ 07764 www.monmouth.edu/polling Follow on Twitter: @MonmouthPoll Released: Monday, April 2, 2018 Contact: PATRICK MURRAY

More information

U.S. Sen. Mark R. Warner Transcript March 1, 2018

U.S. Sen. Mark R. Warner Transcript March 1, 2018 U.S. Sen. Mark R. Warner Transcript March 1, 2018 Thank you, Bill, thank you for that very kind introduction. It is great to see everyone here this morning. I recall a number of times in the last few weeks

More information

College of Arts and Sciences. Political Science

College of Arts and Sciences. Political Science Note: It is assumed that all prerequisites include, in addition to any specific course listed, the phrase or equivalent, or consent of instructor. 101 AMERICAN GOVERNMENT. (3) A survey of national government

More information

Accra Declaration. World Press Freedom Day Keeping Power in Check: Media, Justice and the Rule of Law

Accra Declaration. World Press Freedom Day Keeping Power in Check: Media, Justice and the Rule of Law Accra Declaration World Press Freedom Day 2018 Keeping Power in Check: Media, Justice and the Rule of Law We, the participants at the UNESCO World Press Freedom Day International Conference, held in Accra,

More information

Of Jackals and Hamsters

Of Jackals and Hamsters Of Jackals and Hamsters DIVIDING LINES IN RUSSIAN POLITICS AND THE PROSPECTS FOR DEMOCRATIZATION PONARS Eurasia Policy Memo No. 193 June 2012 Viatcheslav Morozov University of Tartu Speaking to a gathering

More information

FREE RUSSIA. Plan of information and psychological operation

FREE RUSSIA. Plan of information and psychological operation FREE RUSSIA Plan of information and psychological operation Goal of Operation Spread of panic and defeatist ideas among the enemy population (in different regions and public layers) to make Russian state

More information

Update on Facebook s Civil Rights Audit

Update on Facebook s Civil Rights Audit Update on Facebook s Civil Rights Audit I. A Note from Laura Murphy The call for a civil rights audit at Facebook reflects the deep concerns of U.S.-based advocacy groups who have rightly observed that,

More information

Methods of Psychological Influence on Military Personnel and Civilians in Latvia. Dr.psych., OF-3 Andzela Rozcenkova

Methods of Psychological Influence on Military Personnel and Civilians in Latvia. Dr.psych., OF-3 Andzela Rozcenkova Methods of Psychological Influence on Military Personnel and in Latvia Dr.psych., OF-3 Andzela Rozcenkova Why should we study the psychological impact on society? After Russia s military intervention in

More information

EXCLUSIVE POLLING ON LATEST AMERICAN ATTITUDES TOWARD RUSSIA, VLADIMIR PUTIN & PRESIDENT TRUMP:

EXCLUSIVE POLLING ON LATEST AMERICAN ATTITUDES TOWARD RUSSIA, VLADIMIR PUTIN & PRESIDENT TRUMP: EXCLUSIVE POLLING ON LATEST AMERICAN ATTITUDES TOWARD RUSSIA, VLADIMIR PUTIN & PRESIDENT TRUMP: 2018 (conducted in February 2018 by McLaughlin & Associates for Joel C. Rosenberg, author of the new political

More information

Warm ups *What is a key cultural difference between Ireland and Northern Ireland? *What is a key political difference between the two?

Warm ups *What is a key cultural difference between Ireland and Northern Ireland? *What is a key political difference between the two? Warm ups 11.28.2016 *What is a key cultural difference between Ireland and Northern Ireland? *What is a key political difference between the two? Lesson Objective: *describe what NATO is *describe key

More information

Politicians as Media Producers

Politicians as Media Producers Politicians as Media Producers Nowadays many politicians use social media and the number is growing. One of the reasons is that the web is a perfect medium for genuine grass-root political movements. It

More information

Current Challenges in the Euro-Atlantic Region with a Special Focus on Hybrid Aspects

Current Challenges in the Euro-Atlantic Region with a Special Focus on Hybrid Aspects OFFICE OF THE HUNGARIAN NATIONAL ASSEMBLY DIRECTORATE FOR FOREIGN RELATIONS Current Challenges in the Euro-Atlantic Region with a Special Focus on Hybrid Aspects 21 st International Parliamentary NATO

More information

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT. Working Group on Enhanced Cooperation

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT. Working Group on Enhanced Cooperation UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT Working Group on Enhanced Cooperation Contribution to the guiding questions agreed during first meeting of the WGEC Submitted by Association

More information

Analysis of the Draft Defence Strategy of the Slovak Republic 2017

Analysis of the Draft Defence Strategy of the Slovak Republic 2017 Analysis of the Draft Defence Strategy of the Slovak Republic 2017 Samuel Žilinčík and Tomáš Lalkovič Goals The main goal of this study consists of three intermediate objectives. The main goal is to analyze

More information

Democracy Promotion in Eurasia: A Dialogue

Democracy Promotion in Eurasia: A Dialogue Policy Briefing Eurasia Democratic Security Network Center for Social Sciences January 2018 Democracy Promotion in Eurasia: A Dialogue D emocracy promotion in the countries of the former Soviet Union is

More information

Testimony by Joerg Forbrig, Transatlantic Fellow for Central and Eastern Europe, German Marshall Fund of the United States

Testimony by Joerg Forbrig, Transatlantic Fellow for Central and Eastern Europe, German Marshall Fund of the United States European Parliament, Committee on Foreign Relations Public Hearing The State of EU-Russia Relations Brussels, European Parliament, 24 February 2015 Testimony by Joerg Forbrig, Transatlantic Fellow for

More information

What do we mean by strategic communications and why do we need it?

What do we mean by strategic communications and why do we need it? Communication is everywhere. A dog wags a tail. A bird chirps a warning. A politician looks angrily at a little child in shopping mall and someone snaps a photo. We live in a world of meaning, stories,

More information

Asymmetric Warfare Within Hybrid Warfare. Dr Rod Thornton, King s College London

Asymmetric Warfare Within Hybrid Warfare. Dr Rod Thornton, King s College London Asymmetric Warfare Within Hybrid Warfare Dr Rod Thornton, King s College London Asymmetric warfare and hybrid warfare Both are seen as different from the norm of warfare. Both tend to be products of the

More information

UNITED NATIONS HEADQUARTERS, NEW YORK WEDNESDAY, 5 APRIL 2017, A.M. Ali Rached INTERPOL Counter-Terrorism Directorate

UNITED NATIONS HEADQUARTERS, NEW YORK WEDNESDAY, 5 APRIL 2017, A.M. Ali Rached INTERPOL Counter-Terrorism Directorate Open Briefing of the Counter-Terrorism Committee on Denying Save Haven to Those who Finance, Plan, Support, or Commit Terrorist Acts, or Provide Safe Havens, and Preventing Terrorists from Abusing the

More information

Anti-Democratic Propaganda in Bulgaria

Anti-Democratic Propaganda in Bulgaria PRESS RELEASE of REPORT on the Study on Anti-Democratic Propaganda in Bulgaria Part One. News Websites and Print Media: 2013 2016 Quantitative Research Human and Social Studies Foundation Sofia, 2017 Support

More information

Election Hacking: Russian Interference in the 2016 U.S. Presidential Election PRESENTER: JIM MILLER

Election Hacking: Russian Interference in the 2016 U.S. Presidential Election PRESENTER: JIM MILLER Election Hacking: Russian Interference in the 2016 U.S. Presidential Election PRESENTER: JIM MILLER The Mueller Indictment CONSPIRACY TO DEFRAUD THE U.S. The Grand Jury for the District of Columbia charges:

More information

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES Martin S. Feldstein Working Paper 13729 http://www.nber.org/papers/w13729 NATIONAL BUREAU OF ECONOMIC RESEARCH

More information

Russia s Disinformation Activities and Counter-Measures

Russia s Disinformation Activities and Counter-Measures Kremlin Watch Report 18.09.2018 Russia s Disinformation Activities and Counter-Measures Lessons from Georgia Tornike Zurabashvili Kremlin Watch Special Fellow Kremlin Watch is a strategic program which

More information

The Narrative Threat of North Korea: An Initial Assessment

The Narrative Threat of North Korea: An Initial Assessment The Narrative Threat of North Korea: An Initial Assessment Strategic Discourse Analysis (STRADA) Group, New Mexico State University April 29, 2013 In recent weeks, analysts, scholars, and government leaders

More information

The National Security Agency s Warrantless Wiretaps

The National Security Agency s Warrantless Wiretaps The National Security Agency s Warrantless Wiretaps In 2005, the press revealed that President George W. Bush had authorized government wiretaps without a court warrant of U.S. citizens suspected of terrorist

More information

Gab: The Alt-Right Social Media Platform

Gab: The Alt-Right Social Media Platform Gab: The Alt-Right Social Media Platform Yuchen Zhou 1, Mark Dredze 1[0000 0002 0422 2474], David A. Broniatowski 2, William D. Adler 3 1 Center for Language and Speech Processing Johns Hopkins University,

More information

Commanding the Trend: Social Media as Information Warfare

Commanding the Trend: Social Media as Information Warfare Commanding the Trend: Social Media as Information Warfare Lt Col Jarred Prier, USAF Abstract This article demonstrates how social media is a tool for modern information-age warfare. It builds on analysis

More information

BEYOND BORDERS: TRANSITIONING NATO TOWARDS HUMAN SECURITY NATO STUDENT POLICY PAPER COMPETITION Oscar Vejen Lacoppidan

BEYOND BORDERS: TRANSITIONING NATO TOWARDS HUMAN SECURITY NATO STUDENT POLICY PAPER COMPETITION Oscar Vejen Lacoppidan BEYOND BORDERS: TRANSITIONING NATO TOWARDS HUMAN SECURITY PEACE AND SECURITY IN THE 21 ST CENTURY: A YOUTH PERSPECTIVE NATO STUDENT POLICY PAPER COMPETITION 2016 Oscar Vejen Lacoppidan Security Risk Management,

More information

All The President s Tweets: l. Political Rhetoric on Social Media THAD KOUSSER AND STAN OKLOBDZIJA DEPARTMENT OF POLITICAL SCIENCE, UC SAN DIEGO

All The President s Tweets: l. Political Rhetoric on Social Media THAD KOUSSER AND STAN OKLOBDZIJA DEPARTMENT OF POLITICAL SCIENCE, UC SAN DIEGO All The President s Tweets: l Political Rhetoric on Social Media THAD KOUSSER AND STAN OKLOBDZIJA DEPARTMENT OF POLITICAL SCIENCE, UC SAN DIEGO The Twitter Election of 2016 Growth in Followers Accelerated

More information

THE CHALLENGE OF THE GRAY ZONE. Presentation to the Strategic Multilayer Assessment

THE CHALLENGE OF THE GRAY ZONE. Presentation to the Strategic Multilayer Assessment THE CHALLENGE OF THE GRAY ZONE Presentation to the Strategic Multilayer Assessment Michael Mazarr February 2016 The argument: In an era of networks and nuclear weapons, constrained military operations

More information

PREVENTING VIOLENT EXTREMISM ONLINE

PREVENTING VIOLENT EXTREMISM ONLINE PREVENTING VIOLENT EXTREMISM ONLINE THROUGH PUBLIC-PRIVATE PARTNERSHIPS 8 April 2016 Palais des Nations, Salle XXIII Report Executive Report On 8 April 2016, the Federal Department of Foreign Affairs of

More information

The Attack of the Bots and Trolls: The Social Storms that are Destroying Public Confidence in Institutions

The Attack of the Bots and Trolls: The Social Storms that are Destroying Public Confidence in Institutions The Attack of the Bots and Trolls: The Social Storms that are Destroying Public Confidence in Institutions 19 April 2018 French Caldwell @itguru 2017 MetricStream, Photo: James Inc. Edward All Rights Reserved.

More information

Making Sense of the Present and Future Operating Environment: Hybrid Threats and Hybrid Strategies in a Historical Context

Making Sense of the Present and Future Operating Environment: Hybrid Threats and Hybrid Strategies in a Historical Context Making Sense of the Present and Future Operating Environment: Hybrid Threats and Hybrid Strategies in a Historical Context Dr Paul Latawski Department of War Studies Presentation Outline Definitions: What

More information

Towards Elections with Integrity

Towards Elections with Integrity POLICY BRIEF Towards Elections with Integrity MARTA MARTINELLI, SRDJAN CVIJIC, ISKRA KIROVA, BRAM DIJKSTRA, AND PAMELA VALENTI October 2018 The EU s High-Level Conference on the Future of Election Observation

More information

Patterns of illiberalism in central Europe

Patterns of illiberalism in central Europe Anton Shekhovtsov, Slawomir Sierakowski Patterns of illiberalism in central Europe A conversation with Anton Shekhovtsov Published 22 February 2016 Original in English First published in Wirtualna Polska,

More information

Western Responses to the Ukraine Crisis: Policy Options

Western Responses to the Ukraine Crisis: Policy Options Chatham House Expert Group Summary Western Responses to the Ukraine Crisis: Policy Options 6 March 2014 The views expressed in this document are the sole responsibility of the author(s) and do not necessarily

More information

Rajan Menon and Eugene B. Rumer, Conflict in Ukraine: The Unwinding of the Post Cold War Order. Cambridge, MA and London, UK: MIT Press, pp.

Rajan Menon and Eugene B. Rumer, Conflict in Ukraine: The Unwinding of the Post Cold War Order. Cambridge, MA and London, UK: MIT Press, pp. REVIEWS Rajan Menon and Eugene B. Rumer, Conflict in Ukraine: The Unwinding of the Post Cold War Order. Cambridge, MA and London, UK: MIT Press, 2016. 248 pp. Two major approaches have framed interpretations

More information

Government Research Priorities for TSAS

Government Research Priorities for TSAS Government Research Priorities for TSAS TSAS works with a number of departments in government. This document alerts academic researchers to the questions that policy analysts find most interesting and

More information

Confronting the Nucleus Taking Power from Fascists

Confronting the Nucleus Taking Power from Fascists Confronting the Nucleus Taking Power from Fascists Joshua Curiel May 1st, 2018 Contents Introduction......................................... 3 The Reaction......................................... 3 The

More information

Case 1:17-cv ESH Document 36-1 Filed 12/08/17 Page 1 of 13 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:17-cv ESH Document 36-1 Filed 12/08/17 Page 1 of 13 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Case 1:17-cv-01370-ESH Document 36-1 Filed 12/08/17 Page 1 of 13 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ROY COCKRUM, et al., v. Plaintiffs, DONALD J. TRUMP FOR PRESIDENT, INC.,

More information

Explaining the Spread of Misinformation on Social Media: Evidence from the 2016 U.S. Presidential Election.

Explaining the Spread of Misinformation on Social Media: Evidence from the 2016 U.S. Presidential Election. Explaining the Spread of Misinformation on Social Media: Evidence from the 2016 U.S. Presidential Election. Pablo Barberá Assistant Professor of Computational Social Science London School of Economics

More information

closer look at Rights & remedies

closer look at Rights & remedies A closer look at Rights & remedies November 2017 V1 www.inforights.im Important This document is part of a series, produced purely for guidance, and does not constitute legal advice or legal analysis.

More information

Report Rethinking deterrence and assurance Western deterrence strategies: at an inflection point? Wednesday 14 Saturday 17 June 2017 WP1545

Report Rethinking deterrence and assurance Western deterrence strategies: at an inflection point? Wednesday 14 Saturday 17 June 2017 WP1545 Image: Sergeant Tom Robinson RLC Report Rethinking deterrence and assurance Western deterrence strategies: at an inflection point? Wednesday 14 Saturday 17 June 2017 WP1545 In association with: Report

More information

Cosentino Brands Monthly Social Media Report. December/End of the Year 2014

Cosentino Brands Monthly Social Media Report. December/End of the Year 2014 Cosentino Brands Monthly Social Media Report December/End of the Year 2014 Silestone and ECO by Cosentino Social Media Measurement December/End of the Year 2014 Monthly Report Silestone Measurement and

More information