By

Michael Williams
Ed – The subject of this article has been under discussion within DoD for many years.  Who should be in charge?  USSOCOM?  The regional Combatant Commands?  CYBERCOM?  There are all good arguments for each but, in the end, and because of a lack of action on the part of others that CYBERCOM may be as...
Read More
From the Scientific American: In a recent review of the research, Nadia M. Brashier and Elizabeth J. Marsh identify two additional ways disinformation hacks our truth judgments. One that is closely related to fluency and the good feelings it generates is memory. The information and experiences stored in our memory are powerful weapons in the...
Read More
Securing Democracy Dispatch   December 9, 2019 Our Take Democracies need a competitive offer and vision for the future internet, which includes counting 5G spending towards 2-percent goals, Fellow for Emerging Technologies Lindsay Gorman argued in Defense One. In a Washington Post piece on Russia’s efforts to target this week’s U.K. elections, Non-Resident Fellow Clint...
Read More
A pair of articles identify the necessity of getting the public involved in recognizing the threat of disinformation and the need to proactively protect democratic values.  There is a price to be paid to take the steps necessary to protect our infrastructure and to highlight the threat of misinformation and those that would propagate misinformation...
Read More
Latest from the Alliance for Securing Democracy Democracies need a competitive offer and vision for the future internet, which includes counting 5G spending towards 2-percent goals, Fellow for Emerging Technologies Lindsay Gorman argued in Defense One. In a Washington Post piece on Russia’s efforts to target this week’s U.K. elections, Non-Resident Fellow Clint Watts argued...
Read More
A helpful starter guide from the tech writers at the NY Times with some simple steps you can take to limit tracking and other intrusions to your on-line activities. Here are some mildly terrifying things I learned when I recently did an online privacy checkup: Google was sharing my creditworthiness with third parties.  
Read More
This new post from The Strategy Bridge has all the right intentions.  What’s missing is the discussion of structural impediments within the NSC and its inability to direct any resources within the departments without a Presidential Directive and even then it is limited.  Yes, there are some PDDs that live on past one administration but...
Read More
From Defense One: A broad disinformation campaign of fake news and other tricks aims to turn the Baltic nation’s public against the alliance. FORT BRAGG, North Carolina — The Russian effort to smear NATO’s reputation in Lithuania is broader than previously revealed — and is likely a harbinger of future disinformation campaigns in the country, throughout...
Read More
The latest Kremlin Watch Briefing from the European Values Center for Security Policy Topics of the Week Russian exploits in Africa: Strategic goal or a testing ground for the Kremlin? How does GRU attack Android phones? Kremlin’s Current Narrative: China is a victim of US aggression  
Read More
From The Hill:  Some good news in the cyber-domain. State election officials said Ohio detected and stopped an election-related cyberattack earlier this month, The Associated Press reported.
Read More
1 5 6 7 8 9
Brandt, J., Schafer, B., Aghekyan, E., Wirtschafter, V., & Danditya, A. (2022). Winning the web: How Beijing exploits search results to shape views of Xinjiang and COVID-19. Brookings Institute. https://www.brookings.edu/articles/winning-the-web-how-beijing-exploits-search-results-to-shape-views-of-xinjiang-and-covid-19/
Mankoff, J. (2020). With Friends Like These: Assessing Russian Influence in Germany. Center for Strategic & International Studies. https://www.csis.org/analysis/friends-these-assessing-russian-influence-germany
Babbage, R. (2019). Winning Without Fighting: Chinese and Russian Political Warfare Campaigns and How the West Can Prevail. Center for Strategic and Budgetary Assessments. https://csbaonline.org/research/publications/winning-without-fighting-chinese-and-russian-political-warfare-campaigns-and-how-the-west-can-prevail/publication/1
Singer, P. W. (n.d.). Winning the War of Words: Information Warfare in Afghanistan. Brookings. Retrieved April 26, 2024, from https://www.brookings.edu/articles/winning-the-war-of-words-information-warfare-in-afghanistan/
Koerner, B. I. (2016, March). Why ISIS Is Winning the Social Media War—And How to Fight Back. Wired. https://www.wired.com/2016/03/isis-winning-social-media-war-heres-beat/