Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Defense and Security Studies (2)
- International Relations (2)
- Political Science (2)
- Public Affairs, Public Policy and Public Administration (2)
- American Politics (1)
-
- Arts and Humanities (1)
- Communication (1)
- Communication Technology and New Media (1)
- First Amendment (1)
- History (1)
- International Law (1)
- International and Intercultural Communication (1)
- Internet Law (1)
- Law (1)
- Mass Communication (1)
- Military and Veterans Studies (1)
- Military, War, and Peace (1)
- National Security Law (1)
- Peace and Conflict Studies (1)
- Political History (1)
- Social Influence and Political Communication (1)
- Social Media (1)
- Soviet and Post-Soviet Studies (1)
- Keyword
-
- CIA (1)
- China (1)
- Counter-influence policy (1)
- DHS (1)
- DNI (1)
-
- Deepfakes (1)
- Disinformation (1)
- FBI (1)
- Fake (1)
- False (1)
- France (1)
- Human trafficking (1)
- IC (1)
- Influence (1)
- Information (1)
- Information warfare (1)
- Intelligence (1)
- Intelligence community (1)
- Islamist (1)
- Marriage (1)
- Military policy (1)
- Misinformation (1)
- Misyar (1)
- News (1)
- Nuclear nations (1)
- Nuclear war (1)
- Propaganda (1)
- Russia (1)
- Saudi Arabia (1)
- Security gaps (1)
Articles 1 - 4 of 4
Full-Text Articles in Entire DC Network
A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen
A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen
Global Tides
This paper attempts to explain the threat that foreign disinformation poses for the United States Intelligence Community and its allies. The paper examines Russian disinformation from both a historical and contemporary context and how its effect on Western democracies may only be exacerbated in light of Chinese involvement and evolving technologies. Fortunately, the paper also studies practices and strategies that the United States Intelligence Community and its allied foreign counterparts may use to respond. It is hoped that this study will help shed further light on Russian and Chinese disinformation campaigns and explain how the Intelligence Community can efficiently react.
Bytes And Bombs: Information Warfare And Accidental Nuclear War, Nicholas Stewart
Bytes And Bombs: Information Warfare And Accidental Nuclear War, Nicholas Stewart
Global Tides
While both information warfare and accidental nuclear war have been discussed in detail in academia, their intersection has long been ignored. Information warfare can be used to create animosity between states and could even spark war during times of crisis. Furthermore, not all states benefit from the technology advances of the first world: nations like Russia and Pakistan have disturbing gaps in their nuclear command and control that could be easily exploited by other states, internal factions or even terrorist organizations. Comparing the information vulnerabilities of the United States, Russia and Pakistan, one can only conclude that immediate action is …
Misyar Marriage As Human Trafficking In Saudi Arabia, Stephanie Doe
Misyar Marriage As Human Trafficking In Saudi Arabia, Stephanie Doe
Global Tides
The severity and scope of human trafficking for sexual and labor exploitation has been grossly understudied until this past decade. Reliable information on how and why trafficking in persons occurs is scarce, especially for the Middle East. Saudi Arabia’s notorious policies of discrimination against women serve as the starting point. In Saudi Arabia, the monarchy has co-opted the traditional roles of women as an emblem of its own Islamic character, thereby making it a symbol of its national heritage. An entrenched institution of patriarchy uses gender construction as an instrument of state policy and state security. This intimate relationship between …
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Global Tides
Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …