Narrow your search

Library

Vlaams Parlement (5)

KU Leuven (4)

NATO Library (4)

UCLouvain (4)

KBC (1)

LUCA School of Arts (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UAntwerpen (1)

More...

Resource type

book (15)


Language

English (14)

French (1)


Year
From To Submit

2022 (15)

Listing 1 - 10 of 15 << page
of 2
>>
Sort by

Book
Info Ops : From World War I to the Twitter Era
Authors: --- ---
ISBN: 9781626379954 1626379955 1955055009 Year: 2022 Publisher: Boulder, CO : Lynne Rienner, 2022

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since antiquity, information has been used in conflict - to deceive, to demoralize, to sow fear among enemy troops. Not until the twentieth century, though, did information operations become so central to war. In this book the authors assess the evolving role and increasing relevance of information operations from the leaflet bombardments of World War I to the present digital age.


Book
Cyber war and cyber peace : digital conflict in the Middle East
Authors: ---
ISBN: 0755646045 0755646002 9780755646005 9780755646043 Year: 2022 Publisher: London: I.B. Tauris,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Middle East is the region in which the first act of cyber warfare took place. Since then, cyber warfare has escalated and has completely altered the course of the MENA region's geopolitics. With a foreword by top national security and cyber expert, Richard A. Clarke, this is the first anthology to specifically investigate the history and state of cyber warfare in the Middle East. It gathers an array of technical practitioners, social science scholars, and legal experts to provide a panoramic overview and cross-sectional analysis covering four main areas: privacy and civil society; the types of cyber conflict; information and influence operations; and methods of countering extremism online. The book highlights the real threat of hacktivism and informational warfare between state actors and the specific issues affecting the MENA region. These include digital authoritarianism and malware attacks in the Middle East, analysis of how ISIS and the Syrian electronic army use the internet, and the impact of disinformation and cybercrime in the Gulf. The book captures the flashpoints and developments in cyber conflict in the past 10 years and offers a snapshot of the region's still-early cyber history. It also clarifies how cyber warfare may develop in the near- to medium-term future and provides ideas of how its greatest risks can be avoided


Book
Russian and Ukrainian perspectives on the concept of information confrontation : translations, 2002-2020

Loading...
Export citation

Choose an application

Bookmark

Abstract

In this volume, the authors of several translated articles, which were published between 2002 and 2020, provide insight into the evolution of military-scientific thinking in both Russia and Ukraine on the concept of information confrontation. The authors detail the impact of the rapid development of information technologies and information weapons over the past two decades on the military-scientific literature of Russia and Ukraine. The articles in this volume provide insight into the varying definitions and subtypes of information confrontation, its historical evolution and application, the technical tools used in the conduct of information confrontation, and the relationship between the connected yet distinct concepts of information confrontation and information warfare.


Book
Digital influence mercenaries : profits and power through information warfare
Author:
ISBN: 1682477525 Year: 2022 Publisher: Annapolis, Maryland : Naval Institute Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In today's online attention economy, supply and demand have created a rapidly growing market for firms and entrepreneurs using the tactics, tools, and strategies of digital influence warfare to gain profit and power. This book focuses on the more malicious types of online activity such as deception, provocation, and a host of other dirty tricks conducted by these "digital influence mercenaries." They can be located anywhere with an Internet connection and the targets of their influence efforts can be whomever and wherever they are paid to attack. James J. F. Forest describes in detail the various tools and tactics these mercenaries use to exploit the uncertainties, fears, and biases of their targets including bots, deep-fake images, fake news, provocation, deception and trolling. He also shows how they weaponize conspiracy theories and disinformation to manipulate people's beliefs and perceptions. Forest also highlights how government agencies and social media platforms are trying to defend against these foreign influence campaigns through such tactics as shutting down offending websites, Facebook pages, and YouTube channels; tagging disinformation with warning labels; identifying and blocking coordinated inauthentic behavior; and suspending social media accounts, often permanently.  European and North American governments have launched numerous investigations against these mercenaries, and in some cases have brought criminal charges. Forest concludes with suggestions for how each of us can learn to identify disinformation and other malicious efforts and defend ourselves in the future.


Book
Terreur et séduction : une histoire de la doctrine de la "guerre révolutionnaire"
Author:
ISBN: 2348057409 Year: 2022 Publisher: La Découverte

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Russian information warfare : assault on democracies in the cyber wild west
Author:
ISBN: 9781682477472 1682477479 9781682477199 Year: 2022 Publisher: Annapolis, Maryland : Naval Institute Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Russian Information Warfare: Assault on Democracies in the Cyber Wild West examines how Moscow tries to trample the very principles on which democracies are founded and what we can do to stop it. In particular, the book analyzes how the Russian government uses cyber operations, disinformation, protests, assassinations, coup d'états, and perhaps even explosions to destroy democracies from within, and what the United States and other NATO countries can do to defend themselves from Russia's onslaught. The Kremlin has been using cyber operations as a tool of foreign policy against the political infrastructure of NATO member states for over a decade. Alongside these cyber operations, the Russian government has launched a diverse and devious set of activities which at first glance may appear chaotic. Russian military scholars and doctrine elegantly categorizes these activities as components of a single strategic playbook —information warfare. This concept breaks down the binary boundaries of war and peace and views war as a continuous sliding scale of conflict, vacillating between the two extremes of peace and war but never quite reaching either. The Russian government has applied information warfare activities across NATO members to achieve various objectives. What are these objectives? What are the factors that most likely influence Russia's decision to launch certain types of cyber operations against political infrastructure and how are they integrated with the Kremlin's other information warfare activities? To what extent are these cyber operations and information warfare campaigns effective in achieving Moscow's purported goals? Dr. Bilyana Lilly addresses these questions and uses her findings to recommend improvements in the design of U.S. policy to counter Russian adversarial behavior in cyberspace by understanding under what conditions, against what election components, and for what purposes within broader information warfare campaigns Russia uses specific types of cyber operations against political infrastructure.


Book
Russian Disinformation Efforts on Social Media
Authors: --- ---
Year: 2022 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Russia is waging wide-reaching information warfare with the West. A significant part of this war takes place on social media, which Russia employs to spread disinformation and to interfere with the internal politics of other countries. Drawing on a variety of primary and secondary sources, expert interviews, and fieldwork in Ukraine, the report describes Russia's information warfare in the social media sphere (as of 2019) and provides recommendations to better counter this evolving threat. Moscow views social media as a double-edged sword - anxious about its potential to undermine Russia's security but aware of its advantages as a weapon of asymmetric warfare. Russia's use of this weapon picked up most markedly in 2014, suggesting a reaction to the West's response to the Ukraine conflict. Although popular portrayals of the Russian disinformation machine at times imply an organized and well-resourced operation, evidence suggests that it is neither. However, even with relatively modest investments, Russian social media activity has been wide-reaching. The impacts of Russia's efforts on the West - and of Western countermeasures on Russia - are difficult to assess. However, this threat can cause a variety of harms and is likely to evolve. Thus, the authors recommend that the U.S. Air Force and the joint force improve defensive measures aimed at raising awareness and lowering the susceptibility of the military and their families to Russian disinformation and propaganda campaigns. This research was completed in September 2019, before the February 2022 Russian invasion of Ukraine. It has not been subsequently revised.


Book
Tyrants on Twitter : protecting democracies from information warfare
Author:
ISBN: 9781503631151 150363115X Year: 2022 Publisher: Stanford, CA : Stanford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A look inside the weaponization of social media, and an innovative proposal for protecting Western democracies from information warfare. When Facebook, Twitter, YouTube, and Instagram were first introduced to the public, their mission was simple: they were designed to help people become more connected to each other. Social media became a thriving digital space by giving its users the freedom to share whatever they wanted with their friends and followers. Unfortunately, these same digital tools are also easy to manipulate. As exemplified by Russia's interference in the 2016 U.S. presidential election, authoritarian states can exploit social media to interfere with democratic governance in open societies. Tyrants on Twitter is the first detailed analysis of how Chinese and Russian agents weaponize Facebook, Instagram, Twitter, and YouTube to subvert the liberal international order. In addition to examining the 2016 U.S. election, David L. Sloss explores Russia's use of foreign influence operations to threaten democracies in Europe, as well as China's use of social media and other digital tools to meddle in Western democracies and buttress autocratic rulers around the world. Sloss calls for cooperation among democratic governments to create a new transnational system for regulating social media to protect Western democracies from information warfare. Drawing on his professional experience as an arms control negotiator, he outlines a novel system of transnational governance that Western democracies can enforce by harmonizing their domestic regulations. And drawing on his academic expertise in constitutional law, he explains why that system—if implemented by legislation in the United States—would be constitutionally defensible, despite likely First Amendment objections. With its critical examination of information warfare and its proposal for practical legislative solutions to fight back, this book is essential reading in a time when disinformation campaigns threaten to undermine democracy.


Book
La guerre qu'on ne voit pas venir
Author:
ISBN: 9791032925171 Year: 2022 Publisher: Paris Éditions de l'Observatoire

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Nous, Européens, croyons vivre en paix, protégés depuis plus d'un demi-siècle des tumultes du monde. Pourtant, sous nos yeux, et sans que nous y ayons pris garde, on nous a déclaré la guerre. Des puissances autoritaires et inamicales utilisent notre espace de liberté comme terrain de jeu, dans l'espoir de nous diviser et de nous affaiblir. Les campagnes de désinformation, les cyberattaques, l'ingérence dans nos campagnes électorales et dans notre vie politique se sont multipliées. Fake news, faux médias, vrais trolls : l'infox touche désormais tous les sujets, de la Covid aux droits des femmes et des minorités, en passant par la guerre d'Ukraine. Nos démocraties européennes sont harcelées, critiquées, calomniées, afin que leurs fondations vacillent et que leur influence diminue. Ces guerres invisibles que l'on nous livre, nous sommes parfaitement capables de les gagner, sous réserve que nous en mesurions l'ampleur et que nous n'hésitions pas à nous battre pour nos valeurs. Ces guerres invisibles, nous n'avons surtout pas le droit de les perdre."


Book
Cyber mission thread analysis : an implementation guide for process planning and execution
Authors: --- --- --- ---
Year: 2022 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber mission thread analysis (CMTA), which identifies mission-critical systems in a cyber threat environment, requires a disciplined, well-planned process for its execution. This report provides a proposed planning and implementation guide (1) to perform CMTA expeditiously while still giving results good enough to make decisions about mission criticality, and (2) to analyze multiple missions concurrently. The authors offer guidance on the roles and responsibilities of organizations and personnel involved in CMTA; the process for implementing the analysis and the types of preparations necessary for successful implementation; a rough timeline required to perform CMTA for one or more missions concurrently; and the possible constraints and issues that may be encountered. The authors draw on lessons learned from a pilot CMTA application, analogous Air Force efforts, and relevant social science methods for conducting interviews and focus groups. They highlight a number of key considerations, including two that are most critical: (1) Develop and execute a detailed plan. The number of stakeholders involved and desire for a swift timeline require a substantial coordination effort; and (2) Remember that the ultimate CMTA goal is triage. It is vital that any mission-critical system appear highly ranked; it is okay if some non-critical systems appear highly ranked. This goal ensures discussions do not become unnecessarily detailed and results remain within scope. The analytical tasks to perform CMTA are covered in a separate, companion document - Cyber Mission Thread Analysis: A Prototype Framework for Assessing Impact to Missions from Cyber Attacks to Weapon Systems - that readers can consult.

Listing 1 - 10 of 15 << page
of 2
>>
Sort by