<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:Disinformation &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/disinformation/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/disinformation/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Tue, 07 Apr 2026 12:45:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:Disinformation &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/disinformation/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Redefining Espionage: The Unseen War for Technological Dominance</title>
		<link>https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/</link>
					<comments>https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/#respond</comments>
		
		<dc:creator><![CDATA[Joshua Thibert]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 12:13:13 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[adaptive cyberattacks]]></category>
		<category><![CDATA[anomaly detection]]></category>
		<category><![CDATA[Artemis II]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[automated espionage]]></category>
		<category><![CDATA[big data analysis]]></category>
		<category><![CDATA[counter-disinformation]]></category>
		<category><![CDATA[counterintelligence]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[cyber operations]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[democratic institutions]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[disruptive technologies]]></category>
		<category><![CDATA[economic competitiveness]]></category>
		<category><![CDATA[economic espionage]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[foreign intelligence entities]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[global power shift]]></category>
		<category><![CDATA[gray zone]]></category>
		<category><![CDATA[Great Power Competition]]></category>
		<category><![CDATA[information domain]]></category>
		<category><![CDATA[insider threat mitigation]]></category>
		<category><![CDATA[intellectual property]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[predictive analysis]]></category>
		<category><![CDATA[security competition]]></category>
		<category><![CDATA[supply-chain vulnerabilities]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[technological arms race]]></category>
		<category><![CDATA[technological dominance]]></category>
		<category><![CDATA[threat mitigation. ​]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32482</guid>

					<description><![CDATA[<p>Published: March 24, 2026 The international system is undergoing a profound global power shift characterized by the resurgence of great power competition and a broad diffusion of technical capabilities. This environment is intensifying security competition across all domains. Concurrently, the proliferation of artificial intelligence (AI) and other disruptive technologies has fundamentally transformed espionage and defense. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/">Redefining Espionage: The Unseen War for Technological Dominance</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: March 24, 2026</em></p>
<p>The international system is undergoing a profound global power shift characterized by the resurgence of great power competition and a broad diffusion of technical capabilities. This environment is intensifying security competition across all domains. Concurrently, the proliferation of artificial intelligence (AI) and other disruptive technologies has fundamentally transformed espionage and defense. The traditional <a href="https://www.realcleardefense.com/articles/2025/10/30/artificial_intelligence_and_the_future_of_espionage_1144178.html">landscape</a> of counterintelligence (CI) is obsolete and requires rapid, systemic overhaul to address the increasingly amplified, technologically enabled threats posed by state and non-state actors.</p>
<p>Specifically, the shift to great power technological competition has expanded CI&#8217;s mandate from protecting military secrets to securing critical infrastructure, intellectual property (IP), and the integrity of the information domain. The dual-use nature of AI functions as both in support of <a href="https://www.hstoday.us/subject-matter-areas/cybersecurity/ai-driven-espionage-campaign-marks-new-phase-in-cybersecurity-researchers-say/">automated espionage</a> and a critical mechanism for preemptively anticipating and mitigating threats. The failure of the United States to strategically integrate AI into CI methodologies will result in the systemic erosion of national technological and economic advantage.</p>
<p><strong>The Expanded Mandate of Modern Counterintelligence</strong></p>
<p>CI functions to protect a nation’s secrets, personnel, and systems from foreign intelligence entities (FIEs). Yet today, CI must also confront a threat matrix dramatically enlarged in scope, sophistication, and velocity. The current geopolitical climate has necessitated a significant expansion of the traditional CI mission. In the context of great power competition, the most significant threat has shifted from the theft of classified military and diplomatic secrets to the large-scale acquisition of IP, trade secrets, and technological data, as highlighted in the recently released <a href="https://www.odni.gov/index.php/newsroom/reports-publications/reports-publications-2026/4141-2026-annual-threat-assessment">Annual Threat Assessment</a>.</p>
<p>FIEs are aggressively targeting the private sector, academia, and research institutions, the very engines of national innovation through sophisticated economic espionage. Their strategic goal is not merely to obtain information, but to erode a nation&#8217;s competitive advantage and accelerate the adversary&#8217;s technological timetable, thereby shifting the global balance of power. CI must establish robust protective mechanisms that extend deep into the non-governmental technology and research ecosystem.</p>
<p>The dissolution of a clear distinction between peacetime competition and active conflict has resulted in a continuous state of confrontation known as the &#8216;gray zone&#8217;. This strategic domain is characterized by persistent, non-lethal, yet tactically damaging activities designed to achieve political objectives without triggering traditional military responses. CI must now defend against a spectrum of subtle subversion, including large-scale cyber operations, persistent penetration of networks for reconnaissance and preparatory measures, and covert attempts to manipulate political discourse and decision-making.</p>
<p>The globalization of commerce and technology has created intricate, interconnected supply chains. These networks present significant CI risks, as adversaries seek to compromise the integrity, trustworthiness, and authenticity of products and services. By inserting &#8220;backdoors&#8221; or creating exploitable &#8220;choke points&#8221; at various nodes, adversaries establish capabilities for future exploitation. CI efforts are essential to conduct comprehensive due diligence and risk mitigation, securing these complex networks against both hardware and software compromise.</p>
<p><strong>Artificial Intelligence: The Dual-Use Catalyst</strong></p>
<p>AI and emerging technologies are not merely <em>targets</em> of modern espionage; they are simultaneously the most potent tools and the most necessary defenses in the counterintelligence battleground. This dual-use dynamic creates a challenging “AI vs. AI” scenario that demands immediate, radical adaptation. Adversaries are leveraging AI to dramatically enhance the speed, scale, and sophistication of their intelligence operations:</p>
<p><u>Automated Espionage and Big Data Analysis</u>: AI-powered tools can automate and scale the processing, translation, and analysis of vast, heterogeneous datasets (Big Data), vastly increasing the volume and velocity of intelligence collection from both open-source intelligence and classified sources.</p>
<p><u>Adaptive Cyberattacks</u>: Machine learning (ML) algorithms enable the development of more elusive and adaptive cyber threats. This includes automated exploitation of vulnerabilities, dynamic creation of polymorphic malware, and rapid penetration of defenses, operating at speeds that effectively outpace traditional, human-centric cybersecurity responses.</p>
<p><u>Generative AI for Influence</u>: Generative AI can create highly realistic deepfakes (synthetic videos and audio) and synthetic narratives at scale. This facilitates sophisticated disinformation and propaganda campaigns to manipulate public opinion and conduct advanced social engineering, severely compromising the ability of institutions to discern truth from falsehood.</p>
<p>Three interconnected factors fundamentally redefine the scope of CI responsibility: target expansion, the blurring of conflict lines, and supply chain vulnerabilities. To effectively counter these technologically enabled threats, CI must aggressively embrace and integrate these same technologies, transforming them into proactive defensive tools:</p>
<p><u>Threat Anticipation and Predictive Analysis</u>: AI can process and analyze massive amounts of threat data, identifying subtle, non-obvious patterns, trends, and anomalies. This capability allows CI to transition from merely reacting to threats toward predictive modeling, allowing one to forecast adversary actions before they materialize and enabling preemptive defense.</p>
<p><u>Enhanced Surveillance and Anomaly Detection</u>: ML algorithms are crucial for the detection of subtle anomalies in network traffic, user behavior, and physical security systems that a human operator would miss. AI-driven monitoring provides real-time, large-scale pattern-of-life analysis that significantly exceeds human cognitive capacity.</p>
<p><u>Counter-Disinformation and Integrity Checks</u>: CI requires AI-driven tools to effectively identify, analyze, and flag AI-generated propaganda, deepfakes, and synthetic media. Systems designed for content provenance and authenticity verification are essential to safeguard the <a href="https://ash.harvard.edu/articles/weaponized-ai-a-new-era-of-threats/">integrity</a> of the information domain and maintain public trust.</p>
<p><u>Insider Threat Mitigation</u>: Defensively, AI can monitor internal networks to flag anomalous user behaviors such as unusual data access attempts, large data transfers, or deviations in an employee&#8217;s digital pattern-of-life. As such they assist in identifying potential insider threats before significant compromise occurs.</p>
<p><strong>The Strategic Imperative</strong></p>
<p>The shift of global powers and the proliferation of disruptive technologies have thrust counterintelligence into an even more important aspect of national security. The stakes of this technological arms race transcend traditional security concerns, encompassing the integrity of a nation’s innovative ecosystem, its economic competitiveness, and the resilience of its democratic institutions.</p>
<p>CI must rapidly evolve its strategies to prioritize the defense of economic and technological assets, and it must integrate AI as a foundational defensive technology to achieve predictive, scalable threat mitigation. Failure to aggressively master and deploy AI defenses against technologically augmented adversaries risks the systemic erosion of national advantage in a world where technological leadership is increasingly synonymous with global power. The future success of great power competition hinges directly on the adaptive capacity and technological sophistication of CI’s function.</p>
<p><em>Joshua Thibert is a Senior Analyst at the </em><a href="https://thinkdeterrence.com/"><em>National Institute for Deterrence Studies (NIDS)</em></a><em> with over 30 years of comprehensive expertise. His background encompasses roles as a former counterintelligence special agent within the Department of Defense and as a practitioner in compliance, security, and insider risk management in the private sector. His extensive academic and practitioner experience spans strategic intelligence, multiple domains within defense and strategic studies, and critical infrastructure protection. The views of the author are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/03/Redefining-Espionage_-AI-Global-Power-Shifts-and-the-Unseen-War-for-Technological-Dominance.pdf"><img decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="187" height="52" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 187px) 100vw, 187px" /></a></p>
<p><a href="https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/">Redefining Espionage: The Unseen War for Technological Dominance</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The 5GW Playbook: Silent Wars and Invisible Battlefields</title>
		<link>https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/</link>
					<comments>https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/#respond</comments>
		
		<dc:creator><![CDATA[Syeda Fizzah Shuja]]></dc:creator>
		<pubDate>Mon, 19 May 2025 12:06:36 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[5GW]]></category>
		<category><![CDATA[5th-generation warfare]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Alouk water station]]></category>
		<category><![CDATA[ambition]]></category>
		<category><![CDATA[anti-satellite weapons]]></category>
		<category><![CDATA[ASAT]]></category>
		<category><![CDATA[autonomous drone strike]]></category>
		<category><![CDATA[Beijing]]></category>
		<category><![CDATA[Berlin Wall]]></category>
		<category><![CDATA[biological warfare]]></category>
		<category><![CDATA[Bollywood]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CIPS]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[cyber networks]]></category>
		<category><![CDATA[cyber sabotage]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[deepfake propaganda]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[drought]]></category>
		<category><![CDATA[economic coercion]]></category>
		<category><![CDATA[economic manipulation]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[false news]]></category>
		<category><![CDATA[finance]]></category>
		<category><![CDATA[financial system]]></category>
		<category><![CDATA[food control]]></category>
		<category><![CDATA[Hollywood]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[hybrid influence operations]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[information dominance]]></category>
		<category><![CDATA[K-pop]]></category>
		<category><![CDATA[Libya]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[manipulation]]></category>
		<category><![CDATA[maritime terrorism. ​]]></category>
		<category><![CDATA[military satellite market]]></category>
		<category><![CDATA[narratives]]></category>
		<category><![CDATA[One China Policy]]></category>
		<category><![CDATA[Palau]]></category>
		<category><![CDATA[pentagon]]></category>
		<category><![CDATA[perception battle]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[Ren Zhengfei]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[sabotage]]></category>
		<category><![CDATA[seabed]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[space dominance]]></category>
		<category><![CDATA[subsea communication cables]]></category>
		<category><![CDATA[SWIFT banking system]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[telecom networks]]></category>
		<category><![CDATA[THAAD missile defense system]]></category>
		<category><![CDATA[US dollar]]></category>
		<category><![CDATA[US sanctions]]></category>
		<category><![CDATA[Venezuela]]></category>
		<category><![CDATA[water scarcity]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30754</guid>

					<description><![CDATA[<p>War no longer announces itself with the roar of fighter jets or the march of soldiers. It now lurks in the shadows where the front line is undefined. The recent sabotage of Estlink 2 power cables, disruptions to Taiwan’s undersea communication lines, and the increasing presence of unidentified commercial vessels near critical infrastructure are signs [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/">The 5GW Playbook: Silent Wars and Invisible Battlefields</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>War no longer announces itself with the roar of fighter jets or the march of soldiers. It now lurks in the shadows where the front line is undefined. </strong>The recent sabotage of <strong>Estlink 2 power cables</strong>, disruptions to <strong>Taiwan’s undersea communication lines</strong>, and the increasing presence of <strong>unidentified commercial vessels near critical infrastructure</strong> are <a href="https://www.dailysabah.com/opinion/op-ed/beneath-the-surface-the-strategic-implications-of-seabed-warfare">signs</a> <strong>of 5th-generation warfare (5GW). Moreover, a high spike in emerging incidents like Russian hybrid tactics in Europe, artificial intelligence (AI)-powered cyberattacks on maritime infrastructure, and the weaponization of social media for disinformation</strong> suggests the evolving nature of contemporary warfare.</p>
<p><a href="https://moderndiplomacy.eu/2024/11/25/5th-generation-war-a-war-without-borders-and-its-impact-on-global-security/">5GW</a><strong> includes </strong>information dominance and manipulation, social engineering, economic coercion, cyber sabotage, and hybrid influence operations. It thrives on ambiguity, exploiting vulnerabilities without traditional combat. In 5GW, the lines between war and peace are blurred. No declarations, no clear enemies, just a relentless assault on stability. The goal is not to conquer land or destroy armies, but to cripple a nation’s spirit, economy, and infrastructure from within.</p>
<p>One of the most potent asymmetric tools of 5GW is economic manipulation. <a href="https://www.fdd.org/analysis/2024/11/02/palau-is-under-attack-from-prc/">Palau</a>, a serene archipelago of over <strong>500 islands</strong>, were untouched by war <strong>until 2017.</strong> Palau dared to reject <strong>Beijing’s “One China Policy.”</strong> This move sent shockwaves through its fragile economy in the form of economic strangulation. In a masterstroke of economic coercion, <strong>China’s state-backed tour operators erased Palau from the Web.</strong></p>
<p>Travel agencies stopped selling trips. Online searches yielded no results. <strong>Palau’s tourism industry, which accounted for </strong><a href="https://www.theguardian.com/global-development/2018/sep/08/palau-against-china-the-tiny-island-defying-the-worlds-biggest-country">45 percent of gross domestic product</a> (GDP)<strong>, collapsed.</strong> Hotels emptied, airlines shut down, and the once-thriving economy suffocated.</p>
<p>This was not an anomaly, but a pattern<strong>.</strong> In <strong>2016, South Korea agreed to facilitate the American </strong><a href="https://www.theguardian.com/world/2016/jul/08/south-korea-and-us-agree-to-deploy-thaad-missile-defence-system">THAAD missile defense system</a><strong>.</strong> China retaliated not with weapons but with <strong>economic muscle.</strong> Mysterious “fire and safety” violations suddenly appeared in South Korean businesses across China. <strong>A </strong><a href="https://www.forbes.com/sites/augustrick/2017/12/21/how-beijing-played-hardball-with-south-korea-using-the-2018-olympic-ticket-sales/">nine-month ban</a><strong> on Chinese tourism cost Seoul $6.5 billion.</strong> <strong>Retail giants like Lotte crumbled, thousands lost jobs, and yet, no war was declared.</strong></p>
<p>The more interconnected the world economy becomes, <strong>the more vulnerable nations are to economic blackmail.</strong> Even <strong>Venezuela, despite its fiery anti-American rhetoric,</strong> was bound to the US economy. In 2018, despite Washington branding <strong>Nicolás Maduro a dictator</strong> and Caracas calling the US a <strong>“white supremacist regime,”</strong> the two nations still had <strong>$24 billion in trade, </strong>a quarter of <a href="https://www.aljazeera.com/economy/2018/9/13/venezuelas-crisis-in-numbers">Venezuela’s GDP</a>.</p>
<p>Yet, when Washington imposed <strong>sweeping financial sanctions,</strong> Venezuela’s <a href="https://www.wsj.com/articles/the-tragedy-of-venezuela-1527177202">economy shrunk</a><strong> by 35 percent in a single year.</strong> After all, the United States does not just impose sanctions; <strong>it controls the very financial system that runs the world.</strong> The US dollar is the bloodline of global trade, and those who defy it <strong>find themselves cut off from international markets, unable to access capital or even conduct basic transactions. However, </strong>economic warfare breeds resistance.</p>
<p><strong>Russia and China saw the writing on the wall.</strong> Between 2017 and 2020, <strong>Moscow </strong><a href="https://www.rferl.org/a/russia-cuts-holdings-us-bonds-may-end-dollar-payments/29429653.html">slashed its holdings</a><strong> of US Treasury securities from $105 billion to just $3.8 billion</strong> and shifted towards China’s <strong>Cross-Border Interbank Payment System (</strong><a href="https://www.cnas.org/publications/commentary/why-chinas-cips-matters-and-not-for-the-reasons-you-think">CIPS</a><strong>),</strong> sidestepping American financial hegemony.</p>
<p>The true <strong>commanding heights of global dominance</strong> lie at the intersection of <strong>technology, finance, and unchecked ambition. China is not just selling 5G networks, it is embedding itself into the nervous system of global communication. On the other hand, the US does not just dominate finance, it controls the SWIFT banking system, ensuring economic warfare is just a sanction away. Similarly, corporations do not just innovate, they monopolize, influence, and quietly dictate policy behind closed doors.</strong></p>
<p><em>“Surge forward, killing as you go, to blaze us a trail of blood.”</em> A battle cry? <strong>Indeed.</strong> Not from a general on the battlefield, but from <strong>Ren Zhengfei, the founder of Huawei</strong>, a company waging a war not just against competitors but against entire nations. Britain’s telecom networks are suspected to have <a href="https://www.bbc.com/news/uk-53329005">Chinese backdoors</a>.</p>
<p>I<strong>nformation is now what oil was in the 1970s, a critical commodity to be controlled.</strong> Today, <strong>data is the new crude</strong>, and the battle to monopolize its flow has already begun. <strong>Quantum computing, AI, and machine learning</strong> are the new oil rigs, and the nations that dominate these technologies will dictate the future. Unlike oil, <strong>information is easily stolen, manipulated, or even weaponized in ways no physical resource ever could. </strong></p>
<p>The first lethal autonomous drone strike in Libya, recorded in <strong>March 2020</strong>, was a grim reminder of what is to come. <strong>A suicide drone, powered by AI, needed no human command—just a target. </strong><a href="https://journal.ciss.org.pk/index.php/ciss-insight/article/view/361">Fire and forget</a><strong> was the name of the game. </strong>Imagine the next phase: <strong>terrorist organizations deploying AI-powered swarms, able to strike with precision, invulnerability, and zero risk to human operatives.</strong> They would not negotiate, would not retreat, and would prove hard to stop. <strong> </strong></p>
<p>In a world where biological warfare is outlawed, <strong>the selective control of food, aid, and healthcare has replaced mass destruction with slow, calculated suffocation.</strong> Nations can now <strong>deny access to the very essentials of life</strong> to break their adversaries in a <strong>siege without walls and a war without battlefields. </strong>Over <a href="https://www.wri.org/insights/highest-water-stressed-countries">40 percent</a><strong> of the world’s population</strong> faces water scarcity, and by 2030, <a href="https://www.who.int/health-topics/drought#tab=tab_1">drought</a> could displace <strong>700 million people.</strong> The <strong>Turkish-backed militias that had control over the Alouk water station in Syria</strong> in 2020 was a stark reminder—<strong>when resources are weaponized, suffering becomes policy.</strong></p>
<p><strong>Interestingly, the battle of perception is gaining momentum more than ever. </strong>In an era of <strong>clickbait headlines and disinformation campaigns, lies travel faster than truth. The </strong><a href="https://news.mit.edu/2018/study-twitter-false-news-travels-faster-true-stories-0308">Massachusetts Institute of Technology</a> found that <strong>false news spreads 70 percent faster than real news.</strong> From <strong>the Soviet KGB planting the rumor in the 1980s that the US government created AIDS </strong>to modern <strong>deepfake propaganda,</strong> deception is the new artillery.</p>
<p>Even culture is not immune. <strong>Hollywood exported American ideals, Bollywood spread Indian influence, and K-pop turned South Korea into a global powerhouse. For instance,</strong> the Cold War was not just won by missiles, it was won when a <strong>West German band sang “Wind of Change,” which then became the anthem of the Berlin Wall’s collapse.</strong></p>
<p>If <strong>hunger, water, and financial systems</strong> hare already weaponized, the next battlefield is clear—space and the seabed<strong>.</strong> <strong>Subsea communication cables are responsible for carrying 97 percent of global data traffic and are the arteries of the modern economy. They enable over $10 trillion in financial transactions every single day.</strong> Yet, these vital lifelines remain <strong>shockingly unprotected and are vulnerable to sabotage, espionage, and strategic disruption.</strong> A targeted attack on just a handful of these cables could <a href="https://www.dailysabah.com/opinion/op-ed/beneath-the-surface-the-strategic-implications-of-seabed-warfare">cripple stock markets</a><strong>, paralyze banking systems, and sever military command structures—all without a single warship being deployed.</strong></p>
<p>Meanwhile, the <strong>race for space dominance is accelerating.</strong> From <strong>$63.66 billion in 2024 to an estimated $74.4 billion by 2028,</strong> the <a href="https://www.researchandmarkets.com/reports/5735299/military-satellites-market-report#:~:text=It%20will%20grow%20from%20$60.92%20billion%20in,compound%20annual%20growth%20rate%20(CAGR)%20of%204.5%.">global military satellite </a>market is growing, fueled by the realization that <strong>power no longer lies in boots on the ground, but in eyes in the sky.</strong> Satellites provide <strong>precision-strike capabilities, secure communication, and real-time battlefield intelligence.</strong> The <strong>Pentagon warns</strong> that the US is already vulnerable, with <strong>China and Russia developing anti-satellite (ASAT) weapons.</strong></p>
<p>In this realm, one can say that modern states wage wars without battlefields, where the goal is not to destroy but to <strong>subdue</strong>—crippling economies, infiltrating cyber networks, and manipulating narratives <strong>without a single shot fired.</strong> What is never openly begun is rarely officially ended. <strong>In 5th-generation warfare, silence is a weapon, perception is the battlefield, and survival means accepting that war never truly ends.</strong></p>
<p><em>Syeda Fizzah Shuja is a Research Associate at Pakistan Navy War College and an Mphil scholar in Peace and Counter Terrorism. Her work focuses on hybrid warfare and maritime terrorism. She can be contacted at fizzasyed2k@gmail.com.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/05/The-5GW-Playbook.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="245" height="68" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 245px) 100vw, 245px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/">The 5GW Playbook: Silent Wars and Invisible Battlefields</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Election May Be Over, but the Threat of Foreign Interference Is Not</title>
		<link>https://globalsecurityreview.com/the-election-may-be-over-but-the-threat-of-foreign-interference-is-not/</link>
					<comments>https://globalsecurityreview.com/the-election-may-be-over-but-the-threat-of-foreign-interference-is-not/#respond</comments>
		
		<dc:creator><![CDATA[Craig Albert]]></dc:creator>
		<pubDate>Tue, 10 Dec 2024 13:08:16 +0000</pubDate>
				<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[adversarial nation-states]]></category>
		<category><![CDATA[American society]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Craig Albert ​]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cyberwarfare]]></category>
		<category><![CDATA[democracy]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[divisiveness]]></category>
		<category><![CDATA[election]]></category>
		<category><![CDATA[foreign interference]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[inauguration day]]></category>
		<category><![CDATA[influence operations]]></category>
		<category><![CDATA[intelligence agencies]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[malinformation]]></category>
		<category><![CDATA[misinformation]]></category>
		<category><![CDATA[polarization]]></category>
		<category><![CDATA[political process]]></category>
		<category><![CDATA[public confidence]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[US elections]]></category>
		<category><![CDATA[vigilance]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29554</guid>

					<description><![CDATA[<p>Election day came and went relatively smoothly. There was none of the violence or unrest people feared. What if, however, the real danger has not passed but is just beginning? It is important to remember that election-related violence and unrest do not just happen spontaneously. There is a long build-up of tension leading to such [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-election-may-be-over-but-the-threat-of-foreign-interference-is-not/">The Election May Be Over, but the Threat of Foreign Interference Is Not</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Election day came and went relatively smoothly. There was none of the violence or unrest people feared. What if, however, the real danger has not passed but is just beginning?</p>
<p>It is important to remember that election-related violence and unrest do not just happen spontaneously. There is a long build-up of tension leading to such events, and much of this tension is deliberately instigated by adversarial nation-states that are engaged in spreading misinformation, disinformation, and malinformation through social media influence operations.</p>
<p>During non-election times, the general goal of these influence operations is simply to cause as much polarization and divisiveness within American society as possible. But during election time the goal becomes more specific: sow confusion, suspicion, mistrust, and chaos regarding the American political process to undermine democracy.</p>
<p>The problem is that this post-election period is still a prime time to achieve that specific goal. To ensure the peaceful transfer of power and preserve democracy, it is essential to understand why the level of risk remains high.</p>
<p><strong>More Actors Are Getting Involved</strong></p>
<p>The first factor to consider is that the number of adversaries Americans should be legitimately concerned about, with respect to social media information operations, continues to grow. Where Russia and China were the two primary nation-states to worry about, Iran is increasingly entering the picture as a formidable adversary. While Iran is already a threat in terms of conventional cyberwarfare, it is not known for its prowess in influence operations.</p>
<p>However, this is changing, and Iran is proving itself a formidable adversary on the information warfare front. Just last August, for example, American intelligence officials revealed that Iran attempted to hack the presidential campaigns.</p>
<p>They were successful in hacking the Trump campaign, but this was not a conventional cyberattack. Their main objective was not the hack itself. Rather, it was the influence operations made possible by the information gained from that hack.</p>
<p>This was evidenced by Iran offering the Biden campaign access to information stolen from the Trump campaign. The Biden campaign did not respond.</p>
<p>In addition to the more obvious nation-states such as China, Iran, and Russia, there are also potential influence operations being carried out or in planning by other threat actors that the US must not ignore. Overly focusing on just the usual suspects can lead to overlooking other players in the game which include not just external nation-state adversaries but also domestic threat actors.</p>
<p>Despite Iran’s hack of the Trump campaign, in this and in other election-related influence operations, the goal is not necessarily to favor one presidential candidate over the other. With Trump’s victory, that is now a moot point anyway. Instead, the goal is to use misinformation, disinformation, and malinformation to confuse and overwhelm Americans, regardless of their political persuasions, and to trigger their negative emotions to sow as much chaos and discord as possible.</p>
<p>The ultimate end game is to get the American populace to lose trust in their political system, thereby undermining democratic society. This, in turn, would open the way for these nation-state adversaries to further assert their own interests.</p>
<p><strong>Election Day Was Just the Beginning</strong></p>
<p>Thankfully, election day came and went with few and only minor incidents. This was not due to lack of harmful activity. In fact, the Office of the Director of National Intelligence (ODNI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI) issued joint statements advising the public that their respective agencies observed adversarial states—namely Iran and Russia—conducting influence operations “intended to undermine public confidence in the integrity of US elections and stoke divisions among Americans.” They added, “The IC expects these activities to intensify through election day and in the coming weeks, and that foreign influence narratives will focus on swing states.”</p>
<p>First, the fact that these three agencies felt the need to issue joint statements is highly significant and they would not have done so had the level of risk not justified it. The lack of major incidents is therefore a testament to their vigilance. But pay special attention to this part of their statement: “These activities will intensify through election day and in the coming weeks.”</p>
<p>What this means is that even though there is a clear winner, and the public has peacefully accepted the outcome, from the viewpoint of the nation’s adversaries, now is the time to strike. Now is the time to flood social media with misinformation, disinformation, and malinformation.</p>
<p>In fact, adversaries may very well have prepared months’ worth of content in advance to use in the case of either presidential candidate’s victory. That way, regardless of who won, they were ready.</p>
<p>A quick search of popular media platforms brings up posts claiming that the winner cheated. Are these sincere, good faith actors with real evidence to back up their claims? Or are they part of an influence operation? In today’s age, especially with powerful AI tools widely available, it is difficult for citizens to tell at a glance.</p>
<p>As a nation, regardless of individual politics, the US has gone through too much and fought too hard to preserve its democracy to allow malicious actors to put that hard-won fact at risk. Although it passed an important milestone, the election itself, it is not time for the country to breathe a collective sigh of relief.</p>
<p>It should not be assumed that the time between now and inauguration day, January 20, 2025, will be uneventful. Now is precisely when the intelligence and cybersecurity communities, the media (especially social media platforms), and the American people need to remain watchful and vigilant.</p>
<p><em>Craig Albert, PhD, is Professor of Political Science &amp; Graduate Director of the Master of Arts in Intelligence and Security Studies at Augusta University. Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/12/The-Election-May-Be-Over.pdf"><img decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-election-may-be-over-but-the-threat-of-foreign-interference-is-not/">The Election May Be Over, but the Threat of Foreign Interference Is Not</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-election-may-be-over-but-the-threat-of-foreign-interference-is-not/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Generative Artificial Intelligence and Deterrence Stability between India and Pakistan</title>
		<link>https://globalsecurityreview.com/generative-artificial-intelligence-and-deterrence-stability-between-india-and-pakistan/</link>
					<comments>https://globalsecurityreview.com/generative-artificial-intelligence-and-deterrence-stability-between-india-and-pakistan/#respond</comments>
		
		<dc:creator><![CDATA[Anum A. Khan]]></dc:creator>
		<pubDate>Mon, 23 Sep 2024 12:23:49 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI arms control]]></category>
		<category><![CDATA[AI arms control agreement.]]></category>
		<category><![CDATA[AI incident reporting]]></category>
		<category><![CDATA[AI mitigation centers]]></category>
		<category><![CDATA[AI regulation]]></category>
		<category><![CDATA[command-and-control systems]]></category>
		<category><![CDATA[confidence-building measures]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[deterrence stability]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[escalation]]></category>
		<category><![CDATA[false flag operations]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[military purposes]]></category>
		<category><![CDATA[misinformation]]></category>
		<category><![CDATA[nuclear crisis]]></category>
		<category><![CDATA[nuclear safety]]></category>
		<category><![CDATA[nuclear war]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[perception building]]></category>
		<category><![CDATA[security mechanisms]]></category>
		<category><![CDATA[strategic communication]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[synthetic media]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28925</guid>

					<description><![CDATA[<p>Imagine a scene. It is the Indian military command center on the night of May 28, 2028. A high-ranking Indian military officer sends a message to a subordinate commander; Pakistan has initiated a preemptive strike. Prepare for a retaliatory strike. This is not a drill. Missile flight time between both India and Pakistan is a [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/generative-artificial-intelligence-and-deterrence-stability-between-india-and-pakistan/">Generative Artificial Intelligence and Deterrence Stability between India and Pakistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine a scene. It is the Indian military command center on the night of May 28, 2028. A high-ranking Indian military officer sends a message to a subordinate commander; Pakistan has initiated a preemptive strike. Prepare for a retaliatory strike. This is not a drill.</p>
<p>Missile flight time between both India and Pakistan is a few minutes. Hence, commanders do not have time for verification and decide to launch a retaliatory strike on warning.</p>
<p>In Pakistan, a high-ranking Pakistani military officer contacts Pakistan’s prime minister to tell him India has initiated a nuclear strike, and an immediate response is required. The prime minister immediately orders a counterstrike. Pakistan proceeds to counterstrike protocols.</p>
<p>Missiles begin crossing borders between India and Pakistan as the world hurtles towards a nuclear catastrophe in South Asia. The world’s worst fears are realized. It is only later realized that the high-ranking Indian military officer’s message to an Indian commander was made by a nuclear command-and-control system embedded with generative artificial intelligence (AI).</p>
<p><strong>The Role of Generative AI in Modern Warfare</strong></p>
<p>The use of generative AI, which is best exemplified by ChatGPT, by an adversary, or third party, can impact deterrence stability between India and Pakistan. In a worst-case scenario, it could trigger a nuclear war, like the scene mentioned above. Should generative AI be embedded in nuclear command-and-control systems, it is theoretically possible that hyper-personalized messages, like the one described above, could be generated in a system that was not originally designed to allow such an outcome. The potential for a <a href="https://www.wins.org/wp-content/uploads/2024/02/7.-world-institute-for-nuclear-Security-feb-2024-Giulio-Corci.pdf">tailored</a> message, for specific individuals, is possible.</p>
<p>Traditionally, content and information generation were based on human creativity. However, at present, generative artificial intelligence is being considered as a tool for digital transformation. <a href="https://news.mit.edu/2023/explained-generative-ai-1109">Generative AI</a> is a deep learning model which has the capability to generate synthetic media including text, video, and audio—dependent on training.</p>
<p><strong>Perception Building and the Escalation of Crises</strong></p>
<p>Generative AI can also play a distinctly different role in leading to nuclear crisis. In a deterrence framework, the development of a narrative and perception are crucial. Similarly, communication of deterrence threats is also achieved through perception-building of an adversary—concerning a state’s capabilities and credibility. In the specific case of India and Pakistan, India is creating <a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=BGR-PksAAAAJ&amp;citation_for_view=BGR-PksAAAAJ:UeHWp8X0CEIC">misperceptions</a> regarding Pakistan’s nuclear program. Recently, Pakistani Ambassador Munir Akram, at the United Nations Security Council’s high-level debate, <a href="https://www.app.com.pk/global/pakistan-urges-intl-instrument-to-counter-cyberwarfare-recalls-indian-networks-disinformation-drive/#google_vignette">stated</a> that India is actively pursuing a state-led disinformation campaign to malign Pakistan.</p>
<p>He was referring to recent EU Disinfolab’s <a href="https://www.disinfo.eu/publications/bad-sources-how-indian-news-agency-ani-quoted-sources-that-do-not-exist/">reports</a> on how India is using fake nongovernmental organizations, think tanks, media outlets, and international organizations to malign Pakistan. Similarly, it is possible that India may use Generative AI to manipulate public opinion, thereby, creating misperceptions among Pakistan’s public. This could make the citizenry, as well as the government of both India and Pakistan, susceptible to separate facts from fiction—especially in a crisis situation. Hence, AI-driven narratives could push both countries to a crisis leading to warfighting.</p>
<p><strong>Misinformation and Crisis Management Challenges in South Asia</strong></p>
<p>Misinformation through generative AI can make crisis management and escalation dominance between India and Pakistan much more difficult. According to Heather Williams and Alexi Drew, Herman Kahn’s escalation ladder has transformed into a <a href="https://www.kcl.ac.uk/csss/assets/escalation-by-tweet-managing-the-new-nuclear-diplomacy-2020.pdf">web</a> across domains with multiple actors and alliances, especially in the age of social media. In South Asia, due to mated warheads and cannasterization of missiles by India, coupled with geographical contiguity with Pakistan, nuclear use may become <a href="https://ciss.org.pk/drivers-of-indian-mirv-ciss-strategic-view-v/">ultimate escalation</a> within minutes—without a ladder or a web. Social media could be a threat multiplier and can become lethal with the use of generative AI. Although, tweets are <a href="https://www.kcl.ac.uk/csss/assets/escalation-by-tweet-managing-the-new-nuclear-diplomacy-2020.pdf">unlikely</a> to independently start a crisis, tweets from government officials of India and Pakistan could be fabricated through utilizing hacking and generative AI to escalate an ongoing crisis.</p>
<p><strong>Risks of Generative AI in Command-and-Control Systems</strong></p>
<p>While Indian nuclear weapons may have an effective command and control where nuclear weapons have nuclear safety and security mechanisms, there was a “Brahmos missile crisis” in 2022. Inadvertent or accidental, the launch of a missile could trigger a reactionary strike by Pakistan as the missile is <a href="https://www.thehindu.com/news/international/BrahMos-gains-sub-strategic-super-weapon-capability/article12556559.ece">dual</a>-capable. Furthermore, this fog of war could undermine strategic stability. As a Group Captain was <a href="https://www.hindustantimes.com/india-news/accidental-missile-firing-incident-prima-facie-fingers-pointed-at-group-captain-101648015107516.html">blamed</a> for the launch, many commanders like him, who may be capable of launching nuclear missiles, even on Indian nuclear submarines, could be manipulated via high-level orders created through generative AI.</p>
<p><strong>False Flag Operations and Strategic Escalation</strong></p>
<p>India has also opted for adventurism against Pakistan through its false flag operations and surgical strikes. Pakistan has adopted a conventional strategy of quid-pro-quo plus as a conventional response to such Indian limited strike. However, malicious false flag operations through disinformation and fake news by India to garner public support for electoral gains and domestic politics can result in crisis escalation in such a competitive strategic environment. It is due to mistrust within the adversarial relationship of India and Pakistan.</p>
<p><strong>The Need for Confidence-Building Measures (CBM) in AI</strong></p>
<p>There is a dire need for risk reduction and confidence-building measures (CBM) between India and Pakistan in the domain of AI. However, the appetite for CBMs and dialogue on the Indian side is non-existent. India and Pakistan could establish bilateral AI incident reporting and mitigation centers to counter the use of AI as a tool for inducing false alarms and other escalatory actions. Furthermore, there is a need for India and Pakistan to further opt for unilateral AI security and regulation measures, especially for inter-organizational and inter-state strategic communications. If leading states like the United States, China, and Russia opt for an AI arms control agreement, less powerful states, including India and Pakistan, may be persuaded to follow suit. This will help establish a universal AI arms control regime regarding the use of AI for military purposes.</p>
<p><strong>Generative AI and Deterrence Stability: A Scenario for De-escalation</strong></p>
<p>It is the night of May 28, 2028, at India’s military command center. A high-ranking Indian military officer sends a message to a subordinate commander; Pakistan has initiated a preemptive strike. Prepare for a retaliatory strike. This is not a drill.</p>
<p>Flight time between India and Pakistan is a few minutes. Hence, commanders do not have time for verification and need to decide quickly whether to launch a retaliatory strike. He calls the command center to verify the message received.</p>
<p>India’s prime minister is contacted immediately concerning the message received by one of his commanders. He picks up the hotline to Pakistan’s prime minister and asks, “Have you launched nuclear weapons?”</p>
<p>Pakistan’s prime minister responds, “Not at all. This is fake!”</p>
<p>India’s prime minister informs the military command center. The crisis is averted, and nuclear weapons are not used.</p>
<p>Confidence-building measures, which were present in the second scenario, have the opportunity to change the outcome of a conflict. Given the potential for artificial intelligence to be used in nefarious ways, it is time to take action to avert such a crisis.</p>
<p><em>Ms. Anum A. Khan is an Associate Director at the Center for International Strategic Studies (CISS) Islamabad. She is also currently a Research Fellow at Comprehensive Test Ban Treaty Organization and a Project Associate of The Third Nuclear Age Project led by Prof. Andrew Futter.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/09/Generative-AI.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="333" height="92" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 333px) 100vw, 333px" /></a></p>
<p><a href="https://globalsecurityreview.com/generative-artificial-intelligence-and-deterrence-stability-between-india-and-pakistan/">Generative Artificial Intelligence and Deterrence Stability between India and Pakistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/generative-artificial-intelligence-and-deterrence-stability-between-india-and-pakistan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Realpolitik and Fake News Complicate Nuclear Deterrence</title>
		<link>https://globalsecurityreview.com/realpolitik-and-fake-news-complicate-nuclear-deterrence/</link>
					<comments>https://globalsecurityreview.com/realpolitik-and-fake-news-complicate-nuclear-deterrence/#respond</comments>
		
		<dc:creator><![CDATA[Joe Buff&nbsp;&&nbsp;Aaron Holland]]></dc:creator>
		<pubDate>Thu, 02 May 2024 12:09:11 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[deception]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Fake News]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[psychological profiling]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[three body problem]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=27746</guid>

					<description><![CDATA[<p>For America to pragmatically solve the nuclear strategy three body problem—simultaneously deterring Russia, China, and North Korea—the United States must compensate for three characteristics of the international system: realpolitik, fake news, and sociopathic dictators. These, unfortunately for global peacekeeping, interact in a feedback loop, which forms a deadly three-player game of its own. In game [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/realpolitik-and-fake-news-complicate-nuclear-deterrence/">Realpolitik and Fake News Complicate Nuclear Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For America to pragmatically solve the nuclear strategy <a href="https://inss.ndu.edu/Media/News/Article/2869997/the-three-body-problem-the-us-china-and-russia/#:~:text=Today%20the%20United%20States%20faces,constant%20state%20of%20dynamic%20tension.">three body problem</a>—simultaneously deterring Russia, China, and North Korea—the United States must compensate for three characteristics of the international system: realpolitik, fake news, and sociopathic dictators. These, unfortunately for global peacekeeping, interact in a feedback loop, which forms a deadly three-player game of its own. In <a href="https://www.britannica.com/science/game-theory">game theory</a>, three-player games are <a href="https://economics.stackexchange.com/questions/34297/pure-nash-equilibria-3-players-game">notoriously difficult to analyze</a> and sometimes the weakest player wins big.</p>
<p>Realpolitik, fake news, and sociopathic dictators are nothing new. They date back more than two millennia. In their time, the social mechanisms and technology of the day were employed. Ancient Rome’s <a href="https://www.britannica.com/biography/Augustus-Roman-emperor">Emperor Augustus</a> is but one example. The word <a href="https://www.foreignaffairs.com/reviews/capsule-review/2017-04-14/realpolitik-history">realpolitik</a>, <a href="https://www.foreignaffairs.com/reviews/capsule-review/2017-04-14/realpolitik-history">invented in Germany</a> in the mid-nineteenth century, describes the application of diplomacy and force in the pursuit of selfish state interests. <a href="https://www.britannica.com/biography/Otto-von-Bismarck/Imperial-chancellor">Count Otto von Bismarck</a>, the “Iron Chancellor,” was another master of ruthless realpolitik.</p>
<p><a href="https://en.wikipedia.org/wiki/Fake_news">Fake news</a> is modern slang for purposeful disinformation spread as real news. Fake news makes claims that the maker knows to be false, but intentionally packages and distributes to seem genuine, to serve their political and military purposes. English-language fake news, used as wartime propaganda, was already commonplace by the time of the <a href="https://britishcivilwars.ncl.ac.uk/propaganda-printing/political-pamphlets-cartoons/">English Civil War</a> (1642–1651). It also <a href="https://www.nps.gov/planyourvisit/event-details.htm?id=64367664-03CF-B6BD-AE8DE9E449949761">vexed the American founding fathers</a> during the American Revolution (1775–1781).</p>
<p><a href="https://www.psychologytoday.com/us/basics/sociopathy">Sociopathic dictators</a> have a serious psychological disorder characterized by constant deceitful manipulation and a complete lack of regard for other people. When a very ambitious and successful sociopath rises to be head of state, taking control of national armies and arsenals and even nuclear weapons, the results can be devastating.</p>
<p>Infamous examples of twentieth-century dictators who practiced realpolitik, propagated fake news, and were sociopaths include Josef Stalin, Adolf Hitler, and Mao Zedong. Between them, their amoral aggression and complete disregard for lives caused the deaths of tens of millions.</p>
<p>Understanding these three historical and contemporary phenomena is essential for America to effectively address national security concerns. Acting together, realpolitik, fake news, and sociopathy shape adversary strategic behavior and work to the United States’ serious detriment. During the nuclear age and the social media era, the risks due to this “trinary weapon” skyrocketed.</p>
<p>Coping with these clear and present dangers calls for a nuanced and multidisciplinary, multiagency approach to deterrence and defense. This approach needs to go well beyond traditional military strategy that focuses on applying force while maintaining secrecy. Three lines of effort are important to help mitigate the above-mentioned trinary aspects of coercive statecraft.</p>
<p>First, multilateral engagement is important for combating the ill effects of enemy realpolitik. Just as in World War I, World War II, and the Cold War, collective international efforts by like-minded democracies are vital to resisting expansionist tyranny. Further strengthening <a href="https://en.wikipedia.org/wiki/Multilateralism">multilateral frameworks and alliances</a>, to address common security challenges and deter adversarial behavior, is a useful approach. Important examples include expanding NATO and rationalizing its burden sharing. Expanding AUKUS, a trilateral security partnership between Australia, the UK, and the US, to include Japan and other Asia-Pacific allies, such as South Korea and Canada, is another option.</p>
<p>Second, strategic communication and information resilience is important. These hybrid-warfare, offensive and defensive weapons need further development by the United States. Clear and consistent messaging is indispensable to effectively convey America’s values and goals and to counteract bad-actor manipulation. This can help immunize allies against falling for adversary disinformation and protect victims of repression from enemy brainwashing.</p>
<p>To this end, <a href="https://warontherocks.com/2023/11/information-resilience-countering-disinformation-and-its-threat-to-the-u-s-alliance-system/">enhancing resilience against fake news</a> requires expansion within the United States. This can be done using media literacy programs, non-partisan fact-checking mechanisms, and widespread public awareness campaigns. Any information warfare efforts the US employs to target adversary populations needs to meet high legal and ethical standards. It must also be tempered by stark realism about the utility of disinformation. In short, unconstrained free speech requires an informed public.</p>
<p>Third, <a href="https://www.ucf.edu/online/criminal-justice/news/what-is-criminal-profiling-and-what-is-its-role-in-law-enforcement/">psychological profiling techniques</a>, now standard practice in law enforcement, need further development to identify and mitigate the influence of sociopathic dictators in shaping strategic events. Such hyper-threatening individuals could, perhaps, be identified mid-career, before rising to lead nations. Overt and covert efforts to remediate or interdict the rise of such dangerously pathological persons is a tricky matter, but one the Pentagon, State Department, and Central Intelligence Agency should not neglect. This line of effort can adapt and extend approaches refined since September 11, 2001, to <a href="https://eknygos.lsmu.lt/springer/605/169-188.pdf">better understand and short circuit mental processes behind progressive radicalization leading to violent terrorism</a>.</p>
<p>These lines of effort need more urgent furthering on a truly whole-of-nation basis. Government officials and private-sector executives can turn their efforts to developing the required capabilities. Social media companies are already expert at manipulating Americans. Perhaps it is time their efforts are employed for the nation rather than against it.</p>
<p>By addressing these new-old challenges head-on and implementing effective countering strategies, America can enhance its defense against the realpolitik and disinformation employed by sociopathic dictators. By doing so, the United States and its allies safely navigate the complexities of modern geopolitics and growing three body problem.</p>
<p><em>Aaron Holland is an Analyst at the National Institute for Deterrence Studies. Joe Buff is a risk-mitigation actuary researching modern nuclear deterrence and arms control. The views expressed in this article are the authors’ own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/05/Realpolitik-and-Fake-News-Complicate-Nuclear-Deterrence.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-26665 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png" alt="Get this publication" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/realpolitik-and-fake-news-complicate-nuclear-deterrence/">Realpolitik and Fake News Complicate Nuclear Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/realpolitik-and-fake-news-complicate-nuclear-deterrence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Annie Jacobsen Gets It Wrong about Nuclear Deterrence</title>
		<link>https://globalsecurityreview.com/annie-jacobsen-gets-it-wrong-about-nuclear-deterrence/</link>
					<comments>https://globalsecurityreview.com/annie-jacobsen-gets-it-wrong-about-nuclear-deterrence/#comments</comments>
		
		<dc:creator><![CDATA[Peter Huessy]]></dc:creator>
		<pubDate>Thu, 11 Apr 2024 12:11:17 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Challenging Disarmament Disinformation]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[armageddon]]></category>
		<category><![CDATA[ballistic missile]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[missile defense]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear warfare]]></category>
		<category><![CDATA[post-strike]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[wargames]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=27637</guid>

					<description><![CDATA[<p>Annie Jacobsen’s new book, Nuclear War: A Scenario, is receiving rave reviews. It portrays a scenario in which a limited North Korean nuclear strike on the United States spirals into global thermonuclear war between the United States and Russia, ultimately killing a significant portion of the world’s population. For Jacobsen, who treats her fictional scenario [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/annie-jacobsen-gets-it-wrong-about-nuclear-deterrence/">Annie Jacobsen Gets It Wrong about Nuclear Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Annie Jacobsen’s new book, Nuclear War: A Scenario, is receiving rave reviews. It portrays a scenario in which a limited North Korean nuclear strike on the United States spirals into global thermonuclear war between the United States and Russia, ultimately killing a significant portion of the world’s population. For Jacobsen, who treats her fictional scenario as if it is fact, the problem is American nuclear policy, which, she asserts, is an utter failure. The only solution to the problem she creates is arms control and nuclear disarmament.</p>
<p>In Jacobsen’s scenario, North Korea unexpectedly launches a limited preemptive strike against the American homeland. The United States responds with a decapitating strike against North Korea’s nuclear arsenal. Through unlikely errors, Russia believes that the United States is attacking them instead of North Korea. In response, Russia launches a large-scale strike. This leads the United States to launch everything. Bing, bang, boom, and we have Armageddon followed by nuclear winter and the death of billions. In interviews with Vanity Fair and Mother Jones, Jacobsen argues that the US has a plan to conduct nuclear warfighting, based on a series of previously adopted requirements that leave the president little leeway to modify his response. This problem is only made worse by the fact that the president has sole authority to employ nuclear weapons. To this point, Jacobsen argues that military “war mongers” have a very “aggressive culture” that has a predilection to “jam” the president toward “quickly launching a massive retaliatory strike.”</p>
<p>Jacobsen asserts that American intercontinental ballistic missiles are on “HAIR TRIGGER ALERT.” Why? She interviewed William Perry who used the term. Bam, nuclear weapons are on hair trigger alert and missileers have itchy trigger fingers.</p>
<p>While admitting that nuclear deterrence has worked for seven decades, Jacobsen warns that deterrence will fail and when it does, any use of a nuclear weapon will result in large-scale nuclear war. Why? Jacobson interviewed Paul Bracken, who participated in government sponsored wargames—four decades ago—that ended in general nuclear war. Ipso-facto, the use of one nuclear weapon leads to Armageddon.</p>
<p>In Jacobsen’s scenario, American missile defenses are a complete failure. Why? She interviewed Ted Postol who said they do not work—case closed. Her conclusion is that missile defense is a farce and a waste of money. And the United States is lying to itself if it thinks they will ever stop an inbound nuclear weapon.</p>
<p>Elsewhere in the scenario, the president is forced to launch a large-scale nuclear response against the Russians within six minutes. Why? Jacobsen was also told by Perry that the president “will not wait” and thus assumed that Ronald Reagan’s memoir, in which he made an off-hand remark about having six minutes to decide on nuclear weapons use, reflects policy. Abracadabra, the president must decide to use nuclear weapons within six minutes.</p>
<p>Jacobsen’s predilection for incorrectly contextualizing the statements of those she interviewed is both stunning and worrying. The conclusions she draws about the present from the statements of former, often Reagan era or earlier, officials boggles the mind. Jacobsen does not seem to grasp the fact that she or her interviewees may be wrong about the relevance of their past experience to the present. Three examples are indicative.</p>
<p>Problems</p>
<p>First, Jacobsen is wrong about the alert status of the nation’s intercontinental ballistic missile force. They are not on “HAIR TRIGGER ALERT.” The United States does not have a launch-on-warning or launch-under-attack policy/doctrine. Nothing of the sort exists. Adam Lowther and Derek Williams dismantle this argument and explain that the United States maintains a launch-under-attack option, which allows the president to employ intercontinental ballistic missiles pre-, mid-, or post-strike. The option requires nothing of the president.</p>
<p>A number of variables will influence this decision. What is important to remember is that there is tremendous work that goes into thinking through scenarios well before they ever arise. Thus, the idea that these weapons are on hair trigger alert is ridiculous. Years of planning and analysis take place left of launch.</p>
<p>Second, Jacobsen is clearly unfamiliar with the design and purpose of wargames. They are specifically designed to understand the implications of a concept or capability. This means a scenario is artificially designed to ensure participants achieve the game’s objectives. Thus, when Jacobsen assumes that because a wargame or series of wargames end in general nuclear war, that a real conflict must necessarily end in general nuclear war, she is fundamentally misunderstanding the purpose and arbitrary nature of wargames. Within the wargaming community, it is well understood that they are not predictive of the future but are instructive of potential options.</p>
<p>Third, missile defenses are not worthless, as Jacobsen claims. They are making steady improvements in their ability to destroy targets. Ted Postol, her primary source of information about missile defenses, was wrong about the effectiveness of Israel’s Iron Dome system. Hard data is proving that missile defenses, in this case Iron Dome, are far more effective than Postel believed.</p>
<p>Although there are additional areas where Jacobsen incorporates inaccurate information into her scenario, the point is clear. Annie Jacobsen’s Nuclear War: A Scenario would be far more accurately titled, Nuclear War: A Novel or Nuclear War: Disarmament Propaganda. The biggest challenge with the book is that Americans with little understanding of nuclear operations will believe the bias with which Jacobsen writes. This makes it imperative that those within the nuclear community speak out and correct the record. Nuclear deterrence is too important to turn over to a journalist with an agenda.</p>
<p><em><a href="https://thinkdeterrence.com/peter-huessy/">Peter Huessy</a> is a Senior Fellow at the National Institute for Deterrence Studies. The views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/04/Annie-Jacobson-Gets-It-Wrong-about-Nuclear-Deterrence.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-26665 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png" alt="Get this publication" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/annie-jacobsen-gets-it-wrong-about-nuclear-deterrence/">Annie Jacobsen Gets It Wrong about Nuclear Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/annie-jacobsen-gets-it-wrong-about-nuclear-deterrence/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Social Media&#8217;s Role in Disaster Preparedness &#038; Crisis Management</title>
		<link>https://globalsecurityreview.com/critical-role-social-media-intelligence-defense-law-enforcement-preparedness/</link>
		
		<dc:creator><![CDATA[Mohamed ELDoh]]></dc:creator>
		<pubDate>Thu, 02 Apr 2020 15:47:03 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Public Health]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=14879</guid>

					<description><![CDATA[<p>There were over 4.5 billion active internet users around the world as of January 2020—roughly 60 percent of the global population. In an average month, over 3 billion are active on social media platforms. This scale means individuals can disseminate an unprecedented amount of information more efficiently than ever. On Facebook alone, more than 300 [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/critical-role-social-media-intelligence-defense-law-enforcement-preparedness/">Social Media&#8217;s Role in Disaster Preparedness &#038; Crisis Management</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There were over 4.5 billion active internet users around the world as of January <a href="https://www.statista.com/statistics/617136/digital-population-worldwide/">2020</a>—roughly 60 percent of the global population. In an average month, over 3 billion are <a href="https://wearesocial.com/blog/2018/01/global-digital-report-2018">active</a> on social media platforms. This scale means individuals can disseminate an unprecedented amount of information more efficiently than ever. On Facebook alone, <a href="https://www.omnicoreagency.com/facebook-statistics/">more</a> than 300 million photos are uploaded each day—while every 60 seconds, <a href="https://zephoria.com/top-15-valuable-facebook-statistics/">approximately</a> 510,000 comments and 293,000 status updates are posted. On Twitter, an <a href="https://www.dsayce.com/social-media/tweets-day/">average</a> of 350,000 tweets are sent per minute—equivalent to 500 million each day, or 200 billion per year.</p>
<p>The decentralization of the ability to disseminate information at scale poses a challenge in the event of national and global security threats and incidents like terrorism, instability in post-conflict states, natural disasters, and public health crises, such as the pandemic we are currently experiencing. In all the examples above, without exception, individuals use social media to share opinions, news, photos, and videos of the incident and its aftermath. First responders and the relevant authorities—whether defense, intelligence, national security, law enforcement, and public health agencies—require accurate information in real-time, and can use social media as a tool for such information to assist in planning and response.</p>
<p>While social media is already widely used by law enforcement and national security agencies as to gather and disseminate information, this author argues there is an essential need to advance the use of social media in the public sector as a source of real-time information to enhance situational awareness, crisis preparedness, and disaster response efforts.</p>
<p>Social media is already utilized in counter-terrorism, criminal investigations, threat forecasting, and information operations. However, social networks can be even further harnessed by public sector agencies as a continuous, real-time source of intelligence, if leveraged appropriately, particularly given that improvements in technology applications mean that any individual with a basic camera-equipped smartphone can serve as a source of on-the-ground information at the epicenter of a significant incident.</p>
<p>Many would argue that continuous, in-depth analysis of social media content infringes on civil liberties and is invasive to the privacy of individuals, yet such an argument exposes a double standard relating to the use of information on social networks by public sector agencies. Many social media users share content publicly, therefore, analysis of publicly-available social media content by public sector agencies wouldn&#8217;t be a violation of user privacy. In the Intelligence Community, the use of social networks as a source of intelligence falls into the OSINT (Open Source Intelligence) category.</p>
<p>Regardless, whether used by law enforcement, defense agencies, the intelligence community, or the general public, social media is an immeasurably powerful tool for reaching and connecting people at scale. Relevant social media content and &#8220;hashtags&#8221; trend around the globe within minutes of a crisis event—such as an act of terrorism, political violence, a natural disaster, or a public health emergency—particularly when an incident rapidly escalates and is unpredictable in nature.</p>
<p>It&#8217;s therefore critical that defense, intelligence, and law enforcement agencies, as well as first responders, maintain and have access to continuous monitoring of social media trends as they develop in real-time. In high priority incidents, individuals on the scene are likely to share photographs, videos, and text updates—information of great value in a crisis. Intelligence gathered from real-time analysis of social networks would include, but not be limited to, preliminary assessments of the situation&#8217;s complexity and the response required, as well as forecasting future consequences that could arise.</p>
<p>Citizen journalism and &#8220;whistleblowing&#8221; over social media can also serve as a critical indicator and a warning sign of worsening situations. A recent example of this was Dr. Li Wenliang, the Chinese doctor who issued a <a href="https://www.bbc.com/news/world-asia-china-51364382">warning</a> in a message shared on the Chinese social media platform Weibo on December 30th, 2019 about a “strange new virus,” which is now a pandemic impacting nearly <a href="https://coronavirus.jhu.edu/map.html">every</a> country in some way. In hindsight, had his post been viewed by intelligence agencies as an early warning sign, many states may have taken stricter measures earlier on to limit the impact of <a href="https://www.cdc.gov/coronavirus/2019-nCoV/index.html">COVID-19</a>.</p>
<p>In addition to systematic social media monitoring, automated text, and sentiment analysis of publicly shared user posts can provide crucial insights into the attitude of the general public and reactions towards an incident. This would further help first responders and security authorities when communicating with the public in an emergency, such as implementing enhanced security screening, border closures, and evacuations. Moreover, automated analysis of social media posts would assist first responders in their response factoring to avoid contributing to a public panic.</p>
<p>Social media in a crisis is a double-edged sword. As a crisis takes hold, a state&#8217;s adversaries are likely to take advantage of the situation and unleash a barrage of online disinformation and propaganda through social media channels in an attempt to foment public unrest. Such campaigns, usually initiated with a political agenda in mind to use the general public as unwitting proxy actors, present an additional challenge that further emphasizes the importance of maintaining continuous, real-time monitoring of publicly available user-generated social media content. Such a capability would effectively reinforce the efforts of first responders on-the-ground, and allow for public sector authorities to better mitigate the consequences of malicious disinformation campaigns.</p>
<p>Furthermore, continuous monitoring of social media platforms by a state&#8217;s security agencies enables those agencies to anticipate and counter unintentional misinformation. The spread of inaccurate rumors may have an adverse impact on public safety, a possible reason for the Director-General of the World Health Organization (WHO), Tedros Ghrebreysus, <a href="https://theconversation.com/covid19-social-media-both-a-blessing-and-a-curse-during-coronavirus-pandemic-133596">advocated</a> for urgent measures to be taken to mitigate the fallout from the coronavirus &#8220;infodemic.&#8221;</p>
<p><a href="https://globalsecurityreview.com/critical-role-social-media-intelligence-defense-law-enforcement-preparedness/">Social Media&#8217;s Role in Disaster Preparedness &#038; Crisis Management</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Iran&#8217;s Fragile Moments of Democracy May Not Survive the Propaganda Bots</title>
		<link>https://globalsecurityreview.com/iranian-democracy-disinformation-bots/</link>
		
		<dc:creator><![CDATA[Ali Arfa]]></dc:creator>
		<pubDate>Thu, 06 Jun 2019 15:56:55 +0000</pubDate>
				<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Information Operations]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11636</guid>

					<description><![CDATA[<p>A day after Aljazeera published a piece on Mojahedin-e Khalq (MEK), whose Twitter users were targeting Iranian scholars, academics, and journalists in favor of dialogue between the U.S. and Iran, Iranian Foreign Minister Javad Zarif mentioned Jack Dorsey, founder of Twitter, in a tweet. Zarif sarcastically asked Dorsey if, instead of shutting down the accounts of real pro-regime [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/iranian-democracy-disinformation-bots/">Iran&#8217;s Fragile Moments of Democracy May Not Survive the Propaganda Bots</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A day after <a href="https://www.aljazeera.com/programmes/listeningpost/2018/09/faking-online-debate-iran-180915121527882.html">Aljazeera published a piece</a> on Mojahedin-e Khalq (MEK), whose Twitter users were targeting Iranian scholars, academics, and journalists in favor of dialogue between the U.S. and Iran, Iranian Foreign Minister Javad Zarif mentioned Jack Dorsey, founder of Twitter, in a <a href="https://twitter.com/JZarif/status/1041287555600338944">tweet</a>. Zarif sarcastically asked Dorsey if, instead of shutting down the accounts of real pro-regime Iranians, he should purge the platform from the MEK bots that were trying to spread a “regime change” propaganda form their headquarters in Tirana, Albania. The incident signaled that the Iranian disinformation campaign, already claimed to be <a href="https://eu.usatoday.com/story/tech/news/2018/08/24/how-iran-targeted-u-s-facebook-youtube-and-twitter-liberal-memes/1079882002/">targeting the U.S. and some of its allies</a>, has now come home to roost.</p>
<p>Out of a population of 81 million, there are <a href="https://bit.ly/2E9Wxdv">at least 47 million active social media users</a> in Iran. Twitter, Instagram, and Telegram, which claims to have <a href="https://reut.rs/2xSILru">40 million users</a>, are also widely used in Iran. This high number of Iranian social media users and a lack of media literacy, provide a fertile ground for vast disinformation campaigns. Propaganda bots, known as “botnets” when working together, are normally used in such campaigns. They can masquerade as humans to amplify political messaging that suit specific agenda by liking, sharing, retweeting, and following genuine accounts. They can also be used to make <a href="https://medium.com/dfrlab/le-pens-small-online-army-c754058630f0">hashtags trend</a>, which improves the visibility of a political message.</p>
<p>As we approach the run-up to the Majles (parliament) and presidential elections in Iran, more hands from both pro-regime and opposition groups will be on keyboards to read, be read and possibly affect the result of the elections. For the Iranian people who are fighting for a transition from theocracy to democracy, disinformation campaigns—which are designed to sow confusion and reap chaos—are undoubtedly harmful; a look at Iran&#8217;s modern history reveals that turmoil has favored authoritarianism rather than democratic movements.</p>
<h3>Iranian Opposition Groups&#8217; Bot Toolkit</h3>
<p>Supposing these campaigns in Iran are inspired by the Russian Internet Research Agency (IRA) model that was used to polarize the U.S. public, it is not difficult to predict that there will be a focus on the societal cleavages that already exist among the Iranians and an effort to bold them through the twitter botnets’ traffic manipulations. The final goal would be to create as much distrust and chaos as possible; such that could finally lead to a “regime change.” The main target could be religious divide and ethnic minorities like Kurds, Baluch, and Turks. There could also be some Twitter campaigns designed to influence voters to boycott the elections with the main focus on delegitimizing both reformist and conservative parties in Iran. Furthermore, sensationalist, conspiratorial, and other forms of junk political news and disinformation could be spread among the voters across the political spectrum to dissuade them from voting.</p>
<p>The disinformation and fake news that have already <a href="http://www.khabaronline.ir/detail/480541/society/events">gained sizable audiences</a> in rural areas could also possibly be another target. Residents of these areas in Iran rarely use Twitter, but the content from the platform could quickly enter Telegram or Instagram and influence users on those platforms. Before and during the course of elections, these rural areas could turn into the epicenters of fake news and rumors that are amplified by bots. This, no matter how small the scope, could change the fate of a nation.</p>
<h3>The Islamic Republic’s Bot Arsenal</h3>
<p>The bots that are most probably handled by the Iranian cyber army or IRGC could be used to amplify any political message that is <a href="https://twitter.com/AmirpoorMehdi/status/1112472861069987842">on the agenda of the ruling forces</a>. They can be used to attack other candidates, harass them, or even spread rumors and fake news to smear their campaign.</p>
<p>Furthermore, in the event of uprisings before or during the elections, the regime in Tehran has its bot methods to fight back. These methods were tested and rehearsed during the nationwide protests of January 2018 to create distrust among the Iranian protestors. One of the tactics used is the creation of the bots whose task is to call the widely shared videos of the rallies fake and to discourage potential protestors from joining the crowds by creating a sense <a href="https://www.bbc.com/news/world-middle-east-42566083">that nothing is going on</a>. These bots were also used to guide the demonstrators to the wrong locations and to create an impression that the <a href="https://monitoring.bbc.co.uk/product/c200mbyv">protests were on a small scale.</a></p>
<h3>Democracy down</h3>
<p>Iran might not be the Switzerland of the Middle East, but has a unique political structure and activism with elections held every four years to choose the president and the members of the parliament. It is these elections that create democratic glimmers of hope for reform to which propaganda bots could be a significant setback. If in 2015 and due to Iranian public’s willingness to join the international community, the P5+1’s primary concern, was Iran’s nuclear activities, now, a non-nuclear but politically polarized Islamic Republic—radicalized by propaganda bot—could raise even more significant concerns.</p>
<p>Furious with Trump’s withdrawal from Joint Comprehensive Plan of Action (JCPOA) and disillusioned with Rouhani cabinet’s mismanagement and inability to deliver economic promises, many Iranians are now anything but moderate. Hardliners, armed to the teeth with twitter bots, will be taking full advantage of this situation to intensively spread their propaganda and rally their supporters for a landslide victory in the next round of elections. A déjà vu of another Ahmadinejad, with a bot army, long-range missiles, and possibly an urge to withdraw from International Atomic Energy Agency (IAEA), would then only be one round of election away from all of us. Whether Iran’s fragile moments of democracy can survive is a question that only time can answer.</p>
<p><a href="https://globalsecurityreview.com/iranian-democracy-disinformation-bots/">Iran&#8217;s Fragile Moments of Democracy May Not Survive the Propaganda Bots</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Russia&#8217;s Disinformation Campaigns are Succeeding in Europe</title>
		<link>https://globalsecurityreview.com/russia-disinformation-campaigns-succeeding-europe/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Sat, 11 May 2019 19:04:30 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11311</guid>

					<description><![CDATA[<p>Russian disinformation campaigns continue to increase, and increasingly seems to be part of a coordinated campaign to overwhelm democracies. In 2017, Catalonia held an illegal referendum on independence from Spain, despite it having been declared unconstitutional by the Spanish Constitutional Court. While 92% of referendum voters supported independence, only 43% of registered voters voted. Amid police [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russia-disinformation-campaigns-succeeding-europe/">How Russia&#8217;s Disinformation Campaigns are Succeeding in Europe</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Russian disinformation campaigns continue to increase, and increasingly seems to be part of a coordinated campaign to overwhelm democracies.</h2>
<p>In 2017, Catalonia held an illegal referendum on independence from Spain, despite it having been declared unconstitutional by the Spanish Constitutional Court. While 92% of referendum voters supported independence, only 43% of registered voters voted. Amid police crackdowns and massive protests, the Spanish National Court <a href="https://www.independent.co.uk/news/world/europe/catalonia-independence-what-happened-spain-timeline-events-referendum-latest-a8023711.html">ordered the imprisonment of Jordi Cuixart and Jordi Sanchez</a>, two Catalan separatist leaders. In spite of this, Catalonian MPs voted to declare independence. In response, Spain imposed direct rule over Catalonia. However, the situation is not as straightforward as many commentators make it seem, as vital information key to understanding the unrest has been overlooked.</p>
<p>Both the United States Senate and <a href="https://elpais.com/elpais/2017/11/11/inenglish/1510395422_468026.html">an independent study conducted by the George Washington University</a> have claimed that Kremlin-connected media outlets Russia Today (RT) and Sputnik created &#8220;zombie accounts&#8221; or bots to perpetuate a negative perception of Spain in the days leading up to the referendum. Half of the stories shared by RT highlighted police violence to deliberately disrupt internal cohesion in Spain.</p>
<p>Spain is not Moscow&#8217;s only target, however. Over the last year, the E.U. East StratCom Task Force reported <a href="https://euvsdisinfo.eu/">993 reports of disinformation cases,</a> 152 of which targeted the E.U. and originated from Russia. Furthermore, <a href="https://ec.europa.eu/digital-single-market/en/news/final-results-eurobarometer-fake-news-and-online-disinformation">eighty-three percent of Europeans </a>believe &#8220;fake news&#8221; is a danger to democracy.  Disinformation is on the rise, and there is ample evidence that Russian disinformation is part of an orchestrated campaign to overwhelm democracies and free media outlets. <a href="https://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-doctrine/">Coined by Russian expert Mark Galeotti</a>, the &#8220;Gerasimov doctrine&#8221; is a colloquial term that refers to the employment of non-kinetic or non-military methods to achieve political ends—to destabilize the E.U. and NATO from within through the exploitation of existing social, ethnic, and religious divisions.  The so-called &#8220;Gerasimov doctrine&#8221; merely describes an operational concept and isn&#8217;t a reference to a Russian military doctrine.</p>
<p>For decades, the <a href="https://www.ispionline.it/it/pubblicazione/means-goals-and-consequences-pro-kremlin-disinformation-campaign-16216">trans-Atlantic alliance</a> has remained stable, but history is no guarantee of stability in perpetuity. Despite mostly positive support for NATO amongst the citizens of its member states, Russia seizes upon existing dissatisfaction felt by a minority of citizens and pushes messaging that employs terms like &#8220;occupying power&#8221; to describe the alliance. The same goes for the European Union. Member states regularly disagree over issues such as refugee resettlement, Russian sanctions, and the resurgence of nationalism across the continent. Such subjects are prime targets for Russian disinformation campaigns, which are disseminated by Kremlin-controlled media outlets like RT (Russia Today) and Sputnik, as well as on fringe websites and social media accounts to amplify the message further.</p>
<p>Disinformation is challenging to counter, despite increasing and widespread awareness. Some European states like France <a href="https://www.politico.eu/article/french-parliament-passes-law-against-fake-news/">have enacted laws</a> that compel social networks to disclose the source of funding for sponsored political content and allow for candidates to sue for the removal of contested news reports during elections. In 2018, the E.U. enacted a non-binding disinformation code of practice, aimed at targeting &#8220;fake news&#8221; in upcoming European elections.</p>
<p>Such measures, however, are merely reactive and fail to anticipate the continually adapting strategies of disinformation purveyors. To avoid laws that target foreign influence campaigns, state-sponsored actors are buying political ads in local currency. Actors are increasingly adept at masking their locations and are moving towards image-based disinformation campaigns, which are less regulated and significantly more difficult to legislate.</p>
<p>Rather than perpetually being one step behind, Europe should emulate the strategies of states like Estonia that have been <a href="https://www.csmonitor.com/World/Passcode/2017/0324/Estonia-s-lessons-for-fighting-Russian-disinformation">dealing with Russian disinformation campaigns for years</a>. Rather than allow for Russian disinformation campaigns to gather steam, the websites such as the Estonia-based <a href="https://www.propastop.org/">Propastop</a> continuously debunk disinformation. The Estonian government also operates a Russian-language news channel to serve as an alternative to RT. Moreover, all Estonian politicians and public administration officers do not give interviews to Russian state-controlled media outlets. <a href="https://www.kremlinwatch.eu/countries-compared-states/estonia/https:/www.kremlinwatch.eu/countries-compared-states/estonia/">This strategy of national resilience</a> is also strengthened by Estonia’s National Center for Defense and Security Awareness (NCDSA), a non-governmental organization that aims to foster a society that is resilient and resistant to hostile foreign influence.</p>
<h3>France: The Yellow Vests</h3>
<p>Counter-disinformation tactics must be adaptable because disinformation comes in many different forms. Catalonia and Estonia are not the only case studies by far. France, for example, is currently dealing with an enormous surge of anti-government protestors who disagreed vehemently with an increase on the gas tax. These protestors are better known by their moniker &#8220;yellow vests.&#8221; Although the demonstrators&#8217; original demand of suspending the gas tax increase was met, the next day, more than 125,000 yellow vest protestors took to the streets, clashing with police and looting stores as they went.</p>
<p>According to New Knowledge, <a href="https://www.wired.com/story/co-opting-french-unrest-spread-disinformation/">340 pro-Kremlin accounts</a> created and magnified “the brutality of the French police, Macron’s inability to lead the nation, and anti-NATO or anti-migrant sentiments more than 20,000 times.” Since late October 2017, these accounts have posted at least 1,600 times a day on Twitter, retweeting false information to increase its believability. These accounts, as well as others, impersonated journalists and legitimate news outlets to craft a narrative of France being embroiled in a civil war and blaming Macron for its onset.</p>
<p>What does the Kremlin hope to accomplish through its disinformation campaigns in France? Ultimately, Russia wants to undermine the French government&#8217;s ability to govern effectively. If the French government&#8217;s focus is entirely domestic, it can no longer point fingers at Russia, continue its sanctions regime, and pose any serious threat to Russia. By amplifying societal discontent in France with disinformation through social media, Russia is creating a reality where French democracy is indeed under threat. As the yellow vest protests continue, it remains to be seen whether or not Russia has achieved its goals.</p>
<h3>Georgia: Disinformation as the Status Quo</h3>
<p>Unfortunately, Russian disinformation in Georgia is nothing new. During the 2008 war between Russia and Georgia, the former launched an intense pro-Russian propaganda campaign to spread claims that the Georgian government was violating the human rights of Russian speakers in Georgia. Although the accusations were widely discredited, they were used by Russia to justify the invasion and subsequent occupation of the Georgian regions of South Ossetia and Abkhazia. While Georgian politicians are aware of threat Russian disinformation poses, they lack the <a href="https://www.kremlinwatch.eu/userfiles/russia-s-disinformation-activities-and-counter-measures-lessons-from-georgia.pdf">political will to enact meaningful countermeasures.</a></p>
<p>According to the Georgia-based Media Development Foundation (MDF), this lack of response may be problematic given that <a href="http://mdfgeorgia.ge/uploads/library/89/file/eng/AntiWest-2017-ENG.pdf">almost 2000 anti-Western messages were detected</a> throughout Georgian media outlets in 2017. In contrast to 2016, when most of the Russian disinformation campaign was centered on human rights, the dominant topic in 2017 was the polarization of the Georgian domestic political landscape. Pro-Kremlin actors focused on targeting everyday Georgian&#8217;s perceived loss of national identity paired with demonizing rhetoric of the U.S., NATO, and the E.U.</p>
<p>Russia&#8217;s disinformation campaigns in Georgia are based on a three-part strategy. First, create a threat. Second, foster distrust of Georgia&#8217;s Western allies and partners. Third, reinstate and reinforce the belief that Russia is the sole trustworthy partner. Russian disinformation campaigns in Georgia used fake photos and videos to encourage conspiratorial thinking and increase radicalism in groups like <a href="https://www.transparency.ge/en/blog/anatomy-georgian-neo-nazism">Georgian Neo-Nazi parties</a>. One example of this tactic is the <a href="https://www.bbc.com/news/av/world-46157507/russian-disinformation-and-the-georgian-lab-of-death">“lab of death”</a> narrative, where it was claimed that a U.S.-funded laboratory in Georgia which was giving untested drugs to Georgians, causing them to die.</p>
<p>In Georgia, the goal of such disinformation campaigns is quite different than in France. As Georgia is not presently a member of the E.U., the bulk of Russian messaging is intended to ensure that will never happen. Russia sees Georgia as lying within its sphere of influence, and any attempt to align with the West is seen as a threat. The 2008 Russian-Georgian war, for example, is primarily seen as the driver behind Georgia’s push to receive a NATO Membership Action Plan.</p>
<p>Despite the troubled relationship between the two countries, Georgia has adopted a pragmatic approach for its foreign policy, where it has downplayed tensions with Russia <a href="http://georgiatoday.ge/news/10455/Russia%E2%80%93Georgia-Trade-Corridor-Agreement-Moving-Forward">and even is in talks to create trade corridors </a>through the frozen conflict zones of South Ossetia and Abkhazia. Again, Russia’s disinformation campaigns are having the desired impact. Despite Georgia’s westward orientation, Tbilisi continues to adopt a less aggressive and more pacifist tone towards Moscow.</p>
<h3>Europe Needs to Fight Back</h3>
<p>From Western Europe to the Eastern Neighborhood, disinformation campaigns are having a severe impact on societal cohesion. In France, the &#8220;yellow vest&#8221; protests are ongoing. In Georgia, right-wing radicalism is on the rise, threatening Georgia’s turn to the West. Disinformation is even suspected to be involved with Brexit, and <a href="https://euvsdisinfo.eu/pro-kremlin-disinformation-in-germany-absent-or-present/">the recent German parliamentary election</a>. In this hostile environment, Europe must reorient itself and learn from the E.U. East Stratcom Task Force and Estonia. Otherwise, the E.U. risks further fragmentation within itself and other Western democracies.</p>
<p>Russia’s campaigns are succeeding within Europe because countries are not adopting the appropriate countermeasures. Instead of simply acknowledging that disinformation is a problem, European countries must take proactive measures to debunk Russian propaganda. The E.U.’s East Stratcom Task Force is already doing much of this work, but it could receive further funding and publicity from all E.U. member states.</p>
<p>Counter-disinformation efforts can only be successful if they are marketed effectively. Furthermore, European countries ought to create more societal resilience programs, modeling them off the Estonian model. While not every European country has a Russian-speaking minority, each has segments of disenfranchised people who are vulnerable to disinformation. Put bluntly, the best way to combat the current successes of Russian disinformation is to fight back.</p>
<p><a href="https://globalsecurityreview.com/russia-disinformation-campaigns-succeeding-europe/">How Russia&#8217;s Disinformation Campaigns are Succeeding in Europe</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Unintended Consequences of Fake News</title>
		<link>https://globalsecurityreview.com/unintended-consequences-fake-news/</link>
		
		<dc:creator><![CDATA[Matthew Crosston]]></dc:creator>
		<pubDate>Mon, 03 Dec 2018 15:31:12 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Fake News]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Tanzania]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8948</guid>

					<description><![CDATA[<p>Unintended consequences are often found in the debris of partisan politics – and we’ve seen many there already during the short tenure of the Trump presidency.  But perhaps the most consequential yet unforeseen of the president’s unintended consequences has been the global impact of Trump’s comments regarding the so-called phenomenon of ‘fake news.’ Emblematic of Trump, despite [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/unintended-consequences-fake-news/">The Unintended Consequences of Fake News</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Unintended consequences are often found in the debris of partisan politics – and we’ve seen many there already during the short tenure of the Trump presidency.  But perhaps the most <em>consequential yet unforeseen</em> of the president’s unintended consequences has been the global impact of Trump’s comments regarding the so-called phenomenon of ‘fake news.’</p>
<p>Emblematic of Trump, despite warnings from various journalism watchdog groups that the global trend of his phrase may have restrictive and even deadly consequences – witness the suspected execution of columnist Jamal Khashoggi by the Saudi government, as well as the more recent anonymous delivery of a pipe bomb to CNN’s New York offices – the president seems to be taking the micro-narcissist view of the problem.  He expresses pride that a phrase he coined is gaining popularity around the world instead of focusing on the likelihood that his incessant criticism may likely be contributing to crackdowns by autocratic governments on freedom of expression and the press globally.</p>
<p>Ever resilient against criticism, if also ironically hyper-sensitive, Trump has ignored the United States’ precipitous fall to 45<sup>th</sup> place in the World Press Freedom Index because of his anti-news media rhetoric. And while it cannot be proven as causal, there does seem to be a strong inverse correlation between this decline and <a href="https://www.politico.com/story/2018/07/30/trump-media-fake-news-750536">the increase around the globe of arrests and the physical harassment of journalists.</a></p>
<p>The strongest sign that “fake news” is more than a passing political fad is the disturbing example of a world leader within the cradle of democracy giving in to the temptation of using it as a weapon.  <a href="https://newatlas.com/fake-news-laws-around-the-world/55737/">France’s Emmanuel Macron succeeded in passing a law which takes effect within three months of a general election</a> and allows for emergency governmental action to block ‘manipulative and misleading information’ within 48 hours of it being brought before a judge.</p>
<p>What so disturbed Macron was his sense of being the target during 2017 of a vicious and fallacious disinformation campaign by political opponents.  Sound familiar?</p>
<p>There is no doubt that France feels confident that it has crafted a rational ‘golden middle’ path through the fake news debate by limiting the time frame in which the law can be utilized (strictly before general elections) and by requiring the potential target of government action to be brought before the judiciary for formal legal approval.  But the reality is that this French initiative could create its own unintended consequences, as it no longer allows isolates press restrictions to the realm of dictators.  Indeed, Macron’s move has given flexibility to stable democracies to do similar undemocratic things.</p>
<p>Meantime, what of those nation states that might be defined as decidedly less democratic – perhaps as autocratic or semi-autocratic?  How are they dealing with “fake news”?  <a href="https://www.poynter.org/news/guide-anti-misinformation-actions-around-world">Here’s a quick world tour</a>:</p>
<ul>
<li>Belarus: passed media laws that permit the government to prosecute people who spread ‘false information online.’ The laws spread further into allowing the government to potentially block websites deemed in violation.</li>
<li>Brazil: the Federal Police announced the creation of a special task force to identify, locate, and punish authors of fake news.</li>
<li>Cambodia: in the weeks leading up to the country’s national elections, the government passed measures that gave it the right to block websites and other forms of media it deemed a ‘danger to national security.’</li>
<li>Croatia: similar to a move pursued in Germany, Croatian officials passed a law meant to stop the spread of hate speech and misinformation on social media platforms.</li>
<li>Egypt: the government now openly regulates any social media accounts that have large followings in order to make sure misinformation is not spread throughout the country.</li>
<li>Indonesia: a newly-formed National Cyber and Encryption Agency was tasked to help intelligence and police agencies combat online disinformation and social media hoaxes.</li>
<li>Kenya: the national government passed laws criminalizing 17 different forms of online activity.</li>
<li>Russia: despite being the most common target of countries around the world that criticize states trying to foment fake news, it didn’t stop Russia from introducing its own domestic legislation against disinformation.</li>
<li>Tanzania: the government, growing ever more concerned about the pervasiveness of online misinformation, has levied several possible legal initiatives that would constrict and/or punish online publishers.</li>
</ul>
<p>While this list is by no means exhaustive, it suggests a general global trend:  governments are actively attempting to regulate, monitor, limit, and restrict citizen impact within online social/political participation.</p>
<p>Through it all, there never seems to be any explicit attempt to define and describe fake news. Keeping terms amorphous and ambiguous allows governments to advantageously use the slippery slope approach to opposition forces: “If you are against me I will just make sure the arguments you make are deemed fake news.”</p>
<p>Indeed, many if not most of the initiatives do not seem to be motivated by a desire to improve the quality of news and resource information for the public. Instead, they are structured to simply provide greater obstacles and legal roadblocks to grassroots organizations that are unwilling to be in lockstep with central authorities. The bottom line: Many of these fake news policies are really just poorly masked proposals to prevent a more significant and healthy development of civil society in nations that are in desperate need of such development.</p>
<p>Finally, it is not a coincidence that in every case, regardless of political system or regime, there is no mention or discussion of repercussions and consequences <em>on the governments or their officials </em>if they are found guilty of spreading fake news themselves – perhaps because <a href="https://inhomelandsecurity.com/fake-news-propaganda-identify-can-useful/">governments have been issuing fake news – we used to call it propaganda – for ages.</a></p>
<p>If you accept all this to be true, then you are left with one very disturbing political conclusion about these fake news initiatives: they are not efforts to improve the quality of political dialogue but ultimately to shut down that dialogue altogether.</p>
<p>When governments seem intent to weaponize alleged fake news and use it to bludgeon opponents and opposition, then the ultimate political consequence is the crippling of public oversight, citizen criticism, and grassroots activism.</p>
<p>Which leads us back to the United States and President Trump.  Many here seem to view President Trump’s tirades against fake news with bemusement, yet a lack of real concern due to their enduring faith in the institutions of American democracy and its innate principles safeguarding freedom of the press, association, and expression. That is all well and good.  But many of the governments around the world, clearly inspired by Trumpian rhetoric, are not beholden to our check-and-balance structural limitations.  As such, their efforts do not bolster the quality of their politics but serve only to solidify their power.</p>
<p><a href="https://globalsecurityreview.com/unintended-consequences-fake-news/">The Unintended Consequences of Fake News</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
