| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | AA | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Title | Author(S) | Date | Publication | Link | Category | Actor | Region | |||||||||||||||||||
2 | Influence Cyber Operations: The Use of Cyberattacks in Support of Influence Operations | Pascal Brangetto and Matthijs A. Veenendaal | 2016 | 2016 8th International Conference on Cyber Conflict | https://ccdcoe.org/uploads/2018/10/Art-08-Influence-Cyber-Operations-The-Use-of-Cyberattacks-in-Support-of-Influence-Operations.pdf | Influence Operations | | x | |||||||||||||||||||
3 | Domestic Disinformation on the Rise in Africa | October 6, 2021 | Africa Center for Strategic Studies | https://africacenter.org/spotlight/domestic-disinformation-on-the-rise-in-africa/ | Disinformation | | x | ||||||||||||||||||||
4 | Disinformation Drilling into Africa’s Information Ecosystems | Mark Duerksen | February 8, 2023 | Africa Center for Strategic Studies | https://africacenter.org/experts/disinformation-drilling-africa-information-ecosystems/ | Disinformation | | x | |||||||||||||||||||
5 | China’s United Front Strategy in Africa | Paul Nantulya | September 5, 2023 | Africa Center for Strategic Studies | https://africacenter.org/spotlight/china-united-front-africa/ | | China | x | |||||||||||||||||||
6 | Mapping a Surge of Disinformation in Africa | March 13, 2024 | Africa Center for Strategic Studies | https://africacenter.org/spotlight/mapping-a-surge-of-disinformation-in-africa/ | Disinformation | | x | ||||||||||||||||||||
7 | Disinformation and Entropy: Leveraging AI in the Information Environment | José R. Davis | Vol. 3, No. 2, Summer 2024 | Air & Space Operations Review | https://www.airuniversity.af.edu/Portals/10/ASOR/Journals/Volume-3_Number-2/Davis.pdf | Artificial Intelligence | | ||||||||||||||||||||
8 | Dealing with Disinformation: The Barriers to Success and a Path Forward | James M. Davitch | Vol. 1, No. 1, Spring 2022 | Air & Space Operations Review | https://www.airuniversity.af.edu/Portals/10/ASOR/Journals/Volume-1_Issue-1/Davitch_Dealing_With_Disinformation.pdf | Disinformation | | ||||||||||||||||||||
9 | Intermediate Objectives and Incremental Behavior Change: Relooking a Current Paradigm for DOD Foreign Influence Efforts | Ian J. Courter | Jan. 1, 2023 | Air Land Sea Space Application Center | https://www.alssa.mil/Portals/9/Documents/articles/230101_ALSA_Article_Courter_Intermediate_Psychological_Objectives.pdf | | | x | |||||||||||||||||||
10 | Russian Information Warfare as Domestic Counterinsurgency | Stephen Blank | Volume 35, 2013 - Issue 1 | American Foreign Policy Interests | https://www.tandfonline.com/doi/pdf/10.1080/10803920.2013.757946 | | Russia | x | |||||||||||||||||||
11 | Joseph Goebbels: Propagandist | Kenneth J. Campbell | Vol. 30, No. 2 (2012) | American Intelligence Journal | https://www.jstor.org/stable/26202024 | Propaganda | | x | |||||||||||||||||||
12 | The COVID-19 Threat: A Pandemic of Disinformation, Misinformation, Mal-Information, and Malicious Influence Operations | Jeffrey S. Votaw | Vol. 38, No. 1, (2021) | American Intelligence Journal | https://www.jstor.org/stable/27087757 | | | x | |||||||||||||||||||
13 | The Trust | Natalie Grant | Vol. 12, No. 1, (1991) | American Intelligence Journal | https://www.jstor.org/stable/44319063? | Deception | Russia | x | |||||||||||||||||||
14 | Defending Liberal Democracies Against Disinformation | Jacob P. Matthews | Vol. 36, No. 2, (2019) | American Intelligence Journal | https://www.jstor.org/stable/27066376? | Disinformation | | x | |||||||||||||||||||
15 | What's in a Name? Waging War to Win Hearts and Minds | Robert J. Kodosky | Vol. 32, No. 1 (2015) | American Intelligence Journal | https://www.jstor.org/stable/26202117 | | | x | |||||||||||||||||||
16 | Influence Operations in Cyberspace – How They Really Work | Petere Pijpers and P.A.L. Ducheine | September 24, 2020 | Amsterdam Center for International Law | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3698642 | Influence Operations | | x | |||||||||||||||||||
17 | Iranian digital influence efforts: Guerrilla broadcasting for the twenty-first century | Emerson T. Brooking and Suzanne Kianpour | February 11, 2020 | Atlantic Council | https://www.atlanticcouncil.org/wp-content/uploads/2020/02/IRAN-DIGITAL.pdf | Influence Operations | Iran | x | |||||||||||||||||||
18 | Democratic defense against disinformation 2.0 | Alina Polyakova, Daniel Fried | June 13, 2019 | Atlantic Council | http://www.atlanticcouncil.org/wp-content/uploads/2019/06/Democratic_Defense_Against_Disinformation_2.0.pdf | Disinformation | | x | |||||||||||||||||||
19 | Digital Autocracy: Maduro’s control of the Venezuelan information environment | Esteban Ponce de León and Daniel Suárez Pérez | September 30, 2022 | Atlantic Council | https://www.atlanticcouncil.org/wp-content/uploads/2021/04/DigitalAutocracyVEN-FINAL.pdf | | Venezuela | x | |||||||||||||||||||
20 | Political warfare in the digital age: cyber subversion, information operations and ‘deep fakes’ | Thomas Paterson & Lauren Hanley | Volume 74, 2020 - Issue 4 | Australian Journal of International Affairs | https://www.tandfonline.com/doi/full/10.1080/10357718.2020.1734772 | Political Warfare | | x | |||||||||||||||||||
21 | Truth and reality with Chinese characteristics | Samantha Hoffman , Tilla Hoja , Yvonne Lau & Lilly Min-Chen Lee | 02 May 2024 | Australian Strategic Policy Institute | https://www.aspi.org.au/report/truth-and-reality-chinese-characteristics | | China | x | |||||||||||||||||||
22 | Protecting Democracy in an Era of Cyber Information War | Joseph S. Nye | February 2019 | Belfer Center for Science and International Affairs | https://www.belfercenter.org/sites/default/files/files/publication/ProtectingDemocracy.pdf | | | x | |||||||||||||||||||
23 | National CounterInformation Operations Strategy | February 2019 | Belfer Center for Science and International Affairs | https://www.belfercenter.org/sites/default/files/files/publication/CounterIO.pdf | | United States | x | ||||||||||||||||||||
24 | A Next Generation National Information Operations Strategy and Architecture | Jack Kiesler | September 2021 | Belfer Center for Science and International Affairs | https://www.belfercenter.org/sites/default/files/files/publication/Next%20Gen%20National%20IO%20Strategy%20-%20Kiesler.pdf | | United States | x | |||||||||||||||||||
25 | The Geopolitics of Information | Eric Rosenbach, Katherine Mansted | May 2019 | Belfer Center for Science and International Affairs | https://www.belfercenter.org/sites/default/files/2019-08/GeopoliticsInformation.pdf | | | ||||||||||||||||||||
26 | Combating Information Operations: Developing an Operating Concept | Simon Jones | June 2018 | Belfer Center for Science and International Affairs | https://www.belfercenter.org/sites/default/files/files/publication/PAE%20Jones%20-%20web%20final%281%29.pdf | | | x | |||||||||||||||||||
27 | Cognitive Warfare: The Russian Threat to Election Integrity in the Baltic States | Oliver Backes, Andrew Swab | November 2019 | Belfer Center for Science and International Affairs | https://www.belfercenter.org/sites/default/files/2019-11/CognitiveWarfare.pdf | Elections | Russia | x | |||||||||||||||||||
28 | Combatting and Defeating Chinese Propaganda and Disinformation: A Case Study of Taiwan’s 2020 Elections | Aaron Huang | July 2020 | Belfer Center for Science and International Affairs | https://www.belfercenter.org/sites/default/files/files/publication/Combatting%20Chinese%20Propaganda%20and%20Disinformation%20-%20Huang.pdf | Elections | China | x | |||||||||||||||||||
29 | The Use of Cyberwarfare in Influence Operations | Daniel Cohen & Ofir Bar'el | October 1, 2017 | Blavatnik Interdisciplinary Cyber Research Center (ICRC) at Tel Aviv University | https://en-cyber.tau.ac.il/sites/cyberstudies-english.tau.ac.il/files/media_server/cyber%20center/cyber-center/Cyber_Cohen_Barel_ENG.pdf | Influence Operations | | x | |||||||||||||||||||
30 | Restoring America’s Good Name: Improving Strategic Communications with the Islamic World | Hady Amr and P.W. Singer | September 1, 2006 | Brookings Institute | https://www.brookings.edu/wp-content/uploads/2016/06/09middleeast_amr.pdf | Strategic Communication | | x | |||||||||||||||||||
31 | Deepfakes and international conflict | Daniel L. Byman, Chongyang Gao, Chris Meserole, and V.S. Subrahmanian | January 2023 | Brookings Institute | https://www.brookings.edu/wp-content/uploads/2023/01/FP_20230105_deepfakes_international_conflict.pdf | Artificial Intelligence | | x | |||||||||||||||||||
32 | Winning the web: How Beijing exploits search results to shape views of Xinjiang and COVID-19 | Jessica Brandt, Bret Schafer, Elen Aghekyan, Valerie Wirtschafter, and Adya Danaditya | May 2022 | Brookings Institute | https://www.brookings.edu/wp-content/uploads/2022/05/FP_20220525_china_seo_v2.pdf | | China | x | |||||||||||||||||||
33 | The future of political warfare: Russia, the West, and the coming age of global digital competition | Alina Polyakova and Spencer Phipps Boyer | March 2018 | Brookings Institute | https://www.brookings.edu/wp-content/uploads/2018/03/fp_20180316_future_political_warfare.pdf | Political Warfare | Russia | x | |||||||||||||||||||
34 | Winning the War of Words: Information Warfare in Afghanistan | Peter W. Singer | October 2001 | Brookings Institute | https://www.brookings.edu/articles/winning-the-war-of-words-information-warfare-in-afghanistan/ | | | x | |||||||||||||||||||
35 | The Breakout Scale: Measuring the Impact of Influence Operations | Ben Nimmo | September 2020 | Brookings Institute | https://www.brookings.edu/wp-content/uploads/2020/09/Nimmo_influence_operations_PDF.pdf | Influence Operations | | x | |||||||||||||||||||
36 | An AI early warning system to monitor online disinformation, stop violence, and protect elections | Michael Yankoski, Tim Weninger & Walter Scheirer | Volume 76, 2020 - Issue 2 | Bulletin of the Atomic Scientists | https://www.tandfonline.com/doi/full/10.1080/00963402.2020.1728976 | Artificial Intelligence | | x | |||||||||||||||||||
37 | Meme warfare: AI countermeasures to disinformation should focus on popular, not perfect, fakes | Michael Yankoski, Walter Scheirer & Tim Weninger | Volume 77, 2021 - Issue 3 | Bulletin of the Atomic Scientists | https://www.tandfonline.com/doi/full/10.1080/00963402.2021.1912093 | Memetics | | x | |||||||||||||||||||
38 | “Netwar”: The unwelcome militarization of the Internet has arrived | Jonathan Zittrain | Volume 73, 2017 - Issue 5 | Bulletin of the Atomic Scientists | https://www.tandfonline.com/doi/full/10.1080/00963402.2017.1362907 | | | x | |||||||||||||||||||
39 | The existential threat from cyber-enabled information warfare | Herbert Lin | Volume 75, 2019 - Issue 4 | Bulletin of the Atomic Scientists | https://www.tandfonline.com/doi/full/10.1080/00963402.2019.1629574 | Cyber | | x | |||||||||||||||||||
40 | NATO: Countering Strategic Maskirovka | Julian Lindley-French | May 2015 | Canadian Defence & Foreign Affairs Institute | https://d3n8a8pro7vhmx.cloudfront.net/cdfai/pages/543/attachments/original/1432247421/NATO_Countering_Strategic_Maskirovka.pdf?1432247421 | Deception | Russia | x | |||||||||||||||||||
41 | From Intelligence to Influence: The Role of Information Operations | Roger Vandomme | 2010 No. 6 | Canadian Forces College | https://www.cfc.forces.gc.ca/237/251/vandomme-eng.pdf | Intelligence | | x | |||||||||||||||||||
42 | The Western Alliance In The Face Of The Russian (Dis)Information Machine: Where Does Canada Stand? | Sergey Sukhankin | September 2019 | Canadian Global Affairs Institute | https://d3n8a8pro7vhmx.cloudfront.net/cdfai/pages/4258/attachments/original/1567979739/The_Western_Alliance_in_the_Face_of_the_Russian_%28Dis%29information_Machine_Where_Does_Canada_Stand.pdf?1567979739 | Disinformation | Russia | x | |||||||||||||||||||
43 | Assessing National Information Ecosystems | Alicia Wanless, Samantha Lai, and John Hicks | February 11, 2025 | Carnegie Endowment for International Peace | https://carnegie-production-assets.s3.amazonaws.com/static/files/Wanless%20et%20al%20-%20Assessing%20National%20Information%20Ecosystems.pdf | | | ||||||||||||||||||||
44 | Phase-based Tactical Analysis of Online Operations | Ben Nimmo, Eric Hitchins | March 16, 2023 | Carnegie Endowment for International Peace | https://carnegieendowment.org/files/202303-Nimmo_Hutchins_Online_Ops.pdf | | | x | |||||||||||||||||||
45 | No Water’s Edge: Russia’s Information War and Regime Security | GAVIN WILDE, JUSTIN SHERMAN | January 2023 | Carnegie Endowment for International Peace | https://carnegieendowment.org/files/No_Waters_Edge-Russias_Information_War_and_Regime_Security_11.pdf | | Russia | x | |||||||||||||||||||
46 | Collaborative Models for Understanding Influence Operations: Lessons From Defense Research | JACOB SHAPIRO, MICHELLE NEDASHKOVSKAYA, JAN OLEDAN | June 2020 | Carnegie Endowment for International Peace | https://carnegieendowment.org/2020/06/25/collaborative-models-for-understanding-influence-operations-lessons-from-defense-research-pub-82150 | Influence Operations | | x | |||||||||||||||||||
47 | What Makes an Influence Operation Malign? | KAMYA YADAV, MARTIN J. RIEDL, ALICIA WANLESS, SAMUEL WOOLLEY | August 2023 | Carnegie Endowment for International Peace | https://carnegieendowment.org/2023/08/07/what-makes-influence-operation-malign-pub-90323 | Influence Operations | | x | |||||||||||||||||||
48 | Countering Disinformation Effectively: An Evidence-Based Policy Guide | JON BATEMAN, DEAN JACKSON | January 2024 | Carnegie Endowment for International Peace | https://carnegieendowment.org/2024/01/31/countering-disinformation-effectively-evidence-based-policy-guide-pub-91476 | Disinformation | | x | |||||||||||||||||||
49 | A CERN Model for Studying the Information Environment | ALICIA WANLESS, JACOB N. SHAPIRO | November 2022 | Carnegie Endowment for International Peace | https://carnegieendowment.org/files/Wanless_Shapiro_CERN_final.pdf | | | x | |||||||||||||||||||
50 | What Is So Foreign About Foreign Influence Operations? | Hedvig Ördén and James Pamment | January 2021 | Carnegie Endowment for International Peace | https://carnegieendowment.org/files/Orden_Pamment_ForeignInfluenceOps2.pdf | Influence Operations | | x | |||||||||||||||||||
51 | The Challenges of Countering Influence Operations | Elise Thomas, Natalie Thompson, and Alicia Wanless | Carnegie Endowment for International Peace | https://carnegieendowment.org/files/Thomas_Thompson_Wanless_-_PCIO_-_Influence_Ops.pdf | Influence Operations | | x | ||||||||||||||||||||
52 | Influence Operations Researchers Want Guidance on Best Practice, But What Does That Mean? | Dean Jackson | December 05, 2022 | Carnegie Endowment for International Peace | https://carnegieendowment.org/2022/12/05/influence-operations-researchers-want-guidance-on-best-practice-but-what-does-that-mean-pub-88517 | Influence Operations | | x | |||||||||||||||||||
53 | Dangerous Synergies: Countering Chinese and Russian Digital Influence Operations | Daniel Kliman, Andrea Kendall-Taylor, Kristine Lee, Joshua Fitt and Carisa Nietsche | May 7, 2020 | Center for a New American Security | https://s3.us-east-1.amazonaws.com/files.cnas.org/backgrounds/documents/CNAS-Report-Dangerous-Synergies-May-2020-DoS-Proof.pdf | Influence Operations | | x | |||||||||||||||||||
54 | The New War of Ideas: Counterterrorism Lessons for the Digital Disinformation Fight | Kara Frederick | June 3, 2019 | Center for a New American Security | https://s3.us-east-1.amazonaws.com/files.cnas.org/hero/documents/CNAS-Report-Disinformation-final.pdf | Disinformation | | x | |||||||||||||||||||
55 | Under Pressure: The Growing Reach of Chinese Influence Campaigns in Democratic Societies | Harry Krejsa | April 27, 2018 | Center for a New American Security | https://s3.us-east-1.amazonaws.com/files.cnas.org/backgrounds/documents/CNASReport-Under-Pressure-web.pdf | Influence Operations | China | x | |||||||||||||||||||
56 | Digital Threats to Democracy: A Double-Edged Sentence | M. Nina Miller | May 20, 2020 | Center for a New American Security | https://s3.us-east-1.amazonaws.com/files.cnas.org/backgrounds/documents/CNAS-Report-HTI-Double-Edged-Sentencev2-1.pdf | | | x | |||||||||||||||||||
57 | Engineers Of The Human Soul: China’s Propaganda Work System | April 29, 2023 | Center for Intelligence Research and Analysis | https://cira.exovera.com/wp-content/uploads/2023/05/Engineers-of-the-Human-Soul-Chinas-Propaganda-Work-System_CCP-Conference-Paper_sourced.pdf | Propaganda | China | x | ||||||||||||||||||||
58 | AI and the Future of Disinformation Campaigns - Part 1: The RICHDATA Framework | Katerina Sedova, Christine McNeill, Aurora Johnson, Aditi Joshi, Ido Wulkan | December 2021 | Center for Security and Emerging Technology | https://cset.georgetown.edu/wp-content/uploads/CSET-AI-and-the-Future-of-Disinformation-Campaigns-Report.pdf | Artificial Intelligence | | x | |||||||||||||||||||
59 | AI and the Future of Disinformation Campaigns - Part 2: A Threat Model | Katerina Sedova, Christine McNeill, Aurora Johnson, Aditi Joshi, Ido Wulkan | December 2021 | Center for Security and Emerging Technology | https://cset.georgetown.edu/wp-content/uploads/CSET-AI-and-the-Future-of-Disinformation-Campaigns-Part-2.pdf | Artificial Intelligence | | x | |||||||||||||||||||
60 | Forecasting Potential Misuses of Language Models for Disinformation Campaigns—and How to Reduce Risk | Josh A. Goldstein, Girish Sastry, Micah Musser, Renée DiResta, Matthew Gentzel, Katerina Sedova | January 2023 | Center for Security and Emerging Technology | https://arxiv.org/pdf/2301.04246.pdf | Artificial Intelligence | | x | |||||||||||||||||||
61 | Truth, Lies, and Automation: How Language Models Could Change Disinformation | Ben Buchanan, Andrew Lohn, Micah Musser, Katerina Sedova | May 2021 | Center for Security and Emerging Technology | https://cset.georgetown.edu/wp-content/uploads/CSET-Truth-Lies-and-Automation.pdf | Artificial Intelligence | | x | |||||||||||||||||||
62 | Deepfakes: A Grounded Threat Assessment | Tim Hwang | July 2020 | Center for Security and Emerging Technology | https://cset.georgetown.edu/wp-content/uploads/CSET-Deepfakes-Report.pdf | Artificial Intelligence | | x | |||||||||||||||||||
63 | Finding China's Edge. Engineering Influence Operations within the Limits of Social Media Platform Rules | July 2021 | Center for Security Studies (CSS), ETH Zürich | https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2021-07-Finding-China's-Edge.pdf | Influence Operations | China | x | ||||||||||||||||||||
64 | Cyber Influence Operations: An Overview and Comparative Analysis | October 2019 | Center for Security Studies (CSS), ETH Zürich | https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/382358/1/Cyber-Reports-2019-10-CyberInfluence.pdf | Influence Operations | | x | ||||||||||||||||||||
65 | Foreign Malign Influence Targeting U.S. and Allied Corporations | Daniel Byman | March 20, 2025 | Center for Strategic & International Studies | https://csis-website-prod.s3.amazonaws.com/s3fs-public/2025-03/250320_Byman_Foreign_Influence.pdf?VersionId=RRrbau8bPrR6dv7tHPjAMpFwaPY3d7Y3 | | | ||||||||||||||||||||
66 | Countering China’s Influence Activities: Lessons from Australia | Amy Searight | July 31, 2020 | Center for Strategic & International Studies | https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/200731_Searight_ChinaInfluenceOperationsAustralia_v6_WEB%20FINAL.pdf | | China | x | |||||||||||||||||||
67 | With Friends Like These: Assessing Russian Influence in Germany | Jeffrey Mankoff | July 24, 2020 | Center for Strategic & International Studies | https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/200724_Mankoff_FullReport_v3.pdf | | Russia | x | |||||||||||||||||||
68 | Countering Russian & Chinese Influence Activities | Heather A. Conley, Amy Searight, Cyrus Newlin, and Tim Kostelancik | July 15, 2020 | Center for Strategic & International Studies | https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/200714_Newlin_FullReport_v4_WEB%20FINAL.pdf | | China | x | |||||||||||||||||||
69 | Influence and Escalation: Implications of Russian and Chinese Influence Operations for Crisis Management | Rebecca Hersman, Eric Brewer, Lindsey Sheppard, Maxwell Simon | November 9, 2021 | Center for Strategic & International Studies | https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/211109_Hersman_Influence_and_Escalation_0.pdf?fAE4qTWKrjF0eT9k8wVV6gs8KDU_x0Bn | | | x | |||||||||||||||||||
70 | Competing without Fighting: China's Strategy of Political Warfare | Seth G. Jones , Emily Harding , Catrina Doxsee , Jake Harrington , and Riley McCabe | August 2, 2023 | Center for Strategic & International Studies | https://csis-website-prod.s3.amazonaws.com/s3fs-public/2023-08/230802_Jones_CompetingwithoutFighting.pdf?VersionId=Zb5B2Le0lf0kk7.QH7E0meA9phGqQEZf | Political Warfare | China | x | |||||||||||||||||||
71 | Using Unclassified U.S. Government Reporting in America’s Global Battles of Influence | Anthony H. Cordesman | September 6, 2023 | Center for Strategic & International Studies | https://csis-website-prod.s3.amazonaws.com/s3fs-public/2023-09/230906_Cordesman_Gov_Reporting.pdf?VersionId=TdJXKY2Nut8Kto7woYrFAs_bUW38hAga | | United States | x | |||||||||||||||||||
72 | Winning Without Fighting: Chinese and Russian Political Warfare Campaigns and How the West Can Prevail – Volume 1 | Ross Babbage | July 24, 2019 | Center for Strategic and Budgetary Assessments | https://csbaonline.org/uploads/documents/Winning_Without_Fighting_Final.pdf | Political Warfare | | x | |||||||||||||||||||
73 | Winning Without Fighting: Chinese and Russian Political Warfare Campaigns and How the West Can Prevail - Volume II: Case Studies | Ross Babbage | July 24, 2019 | Center for Strategic and Budgetary Assessments | https://csbaonline.org/uploads/documents/Winning_Without_Fighting_Annex_Final2.pdf | Political Warfare | | ||||||||||||||||||||
74 | Influence Operations and the Human Domain | Thomas M. Scanzillo and Edward M. Lopacienski | 3-2015 | Center on Irregular Warfare & Armed Groups | https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1013&context=ciwag-case-studies | Influence Operations | | x | |||||||||||||||||||
75 | Totalitarian Insurgency: Evaluating the Islamic State’s In-Theater Propaganda Operations | Charlie Winter | 4-2017 | Center on Irregular Warfare & Armed Groups | https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1014&context=ciwag-case-studies | Propaganda | Islamic State | x | |||||||||||||||||||
76 | Russian ‘Active Measures’ | John Sipher | June 2018 | Centre for Historical Analysis and Conflict Research | https://chacr.org.uk/wp-content/uploads/2020/01/20180701_Issue14_CHACR_GAP_Briefing_Russian_Active_Measures.pdf | Active Measures | Russia | x | |||||||||||||||||||
77 | Russia, Religion and Soft Power | Eppie Parker | June 2020 | Centre for Historical Analysis and Conflict Research | https://chacr.org.uk/wp-content/uploads/2020/06/CHACR_Briefing_Russia_Religion_June_2020.pdf | | Russia | x | |||||||||||||||||||
78 | Infektion’s Evolution: Digital Technologies and Narrative Laundering | Darren Linvill and Patrick Warren | December 2023 | Clemson University - Media Forensics Hub | https://tigerprints.clemson.edu/cgi/viewcontent.cgi?article=1002&context=mfh_reports | Disinformation | Russia | x | |||||||||||||||||||
79 | Evidence-Based Techniques for Countering Mis-/Dis-/Mal-Information: A Primer | Megan K. McBride, Pamela G. Faber, Kaia Haney, Patricia J. Kannapel, Samuel Plapinger | May 2023 | CNA | https://www.cna.org/reports/2024/03/Evidence-Based-Techniques-for-Countering-Mis-Dis-Mal-Information.pdf | Disinformation | | x | |||||||||||||||||||
80 | Mobilizing Compatriots: Russia’s Strategy, Tactics, and Influence in the Former Soviet Union | Vera Zakem, Paul Saunders, and Daniel Antoun | November 2015 | CNA | https://www.cna.org/archive/CNA_Files/pdf/dop-2015-u-011689-1rev.pdf | Political Warfare | Russia | x | |||||||||||||||||||
81 | Mapping Russian Media Network: Media’s Role in Russian Foreign Policy and Decision-making | Vera Zakem, Paul Saunders, Umida Hashimova, and P. Kathleen Hammerberg | January 2018 | CNA | https://www.cna.org/archive/CNA_Files/pdf/drm-2017-u-015367-3rev.pdf | | Russia | ||||||||||||||||||||
82 | Mapping the Information Environment in the Pacific Island Countries: Disruptors, Deficits, and Decisions | Lauren Dickey, Erica Downs, Andrew Taffer, Heidi Holz, Drew Thompson, S. Bilal Hyder, Ryan Loomis, Anthony Miller | December 2019 | CNA | https://www.cna.org/reports/2019/12/IRM-2019-U-019755-Final.pdf | | China | ||||||||||||||||||||
83 | Black and White and Red All Over: China’s Improving Foreign-Directed Media | Elizabeth Bachman, James Bellacqua | August 2020 | CNA | https://www.cna.org/reports/2020/08/DRM-2020-U-027331-1Rev.pdf | | China | ||||||||||||||||||||
84 | Social Media Bots: Laws, Regulations, and Platform Policies | Kasey Stricklin, Megan K McBride | September 2020 | CNA | https://www.cna.org/reports/2020/10/DIM-2020-U-028193-Final.pdf | Social Media | | ||||||||||||||||||||
85 | Social Media Bots: Implications for Special Operations Forces | Megan K. McBride, Zack Gold, Kasey Stricklin | September 2020 | CNA | https://www.cna.org/reports/2020/09/DRM-2020-U-028199-Final.pdf | Social Media | | ||||||||||||||||||||
86 | Telling China’s COVID-19 Story Well: Beijing’s Efforts to Control Information and Shape Public Narratives Regarding the 2020 Global Pandemic | Josiah Case | December 2020 | CNA | https://www.cna.org/reports/2020/12/DRM-2020-U-028558-Final.pdf | Narrative | China | ||||||||||||||||||||
87 | The Psychology of (Dis)information: Case Studies and Implications | Megan McBride, Heather Wolters, Kaia Haney, William Rosenau | October 2021 | CNA | https://www.cna.org/reports/2021/10/The-Psychology-of-%28Dis%29information-Case-Studies-and-Implications.pdf | Disinformation | | ||||||||||||||||||||
88 | The Psychology of (Dis)information: A Primer on Key Psychological Mechanisms | Heather Wolters, Kasey Stricklin, Neil Carey, Megan K. McBride | September 2021 | CNA | https://www.cna.org/reports/2021/10/The%20Psychology-of-%28Dis%29information-A-Primer-on-Key-Psychological-Mechanisms.pdf | Disinformation | | ||||||||||||||||||||
89 | China’s Playbook for Shaping the Global Media Environment | Heidi Holz with Anthony Miller | February 2020 | CNA | https://www.cna.org/reports/2020/02/IRM-2020-U-024710-Final.pdf | | China | ||||||||||||||||||||
90 | Exploring the Utility of Memes for U.S. Government Influence Campaigns | Vera Zakem, Megan K. McBride, Kate Hammerberg | April 2018 | CNA | https://www.cna.org/archive/CNA_Files/pdf/drm-2018-u-017433-final.pdf | Memetics | United States | x | |||||||||||||||||||
91 | Propaganda: An Instrument of Foreign Policy | Richard T. Newman | Vol. 5, No. 2, SPRING 1951 | Columbia Journal of International Affairs | https://www.jstor.org/stable/24354541 | Propaganda | | x | |||||||||||||||||||
92 | History as a propaganda tool in Putin’s Russia | Miguel Vázquez Liñán | Volume 43, Issue 2, June 2010 | Communist and Post-Communist Studies | https://www.sciencedirect.com/science/article/abs/pii/S0967067X10000206 | Propaganda | Russia | x | |||||||||||||||||||
93 | Russia’s influence operations in the Czech Republic during the radar debate | Michaela Dodge | Volume 39, 2020 - Issue 2 | Comparative Strategy | https://www.tandfonline.com/doi/full/10.1080/01495933.2020.1718989 | Influence Operations | Russia | x | |||||||||||||||||||
94 | Beyond Propaganda: Soviet Active Measures in Putin’s Russia | Steve Abrams | 15, no. 1 (2016) | Connections: The Quarterly Journal | https://connections-qj.org/article/beyond-propaganda-soviet-active-measures-putins-russia | Active Measures | Russia | x | |||||||||||||||||||
95 | Media Matters: How Operation Shujaa Degraded the Islamic State’s Congolese Propaganda Output | CALEB WEISS, RYAN O’FARRELL | MARCH 2024, VOLUME 17, ISSUE 3 | CTC Sentinel | https://ctc.westpoint.edu/media-matters-how-operation-shujaa-degraded-the-islamic-states-congolese-propaganda-output/ | Propaganda | Islamic State | x | |||||||||||||||||||
96 | The Online Frontline: Decoding al-Shabaab’s Social Media Strategy | GEORGIA GILROY | JANUARY 2024, VOLUME 17, ISSUE 1 | CTC Sentinel | https://ctc.westpoint.edu/the-online-frontline-decoding-al-shabaabs-social-media-strategy/ | Social Media | al Qaeda | x | |||||||||||||||||||
97 | The Islamic State Somalia Propaganda Coalition’s Regional Language Push | LUCAS WEBBER, DANIELE GAROFALO | APRIL 2023, VOLUME 16, ISSUE 4 | CTC Sentinel | https://ctc.westpoint.edu/the-islamic-state-somalia-propaganda-coalitions-regional-language-push/ | Propaganda | Islamic State | x | |||||||||||||||||||
98 | Iran’s COVID-19 Disinformation Campaign | MARK DUBOWITZ, SAEED GHASSEMINEJAD | JUNE 2020, VOLUME 13, ISSUE 6 | CTC Sentinel | https://ctc.westpoint.edu/irans-covid-19-disinformation-campaign/ | Disinformation | Iran | x | |||||||||||||||||||
99 | Addressing the Enemy: Al-Shabaab’s PSYOPS Media Warfare | CHRISTOPHER ANZALONE | MARCH 2020, VOLUME 13, ISSUE 3 | CTC Sentinel | https://ctc.westpoint.edu/addressing-enemy-al-shabaabs-psyops-media-warfare/ | PSYOP | al Qaeda | x | |||||||||||||||||||
100 | Selling the Long War: Islamic State Propaganda after the Caliphate | MICHAEL MUNOZ | NOVEMBER 2018, VOLUME 11, ISSUE 10 | CTC Sentinel | https://ctc.westpoint.edu/selling-long-war-islamic-state-propaganda-caliphate/ | | | x |