Social Media: The Fifth Column in the Fifth Domain
The key question as representatives from Facebook, Twitter and Google testify Tuesday and Wednesday before Congress is not how Russia used social media to interfere […] More
The key question as representatives from Facebook, Twitter and Google testify Tuesday and Wednesday before Congress is not how Russia used social media to interfere […] More
Members of Congress have expressed deep concern over the Kremlin’s disinformation campaign in the 2016 election. They have even taken some action, most notably voting […] More
A bipartisan group of influential lawmakers is expected to introduce the Honest Ads Act this week, legislation that would seek to increase transparency in American […] More
U.S. immigration authorities will soon start to catalog social media handles from permanent residents and naturalized citizens. The new information requirements expand “categories of records […] More
As more details emerge about Kremlin influence and disinformation operations aimed at sowing discord and exploiting divisions in the United States, congressional investigators are taking […] More
Terrorist groups such as al Qaeda and ISIS have strategically disseminated propaganda that appeals to a wide variety of individuals. Although al Qaeda was the […] More
Just a few days away from the German federal election, a widely held opinion is that Germany has been spared from interference by Moscow. German […] More
Two top congressional Democrats said Facebook’s announcement it had discovered a Russian-funded campaign promoting divisive social and political messages demands a “very serious look” and […] More
Tradecraft. A term popularized in the novels of John le Carré, but practiced by spies throughout history. Tradecraft includes a number of methodologies, ranging from […] More
Intelligence officers must often use a false identity — a legend or cover. How has social media and digital technology changed how they create and […] More
Intelligence officers’ tradecraft is highly guarded for good reason. One of its most important aspects is establishing a cover identity so foreign governments and hostile […] More
The terrorist attacks that have swept the United Kingdom mark yet another chapter in the long war by violent Islamist extremists against the free world. […] More
ISIS has become infamous for using the Internet to radicalize and recruit individuals worldwide. Lesser known, however, are the tech-savvy ISIS supporters who dedicate their […] More
As people’s lives become more attached to the internet, cyber attacks will have more of an impact. One of the most pressing threats is the […] More
With the recent U.S. military raid in Yemen and the ongoing campaign in Mosul, the Trump Administration is so far continuing the United States’ longstanding […] More
For years, the easiest avenue to conduct a cyber attack against a business or an organization was social engineering attacks via emails. While still a […] More
Do Chinese authorities need more laws to surveil people? From the earliest days of the Chinese Communist Party, authorities have kept the closest of eyes […] More
Collaborating with the private sector remains “a work in progress” for the U.S. government and intelligence community, but prioritizing that effort is crucial to protecting […] More
Search