The Future of American Defense Policy

Total Page:16

File Type:pdf, Size:1020Kb

The Future of American Defense Policy SPECIAL BIBLIOGRAPHY NO. 121 SERIES The Future of American Defense Policy October 2018 SPECIAL BIBLIOGRAPHY NO. 121 SERIES INTRODUCTION This Special Bibliography Series, Number 121, “The Future of American Defense Policy” was developed by the McDermott Library’s Social Sciences Bibliographer and Reference Librarian, Frances K. Scott, in support of the 60th Academy Assembly to be held at the United States Air Force Academy, 16-17 October 2018. Most items cited in the bibliography are included in the McDermott Library’s collections, including on-line databases. This year’s topic encompasses three components. A brief summary includes examining major technological and societal changes formulating foreign policy. The breakdown is three different panels each discussing a specific topical area and how each has produced challenges and opportunities to the US: Interstate: Panel exploring how advancements in technologies along three-four areas (e.g. changes in cyber, space, missiles, and RPA). Intrastate: Panel exploring how changes in technologies empower three-four actors (e.g. changes in technology that empower terrorists, NGO, and MNCs). Domestic: Panel exploring how changes in American society (e.g. the turn to the private contractor, the rise of the female warrior, the recognition of transgender service, and the widening civilian-military gap). If you are a participant in this year’s Academy Assembly (the Academy’s oldest continuing annual event), we welcome you to your United States Air Force Academy. Hopefully your stay in the Colorado Springs area will be rewarding and this year’s topic intellectually challenging. HQ USAFA/DFLIB-REF Attn: Ms. Frances K. Scott Social Sciences Bibliographer 2354 Fairchild Drive, Ste 3B4 USAF Academy CO 80840-6214 Email: [email protected] Comments about this year’s bibliography or other library programs should be sent to the address above. DAVID A. SCHAFFTER Director (Interim), McDermott Library October 2018 TABLE OF CONTENTS I. INTERSTATE: FUTURE OF AMERICAN FOREIGN POLICY.……………………………………. 1 At the interstate level we will have a panel that will explore how advancements in technologies along three-four areas (e.g. changes in cyber, space, missiles, and RPA) have produced challenges and opportunities to The US as she as she formulates her defense policy. II. INTRASTATE: FUTURE OF AMERICAN FOREIGN POLICY…..…….……………………..……... 5 At the intrastate (Cosmopolitan) level we will have a panel that will explore how changes in technologies empower three-four actors (e.g. changes in technology that empower terrorists, NGO, and MNCs) have produced challenges and opportunities for the US as she formulates her defense policy. III. DOMESTIC: FUTURE OF AMERICAN FOREIGN POLICY..….….…………………………….. 13 At the domestic level we will have a panel that will explore how changes in American society (e.g. the turn to the private contractor, the rise of the female warrior, the recognition of transgender service, and the widening civilian-military gap) have produced challenges and opportunities for the US as she formulates her defense policy. INTERSTATE: FUTURE DEFENSE POLICY Books, Report Literature, and Government Documents Arieff, Alexis. Crisis in Mali. CRS Report for Congress R42664. Washington/D.C: Congressional Research Service, 2013. (R42664) Bergen, Peter L., and Daniel Rothenberg, eds. Drone Wars: Transforming Conflict, Law, and Policy. New York: Cambridge University Press, 2015. (KZ 6687 .D76 2015) Breznitz, Dan, and Michael Murphree. The Run of the Red Queen: Government, Innovation, Globalization, and Economic Growth in China. New Haven: Yale UP, 2011. Coker, Christopher. Warrior Geeks: How 21st-Centurytechnology Is Changing the Way We Fight and Think About War. Oxford: Oxford University Press, 2013. (U 39 .C63 2013b) Jacobsen, Annie. The Pentagon's Brain: An Uncensored History of Darpa, America's Top Secret Military Research Agency. 1st ed. New York: Little, Brown and Company, 2015. (U 394 .A75 J33 2015) Kreuzer, Michael P. Drones and the Future of Air Warfare the Evolution of Remotely Piloted Aircraft. London; New York: Routledge, 2016. https://ebookcentral.proquest.com/lib/usafmcdermott/detail.action?docID=4533526. Larson, Eric V., et al. Assessing Irregular Warfare: A Framework for Intelligence Analysis. 1st ed. Santa Monica: RAND, 2009. https://search.ebscohost.com/login.aspx?direct=true&db=edsjbk&AN=edsjbk.mg668a&site=eds- live&scope=site Nerguizian, Aram. The Military Balance in a Shattered Levant: Conventional Forces, Asymmetric Warfare & the Struggle for Syria. Washington DC: Center for Strategic and International Studies, 2015. http://csis.org/files/publication/150615_Nerguizian_Levant_Mil_Bal_Report_w_cover_v2.pdf United States. Congress. House. Committee on Foreign Affairs. Cyber War: Definitions, Deterrence, and Foreign Policy. Hearing. 114 Cong., 1st sess., 30 Sep 2015. Washington: GPO, 2015. (Gov Doc Y 4.F 76/1:114-106) United States. House of Representatives. Committee on Foreign Affairs. Subcommittee on the Middle East and North Africa. Regional Impact of U.S. Policy towards Iraq and Syria. Hearing. 114th Cong. 1st sess. Washington DC: GPO, 2015. https://www.gpo.gov/fdsys/pkg/CHRG-114hhrg94389/pdf/CHRG-114hhrg94389.pdf Whittle, Richard. Predator: The Secret Origins of the Drone Revolution. 1st ed. New York: Henry Holt, 2014. (UGH 2178 .W62 2014) 1 JOURNALS "The Battle for Digital Supremacy: America V. China." Economist 426, no. 9083 (17 March 2018): 1. https://search.ebscohost.com/login.aspx?direct=true&db=edsbig&AN=edsbig.A531093038&site =eds-live&scope=site. Borum, Randy, et al. "Strategic Cyber Intelligence." Information Management & Computer Security 23, no. 3 (August 2015): 16. https://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=103180969&site=eds- live&scope=site. Cimbala, Stephen J. "Deal Breakers or Speed Bumps? Missile Defenses and Russian-American Nuclear Arms Control." Journal of Slavic Military Studies 31, no. 1 (January-March 2018): 13. https://search.ebscohost.com/login.aspx?direct=true&db=hia&AN=127893631&site=eds- live&scope=site. Cimbala, Stephen J. "The Trump Nuclear Posture Review: Three Issues, Nine Implications." Strategic Studies Quarterly 12, no. 2 (Summer 2018): 8. https://search.ebscohost.com/login.aspx?direct=true&db=edsjsr&AN=edsjsr.26430814&site=eds- live&scope=site http://www.airuniversity.af.mil/Portals/10/SSQ/documents/Volume-12_Issue- 2/Cimbala.pdf. Costigan Sean S, and Gustav Lindstrom. "Policy and the Internet of Things." Connections 15, no. 2 (2016): 10. https://search.ebscohost.com/login.aspx?direct=true&db=edsjsr&AN=edsjsr.26326436&site=eds- live&scope=site. Davenport, Kelsey. "U.S., North Korea Jockey over Missile Tests." Arms Control Today 47, no. 7 (September 2017): 2. https://search.ebscohost.com/login.aspx?direct=true&db=edsgao&AN=edsgcl.509015000&site=e ds-live&scope=site. DeGering, Randall. "What Is NORAD's Role in Military Cyber Attack Warning?" Homeland Security Affairs 12 (December 2016): 24. https://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=121036115&site=eds- live&scope=site. DeWees, Brad. "Modern Solution, Ancient Problem: Measuring Military Effectiveness in the Age of Artificial Intelligence." War on the Rocks (09 July 2018). https://warontherocks.com/2018/07/modern-solution-ancient-problem-measuring-military- effectiveness-in-the-age-of-artificial-intelligence/. Gartzke, Erik, and Jon R. Lindsay. "Thermonuclear Cyberwar." Journal of Cybersecurity 3, no. 1 (March 2017): 12. https://academic.oup.com/cybersecurity/article/3/1/37/2996537. Gross, Michael L., Daphna Canetti, and Dana R. Vashdi. "Cyberterrorism: Its Effects on Psychological Well-Being, Public Confidence and Political Attitudes." Journal of Cybersecurity 3, no. 1 (01 March 2017): 10. https://academic.oup.com/cybersecurity/article/3/1/49/2999135. 2 Gürer, Cüneyt. "Presenting a Strategic Model to Understand Spillover Effects of Isis Terrorism." Connections 16, no. 2 (2017): 18. https://search.ebscohost.com/login.aspx?direct=true&db=edsjsr&AN=edsjsr.26326480&site=eds- live&scope=site. Heinl Caitríona H. "Regional Cybersecurity: Moving toward a Resilient ASEAN Cybersecurity Regime." Asia Policy 18 (2014): 30. https://search.ebscohost.com/login.aspx?direct=true&db=edsjsr&AN=edsjsr.24905282&site=eds- live&scope=site. Hartley, Keith. "The Economics of Smart Defense." Connections 12, no. 3 (Summer 2013): 9. https://search.ebscohost.com/login.aspx?direct=true&db=edsjsr&AN=edsjsr.26326329&site=eds- live&scope=site. Judson Jen, author. "War College Ponders Service's Future in Bm: Army's Role in Ballistic Missile Defense Set to Expand Along with Costs." Inside Missile Defense 19, no. 13 (2013): 11. https://search.ebscohost.com/login.aspx?direct=true&db=edsjsr&AN=edsjsr.24788007&site=eds- live&scope=site. Kai Hu, et al. "A Scientometric Visualization Analysis for Night-Time Light Remote Sensing Research from 1991 to 2016." Remote Sensing 9, no. 8 (August 2017): 30. https://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=124868656&site=eds- live&scope=site. Kehler, C. Robert, Herbert Lin, and Michael Sulmeyer. "Rules of Engagement for Cyberspace Operations: A View from the USA." Journal of Cybersecurity 3, no. 1 (01 March 2017): 12. Knowles, J. "Multi-Domain Operations (the View from Here)." Journal of Electronic Defense 39, no. 11 (November 2016): 1. https://search.ebscohost.com/login.aspx?direct=true&db=edsbig&AN=edsbig.A472312875&site =eds-live&scope=site. Kostyuk Nadiya, et al. "Determinants of the Cyber Escalation Ladder." The Cyber Defense Review 1 (2018). https://search.ebscohost.com/login.aspx?direct=true&db=edsjsr&AN=edsjsr.26427380&site=eds-
Recommended publications
  • Considering the Planks of U.S. International Cyber Policy, 2005-2011
    JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY FROM TUNIS TO TUNIS: CONSIDERING THE PLANKS OF U.S. INTERNATIONAL CYBER POLICY, 2005–2011 BY CHRISTOPHER BRONK, PH.D. FELLOW IN INFORMATION TECHNOLOGY POLICY JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY MAY 21, 2012 Considering the Planks of U.S. International Cyber Policy THESE PAPERS WERE WRITTEN BY A RESEARCHER (OR RESEARCHERS) WHO PARTICIPATED IN A BAKER INSTITUTE RESEARCH PROJECT. WHEREVER FEASIBLE, THESE PAPERS ARE REVIEWED BY OUTSIDE EXPERTS BEFORE THEY ARE RELEASED. HOWEVER, THE RESEARCH AND VIEWS EXPRESSED IN THESE PAPERS ARE THOSE OF THE INDIVIDUAL RESEARCHER(S), AND DO NOT NECESSARILY REPRESENT THE VIEWS OF THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY. © 2012 BY THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY OF RICE UNIVERSITY THIS MATERIAL MAY BE QUOTED OR REPRODUCED WITHOUT PRIOR PERMISSION, PROVIDED APPROPRIATE CREDIT IS GIVEN TO THE AUTHOR AND THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY. 2 Considering the Planks of U.S. International Cyber Policy Abstract How have U.S. policies on the governance of the Internet and cyberspace evolved between the 2005 World Summit of the Information Society (WSIS) in Tunisia and the massive, cyber-fueled uprisings in the Middle East of 2011? The paper develops a framework of possible actions regarding Internet or cyber governance to produce contexts for the timeline of significant policy statements by U.S. government officials and agencies on the topic. In the resulting narrative, Internet governance policy rises from a relatively marginal issue for the foreign policy establishment to a significant component of U.S.
    [Show full text]
  • Purveying Fake News
    1 GOVERNANCE IN AN EMERGING NEW WORLD Convened by George P. Shultz with James Cunningham, David Fedor, and James Timbie Table of Contents FALL SERIES, ISSUE 318 Introduction ..........................................................................................................................................................................5 What Is to Be Done? Safeguarding Democratic Governance in the Age of Network Platforms Niall Ferguson ................................................................................................................................................................................................8 Protecting Democracy in an Era of Cyber Information War Joseph S. Nye ..............................................................................................................................................................................................37 Observations from the Roundtable ................................................................................................................................. 47 GOVERNANCE IN AN EMERGING NEW WORLD The Information Challenge to Democracy A Letter from the Conveners Sharp changes are afoot throughout the globe. Demographics are shifting, technology is advancing at unprecedented rates, and these changes are being felt everywhere. How should we develop strategies to deal with this emerging new world? We can begin by understanding it. First, there is the changing composition of the world population, which will have a profound impact on societies. Developed
    [Show full text]
  • Jared Cohen Former Advisor to the Secretary of State / Author / Director, Google Ideas
    JARED COHEN FORMER ADVISOR TO THE SECRETARY OF STATE / AUTHOR / DIRECTOR, GOOGLE IDEAS Jared Cohen is an expert on international security, global political dynamics, and the impact of technology. He is politically transcendent and has served as a close advisor to both Secretaries of State Condoleezza Rice and Hillary Clinton. In these roles, he helped architect the vision of "21st century statecraft" and key foreign policy initiatives and strategies related to counter-terrorism, the Middle East, and how to address a growing youth bulge around the world. In addition to being the youngest member of the Secretary of State's Policy Planning Staff ever appointed, Cohen is also a two-time recipient of the Secretary of State's Meritorious Honor Award, earning this distinguished honor in both the Bush and Obama administrations. He was selected by the Huffington Post as one of its "Top 100 Game Changers," and by social enterprise Devex as one of its "40 Under 40." Recently, he was named by Vanity Fair as part of their 2011 The Next Establishment, which recognizes rising talent in technology, media, policy, and business. He has traveled extensively to more than 70 countries around the world and has conducted in-depth research in some of the world's most volatile regions: Iran, Iraq, Syria, Lebanon, South Asia, and Africa to name a few. Cohen has the rare experience of having actually interviewed militants ranging from Hezbollah to Al-Qaeda. He received his BA from Stanford University and his M.Phil in International Relations where he studied as a Rhodes Scholar.
    [Show full text]
  • Foreign Affairs Yuri Van Hoef
    www.rug.nl/research/MHIR-journalreview American internationalism based on American interests A Critical Review of Foreign Affairs Yuri van Hoef This review is part of the Journal Review project of the research-master Modern History and International Relations (MHIR) at the University of Groningen. For more information, visit www.rug.nl/research/MHIR-journalreview © 2013 the author and the University of Groningen. All rights reserved. www.rug.nl/research/MHIR-journalreview “Public opinion must be led along the right path… That is the job of a few men in real contact with the facts.” The unfortunate British Lionel Curtis, who would not become a member of the soon to be founded Council on Foreign Relations, Paris, 1919.1 1 Robert D. Schulzinger, The Wise Men of Foreign Affairs. The History of the Council on Foreign Relations (New York 1984) 4. www.rug.nl/research/MHIR-journalreview Contents Introduction ................................................................................................................................ 1 1. Analyzing the themes ............................................................................................................. 5 1.1 The threat of China and Russia ........................................................................................ 6 1.2 The Axis of Evil ............................................................................................................... 8 1.3 Nonproliferation ..............................................................................................................
    [Show full text]
  • Inside Russia's Social Media War on America
    Illustration by Ben Wiseman for TIME HACKING Inside Russia’s Social Media War on America Massimo Calabresi May 17, 2017 n March 2, a disturbing report hit the desks of U.S. counterintelligence ofcials in Washington. For months, American spy hunters had scrambled to uncover O details of Russia's inuence operation against the 2016 presidential election. In ofces in both D.C. and suburban Virginia, they had created massive wall charts to track the different players in Russia's multipronged scheme. But the report in early March was something new. It described how Russia had already moved on from the rudimentary email hacks against politicians it had used in 2016. Now the Russians were running a more sophisticated hack on Twitter. The report said the Russians had sent expertly tailored messages carrying malware to more than 10,000 Twitter users in the Defense Department. Depending on the interests of the targets, the messages offered links to stories on recent sporting events or the Oscars, which had taken place the previous weekend. When clicked, the links took users to a Russian-controlled server that downloaded a program allowing Moscow's hackers to take control of the victim's phone or computer--and Twitter account. As they scrambled to contain the damage from the hack and regain control of any compromised devices, the spy hunters realized they faced a new kind of threat. In 2016, Russia had used thousands of covert human agents and robot computer programs to spread disinformation referencing the stolen campaign emails of Hillary Clinton, amplifying their effect.
    [Show full text]
  • SECURING CYBERSPACE a New Domain for National Security
    SECURING CYBERSPACE A New Domain for National Security FOREWORD BY JOSEPH S. NYE & BRENT SCOWCROFT EDITED BY NICHOLAS BURNS & JONATHON PRICE Copyright © 2012 by The Aspen Institute The Aspen Institute One Dupont Circle, N.W. Suite 700 Washington, DC 20036 Published in the United States of America in 2012 by The Aspen Institute All rights reserved Printed in the United States of America ISBN: 0-89843-562-5 Wye Publication Number: 12/001 Cover Design by: Steve Johnson Interior Layout by: Sogand Sepassi aspen strategy group CO-CHAIRMEN Graham Allison Director, Belfer Center Joseph S. Nye, Jr. John F. Kennedy School of Government University Distinguished Service Professor Harvard University John F. Kennedy School of Government Harvard University Zoë Baird Budinger President Brent Scowcroft Markle Foundation President The Scowcroft Group, Inc. Samuel R. Berger Chair Albright Stonebridge Group DIRECTOR Stephen E. Biegun Nicholas Burns Vice President Professor of the Practice of Diplomacy Ford Motor Company and International Politics John F. Kennedy School of Government Robert D. Blackwill Harvard University Henry A. Kissinger Senior Fellow for U.S. Foreign Policy Council on Foreign Relations DEPUTY DIRECTOR Eliot Cohen Jonathon Price Professor Deputy Director Johns Hopkins SAIS Aspen Strategy Group Susan Collins Senator ASSOCIATE DIRECTOR United States Senate Jennifer Jun Richard Cooper Associate Director Professor Aspen Strategy Group Harvard University Richard Danzig Chairman MEMBERS Center for a New American Security Madeleine Albright John Deutch Chair Institute Professor Albright Stonebridge Group Massachusetts Institute of Technology Richard Falkenrath Richard G. Lugar Principal Senator The Chertoff Group United States Senate Peter Feaver Leo Mackay Professor Vice President Duke University Ethics & Business Conduct Lockheed Martin Corporation Dianne Feinstein Senator Jessica T.
    [Show full text]
  • The Future of US Policy Toward China: Recommendations for the Biden Administration
    A PRODUCT OF THE NOVEMBER 2020 COLLABORATION BETWEEN BROOKINGS FOREIGN POLICY’S JOHN L. THORNTON CHINA CENTER AND YALE LAW SCHOOL’S PAUL TSAI CHINA CENTER THE FUTURE OF US POLICY TOWARD CHINA Recommendations for the Biden administration EDITED BY RYAN HASS, RYAN MCELVEEN, AND ROBERT D. WILLIAMS TABLE OF CONTENTS Foreword Ryan Hass and Robert D. Williams ...........................................................i Introduction “Meeting the China challenge: A strategic competitor, not an enemy,” by Jeff Bader, Senior Fellow, John L. Thornton China Center, The Brookings Institution ......................1 Section I: Bilateral diplomacy and working with allies “Avoiding three traps in confronting China’s party-state,” by Cheng Li, Director and Senior Fellow, John L. Thornton China Center, The Brookings Institution ...........8 “Designing a new diplomatic framework for dealing with China,” by Ryan Hass, Michael H. Armacost Chair and Fellow, John L. Thornton China Center, The Brookings Institution ..........15 “Working with our (European) allies,” by Paul Gewirtz, Potter Stewart Professor of Constitutional Law and Director, Paul Tsai China Center, Yale Law School ....................20 “Developing a new US approach to China and COVID-19,” by Thomas J. Christensen, Nonresident Senior Fellow, John L. Thornton China Center, The Brookings Institution; Professor and Director, China and the World Program, Columbia University. 26 “Rebooting US-China climate engagement,” by Todd Stern, Nonresident Senior Fellow, Energy Security and Climate Initiative,
    [Show full text]
  • The Role of Twitter in the First Week of Ferguson Unrests in August 2014
    Social Communication 39 Volume 1 (2018), pp. 39-47 DOI: 10.2478/sc-2018-0005 THE ROLE OF TWITTER IN THE FIRST WEEK OF FERGUSON UNRESTS IN AUGUST 2014. Marcin Balon1 Abstract The purpose of this article is find out about the role that was played by Twitter during the first week of Ferguson Unrests that started on the 9th of August 2014. As a source base for this work the author analyzes the newspapers, magazine journalism and articles upon the death of Michael Brown to show how local journalists and activists used Twitter to communicate and comment on his death. Through the examination of hashtag usage, the author demonstrates how Twitter has become a powerful tool to start nationwide discussion, as well as how hashtag activism can trigger creation of a new social movement. Key words: Twitter, hashtag, civil journalism, social movement Introduction The objective of the article is to demonstrate, through analysis of the role that was played by Twitter in the first week of Ferguson Unrests, how powerful tool Twitter has become. In this article the author wants to verify the statement that activists commonly used Twitter as an instrument to communicate and organize the protests. Through the examination and analysis of various articles the author shows how Twitter has become a mighty weapon of civil journalism, as well as that “hashtag activism” can trigger the creation of a new social movement. As a source base for this work the author analyzes the newspapers, magazine journalism and articles from the moment of the death of Mi- chael Brown.
    [Show full text]
  • Egyptcasestudy 10-3-11 Format JT FNL MP
    Strategic Public Diplomacy: The Case of Egypt A Case Study of the Strategic Public Diplomacy Project | October 2011 Ambassador James K. Glassman and Secretary Dan Glickman, co-chairs ABOUT BPC Founded in 2007 by former Senator Majority Leaders Howard Baker, Tom Daschle, Bob Dole and George Mitchell, Bipartisan Policy Center (BPC) is a non-profit organization that drives principled solutions through rigorous analysis, reasoned negotiation and respectful dialogue. With projects in multiple issue areas, BPC combines politically balanced policymaking with strong, proactive advocacy and outreach. DISCLAIMER This white paper is the product of Bipartisan Policy Center’s National Security Project. The findings and recommendations expressed herein do not necessarily represent the views or opinions of Bipartisan Policy Center, its founders, or its board of directors. Strategic Public Diplomacy: The Case of Egypt | 2 The pace and intensity of world events in 2011 have been unrelenting. The spread of political unrest across the Middle East, global financial crises, conflicts and natural disasters have all competed for the attention of policymakers. Achieving the perspective to recognize pivotal moments and seize transformative opportunities can be difficult in the midst of such upheaval. We have joined together to issue these papers to call attention to precisely such an opportunity: the ongoing revolution in Egypt. The public uprisings that brought Hosni Mubarak’s reign to an end could have a greater impact on the political landscape of the Middle East than any other protest in the region to date. What is not yet clear is the nature of the change they will spark. Egypt’s revolution is as yet unfinished; it could still lead towards a pluralist and tolerant democracy but, as of this writing, renewed military rule, an Islamist state or rising chaos all seem more likely.
    [Show full text]
  • Vistology Fusion 2011
    Toward Formal Reasoning with Epistemic Policies about Information Quality in the Twittersphere Brian Ulicny Mieczyslaw M. Kokar VIStology, Inc Department of Electrical and Computer Framingham, MA, U.S.A. Engineering [email protected] Northeastern University Boston, MA, USA [email protected] Abstract – Some recent systems have had success in ‘@’. Users can annotate a message by topic with a producing an accurate awareness of situations by hashtag: a folksonomy term prepended with ‘#’. Users mining traffic in Twitter. Where these systems have can subscribe to the messages of other users by following been successful, there has been no issue of evaluating them. Users can send private messages to someone who Twitter streams for source reliability and information follows them by by prefixing their message with ‘DM’ credibility because the situations have not been (direct message) and the username. Users typically adversarial. Recent uses of Twitter in political dissent in shorten URLs in their tweets via various services (e.g. the Mideast makes the need for computationally bit.ly) to maximize the 140-character message length. tractable approaches to evaluating source reliability and These shortened URLs are unique to the originating information credibility more acute in order to achieve message. Users can also retweet a message, indicating accurate situation awareness on the basis of Twitter whom it came from by simply prepending the message streams in the face of deliberate mis- or disinformation with ‘RT’ and the originators username. Users can efforts. automatically associate a geolocation with their message if their phone or other device supports this, and they turn Keywords: Twitter; soft data fusion; situation awareness; this option on.
    [Show full text]
  • T H E N E T D E L U S Io N E V G E N Y M O R O Zo V
    2/C PMS (BLACK + 809) SOFT-TOUCH MATTE LAMINATION + SPOT GLOSS THE NET DELUSION EVGENY MOROZOV POLITICS/TECHNOLOGY $27.95/$35.50 CAN “ Evgeny Morozov is wonderfully knowledgeable about the Internet—he seems “THE REVOLUTION WILL BE TWITTERED!” to have studied every use of it, or every political use, in every country in the declared journalist Andrew Sullivan after world (and to have read all the posts). And he is wonderfully sophisticated and protests erupted in Iran in June 2009. Yet for tough-minded about politics. This is a rare combination, and it makes for a all the talk about the democratizing power powerful argument against the latest versions of technological romanticism. of the Internet, regimes in Iran and China His book should be required reading for every political activist who hopes to are as stable and repressive as ever. In fact, ALEXANDER KRSTEVSKI ALEXANDER change the world on the Internet.” —MICHAEL WALZER, Institute for authoritarian governments are effectively Advanced Study, Princeton using the Internet to suppress free speech, EVGENY MOROZOV hone their surveillance techniques, dissem- is a contributing editor to Foreign Policy “ Evgeny Morozov has produced a rich survey of recent history that reminds us inate cutting-edge propaganda, and pacify and Boston Review and a Schwartz Fellow that everybody wants connectivity but also varying degrees of control over their populations with digital entertain- at the New American Foundation. Morozov content, and that connectivity on its own is a very poor predictor of political ment. Could the recent Western obsession is currently also a visiting scholar at Stan- pluralism...
    [Show full text]
  • Google Met Wikileaks Is the Transcript of the Discussion in Book Form
    BEYOND GOOD AND “DON’T BE EVIL” Eric Schmidt is an influential figure, even among the parade of powerful characters with whom I have had to cross paths since I founded WikiLeaks. In mid-May 2011 I was under house arrest in rural Norfolk, about three hours’ drive northeast of London. The crackdown against our work was in full swing and every wasted moment seemed like an eternity. It was hard to get my attention. But when my colleague Joseph Farrell told me the executive chairman of Google wanted to make an appointment with me, I was listening. In some ways the higher echelons of Google seemed more distant and obscure to me than the halls of Washington. We had been locking horns with senior US officials for years by that point. The mystique had worn off. But the power centers growing up in Silicon Valley were still opaque and I was suddenly conscious of an opportunity to understand and influence what was becoming the most influential company on earth. Schmidt had taken over as CEO of Google in 2001 and built it into an empire. I was intrigued that the mountain would come to Muhammad. But it was not until well after Schmidt and his companions had been and gone that I came to understand who had really visited me. *** The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas, an outfit that describes itself as Google’s in-house “think/do tank.” I knew little else about Cohen at the time.
    [Show full text]