Cyberwar: Role of Non-State Actors

Total Page:16

File Type:pdf, Size:1020Kb

Cyberwar: Role of Non-State Actors CYBERWAR: ROLE OF NON-STATE ACTORS A Dissertation submitted to the Panjab University, Chandigarh for the award of Masters of Philosophy in Social Science, in partial fulfilment of the requirement for the Advanced Professional Programme in Public Administration By GS Sabherwal (Roll No 4531) Under the Guidance of Dr Surabhi Pandey 45th ADVANCED PROFESSIONAL PROGRAMME IN PUBLIC ADMINISTRATION (2019-20) INDIAN INSTITUTE OF PUBLIC ADMINISTRATION NEW DELHI i CERTIFICATE I have the pleasure to certify that Shri GS Sabherwal, has perceived his research work and prepared the present dissertation titled ‘Cyberwar: Role of Non-state Actors’, under my guidance and supervision. The dissertation is a result of his own work and to the best of my knowledge, no part of it has earlier comprised any other monograph, dissertation or book. This is being submitted to Panjab University, Chandigarh, for the degree of Masters of Philosophy in Social Sciences in partial fulfilment of the requirement for the Advanced Professional Programme in Public Administration of Indian Institute of Public Administration, New Delhi. I recommend that the dissertation of Shri GS Sabherwal is worthy of consideration for the award of M. Phil. degree of Panjab University. (Dr. Surabhi Pandey) Supervisor Indian Institute of Public Administration IP Estate, Ring Road New Delhi ii ACKNOWLEDGEMENT I am extremely grateful to my guide Dr. Surabhi Pandey for her invaluable guidance and constant encouragement during the course of the study. The dissertation in its present form has been possible only due to her painstaking efforts in going through the draft and making valuable suggestions/corrections. All through the study she guided me patiently, tirelessly and cheerfully. She has been extremely generous in giving preference to my dissertation work despite her extremely busy schedule. I extend my sincere thanks to Prof. G Bhattacharjee, Programme Director and Prof. Neetu Jain, Programmme Co-director, who are a constant source of encouragement during the course of the program. I am also thankful to the staff of APPPA office, specially Shri Manish Rawat who provided logistic support during the writing of this dissertation. Last but not the least, I am grateful to my wife Shabnam and my children Naina and Angad for their help, support and patience during the process of writing this dissertation and pursuing the program. (GS Sabherwal) (Roll No. 4531) 45th APPPA iii Table of Contents CERTIFICATE ............................................................................................................ i ACKNOWLEDGEMENT ........................................................................................... ii LIST OF FIGURES ..................................................................................................... v LIST OF TABLES ..................................................................................................... vi ABBREVIATIONS ................................................................................................... vii EXECUTIVE SUMMARY ....................................................................................... viii CHAPTER - 1 ....................................................................................................... 1 CYBERWAR : INTRODUCTION AND AN OVERVIEW ......................................... 1 1.1 Introduction ................................................................................................................................ 1 1.2 Statement of Research Problem................................................................................................. 2 1.3 Purpose or Objectives ................................................................................................................ 4 1.4 Rationale or Justification ............................................................................................................ 4 1.5 Research Design ......................................................................................................................... 7 1.6 Research Questions .................................................................................................................... 7 1.7 Scope of the Study ...................................................................................................................... 7 1.8 Methods to be Applied and Data Sources .................................................................................. 7 1.9 Chapter Scheme ......................................................................................................................... 7 CHAPTER - 2 ....................................................................................................... 9 LITERATURE REVIEW ............................................................................................ 9 CHAPTER - 3 ..................................................................................................... 14 CYBERWAR – ATTACKS, ATTACKERS, TECHNIQUES AND TOOLS .............. 14 3.1 Introduction .............................................................................................................................. 14 3.2 Cybercrime ............................................................................................................................... 14 3.3 Cyber-attack, Cyber-terrorism and Cyber-warfare ................................................................... 17 3.4 Types of Attacks ....................................................................................................................... 19 3.5 Types of Cybercrime Actors ...................................................................................................... 20 3.6 Types of Threats and Trends .................................................................................................... 23 3.7 Cybercrime Tools ...................................................................................................................... 24 CHAPTER - 4 ..................................................................................................... 32 CYBERWAR – CASE STUDIES .............................................................................. 32 4.1 Introduction .............................................................................................................................. 32 4.2 Case Studies .............................................................................................................................. 34 4.3 Olympic Games (a.k.a Stuxnet) ................................................................................................ 35 4.4 Ukrainian Power Grid ............................................................................................................... 39 4.5 Kosovo War .............................................................................................................................. 42 4.6 Russia-Georgia War .................................................................................................................. 45 4.7 Operation Cast Lead ................................................................................................................. 47 4.8 The Jasmine Revolution ............................................................................................................ 50 4.9 DuQu (1.0 & 2.0) ....................................................................................................................... 52 4.10 Operation Aurora ................................................................................................................... 54 4.11 Operation Orchard ................................................................................................................. 58 4.12 The Shamoon Attack I & II ...................................................................................................... 61 4.13 Russian hackers tracking Ukrainian artillery ........................................................................... 64 4.14 Sony Corp's Hollywood Studio Attack .................................................................................... 65 4.15 Attack on Estonian Government ............................................................................................ 67 4.16 Operation Dust Storm ............................................................................................................ 70 iv 4.17 Operation Anarchist ............................................................................................................... 72 4.18 Operation Buckshot Yankee ................................................................................................... 74 4.19 2016 US Elections ................................................................................................................... 76 4.20 Wannacry ............................................................................................................................... 78 4.21 Anonymous vs ISIS .................................................................................................................. 80 CHAPTER - 5 ..................................................................................................... 83 DATA ANALYSIS AND FINDINGS ......................................................................... 83 5.1 Employment of Non-State Actors: Reasons ............................................................................. 83 5.2 Role of Non-State Actors .........................................................................................................
Recommended publications
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Cyber Dissuasion
    N° 03/2012 recherches & documents mars 2012 Cyber Dissuasion Bruno gruselle Maître de recherche à la Fondation pour la Recherche Stratégique Bruno tertrais Maître de recherche à la Fondation pour la Recherche Stratégique alain esterle Chercheur associé à la Fondation pour la Recherche Stratégique w w w . frstrategie . o r g CYBER DISSUASION RECHERCHES & DOCUMENTS N ° 03/2012 Édité et diffusé par la Fondation pour la Recherche Stratégique 4 bis rue des Pâtures – 75016 PARIS ISSN : 1966-5156 ISBN : 978-2-911101-68-7 EAN : 9782911101687 WWW.FRSTRATEGIE.ORG 4 B I S RUE DES P ÂTURES 75 016 P ARIS TÉL. 01 43 13 77 77 FAX 0 1 43 13 77 78 SIRET 394 095 533 00045 TVA FR74 394 095 533 CODE APE 7220Z FONDATION RECONNUE D'UTILITÉ PUBLIQUE – DÉCRET DU 26 FÉVRIER 1993 SOMMAIRE INTRODUCTION ....................................................................................................................... 5 LES VULNERABILITES DE L’ESPACE NUMERIQUE ET LES RISQUES ASSOCIES SONT DEJA IMPORTANTS ET DEVRAIENT S ’AGGRAVER A L ’HORIZON 2020 ................................................... 9 Il est nécessaire d’établir le degré de gravité des risques numériques, les vulnérabilités exploitables et les perspectives de leur développement ................. 9 Les menaces pesant sur l’espace numérique ont d’ores et déjà des conséquences de sécurité importantes ...........................................................10 Les acteurs malveillants de l’espace numérique sont nombreux et leurs motivations appartiennent à des ensembles diversifiés ........................................14
    [Show full text]
  • The Question of State Sponsored Cyber Terrorism and Espionage Student Officer
    st th The Hague International Model United Nations Qatar 2020 | 21 ​ – 24 ​ of January 2020 ​ ​ ​ ​ ​ Forum: The Security Council Issue: The Question of State sponsored cyber terrorism and espionage Student Officer: Sebastian Santoni Position: President Introduction On the 27th of April 2007, Estonia experienced the first of a series of cyber attacks which would go on to shape laws, policies, and attitudes within and outside its borders. The country was bombarded by thousands of independent actors, resulting in the complete loss of most internet services for three weeks. The Estonian parliament, banks and media were all targeted in the midst of political disagreements with Russia. Although not the first incident of cyber terrorism, this was definitely one of the most destructive, managing to make an entire country go offline. In response, the world’s first ever regulations concerning actions in cyberspace were drafted, hoping to prevent such incidents from occurring in the future. However, incidents of cyber terrorism and espionage continued and remain a major threat to international security. Not only can they create mistrust and paranoia between nations, but also paralyse the organizations and resources core to their economic, social and political stability. This is especially true when such acts are initiated by countries and their related bodies, placing the world’s most sophisticated technology in the wrong hands. As members of the United Nations, it is the responsibility of countries to use their resources, voices and cooperation to strengthen international cyber security and work towards a world where state-sponsored cyber terrorism and espionage are void. Organizations such as the Kaspersky Lab and the Cooperative Cyber Defence Center of Excellence have made strides toward combating the issue, although they are restricted by an acute lack of relevant treaties and laws.
    [Show full text]
  • Purveying Fake News
    1 GOVERNANCE IN AN EMERGING NEW WORLD Convened by George P. Shultz with James Cunningham, David Fedor, and James Timbie Table of Contents FALL SERIES, ISSUE 318 Introduction ..........................................................................................................................................................................5 What Is to Be Done? Safeguarding Democratic Governance in the Age of Network Platforms Niall Ferguson ................................................................................................................................................................................................8 Protecting Democracy in an Era of Cyber Information War Joseph S. Nye ..............................................................................................................................................................................................37 Observations from the Roundtable ................................................................................................................................. 47 GOVERNANCE IN AN EMERGING NEW WORLD The Information Challenge to Democracy A Letter from the Conveners Sharp changes are afoot throughout the globe. Demographics are shifting, technology is advancing at unprecedented rates, and these changes are being felt everywhere. How should we develop strategies to deal with this emerging new world? We can begin by understanding it. First, there is the changing composition of the world population, which will have a profound impact on societies. Developed
    [Show full text]
  • Big Data in Organizations and the Role of Human Resource Management: a Complex Systems Theory- Based Conceptualization
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Scholz, Tobias M. Book — Published Version Big data in organizations and the role of human resource management: A complex systems theory- based conceptualization Personalmanagement und Organisation, No. 5 Provided in Cooperation with: Peter Lang International Academic Publishers Suggested Citation: Scholz, Tobias M. (2017) : Big data in organizations and the role of human resource management: A complex systems theory-based conceptualization, Personalmanagement und Organisation, No. 5, ISBN 978-3-631-71905-3, Peter Lang International Academic Publishers, Frankfurt a. M., http://dx.doi.org/10.3726/b10907 This Version is available at: http://hdl.handle.net/10419/182489 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence.
    [Show full text]
  • Pandaemonium Architecture Spring 2021
    Pandaemonium Architecture - Generative Algorithms, Machine Learning, Modeling and Simulation, ARGs, and Social Engineering for Artists Scott Benzel Spring 2021 Tuesdays 4-6:50 '...rituals of reversal..."rewire" the crucial connections in the social structure by providing symbolic statements of traditional social imperatives and basic categories of...world view.' Evon Z. Vogt, Rituals of Reversal as a Means of Rewiring Social Structure Pandaemonium Architecture was introduced at the 1958 Mechanisation of Thought Processes symposium as an early pattern recognition model. Named for the demon-inhabited city in Milton's Paradise Lost, the Pandaemonium Architecture assemblage employs 'demons' -bits of information or code- that 'scream' in order to ascend a hierarchy of algorithmic hurdles. The metaphorical implications were not lost on the early innovators of AI. Evon Vogt's Rituals of Reversal as a Means of Rewiring Social Structure examines the annual Highland Maya Zinacanteco rituals invoking the reversal of social, gender, and even species roles as a means of 'rewiring' the social structure of the community. Contemporary social structures are being radically 'rewired' with ever-increasing speed by largely invisible machine-learning algorithms and predictive processes. Netflix's, Amazon's, and Facebook's algorithms are the best-known examples of an increasingly pervasive methodology quietly remaking society. This course posits that artists employing machine learning, generative algorithms, predictive models and other technics can make art –employing these tools of what Deleuze labelled ‘The Societies of Control’- that is evocative, powerful, critical, and perhaps socially transformative. To this end the course examines the history, development and sociopolitics of Machine Learning and AI, including precomputational wargaming, cybernetics, game theory, neocybernetics, the so-called Californian Ideology, The Silicon Ideology, et al.
    [Show full text]
  • National Science Foundation Cri Workshop
    NATIONAL SCIENCE FOUNDATION Division of Computer and Network Systems CISE Computing Research Infrastructure CRI WORKSHOP SNOWBIRD UTAH JUNE 23-25, 2006 NATIONAL SCIENCE FOUNDATION Division of Computer and Network Systems CISE Computing Research Infrastructure CRI-WORKSHOP PROGRAM ORGANIZATION LOGISTICS Rita Rodriguez, CISE, NSF Dana Neill Steve Mahaney, CISE, NSF Computing Research Association Malek Adjouadi, FIU INVITED SPEAKERS Peter Freeman, Assistant Director CISE, NSF Deborah Crawford, Deputy Assistant Director, CISE, NSF PANELS CISE and the Global Implications: Larry Peterson, Princeton; David Novick, UTEP; Patrick Crowley, Washington U. St. Louis; Ram Dantu, U. of North Texas; Debby Cheng, Michigan State U.; and Bryant York, Portland State U. The GENI Program Guru Parulkar, GENI Program Director, CISE, NSF The Industry/University Cooperative Research Centers (I/UCRCs) Alex Schwarzkopf, Program Director, NSF, Division of Eng Education & Centers Sayfe Kiaei, Arizona State University, Director of Connection One and WINTech. ORGANIZATION OF PROCEEDINGS PHOTOS ON THE COVER PAGE Malek Adjouadi with thanks to the FIU-CATE Courtesy of the Cliff Lodge students Magno Guillen and Javier Delgado. Snowbird Ski & Summer Resort WITH THANKS To all of the investigators, presenters and participants of this NSF Workshop. SNOWBIRD UTAH JUNE 23-25, 2006 . NATIONAL SCIENCE FOUNDATION Division of Computer and Network Systems CISE Computing Research Infrastructure WORKSHOP - AGENDA Friday: June 23 Registration: 4:00 PM – 6:00PM Reception: 6:00 PM Dinner: 7:00 PM Saturday: June 24 7:30 - 8:00 Breakfast 8:00 - 8:20 Welcome Steve Mahaney, CISE/CNS Program Director, NSF Rita Rodriguez, CISE/CNS Program Director, NSF Malek Adjouadi, Florida International University 8:20 – 10:20 Session I: First-Year Awards Sabharwal, Ashutosh Rice University Shieber, Stuart Harvard University Callan, Jamie Carnegie Mellon University Manikopoulos, Constantine Foundation @ NJIT Chandra, Namas Florida A&M University Raju, G.V.S.
    [Show full text]
  • BENCHMARKING CYBER OPS 2018 an Initiative by Onnet for OOAT
    BENCHMARKING CYBER OPS 2018 An initiative by OnNet for OOAT //UNCLASSIFIED FOREIGN GOVERNMENT CYBER UNITS EXAMPLES • ISRAEL = UNIT8200 • US = U.S. CYBERCOM, NSATAO, DHS NCCIC • ISRAEL/US = “EQUATION GROUP” Name give by Kaspersky • UK = GHCQ-JTRIG, NCSC, MYNOC • SA = COMSEC • Australia = ASD • CANADA = CSEC • CHINA = PLA61398 • NKOREA = LAZARUSGROUP • RUSSIA = GRU6thDIR-FSO, GTsST • IRAN = INCA • DUTCH = JSCU AFRICA • Only cyber warfare unit known is under South African Government • Owned under National Intelligence Agency NIA • Formerly Electronic Communications Security ELS • Interagency with OIC, Office of Interception Centre EXAMPLES OF KNOWN NATION STATE CYBER WARFARE EVENTS • Estonia cyber attack by Russia • Crimea cyber attack by Russia • Operation Olympic games by TAO and Unit8200 (EquationGroup) against IRAN • Operation Nitro Zeus By TAO against IRAN by US • Operation Socialite by JTRIG/MYNOC, done by UK • Operation Rolling Thunder by JTRIG, operations by UK • Ethiopian use of HackingTeam software RCS to spy on ESAT journalists and Activists • Operation Aurora by Unit61398, operations in China • Operation Disttrack by ICA, Operations in Tehran to respond to US • Operation Turla Uroburos by Russian GRU6th Directorate in Russia • Operation DarkHotel Unit61398, from Israel EXAMPLES OF KNOWN NATION STATE CYBER WARFARE EVENTS • Sony pictures attack by LazarusGroup responding to a movie potraying Nkorea Leader • Red October – Unknown Nation State actor • Operation Ghostnet by Unit61398 from China • Operation NewsCaster by INCA in Tehran
    [Show full text]
  • Cyber Dissuasion
    N° 03/2012 recherches & documents mars 2012 Cyber Dissuasion Bruno gruselle Maître de recherche à la Fondation pour la Recherche Stratégique Bruno tertrais Maître de recherche à la Fondation pour la Recherche Stratégique alain esterle Chercheur associé à la Fondation pour la Recherche Stratégique w w w . frstrategie . o r g CYBER DISSUASION RECHERCHES & DOCUMENTS N ° 03/2012 Édité et diffusé par la Fondation pour la Recherche Stratégique 4 bis rue des Pâtures – 75016 PARIS ISSN : 1966-5156 ISBN : 978-2-911101-68-7 EAN : 9782911101687 WWW.FRSTRATEGIE.ORG 4 B I S RUE DES P ÂTURES 75 016 P ARIS TÉL. 01 43 13 77 77 FAX 0 1 43 13 77 78 SIRET 394 095 533 00045 TVA FR74 394 095 533 CODE APE 7220Z FONDATION RECONNUE D'UTILITÉ PUBLIQUE – DÉCRET DU 26 FÉVRIER 1993 SOMMAIRE INTRODUCTION ....................................................................................................................... 5 LES VULNERABILITES DE L’ESPACE NUMERIQUE ET LES RISQUES ASSOCIES SONT DEJA IMPORTANTS ET DEVRAIENT S ’AGGRAVER A L ’HORIZON 2020 ................................................... 9 Il est nécessaire d’établir le degré de gravité des risques numériques, les vulnérabilités exploitables et les perspectives de leur développement ................. 9 Les menaces pesant sur l’espace numérique ont d’ores et déjà des conséquences de sécurité importantes ...........................................................10 Les acteurs malveillants de l’espace numérique sont nombreux et leurs motivations appartiennent à des ensembles diversifiés ........................................14
    [Show full text]
  • Nuevo Escenario De Confrontación, El
    CENTRO SUPERIOR DE ESTUDIOS DE LA DEFENSA NACIONAL MONOGRAFÍAS del 126 CESEDEN EL CIBERESPACIO. NUEVO ESCENARIO DE CONFRONTACIÓN Febrero, 2012 CATÁLOGO GENERAL DE PUBLICACIONES OFICIALES http://publicacionesoficiales.boe.es/ Edita: MINISTERIO SECRETARÍA DE DEFENSA GENERAL TÉCNICA NIPO: 083-12-024-7 (edición en papel) NIPO: 083-12-025-2 (edición en línea) NIPO: 083-12-023-1 (libro-e) ISBN papel: 978-84-9781-723-3 ISBN libro-e : 978-84-9781-724-0 Depósito Legal: M-12287-2012 Imprime: Imprenta del Ministerio de Defensa Tirada: 500 ejemplares Fecha de edición: marzo, 2012 En esta edición se ha utilizado papel libre de cloro obtenido a partir de bosques gestionados de forma sostenible certificada. Las opiniones emitidas en esta publicación son de exclusiva responsabilidad de los autores de la misma. EL CIBERESPACIO. NUEVO ESCENARIO DE CONFRONTACIÓN SUMARIO Página INTRODUCCIÓN .............................................................................. 9 Por José Ramón Casar Corredera Capítulo primero LA CIBERSEGURIDAD Y LA CIBERDEFENSA ................................ 35 Por Luis Feliu Ortega Capítulo segundo ESTRATEGIAS INTERNACIONALES PARA EL CIBERESPACIO ..... 71 Por Carlos Enríquez González Capítulo tercero LA EVALUACIÓN DEL CONFLICTO HACIA UN NUEVO ESCENA- RIO BÉLICO ................................................................................. 117 Por Javier López de Turiso y Sánchez Capítulo cuarto EL CIBERESPACIO COMO ESCENARIO DEL CONFLICTO. IDEN- TIFICACIÓN DE LAS AMENAZAS ................................................ 167
    [Show full text]
  • Political Warfare: Russia, the West, and the Coming Age of Global Digital Competition
    THE NEW GEOPOLITICS MARCH 2018 EUROPE THE FUTURE OF POLITICAL WARFARE: RUSSIA, THE WEST, AND THE COMING AGE OF GLOBAL DIGITAL COMPETITION ALINA POLYAKOVA SPENCER P. BOYER BROOKINGS – ROBERT BOSCH FOUNDATION TRANSATLANTIC INITIATIVE THE FUTURE OF POLITICAL WARFARE: RUSSIA, THE WEST, AND THE COMING AGE OF GLOBAL DIGITAL COMPETITION ALINA POLYAKOVA SPENCER P. BOYER EXECUTIVE SUMMARY The Kremlin’s political warfare against democratic countries has evolved from overt to covert influence activities. But while Russia has pioneered the toolkit of asymmetric measures for the 21st century, including cyberattacks and disinformation campaigns, these tools are already yesterday’s game. Technological advances in artificial intelligence (AI), automation, and machine learning, combined with the growing availability of big data, have set the stage for a new era of sophisticated, inexpensive, and highly impactful political warfare. In the very near term, it will become more difficult, if not impossible, to distinguish between real and falsified audio, video, or online personalities. Malicious actors will use these technologies to target Western societies more rapidly and efficiently. As authoritarian states such as Russia and China invest resources in new technologies, the global competition for the next great leap in political warfare will intensify. As the battle for the future shifts to the digital domain, policymakers will face increasingly complex threats against democracies. The window to mount an effective “whole-of- society” response to emerging asymmetric threats is quickly narrowing. This paper outlines the current state of play in political warfare, identifies emerging threats, and proposes potential policy responses. It argues for greater information sharing mechanisms between trans-Atlantic governments and the private sector, greater information security and transparency, and greater investments in research and development on AI and computational propaganda.
    [Show full text]
  • Anti-Wikileaks Troll Questionwiki – Allmytweets
    QuestionWiki loaded 1787 tweets Hide Replies Hide Retweets Change User • Ecuador warns WikiLeaks founder Julian Assange over support for Catalonian independence | #QuestionWikileaks https://t.co/rzlmORATnO Nov 23, 2017 • RT @subverzo: Julian Assange should recuse himself. His extensive contacts colluding with Donny Junior & the Trump Campaign has caused him… Nov 22, 2017 • RT @BarrettBrown_: Trump Administration: Powered by Wikileaks https://t.co/aDTaACfwl1 Nov 22, 2017 • He’s a Member of Congress. The Kremlin Likes Him So Much It Gave Him a Code Name | #QuestionWikileaks https://t.co/36TtrxiQkh Nov 21, 2017 • #QuestionWikileaks https://t.co/Qbz4bkfcTB Nov 21, 2017 • RT @NatSecGeek: You really wanna go there? Let's go there. 1. After the Hollywood Access tape leaked, WikiLeaks offered to help the Trumps… Nov 21, 2017 • https://t.co/48Dkph0Jup Nov 21, 2017 • ♂ https://t.co/54d5Rwmkd1 Nov 21, 2017 • Here’s how Kushner newspaper New York Observer gave WikiLeaks and Assange an anti-Clinton ‘platform’ |… https://t.co/UKzWMyN8TX Nov 21, 2017 • @Kaidinn @laurilove You do know we follow each other? ... Tagging him isn't a stretch here ♂ Nov 20, 2017 • @Kaidinn @laurilove Assange is a rat on a sinking ship. @laurilove is an amazing person with a great mind and even… https://t.co/XumABptPd0 Nov 20, 2017 • @Kaidinn I get that. But wishing @laurilove go to prison has "bad person" written all over it. Nov 20, 2017 • @Kaidinn Sure, blame the Question Wiki guy ♂ Nov 20, 2017 • @JonePierantonio @IntelGroupNews Maybe Julian should play the lotto, because
    [Show full text]