Pseudoanonymous Influence Operations and Networked Social

Total Page:16

File Type:pdf, Size:1020Kb

Pseudoanonymous Influence Operations and Networked Social Journal of Design and Science • Issue 6: Unreal On the Internet, Nobody Knows You’re a Bot: Pseudoanonymous Inuence Operations and Networked Social Movements Brian Friedberg, Joan Donovan Published on: Aug 10, 2019 DOI: 10.21428/7808da6b.45957184 License: Creative Commons Attribution 4.0 International License (CC-BY 4.0) On the Internet, Nobody Knows You’re a Bot: Pseudoanonymous Inuence Operations and Journal of Design and Science • Issue 6: Unreal Networked Social Movements Brian Friedberg is an investigative ethnographer whose work focuses on the impacts that alternative media, anonymous communities and popular cultures have on political communication and organization. Brian works with Dr. Joan Donovan, who heads one of the world’s leading teams focused on understanding and combating online disinformation and extremism, based at Harvard’s Shorenstein Center on Media, Politics and Public Policy. In this essay, Brian and Joan explore a challenge the Unreal has presented for study of activism online, the question of whether an online actor is real or synthetic. In this essay, they explore what happens when politically motivated humans impersonate vulnerable people or populations online to exploit their voices, positionality and power. — Ethan Zuckerman, Editor It is not true that in order to live one has to believe in one's own existence. There is no necessity to that. No matter what, our consciousness is never the echo of our own reality, of an existence set in "real time." But rather it is its echo in "delayed time," the screen of the dispersion of the subject and of its identity — only in our sleep, our unconscious, and our death are we identical to ourselves. — Jean Baudrillard Introduction When facts become hard to establish, distortion takes over. Social media has given rise to countless operators who assume false identities, infiltrating political networks and using them to influence public opinion. And while social media platforms say they are working to stop this malfeasance, they remain open to all manner of abuse by bad actors. The outcomes are varied, but in almost every instance, a con game is operating — one that manipulates other social media users and online social movements with reams of posts, a firehose of unprovable “facts’’ that in measurable ways influences public debate on key social issues. For example, with each election cycle, a tremendous amount of online content is generated: Users digest and analyze candidates’ words and images, and politicians themselves produce a waterfall of social media posts as they seek to connect with the electorate. From petitions and polling, meme campaigns and the interventions of marketing firms like Cambridge Analytica, social media and networked communication has created enormous opportunity for professionals and amateurs alike to attempt to influence public opinion. At the same time, a robust practice of punditry provides 2 On the Internet, Nobody Knows You’re a Bot: Pseudoanonymous Inuence Operations and Journal of Design and Science • Issue 6: Unreal Networked Social Movements exhaustive analysis of these campaigns. The prevalence and visibility of these influence operations has also intensified American tendencies toward skepticism and conspiracism. A tacit coalition of journalists, activists, and academics now tries to make sense of these rival perceptions of polarization, with pessimistic analysis suggesting discourse as we know it is dead, or perhaps has never existed. The cacophonous debate about the role social media played in election outcomes leaves most of us with two options: belief or indifference. After the 2016 U.S. presidential election, we have placed tremendous importance on the influencing of political participation and attitudes, as well as on measuring this influence. What we see as the study of disinformation may be in itself the exercise of power: with social and material harm to marginalized groups often being deprioritized in these analyses in favor of party politics and the interests of big data. Algorithmic anti-blackness (Noble, 2018), relentless gendertrolling (Mantilla, 2015), digital redlining (Gilliard & Culik, 2016), the exploitation of gig economy workers (Rosenblat, 2018 and Gray, 2019) and a resurgence of white nationalist organizing in the new public commons present immediate threats to minoritized groups, many of which have been mounting their own resistance to attacks that benefit from the cloak of online pseudoanonymity. Our understanding of disinformation, however, must also include an understanding of these harms, not just their effects on party politics. Historically, activists have adopted anonymization techniques to ensure operational security when organizing on open or closed networks. Despite Facebook leaders’ protestations to the contrary, anyone may at any time create a new Facebook account not linked to his or her verified legal identity. And while a user’s reach depends on access to amplification, users with strong networks or those assisted by artificial tools to add automated followers are favored by algorithmic recommendation mechanisms. Leveraging these mechanisms creates a newfound hypervisibility for individuals who regularly create content with high rates of interaction. It’s a double-edged sword, however: political figures, pundits, and social movements all enjoy newfound reach while simultaneously facing intense scrutiny. Others, who have been outed as activists online, have lost their jobs or other membership status. Alongside this hypervisibility of celebrities, candidates, elected officials arise new opportunities and incentives to influence online conversations anonymously. We have seen foreign and domestic actors leverage amplification opportunities and algorithmic vulnerabilities using political wedge issues, such as immigration, LGBT rights, anti-Black racism, religious discrimination, and more. It is these divisive politicized positions concerning identity, authority, and justice that fuel news cycles and electoral campaigns. Politicians deploy these issues during campaigns, amplifying and iterating them amongst mainstream and independent media alike. These issues are frequently at the heart of operations designed to influence elections, culture, and policy, with operators accomplishing these goals through 3 On the Internet, Nobody Knows You’re a Bot: Pseudoanonymous Inuence Operations and Journal of Design and Science • Issue 6: Unreal Networked Social Movements social media activity and the manipulation of media coverage. By artificially creating the impression of broad support and legitimacy, inauthentic actors can wield disproportionate influence by giving their fabrications a solid platform on social media and making it appear that they have large numbers of supporters. Platforms such as Facebook call these operations “coordinated inauthentic behavior” (CIB), though it also terms the same practices authentic if “legitimate” users, rather than political operatives, paid partisans, or bots perform them. For example, when instances of artificial amplification (bot networks) or misrepresentation (sockpuppet accounts) were covered in the news or discussed by social media users after the 2016 US election, platform companies labelled this activity as CIB based on their own internal data analysis. Because of public outcry and political pressure, major platforms are now removing detectable automated accounts and reporting these removals publicly. At the same time, the accusation of an account being a “Russian bot” became a common dismissive reply online, especially to those calling attention to trolling campaigns or online harassment. Instead of focusing on the notion of authenticity, our analysis centers on “pseudoanonymous influence operations” (PIO), wherein politically motivated actors impersonate marginalized, underrepresented, and vulnerable groups to either malign, disrupt, or exaggerate their causes. Because PIOs travel across platforms, researchers cannot rely on one platform’s designation of CIB in order to assess the complexity of an operation. PIOs are more subtle than botnets and their data traces can be difficult to track. Rather than relying on volume for amplification, as bots do, their inauthenticity comes from the adoption of a minority persona by a human seeking political influence. PIOs play with and upon political polarization, confirming our most deeply held beliefs with their messaging, either reinforcing preexisting stereotypes or creating a convenient straw man of the (approximated) positions of political opponents. In order to investigate the phenomena of PIO, we ask: “What happens when a bot is not a bot?” We compare the residual artifacts, impacts, and press surrounding four pseudonymous (use of pen name) or pseudoanonymous political actors that were charged with inauthentic behavior online. Our analysis reveals how a tradition of anonymity online became a tactic for appropriating the style and techniques of networked social movements, groups of loosely affiliated individuals who use the Internet to coordinate action (Donovan 2018). For example, the Occupy Movement in 2011 used social platforms, conference calls, and the Internet to coordinate protests in hundreds of public parks around the world (Donovan 2016). And it’s not only that networked social movements used social media to coordinate public protests; by repurposing search engine optimization techniques for movement goals they also learned to “play the algorithms” in order to draw online attention to specific issues
Recommended publications
  • How Russia Tried to Start a Race War in the United States
    Michigan Journal of Race and Law Volume 24 2019 Virtual Hatred: How Russia Tried to Start a Race War in the United States William J. Aceves California Western School of Law Follow this and additional works at: https://repository.law.umich.edu/mjrl Part of the Communications Law Commons, Internet Law Commons, and the Law and Race Commons Recommended Citation William J. Aceves, Virtual Hatred: How Russia Tried to Start a Race War in the United States, 24 MICH. J. RACE & L. 177 (2019). Available at: https://repository.law.umich.edu/mjrl/vol24/iss2/2 This Article is brought to you for free and open access by the Journals at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Journal of Race and Law by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. VIRTUAL HATRED: HOW RUSSIA TRIED TO START A RACE WAR in the UNITED STATES William J. Aceves* During the 2016 U.S. presidential election, the Russian government engaged in a sophisticated strategy to influence the U.S. political system and manipulate American democracy. While most news reports have focused on the cyber-attacks aimed at Democratic Party leaders and possible contacts between Russian officials and the Trump presidential campaign, a more pernicious intervention took place. Throughout the campaign, Russian operatives created hundreds of fake personas on social media platforms and then posted thousands of advertisements and messages that sought to promote racial divisions in the United States. This was a coordinated propaganda effort.
    [Show full text]
  • Our Handbook Is a Continuation of Thoughtful, Candid, and Encouraging Engagement of That Deliberative Process
    Handbook Front cover www.co-impact.org Luzmila Elba Rojas Morales sells fresh produce in the local municipality [email protected] of La Victoria. She is the president of the Asociación 20 de junio, which comprises 150 perishable produce vendors. The Association assists For the for the latest Co-Impact updates their members by engaging with the authorities to obtain permits to and announcements, please visit our website sell. If they don´t pay, they face the risk of being evicted. Luzmila’s www.co-impact.org, sign up for our email mailing list, organization is part of the National Network of Women and Men and be sure to follow us on Twitter and LinkedIn. Self-employed Workers (Red Nacional de Trabajadoras y Trabajadores Autoempleados, RENATTA). This Revised Edition of the Co-Impact Handbook published June 2021. Courtesy of Juan Arredondo/Getty Images/Images of Empowerment This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to Share — copy and redistribute the material in any medium or format or Adapt — remix, transform, and build upon the material, under the following terms: a) Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use and b) NonCommercial — You may not use the material for commercial purposes. Table of Contents Foreword and Acknowledgements 4 Purpose of this Handbook 5 Glossary 6 SECTION ONE Who
    [Show full text]
  • When Childhood Gets Commercialized, Can Children Be Protected?1
    When Childhood Gets Commercialized, Can Children Be Protected?1 Juliet B. Schor In 2004, a significant debate about the effects and even the ethics of marketing to children emerged in the U.S. The catalyst has been the growing epidemic of childhood obesity and the related rise in medical diseases such as hypertension and type II diabetes (Surgeon General 2001). Children’s advocates have argued that food marketing is a major cause of the shift to unhealthy diets dominated by added sugar, fat and salt. They point to the billions of dollars of food advertising and marketing which children are exposed to, on television, in schools, on the Internet, and in the grocery store (Nestle 2002, Brownell and Horgen 2003). Although it did not gain much traction before the recent attention to junk food marketing, the critique goes beyond food to include other addictive substances such as tobacco and alcohol, as well as the marketing of violence, unhealthy body images, and materialism. Social scientists and pediatricians have compiled an impressive array of research results about the impact of various aspects of consumer culture on children. (See Robinson et al. 1998, 2001, Sargent et al. 2001, Kasser 2002, Strasburger and Wilson 2002; and Schor 2004, among others.) Ac- tivists have argued that children are suffering from ‘marketing-related diseases’ (see commercialalert.org), and that marketers are engaging in a ‘hostile takeover of childhood’ (Linn 2004, see also Nader 1996). In addition to their opposition to particular products and messages, many critics believe that advertising to child- ren is inherently unfair, even exploitative, because children are unable to under- stand ads or resist their persuasiveness.
    [Show full text]
  • Politics and the Constitution: a Review of Judge Malcolmwilkey's Call for a Second Constitutional Convention Charles D
    McGeorge Law Review Volume 27 | Issue 3 Article 6 1-1-1996 Book Review - Politics and the Constitution: A Review of Judge MalcolmWilkey's Call for a Second Constitutional Convention Charles D. Kelso University of the Pacific; cGeM orge School of Law R. Randall Kelso South Texas College of Law Follow this and additional works at: https://scholarlycommons.pacific.edu/mlr Part of the Law Commons Recommended Citation Charles D. Kelso & R. R. Kelso, Book Review - Politics and the Constitution: A Review of Judge MalcolmWilkey's Call for a Second Constitutional Convention, 27 Pac. L. J. 1213 (1996). Available at: https://scholarlycommons.pacific.edu/mlr/vol27/iss3/6 This Book Review is brought to you for free and open access by the Journals and Law Reviews at Scholarly Commons. It has been accepted for inclusion in McGeorge Law Review by an authorized editor of Scholarly Commons. For more information, please contact [email protected]. Book Review Politics and the Constitution: A Review of Judge Malcolm Wilkey's Call for a Second Constitutional Convention Is IT TIME FOR A SECOND CONSTITUTIONAL CONVENTION? BY JUDGE MALCOLM R. WILKEY. The National Legal Center for the Public Interest, Washington, D.C. 1995. Pp. viii, 214. Reviewed by Charles D. Kelso* and R. Randall Kelso** This book, an expanded version of lectures given by Judge Wilkey in 1993 at Brigham Young University, calls for a second Constitutional Convention.' The book also includes comments by seven accomplished persons and a reply to each comment by Judge Wilkey.2 I. JUDGE WILKEY'S THESIS Judge Wilkey opens with his conclusion that our current constitutional system has failed because of three fundamental problems of modem American politics: gridlock, near perpetual incumbency, and unaccountability of our representatives to the electorate.3 Gridlock, says Judge Wilkey, is "the inability to pass con- structive legislation because of conflicting, neutralizing forces built into the system.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Online Media and the 2016 US Presidential Election
    Partisanship, Propaganda, and Disinformation: Online Media and the 2016 U.S. Presidential Election The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Faris, Robert M., Hal Roberts, Bruce Etling, Nikki Bourassa, Ethan Zuckerman, and Yochai Benkler. 2017. Partisanship, Propaganda, and Disinformation: Online Media and the 2016 U.S. Presidential Election. Berkman Klein Center for Internet & Society Research Paper. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33759251 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA AUGUST 2017 PARTISANSHIP, Robert Faris Hal Roberts PROPAGANDA, & Bruce Etling Nikki Bourassa DISINFORMATION Ethan Zuckerman Yochai Benkler Online Media & the 2016 U.S. Presidential Election ACKNOWLEDGMENTS This paper is the result of months of effort and has only come to be as a result of the generous input of many people from the Berkman Klein Center and beyond. Jonas Kaiser and Paola Villarreal expanded our thinking around methods and interpretation. Brendan Roach provided excellent research assistance. Rebekah Heacock Jones helped get this research off the ground, and Justin Clark helped bring it home. We are grateful to Gretchen Weber, David Talbot, and Daniel Dennis Jones for their assistance in the production and publication of this study. This paper has also benefited from contributions of many outside the Berkman Klein community. The entire Media Cloud team at the Center for Civic Media at MIT’s Media Lab has been essential to this research.
    [Show full text]
  • ACCOUNTING and AUDITING in ROMAN SOCIETY Lance Elliot
    ACCOUNTING AND AUDITING IN ROMAN SOCIETY Lance Elliot LaGroue A dissertation thesis submitted to the faculty at the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of History. Chapel Hill 2014 Approved by: Richard Talbert Fred Naiden Howard Aldrich Terrence McIntosh © 2014 Lance Elliot LaGroue ALL RIGHTS RESERVED II ABSTRACT Lance LaGroue: Accounting and Auditing in Roman Society (Under the direction of Richard Talbert) This dissertation approaches its topic from the pathbreaking dual perspective of a historian and of an accountant. It contributes to our understanding of Roman accounting in several notable ways. The style and approach of Roman documents are now categorized to reflect differing levels of complexity and sophistication. With the aid of this delineation, and by comparison with the practices of various other premodern societies, we can now more readily appreciate the distinct attributes present at each level in Roman accounting practices. Additionally, due to the greater accessibility of Roman accounting documents in recent years – in particular, through John Matthews’ work on the Journey of Theophanes, Dominic Rathbone’s study of the Heroninos archive, and the reading of the Vindolanda tablets -- it becomes easier to appreciate such differences among the few larger caches of accounting documents. Moreover, the dissertation seeks to distinguish varying grades of accountant. Above all, it emphasizes the need to separate the functions of accounting and auditing, and to gauge the essential characteristics and roles of both. In both regards, it is claimed, the Roman method showed competency. The dissertation further shows how economic and accounting theory has influenced perceptions about Roman accounting practices.
    [Show full text]
  • Beaweblogic Portal™®
    BEAWebLogic Portal™® White Paper: Content Personalization Version 8.1 Document Revised: May 2004 By: Greg Smith Copyright Copyright © 2004 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software and documentation is subject to and made available only pursuant to the terms of the BEA Systems License Agreement and may be used or copied only in accordance with the terms of that agreement. It is against the law to copy the software except as specifically allowed in the agreement. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior consent, in writing, from BEA Systems, Inc. Use, duplication or disclosure by the U.S. Government is subject to restrictions set forth in the BEA Systems License Agreement and in subparagraph (c)(1) of the Commercial Computer Software-Restricted Rights Clause at FAR 52.227-19; subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013, subparagraph (d) of the Commercial Computer Software--Licensing clause at NASA FAR supplement 16-52.227-86; or their equivalent. Information in this document is subject to change without notice and does not represent a commitment on the part of BEA Systems. THE SOFTWARE AND DOCUMENTATION ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. FURTHER, BEA Systems DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE USE, OR THE RESULTS OF THE USE, OF THE SOFTWARE OR WRITTEN MATERIAL IN TERMS OF CORRECTNESS, ACCURACY, RELIABILITY, OR OTHERWISE.
    [Show full text]
  • UI Customization and Translation
    LISTSERV Maestro Admin Tech Doc 17 UI Customization and Translation January 24, 2020 | © L-Soft Sweden AB lsoft.com This document is a LISTSERV Maestro Admin Tech Doc. Each admin tech doc documents a certain facet of the LISTERV Maestro administration on a technical level. This document is number 17 of the collection of admin tech docs and explains the topic “UI Customization and Translation”. Last updated for LISTSERV Maestro 9.0-1 on January 24, 2020. The information in this document also applies to later LISTSERV Maestro versions, unless a newer version of the document supersedes it. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. L-Soft Sweden AB does not endorse or approve the use of any of the product names or trademarks appearing in this document. Permission is granted to copy this document, at no charge and in its entirety, provided that the copies are not used for commercial advantage, that the source is cited, and that the present copyright notice is included in all copies so that the recipients of such copies are equally bound to abide by the present conditions. Prior written permission is required for any commercial use of this document, in whole or in part, and for any partial reproduction of the contents of this document exceeding 50 lines of up to 80 characters, or equivalent. The title page, table of contents and index, if any, are not considered part of the document for the purposes of this copyright notice, and can be freely removed if present.
    [Show full text]
  • A Long Overdue Oppy News Email, Oppy Facts Sir Hubert
    Oppy News Email #3 OPPY NEW YEAR! 28/01/18 Dear Fellow Queenslanders: a long overdue Oppy News Email, Oppy Facts Sir Hubert Ferdinand Opperman was Australia's most famous endurance cyclist. He was the Patron of Audax Australia until his death at 91 in 1996, while happily riding his exercise bike. The Fleche Opperman All Day Trial (The "Oppy") is named after him. (Casually Deliberate: Thy name is Oppy) Opperman impressed at the 1928 Tour de France, but it was his performance one month later at the Bol d'Or (Golden Bowl) — a non-stop race over 24 hours — that galvanised his reputation. During the event, his rivals sabotaged his bicycles, filing the chains so thin that they snapped under pressure. Forced to ride a heavy touring bike while his racing machines were repaired, Oppy lost valuable distance to his opponents. Enraged at the foul play, he cycled on, refusing to leave the track in order to relieve himself. After hours of non-stop riding, spectators saw a golden stream flowing from Oppy’s wheel onto the track and into the path of his rivals. They roared in support and chanted "Oppy" all the way to his eventual victory. Oppy had completed just over 950 km in 24 hours, but when he tried to stop at the end of the race Bruce Small (Oppy's coach & later the Mayor of the Gold Coast) convinced him to continue riding to break the 1000 km record. The crowd chanted into the night, "Allez Oppy, Allez!" In 1928 he was voted Europe's most popular sportsman.
    [Show full text]
  • Batch Control V.8.20
    zenon manual Batch Control v.8.20 © 2020 Ing. Punzenberger COPA-DATA GmbH All rights reserved. Distribution and/or reproduction of this document or parts thereof in any form are permitted solely with the written permission of the company COPA-DATA. Technical data is only used for product description and are not guaranteed properties in the legal sense. Subject to change, technical or otherwise. Contents 1 Welcome to COPA-DATA help ............................................................................................................... 7 2 Batch Control .............................................................................................................................................. 7 3 Introduction ................................................................................................................................................. 9 4 Terminology ............................................................................................................................................... 11 5 Configure and apply batch recipes ...................................................................................................... 14 6 Engineering in the Editor ........................................................................................................................ 15 6.1 Unit placeholders: Concept and how it works .................................................................................... 16 6.1.1 Units - unit classes - unit instances ..............................................................................................................
    [Show full text]
  • From Civil Movement to Civil War
    FROM CIVIL MOVEMENT TO CIVIL WAR SOCIAL NETWORKS AND THEIR ROLE IN FACILITATING THE RISE AND FALL OF THE SYRIAN REVOLUTION By Bouchra Bouchkouj Submitted to Central European University and Institut Barcelona d’Estudis Internacionals In partial fulfillment for the degree of Master of Arts in Public Policy Supervisors: Dr. Nick Sitter Dr. Pablo Pareja Alcaraz CEU eTD Collection Budapest, Hungary and Barcelona, Spain 2017 Author’s Declaration: I, Bouchra Bouchkouj, hereby declare that I am the sole author of this thesis. To the best of my knowledge this thesis contains no material previously published by any other person except where proper acknowledgement has been made. This thesis contains no material which has been accepted as part of the requirements of any other academic degree or non-degree program, in English or in any other language. This is a true copy of the thesis, including final revisions. Date: July 13th 2017 Name: Bouchra Bouchkouj CEU eTD Collection 2 Table of Contents Introduction ................................................................................................................................... 4 Limitations ..................................................................................................................................... 6 Literature and Theoretical Aspects ............................................................................................. 8 The Syrian Opposition: Anti-Regime Activists ........................................................................ 11 4.1 Failures ............................................................................................................................................
    [Show full text]