Information Warfare: Issues for Congress
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
THE PHILIPPINES, 1942-1944 James Kelly Morningstar, Doctor of History
ABSTRACT Title of Dissertation: WAR AND RESISTANCE: THE PHILIPPINES, 1942-1944 James Kelly Morningstar, Doctor of History, 2018 Dissertation directed by: Professor Jon T. Sumida, History Department What happened in the Philippine Islands between the surrender of Allied forces in May 1942 and MacArthur’s return in October 1944? Existing historiography is fragmentary and incomplete. Memoirs suffer from limited points of view and personal biases. No academic study has examined the Filipino resistance with a critical and interdisciplinary approach. No comprehensive narrative has yet captured the fighting by 260,000 guerrillas in 277 units across the archipelago. This dissertation begins with the political, economic, social and cultural history of Philippine guerrilla warfare. The diverse Islands connected only through kinship networks. The Americans reluctantly held the Islands against rising Japanese imperial interests and Filipino desires for independence and social justice. World War II revealed the inadequacy of MacArthur’s plans to defend the Islands. The General tepidly prepared for guerrilla operations while Filipinos spontaneously rose in armed resistance. After his departure, the chaotic mix of guerrilla groups were left on their own to battle the Japanese and each other. While guerrilla leaders vied for local power, several obtained radios to contact MacArthur and his headquarters sent submarine-delivered agents with supplies and radios that tie these groups into a united framework. MacArthur’s promise to return kept the resistance alive and dependent on the United States. The repercussions for social revolution would be fatal but the Filipinos’ shared sacrifice revitalized national consciousness and created a sense of deserved nationhood. The guerrillas played a key role in enabling MacArthur’s return. -
Blitzkrieg: the Evolution of Modern Warfare and the Wehrmacht's
East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2021 Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era Briggs Evans East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Evans, Briggs, "Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era" (2021). Electronic Theses and Dissertations. Paper 3927. https://dc.etsu.edu/etd/3927 This Thesis - unrestricted is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era ________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ______________________ by Briggs Evans August 2021 _____________________ Dr. Stephen Fritz, Chair Dr. Henry Antkiewicz Dr. Steve Nash Keywords: Blitzkrieg, doctrine, operational warfare, American military, Wehrmacht, Luftwaffe, World War II, Cold War, Soviet Union, Operation Desert Storm, AirLand Battle, Combined Arms Theory, mobile warfare, maneuver warfare. ABSTRACT Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era by Briggs Evans The evolution of United States military doctrine was heavily influenced by the Wehrmacht and their early Blitzkrieg campaigns during World War II. -
Hard Offensive Counterterrorism
Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 2019 The Use of Force: Hard Offensive Counterterrorism Daniel Thomas Wright State University Follow this and additional works at: https://corescholar.libraries.wright.edu/etd_all Part of the International Relations Commons Repository Citation Thomas, Daniel, "The Use of Force: Hard Offensive Counterterrorism" (2019). Browse all Theses and Dissertations. 2101. https://corescholar.libraries.wright.edu/etd_all/2101 This Thesis is brought to you for free and open access by the Theses and Dissertations at CORE Scholar. It has been accepted for inclusion in Browse all Theses and Dissertations by an authorized administrator of CORE Scholar. For more information, please contact [email protected]. THE USE OF FORCE: HARD OFFENSIVE COUNTERTERRORISM A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts By DANIEL THOMAS B.A., The Ohio State University, 2015 2019 Wright State University WRIGHT STATE UNIVERSITY GRADUATE SCHOOL Defense Date: 8/1/19 I HEREBY RECOMMEND THAT THE THESIS PREPARED UNDER MY SUPERVISION BY Daniel Thomas ENTITLED The Use of Force: Hard Offensive Counterterrorism BE ACCEPTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Master of Arts. _______________________ Vaughn Shannon, Ph.D. Thesis Director ________________________ Laura M. Luehrmann, Ph.D. Director, Master of Arts Program in International and Comparative Politics Committee on Final Examination: ___________________________________ Vaughn Shannon, Ph.D. School of Public and International Affairs ___________________________________ Liam Anderson, Ph.D. School of Public and International Affairs ___________________________________ Pramod Kantha, Ph.D. School of Public and International Affairs ______________________________ Barry Milligan, Ph.D. -
Redalyc.Lawfare: the Colombian Case
Revista Científica General José María Córdova ISSN: 1900-6586 [email protected] Escuela Militar de Cadetes "General José María Córdova" Colombia Padilla, Juan Manuel Lawfare: The Colombian Case Revista Científica General José María Córdova, vol. 10, núm. 10, 2012, pp. 107-142 Escuela Militar de Cadetes "General José María Córdova" Bogotá, Colombia Available in: http://www.redalyc.org/articulo.oa?id=476248923006 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Estudios militares Revista Científica “General José María Córdova”, Bogotá D.C. (Colombia) Sección . Vol 10, Núm 10, Año 2012, Junio REVCGJMC.10(10): 107-142, 2012 Lawfare: The Colombian Case * Guerra jurídica: el caso colombiano La guerre juridique: le cas colombien Guerra jurídica: o caso colombiano Recibido: 20 de Febrero de 2012. Aceptado: 15 de Abril de 2012. Juan Manuel Padillaa * Researche monograph originally presented to the School of Advanced Military Studies of the United States Command and General Staff College, Fort Leavenworth, Kansas, approved for Revista Cientifica Public Release. “General José María Córdova”, Bogotá D.C. (Colombia) a Máster en Ciencias y Artes Militares , U.S. Army Command and General Staff College. Director Sección Estudios militares. de la Escuela Militar de Cadetes “General José María Córdova”. Comentarios a: jumapac@gmail. Vol 10 , Núm 10, Año 2012, com Junio, pp. 107-142 ISSN 1900- 6586 108 Juan Manuel Padilla Abstract. The terrorist groups in Colombia have applied Mao’s theory of protracted people’s war, seeking to use all available means of struggle to achieve their revolutionary goals by counteracting govemment policy. -
Information Warfare, International Law, and the Changing Battlefield
ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? ............................. -
Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer. -
Cyberattack Attribution As Empowerment and Constraint 3
A HOOVER INSTITUTION ESSAY Cyberattack Attribution as Empowerment and Constraint KRISTEN E. EICHENSEHR Aegis Series Paper No. 2101 Introduction When a state seeks to defend itself against a cyberattack, must it first identify the perpetrator responsible? The US policy of “defend forward” and “persistent engagement” in cyberspace raises the stakes of this attribution question as a matter of both international and domestic law. International law addresses in part the question of when attribution is required. The international law on state responsibility permits a state that has suffered an internationally wrongful act to take countermeasures, but only against the state responsible. This limitation implies that attribution is a necessary prerequisite to countermeasures. But international Law and Technology, Security, National law is silent about whether attribution is required for lesser responses, which may be more common. Moreover, even if states agree that attribution is required in order to take countermeasures, ongoing disagreements about whether certain actions, especially violations of sovereignty, count as internationally wrongful acts are likely to spark disputes about when states must attribute cyberattacks in order to respond lawfully. Under domestic US law, attributing a cyberattack to a particular state bolsters the authority of the executive branch to take action. Congress has authorized the executive to respond to attacks from particular countries and nonstate actors in both recent cyber-specific statutory provisions and the -
Articles & Reports
1 Reading & Resource List on Information Literacy Articles & Reports Adegoke, Yemisi. "Like. Share. Kill.: Nigerian police say false information on Facebook is killing people." BBC News. Accessed November 21, 2018. https://www.bbc.co.uk/news/resources/idt- sh/nigeria_fake_news. See how Facebook posts are fueling ethnic violence. ALA Public Programs Office. “News: Fake News: A Library Resource Round-Up.” American Library Association. February 23, 2017. http://www.programminglibrarian.org/articles/fake-news-library-round. ALA Public Programs Office. “Post-Truth: Fake News and a New Era of Information Literacy.” American Library Association. Accessed March 2, 2017. http://www.programminglibrarian.org/learn/post-truth- fake-news-and-new-era-information-literacy. This has a 45-minute webinar by Dr. Nicole A. Cook, University of Illinois School of Information Sciences, which is intended for librarians but is an excellent introduction to fake news. Albright, Jonathan. “The Micro-Propaganda Machine.” Medium. November 4, 2018. https://medium.com/s/the-micro-propaganda-machine/. In a three-part series, Albright critically examines the role of Facebook in spreading lies and propaganda. Allen, Mike. “Machine learning can’g flag false news, new studies show.” Axios. October 15, 2019. ios.com/machine-learning-cant-flag-false-news-55aeb82e-bcbb-4d5c-bfda-1af84c77003b.html. Allsop, Jon. "After 10,000 'false or misleading claims,' are we any better at calling out Trump's lies?" Columbia Journalism Review. April 30, 2019. https://www.cjr.org/the_media_today/trump_fact- check_washington_post.php. Allsop, Jon. “Our polluted information ecosystem.” Columbia Journalism Review. December 11, 2019. https://www.cjr.org/the_media_today/cjr_disinformation_conference.php. Amazeen, Michelle A. -
The Art of War in the Middle Ages, A.D. 378-1515
Digitized by the Internet Archive in 2007 with funding from IVIicrosoft Corporation http://www.archive.org/details/artofwarinmiddleOOomanuoft otl^xan: ^rt§e ^ssag 1884 THE ART OF WAR IN THE MIDDLE AGES PRINTED BY HORACE HART, PRINTER TO THE UNIVERSITY THE ART OF WAR [N THE MIDDLE AGES A.D. 37^—15^5 BY C. W. C. OMAN, B.A. FELLOW OF ALL SOULS COLLEGE WITH MAPS AND PLANS OXFORD B. H. BLACKWELL, 50 BROAD STREET LONDON T. FISHER UNWIN, 26 PATERNOSTER SQUARE 1885 [^// rights reserved '\ O/M The Author desires to acknowledge much kind help received in the revision and correction of this Essay from the Rev. H. B. George, of New College, and Mr. F. York Powell, of Christ Church. 6/ 37 05 , — — CONTENTS. PAGE ' Introduction . i CHAPTER 1. The Transition from Roman to Medieval forms in War (a.d. 378-582). Disappearance of the Legion.—Constantine's reorgajiization. The German tribes . — Battle of Adrianople.—Theodosius accepts its teaching.—Vegetius and the army at the end of the fourth century. —The Goths and the Huns. Army of the Eastern Empire.— Cavalry all-important . 3— 14 CHAPTER n. The Early Middle Ages (a.d. 476-1066). Paucity of Data for the period.—The Franks in the sixth cen- tury.—Battle of Tours.—^Armies of Charles the Great. The Franks become horsemen.—The Northman and the Magyar.—Rise of Feudalism.—The Anglo-Saxons and their wars.—The Danes and the Fyrd.—Military importance of the Thegnhood.—The House-Carles.—Battle of Hastings . Battle of Durazzo 15 — 27 W — VI CONTENTS. -
The Art of War: the Protection of Cultural Property During the "Siege" of Sarajevo (1992-95)
DePaul Journal of Art, Technology & Intellectual Property Law Volume 14 Issue 1 Special Section: Art and War, 2004 Article 5 The Art of War: The Protection of Cultural Property during the "Siege" of Sarajevo (1992-95) Megan Kossiakoff Follow this and additional works at: https://via.library.depaul.edu/jatip Recommended Citation Megan Kossiakoff, The Art of War: The Protection of Cultural Property during the "Siege" of Sarajevo (1992-95), 14 DePaul J. Art, Tech. & Intell. Prop. L. 109 (2004) Available at: https://via.library.depaul.edu/jatip/vol14/iss1/5 This Case Notes and Comments is brought to you for free and open access by the College of Law at Via Sapientiae. It has been accepted for inclusion in DePaul Journal of Art, Technology & Intellectual Property Law by an authorized editor of Via Sapientiae. For more information, please contact [email protected]. Kossiakoff: The Art of War: TheCOMMENT Protection of Cultural Property during the "S THE ART OF WAR: THE PROTECTION OF CULTURAL PROPERTY DURING THE "SIEGE" OF SARAJEVO (1992-95) I. INTRODUCTION Throughout the night of August 25, 1992, shells from Serb gunners fell on the National and University Library of Bosnia and Herzegovina in Sarajevo. The attack set off a blaze fueled by a collection representing hundreds of years of Bosnian history and culture. Librarians and community members, risking sniper fire, formed a human chain to move books to safety.' Despite emergency efforts, ninety percent of the collection was ash by daybreak.2 Unfortunately, this incident was not unique. The destruction of cultural artifacts during the "Siege" of Sarajevo was a loss not only to Bosnia,3 but also to the heritage of the world which now suffers a gap that cannot be closed. -
Active Measures: the Secret History of Disinformation & Political
Active Measures: The Secret History of Disinformation & Political Warfare | Thomas Rid Philosophers have only interpreted the world. The point, May 25th, 2020 however, is to change it. — Karl Marx INTRODUCTION Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies. Rid’s latest book, Active Measures, a startling history of disinformation, was published in late April 2020 with Farrar, Straus and Giroux (also in Russian, Japanese, Polish). His most recent book, Rise of the Machines (2016), tells the sweeping story of how cybernetics, a late- 1940s theory of machines, came to incite anarchy and war (also in Chinese, Russian, German, Japanese, Turkish). His 2015 article “Attributing Cyber Attacks” was designed to explain, guide, and improve the identification of network breaches (Journal of Strategic Studies 2015). In 2013 he published the widely-read book Cyber War Will Not Take Place. Rid’s Ph.D. thesis, “War and Media Operations: The US Military and the Press from Vietnam to Iraq,” was the first academic analysis of the role of embedded media in the 2003 Iraq War, providing a concise history of US military public affairs management since Vietnam. Rid testified on information security in front of the U.S. Senate Select Committee on Intelligence as well as in the German Bundestag and the UK Parliament. From 2011 to 2016, Rid was a professor in the Department of War Studies at King’s College London. Between 2003 and 2010, he worked at major think tanks in Berlin, Paris, Jerusalem, and Washington, DC. Rid holds a PhD from Humboldt University in Berlin. -
Fake News and Misinformation Policy Lab Practicum (Spring 2017)
ST ANFORD Fake News & Misinformation Policy Practicum 2017 PRACTICUM RESEARCFacebookH TEAM: Research Team Jacob Finkel, JD ’19, Steven Jiang,Mufan BS ’17, Luo, PhD ‘22 Mufan Luo, PhD ’22, Rebecca Mears, JD/MPP ’19, Danaë Metaxa-Kakavouli, PhD ’20Camille, Peeples, JD ‘18 Camille Peeples, JD ’18, BrendanArjun Sasso, Shenoy,JD ’19, JD ‘19 Arjun Shenoy, JD ’19, Vincent Sheu, JD/MS ’18 , Nicolás Torres-Echeverry, JSM ’17 Google Research Team INSTRUCTOR AND PROJECTDanaë LEAD MetaxaS: -Kakavouli, PhD ‘20 Nicolás Torres-Echeverry, JSM ‘17 SENATOR RUSS FEINGOLD Edwin A. Heafey, Jr., Visiting Professor of Law Luciana Herman, Ph.D. Twitter Research Team Lecturer in Law Program Director, Law and Policy LabJacob Finkel, JD ‘19 Steven Jiang, BS ‘17 Ashwin Aravind, JD ‘18 Teaching Assistant Rebecca Mears, JD/MPP ‘19 Katie Joseff, MA ‘19 Research Assistant Reddit Research Team October POLICY CLIENT: Brendan Sasso, JD ‘19 Hewlett Foundation MadisonVincent Initiative Sheu, JD/MS ’18 2017 1 Acknowledgements This report reflects the research and analysis of an inter-disciplinary law and graduate student team enrolled in the Stanford Law School Fake News and Misinformation Policy Lab Practicum (Spring 2017). Under the guidance of instructor Senator Russ Feingold, the Edwin A. Heafey Visiting Professor of Law, the practicum surveyed the roles of four major online platforms in the spread of fake news beginning with the 2016 U.S. election. Assisting Senator Feingold in the practicum were Policy Lab Program Director and Lecturer Luciana Herman, Ph.D., and Teaching Assistant Ashwin Aravind, J.D. ’18. Brendan Sasso, J.D. ’19, served as the exceptional lead student editor for the report.