Russia

A No Limits Partnership on Propaganda?

Abstract:

The Russian Federation and the People’s Republic of China signed a formal agreement to cooperate on the creation and dissemination of a jointly constructed propaganda narrative for a global audience. There is some anecdotal evidence and some very basic research to suggest this cooperation might be happening. However, this study aims to use scientific research methods from the Agenda Setting Theory to prove or disprove this alleged propaganda cooperation. The author assessed a N = 600 sample of articles from English language versions of Russian Sputnik and the Chinese Global Times and People’s Daily. The evidence indicates a low level of propaganda cooperation. Russia and China appear to be pursuing their own strategic goals with propaganda. This finding has important implications for information warriors’ and strategic communication professionals’ task and counterpropaganda.

Destabilizing a Regime to Support a Military Campaign, and Vice Versa

Abstract:

This essay aims to identify vulnerabilities and exploitation means necessary to use destabilization to support a military, and ultimately political, objective in a potential conflict between China and the governments supporting a liberal rules-based order. Japanese efforts during the Russo-Japanese War of 1904-1905 showed destabilizing a regime as a credible way to support military objectives during a conflict and provided some key insights by which destabilization efforts function. Based on the historical case and contemporary analysis of China, this essay makes recommendations to decision makers in a conflict on how to best execute and support destabilization efforts.

Cyber Warfare and War in Ukraine

Abstract:

Today cyberspace is a one military domain. The new cyber capacities of armed forces create new possibilities to achieve the goals of war. These new and advanced cyber capabilities are a part of the new non-kinetic environment where cyber operations are used in combination with information warfare (IW) and electronic warfare (EW). These non-kinetic operations are used with lethal weapons systems to produce an operational advantage. This article is a preliminary review of cyber operations in the Ukraine conflict. The article reviews the balance between defense and offense in cyberspace, the utility of offensive cyber operations, and the requirements for effective cyber defence.

The Impact of Russian Cyber Attackers within the Ukraine Situation

Abstract:

On 24 February 2022, Russia invaded Ukraine. The Russo-Ukrainian War is the largest war in Europe since World War II. The aim of the paper is to look at how politically motivated hacking by Russia has been used as part of the Ukraine situation with a focus on the different attack types since the Russian invasion of Ukraine in 2022. The paper will focus on the different groups acting on behalf of Russia, their actions, and techniques. The paper will discuss what their actions mean for the future of cyber conflicts.

Using Junk News to Build an Agenda for Violence: Russian Propaganda Targeting American Right-Wing Extremists

Abstract:

This article examines a known Russian propaganda website, News Room for American and European Based Citizens (NAEBC), run by the Internet Research Agency (IRA), that delivers propaganda through junk news. Using agenda-building theory, it seeks to determine if it can uncover the propagandists’ goals and motivations in order to examine its implications for information warfare. It finds that the IRA is using its extensive resources to agitate right-wing political extremists into violence. This calls into question whether the provocation of a civil war within the United States is a strategic information warfare goal of the Russian government. 

Employing Junk News to Drive a Propaganda Narrative

Abstract:

This study examines the testable question of whether junk news in the service of propaganda can form coherent narrative structure that can be analyzed and countered. The analysis was conducted using a known junk news site, USA Really, which is sponsored by the Russian Government, and which targets American citizens. Leveraging the Narrative Paradigm theory and ethnographic content analysis are the methods of research; an analysis of (N =150) were qualitatively analyzed. An unexpected finding that USA Really was constructing a conspiracy narrative targeting far right-wing extremists emerged. The study also identified a new type of narrative, not accounted for in narrative paradigm theory, that was meant to cause dissension rather than to serve as a guide for proper conduct.

Military Deception and Strategic Culture: The Soviet Union and Russian Federation

Abstract:

Strategic culture shapes political-military organizational activity through a process of socialization, yet little is known about strategic culture’s impact on information operations. This paper explores the influence of Russian-Soviet strategic culture on military deception operations during World War II, the Soviet Afghan War, and the conflict in Ukraine. It finds that the hierarchical characteristic of Russian-Soviet strategic culture contributes to the centralization of deception operations. This work shows that, in the context of foreign policy toward Russia, not only does one need to consider technological innovations for traditional military use, but also advances below the threshold of declared war.

Propaganda or Not: Examining the Claims of Extensive Russian Information Operations within the United States

Abstract:

This paper scientifically examines the claims of an extensive Russian propaganda targeting the population of the United States made by an organization called Prop or Not. Using the Agenda Setting Theory, it examined the intermedia agenda setting effects between the Russian State Media outlet Sputnik and four weblogs listed by Prop or Not. The results of the study found a strong positive correlation between Sputnik and Zero Hedge, New Cold War, Global Research, and the Daily Sheeple in terms of very favorable coverage of Russia and its allies. A positive but weaker correlation was found between these media sources and their coverage of the United States and its allies.

Testing the Importance of Information Control: How Does Russia React When Pressured in the Information Environment?

Abstract:

Applying big data and sentiment analysis to TASS reporting and 15 years of Russian Foreign Ministry documents, this paper tests the importance Moscow places on information control. By comparing the Russian government’s responses to four categories of foreign policy tools— diplomatic, information, military, and economic (the DIME construct)—this research finds that Russia reacts far more negatively to information tools than to military, diplomatic, or economic tools. 

Projected Territoriality: A Case Study of the Infrastructure of Russian Digital Borders

Abstract:

This  article  attempts  to  demonstrate  how  territoriality  can  be  projected  into cyberspace with respect to the infrastructure of a country. It is a case study of the delineation, protection, and control processes of Russia’s so-called digital borders. By combining analysis of border studies, information technology studies, and Russian studies, this article provides an interdisciplinary overview of the infrastructure of the Russian segment of the Internet and examines the principles and practises behind the Russian implementation of the concept of a national  segment  of  the Internet as an infrastructural element of delineating digital borders and achieving a functional digital sovereignty.

Should ‘RuNet 2020’ Be Taken Seriously? Contradictory Views about Cyber Security Between Russia and the West

Abstract:

Russia aims to create an independent state information system that ensures the network’s overall stability by controlling the Internet routing architecture inside Russia. A tightly regulated and secure ‘information space’ will not only ensure stronger defence against external attacks, but also increase offensive capabilities.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com