SOURCES: INFLUENCE OPERATIONS
[1] Defence IQ. (2017). DNC Hack: An escalation that cannot be ignored. [online] Available at: https://www.defenceiq.com/cyber-defence/ articles/dnc-hack-an-escalation-that-cannot-be-ignored [Accessed 19 Jan. 2018].
[2] Pissanidis, N. and Rõigas, H. (2016). Influence Cyber Operations: The Use of Cyberattacks in Support of Influence Operations. [online] Ccdcoe.org. Available at: https://ccdcoe.org/cycon/2016/proceedings/08_brangetto_veenendaal.pdf [Accessed 5 Jan. 2018].
[3] Merriam-webster.com. (2018). Definition of MEME. [online] Available at: https://www.merriam-webster.com/dictionary/meme [Accessed 19 Jan. 2018].
[4] Blackmore, S. (2001). Evolution and Memes: The human brain as a selective imitation device–Dr Susan Blackmore. [online] Dr Susan Blackmore. Available at: https://www.susanblackmore.co.uk/articles/evolution-and-memes-the-human-brain-as-a-selective-imitation-device/ [Accessed 19 Jan. 2018].
[5] 25 Cognitive Biases. (2018). 25 Cognitive Biases–“The Psychology of Human Misjudgment” | The 25 Cognitive Biases Used by Charlie Munger. [online] Available at: http://25cognitivebiases.com/ [Accessed 19 Jan. 2018]
[6] Dauntain, G. (2017). OPINION: The rally against political correctness is not an excuse for ad hominems. [online] Technician. Available at: http:// www.technicianonline.com/opinion/columns/article_969f52a2-86d3-11e7-a5f1-077c2e01c49d.html [Accessed 19 Jan. 2018].
[7] Socionics.com. (2018). Socionics–The New Psychology. [online] Available at: http://www.socionics.com/ [Accessed 19 Jan. 2018].
[8] Scott, J. and Spaniel, D. (2017). ICIT Brief: Metadata – The Most Potent Weapon in This Cyberwar: The New Cyber-Kinetic-Meta War. [online] Icitech.org. Available at: http://icitech.org/icit-brief-metadata-the-most-potent-weapon-in-this-cyberwar-the-new-cyber-kinetic-meta-war/ [Accessed 19 Jan. 2018].
[9] W. (2018). What is Predictive Analytics ?. [online] Predictive Analytics Today. Available at: https://www.predictiveanalyticstoday.com/ what-is-predictive-analytics/ [Accessed 19 Jan. 2018].
[10] Myers, D. and Twenge, J. (2013). Social psychology. New York (NY): McGraw-Hill.
[11] Kahne, J., Allen, D. and Middaugh, E. (2014). Youth, New Media, and the Rise of Participatory Politics. [online] Dmlcentral.net. Available at: https://dmlcentral.net/wp-content/uploads/files/ypp_workinpapers_paper01_1.pdf [Accessed 19 Jan. 2018].
[12] Duch, W. (2015). Memetics and Neural Models of Conspiracy Theories. [online] Arxiv.org. Available at: https://arxiv.org/ abs/1508.04561 [Accessed 6 Jan. 2018].
[13] Color Psychology. (2018). Color Psychology–The Ultimate Guide to Color Meanings. [online] Available at: https://www.colorpsychology.org/ [Accessed 19 Jan. 2018].
[14] Logicalfallacies.info. (2018). Logical Fallacies. [online] Available at: http://www.logicalfallacies.info/ [Accessed 19 Jan. 2018].
[15] Kali.org. (2018). Cite a Website–Cite This For Me. [online] Available at: https://www.kali.org/ [Accessed 19 Jan. 2018].
[16] Paterva.com. (2018). Paterva Home. [online] Available at: https://www.paterva.com/web7/ [Accessed 19 Jan. 2018].
[17] Metasploit. (2018). Metasploit | Penetration Testing Software, Pen Testing Security | Metasploit. [online] Available at: https://www.metasploit. com/
[18] Zarrelli, N. (2016). How the Hidden Sounds of Horror Movie Soundtracks Freak You Out. [online] Atlas Obscura. Available at: https://www.atlasobscura.com/articles/how-the-hidden-sounds-of-horror-movie-soundtracks-freak-you-out [Accessed 19 Jan. 2018].
[19] Oppmann, P. and Kosinski, M. (2017). Denying ‘sonic attacks,’ Cuba names diplomats, releases medical record. [online] CNN. Available at http://www.cnn.com/2017/10/28/politics/cuba-names-sonic-attacks/index.html [Accessed 19 Jan. 2018].
[20] Roberts, R. (2017). Russia targeted key states with anti-Clinton fake news, Trump-Russia hearings chairman reveals. [online] The Independent. Available at: http://www.independent.co.uk/news/world/americas/us-politics/russian-trolls-hilary-clinton-fake-news- election-democrat-mark-warner-intelligence-committee-a7657641.html [Accessed 5 Jan. 2018].
[21] Dwoskin, E. (2017). How Russian content ended up on Pinterest, of all places. [online] Daily Herald. Available at: http://www. dailyherald.com/business/20171014/how-russian-content-ended-up-on-pinterest-of-all-places [Accessed 5 Jan. 2018].
[22] Breiner, A. (2016). Pizzagate, explained: Everything you want to know about the Comet Ping Pong pizzeria conspiracy t…. [online] Salon. Available at: https://www.salon.com/2016/12/10/pizzagate-explained-everything-you-want-to-know-about-the-comet-ping-pong-pizzeria-conspiracy-theory-but-are-too-afraid-to-search-for-on-reddit/ [Accessed 19 Jan. 2018].
[23] Byrne, M. (2016). ‘Pizzagate’ Conspiracy Meme Reaches Its Natural Conclusion—With Shots Fired. [online] Motherboard. Available at: https://motherboard.vice.com/en_us/article/4xa5jg/pizzagate-conspiracy-meme-reaches-is-natural-conclusion-with-shots-fired [Accessed 19 Jan. 2018].
[24] Grim, R. and Cherkis, J. (2017). Russian Trolls Fooled Sanders Voters With Anti-Clinton Fake News. [online] HuffPost UK. Available at: https://www.huffingtonpost.com/entry/bernie-sanders-fake-news-russia_us_58c34d97e4b0ed71826cdb36 [Accessed 6 Jan. 2018].
[25] Elharrar, D. (2017). 7 Types of Bots – Chatbots Magazine. [online] Chatbots Magazine. Available at: https://chatbotsmagazine.com/7-types-of-bots-8e1846535698 [Accessed 6 Jan. 2018].
[26] Gallagher, E. (2017). Propaganda Botnets on Social Media – Erin Gallagher – Medium. [online] Medium. Available at: https://medium.com/@erin_gallagher/propaganda-botnets-on-social-media-5afd35e94725 [Accessed 6 Jan. 2018].
[27] Gertz, B. (2017). China’s ‘Magic Weapons’: Influence Operations Subverting Foreign Governments. [online] Washington Free Beacon.Available at: [27] http://freebeacon.com/national-security/chinas-magic-weapons-influence-operations-subverting-foreign-governments/ [Accessed 5 Jan. 2018].
[28] Mattis, P. (2015). A Guide to Chinese Intelligence Operations–War on the Rocks. [online] War on the Rocks. Available at: https://warontherocks.com/2015/08/a-guide-to-chinese-intelligence-operations/ [Accessed 5 Jan. 2018].
[29] Martina, M. (2017). Exclusive: In China, the Party’s push for influence inside foreign fir. [online] Reuters. Available at: https://www.reuters.com/article/us-china-congress-companies/exclusive-in-china-the-partys-push-for-influence-inside-foreign-firms-stirs-fears- idUSKCN1B40JU [Accessed 5 Jan. 2018].
[30] Bergerson, K. (2016). Cite a Website–Cite This For Me. [online] Uscc.gov. Available at: https://www.uscc.gov/sites/default/files/Research/USCC%20Staff%20Report%20on%20China%20Countering%20US%20Military%20Presence%20in%20Asia.pdf [Accessed19 Jan. 2018].
[31] YouTube. (2015). The New Authoritarians: Ruling Through Disinformation. [online] Available at: https://www.youtube.com/watch?v=d-vMix8dikg [Accessed 19 Jan. 2018].
[32] Navarro, P. (2016). China’s Non-Kinetic ‘Three Warfares’ Against America. [online] The National Interest. Available at: http:// nationalinterest.org/blog/the-buzz/chinas-non-kinetic-three-warfares-against-america-14808 [Accessed 19 Jan. 2018].
[33] Raska, M. (2015). China and the ‘Three Warfares’. [online] The Diplomat. Available at: https://thediplomat.com/2015/12/hybrid- warfare-with-chinese-characteristics-2/ [Accessed 5 Jan. 2018].
[34] King, G., Pan, J. and Roberts, M. (2017). How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument. [online] Gking.harvard.edu. Available at: http://gking.harvard.edu/50c [Accessed 19 Jan. 2018].
[35] Waddell, K. (2017). ‘Look, a Bird!’ How the Chinese Government Trolls by Distraction. [online] The Atlantic. Available at: https://www. theatlantic.com/technology/archive/2017/01/trolling-by-distraction/514589/ [Accessed 19 Jan. 2018].
[36] Doctorow, C. (2017). The first-ever close analysis of leaked astroturf comments from China’s “50c party” reveal Beijing’s cybercontrol strategy. [online] Boing. Available at: https://boingboing.net/2017/01/18/the-first-ever-close-analysis.html [Accessed 19 Jan. 2018].
[37] King, G., Pan, J. and Roberts, M. (2017). How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument. [online] Gking.harvard.edu. Available at: https://gking.harvard.edu/50c [Accessed 5 Jan. 2018].
[38] Lau, J. (2016). Who Are the Chinese Trolls of the ‘50 Cent Army’?. [online] VOA. Available at: https://www.voanews.com/a/who-is-that-chinese-troll/3540663.html [Accessed 5 Jan. 2018].
[39] Bernard, D. (2016). China’s 50 Cent Party: The Other Side of Censorship. [online] VOA. Available at: https://www.voanews.com/a/chinas-50-cent-party-the-other-side-of-censorship/3355262.html [Accessed 5 Jan. 2018].
[40] https://www.economist.com/news/middle-east-and-africa/21725288-big-ways-and-small-china-making-its-presence-felt-across
[41] Economist.com. (2017). China goes to Africa. [online] Available at: https://www.economist.com/news/middle-east-and- africa/21725288-big-ways-and-small-china-making-its-presence-felt-across [Accessed 5 Jan. 2018].
[42] Brookes, P. (2006). China’s Influence in Africa: Implications for the United States. [online] The Heritage Foundation. Available at: http://www.heritage.org/asia/report/chinas-influence-africa-implications-the-united-states [Accessed 5 Jan. 2018].
[43] Johnson, S. (2005). Balancing China’s Growing Influence in Latin America. [online] The Heritage Foundation. Available at: https://www.heritage.org/americas/report/balancing-chinas-growing-influence-latin-america [Accessed 19 Jan. 2018].
[44] Maskirovka: Russia’s Gray Zone Between Peace and War. [online] The Cipher Brief. Available at: https://www.thecipherbrief.com/maskirova-russias-gray-zone-peace-war [Accessed 5 Jan. 2018].
[45] Lister, T. (2017). Putin’s ‘chef,’ the man behind the troll factory. [online] CNN. Available at: http://www.cnn.com/2017/10/17/politics/russian-oligarch-putin-chef-troll-factory/index.html [Accessed 6 Jan. 2018].
[46] Sheth, S. (2017). ‘Our task was to set Americans against their own government’: New details emerge about Russia’s trolling operation. [online] Business Insider. Available at: https://amp.businessinsider.com/former-troll-russia-disinformation-campaign-trump-2017-10[Accessed 6 Jan. 2018].
[47] Williams, S. (2017). Rodrigo Duterte’s Army of Online Trolls. [online] New Republic. Available at: https://newrepublic.com/article/138952/rodrigo-dutertes-army-online-trolls [Accessed 5 Jan. 2018].
[48] Blackmore, S. (2016). Memes and the evolution of religion: We need memetics too. [online] Susanblackmore.co.uk. Available at: https://www.susanblackmore.co.uk/wp-content/uploads/2017/05/Memes-and-the-evolution-of-religion-We-need-memetics-too.pdf [Accessed 19 Jan. 2018].
[49] GrowChurch.net. (2018). Looking For Sermon Series Ideas? – A Year’s Preaching. [online] Available at: https://growchurch.net/looking- sermon-series-ideas-a-years-preaching [Accessed 19 Jan. 2018].
[50] Siegel, J. (2017). The Alt-Right and Antifa Are Waging a New Kind of Internet Warfare. [online] Vice. Available at: https://www.vice.com/ en_nz/article/7xxmad/the-alt-right-and-antifa-are-waging-a-new-kind-of-internet-warfare [Accessed 19 Jan. 2018].
[51] Scott, J. and Spaniel, D. (2017). ICIT Analysis: The Surveillance State & Censorship Legislation Conundrum: Dragnet Surveillance & Censorship. Legislation Will Do Nothing to Eliminate Cyber Jihad & Lone Wolf Recruiting. [online] Icitech.org. Available at: http://icitech.org/icit-analysis-the- surveillance-state-censorship-legislation-conundrum-dragnet-surveillance-censorship-legislation-will-do-nothing-to-eliminate-cyber-jihad-lone-wolf-recruiting/ [Accessed 19 Jan. 2018].