SOURCES: INFLUENCE OPERATIONS

[1] Defence IQ. (2017). DNC Hack: An escalation that cannot be ignored. [online] Available at: https://www.defenceiq.com/cyber-defence/ articles/dnc-hack-an-escalation-that-cannot-be-ignored [Accessed 19 Jan. 2018].

[2] Pissanidis, N. and Rõigas, H. (2016). Influence Cyber Operations: The Use of Cyberattacks in Support of Influence Operations.  [online] Ccdcoe.org. Available at: https://ccdcoe.org/cycon/2016/proceedings/08_brangetto_veenendaal.pdf [Accessed 5 Jan. 2018].

[3] Merriam-webster.com. (2018). Definition of MEME. [online] Available at: https://www.merriam-webster.com/dictionary/meme [Accessed 19 Jan. 2018].

[4] Blackmore, S. (2001). Evolution and Memes: The human brain as a selective imitation device–Dr Susan Blackmore. [online] Dr Susan Blackmore. Available at: https://www.susanblackmore.co.uk/articles/evolution-and-memes-the-human-brain-as-a-selective-imitation-device/ [Accessed 19 Jan. 2018].

[5] 25 Cognitive Biases. (2018). 25 Cognitive Biases–“The Psychology of Human Misjudgment” | The 25 Cognitive Biases Used by Charlie Munger. [online] Available at: http://25cognitivebiases.com/ [Accessed 19 Jan. 2018]

[6] Dauntain, G. (2017). OPINION: The rally against political correctness is not an excuse for ad hominems. [online] Technician. Available at: http:// www.technicianonline.com/opinion/columns/article_969f52a2-86d3-11e7-a5f1-077c2e01c49d.html [Accessed 19 Jan. 2018].

[7] Socionics.com. (2018). Socionics–The New Psychology. [online] Available at: http://www.socionics.com/ [Accessed 19 Jan. 2018].

[8] Scott, J. and Spaniel, D. (2017). ICIT Brief: Metadata – The Most Potent Weapon in This Cyberwar: The New Cyber-Kinetic-Meta War. [online] Icitech.org. Available at: http://icitech.org/icit-brief-metadata-the-most-potent-weapon-in-this-cyberwar-the-new-cyber-kinetic-meta-war/ [Accessed 19 Jan. 2018].

[9] W. (2018). What is Predictive Analytics ?. [online] Predictive Analytics Today. Available at: https://www.predictiveanalyticstoday.com/ what-is-predictive-analytics/ [Accessed 19 Jan. 2018].

[10] Myers, D. and Twenge, J. (2013). Social psychology. New York (NY): McGraw-Hill.

[11] Kahne, J., Allen, D. and Middaugh, E. (2014). Youth, New Media, and the Rise of Participatory Politics. [online] Dmlcentral.net. Available at: https://dmlcentral.net/wp-content/uploads/files/ypp_workinpapers_paper01_1.pdf [Accessed 19 Jan. 2018].

[12] Duch, W. (2015). Memetics and Neural Models of Conspiracy Theories. [online] Arxiv.org. Available at: https://arxiv.org/ abs/1508.04561 [Accessed 6 Jan. 2018].

[13] Color Psychology. (2018). Color Psychology–The Ultimate Guide to Color Meanings. [online] Available at: https://www.colorpsychology.org/ [Accessed 19 Jan. 2018].

[14] Logicalfallacies.info. (2018). Logical Fallacies. [online] Available at: http://www.logicalfallacies.info/ [Accessed 19 Jan. 2018].

[15] Kali.org. (2018). Cite a Website–Cite This For Me. [online] Available at: https://www.kali.org/ [Accessed 19 Jan. 2018].

[16] Paterva.com. (2018). Paterva Home. [online] Available at: https://www.paterva.com/web7/ [Accessed 19 Jan. 2018].

[17] Metasploit. (2018). Metasploit | Penetration Testing Software, Pen Testing Security | Metasploit. [online] Available at: https://www.metasploit. com/

[18] Zarrelli, N. (2016). How the Hidden Sounds of Horror Movie Soundtracks Freak You Out. [online] Atlas Obscura. Available at: https://www.atlasobscura.com/articles/how-the-hidden-sounds-of-horror-movie-soundtracks-freak-you-out [Accessed 19 Jan. 2018].

[19] Oppmann, P. and Kosinski, M. (2017). Denying ‘sonic attacks,’ Cuba names diplomats, releases medical record. [online] CNN. Available at http://www.cnn.com/2017/10/28/politics/cuba-names-sonic-attacks/index.html [Accessed 19 Jan. 2018].

[20] Roberts, R. (2017). Russia targeted key states with anti-Clinton fake news, Trump-Russia hearings chairman reveals. [online] The Independent. Available at: http://www.independent.co.uk/news/world/americas/us-politics/russian-trolls-hilary-clinton-fake-news- election-democrat-mark-warner-intelligence-committee-a7657641.html [Accessed 5 Jan. 2018].

[21] Dwoskin, E. (2017). How Russian content ended up on Pinterest, of all places. [online] Daily Herald. Available at: http://www. dailyherald.com/business/20171014/how-russian-content-ended-up-on-pinterest-of-all-places [Accessed 5 Jan. 2018].

[22] Breiner, A. (2016). Pizzagate, explained: Everything you want to know about the Comet Ping Pong pizzeria conspiracy t…. [online] Salon. Available at: https://www.salon.com/2016/12/10/pizzagate-explained-everything-you-want-to-know-about-the-comet-ping-pong-pizzeria-conspiracy-theory-but-are-too-afraid-to-search-for-on-reddit/ [Accessed 19 Jan. 2018].

[23] Byrne, M. (2016). ‘Pizzagate’ Conspiracy Meme Reaches Its Natural Conclusion—With Shots Fired. [online] Motherboard. Available at: https://motherboard.vice.com/en_us/article/4xa5jg/pizzagate-conspiracy-meme-reaches-is-natural-conclusion-with-shots-fired [Accessed 19 Jan. 2018].

[24] Grim, R. and Cherkis, J. (2017). Russian Trolls Fooled Sanders Voters With Anti-Clinton Fake News. [online] HuffPost UK. Available at: https://www.huffingtonpost.com/entry/bernie-sanders-fake-news-russia_us_58c34d97e4b0ed71826cdb36 [Accessed 6 Jan. 2018].

[25] Elharrar, D. (2017). 7 Types of Bots – Chatbots Magazine. [online] Chatbots Magazine. Available at: https://chatbotsmagazine.com/7-types-of-bots-8e1846535698 [Accessed 6 Jan. 2018].

[26] Gallagher, E. (2017). Propaganda Botnets on Social Media – Erin Gallagher – Medium. [online] Medium. Available at: https://medium.com/@erin_gallagher/propaganda-botnets-on-social-media-5afd35e94725 [Accessed 6 Jan. 2018].

[27] Gertz, B. (2017). China’s ‘Magic Weapons’: Influence Operations Subverting Foreign Governments. [online] Washington Free Beacon.Available at: [27] http://freebeacon.com/national-security/chinas-magic-weapons-influence-operations-subverting-foreign-governments/ [Accessed 5 Jan. 2018].

[28] Mattis, P. (2015). A Guide to Chinese Intelligence Operations–War on the Rocks. [online] War on the Rocks. Available at: https://warontherocks.com/2015/08/a-guide-to-chinese-intelligence-operations/ [Accessed 5 Jan. 2018].

[29] Martina, M. (2017). Exclusive: In China, the Party’s push for influence inside foreign fir. [online] Reuters. Available at: https://www.reuters.com/article/us-china-congress-companies/exclusive-in-china-the-partys-push-for-influence-inside-foreign-firms-stirs-fears- idUSKCN1B40JU [Accessed 5 Jan. 2018].

[30] Bergerson, K. (2016). Cite a Website–Cite This For Me. [online] Uscc.gov. Available at: https://www.uscc.gov/sites/default/files/Research/USCC%20Staff%20Report%20on%20China%20Countering%20US%20Military%20Presence%20in%20Asia.pdf [Accessed19 Jan. 2018].

[31] YouTube. (2015). The New Authoritarians: Ruling Through Disinformation. [online] Available at: https://www.youtube.com/watch?v=d-vMix8dikg [Accessed 19 Jan. 2018].

[32] Navarro, P. (2016). China’s Non-Kinetic ‘Three Warfares’ Against America. [online] The National Interest. Available at: http:// nationalinterest.org/blog/the-buzz/chinas-non-kinetic-three-warfares-against-america-14808 [Accessed 19 Jan. 2018].

[33] Raska, M. (2015). China and the ‘Three Warfares’. [online] The Diplomat. Available at: https://thediplomat.com/2015/12/hybrid- warfare-with-chinese-characteristics-2/ [Accessed 5 Jan. 2018].

[34] King, G., Pan, J. and Roberts, M. (2017). How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument. [online] Gking.harvard.edu. Available at: http://gking.harvard.edu/50c [Accessed 19 Jan. 2018].

[35] Waddell, K. (2017). ‘Look, a Bird!’ How the Chinese Government Trolls by Distraction. [online] The Atlantic. Available at: https://www. theatlantic.com/technology/archive/2017/01/trolling-by-distraction/514589/ [Accessed 19 Jan. 2018].

[36] Doctorow, C. (2017). The first-ever close analysis of leaked astroturf comments from China’s “50c party” reveal Beijing’s cybercontrol strategy. [online] Boing. Available at: https://boingboing.net/2017/01/18/the-first-ever-close-analysis.html [Accessed 19 Jan. 2018].

[37] King, G., Pan, J. and Roberts, M. (2017). How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument. [online] Gking.harvard.edu. Available at: https://gking.harvard.edu/50c [Accessed 5 Jan. 2018].

[38] Lau, J. (2016). Who Are the Chinese Trolls of the ‘50 Cent Army’?. [online] VOA. Available at: https://www.voanews.com/a/who-is-that-chinese-troll/3540663.html [Accessed 5 Jan. 2018].

[39] Bernard, D. (2016). China’s 50 Cent Party: The Other Side of Censorship. [online] VOA. Available at: https://www.voanews.com/a/chinas-50-cent-party-the-other-side-of-censorship/3355262.html [Accessed 5 Jan. 2018].

[40] https://www.economist.com/news/middle-east-and-africa/21725288-big-ways-and-small-china-making-its-presence-felt-across

[41] Economist.com. (2017). China goes to Africa. [online] Available at: https://www.economist.com/news/middle-east-and- africa/21725288-big-ways-and-small-china-making-its-presence-felt-across [Accessed 5 Jan. 2018].

[42] Brookes, P. (2006). China’s Influence in Africa: Implications for the United States. [online] The Heritage Foundation. Available at: http://www.heritage.org/asia/report/chinas-influence-africa-implications-the-united-states [Accessed 5 Jan. 2018].

[43] Johnson, S. (2005). Balancing China’s Growing Influence in Latin America. [online] The Heritage Foundation. Available at: https://www.heritage.org/americas/report/balancing-chinas-growing-influence-latin-america [Accessed 19 Jan. 2018].

[44] Maskirovka: Russia’s Gray Zone Between Peace and War. [online] The Cipher Brief. Available at: https://www.thecipherbrief.com/maskirova-russias-gray-zone-peace-war [Accessed 5 Jan. 2018].

[45] Lister, T. (2017). Putin’s ‘chef,’ the man behind the troll factory. [online] CNN. Available at: http://www.cnn.com/2017/10/17/politics/russian-oligarch-putin-chef-troll-factory/index.html [Accessed 6 Jan. 2018].

[46] Sheth, S. (2017). ‘Our task was to set Americans against their own government’: New details emerge about Russia’s trolling operation. [online] Business Insider. Available at: https://amp.businessinsider.com/former-troll-russia-disinformation-campaign-trump-2017-10[Accessed 6 Jan. 2018].

[47] Williams, S. (2017). Rodrigo Duterte’s Army of Online Trolls. [online] New Republic. Available at: https://newrepublic.com/article/138952/rodrigo-dutertes-army-online-trolls [Accessed 5 Jan. 2018].

[48] Blackmore, S. (2016). Memes and the evolution of religion: We need memetics too. [online] Susanblackmore.co.uk. Available at: https://www.susanblackmore.co.uk/wp-content/uploads/2017/05/Memes-and-the-evolution-of-religion-We-need-memetics-too.pdf [Accessed 19 Jan. 2018].

[49] GrowChurch.net. (2018). Looking For Sermon Series Ideas? – A Year’s Preaching. [online] Available at: https://growchurch.net/looking- sermon-series-ideas-a-years-preaching [Accessed 19 Jan. 2018].

[50] Siegel, J. (2017). The Alt-Right and Antifa Are Waging a New Kind of Internet Warfare. [online] Vice. Available at: https://www.vice.com/ en_nz/article/7xxmad/the-alt-right-and-antifa-are-waging-a-new-kind-of-internet-warfare [Accessed 19 Jan. 2018].

[51] Scott, J. and Spaniel, D. (2017). ICIT Analysis: The Surveillance State & Censorship Legislation Conundrum: Dragnet Surveillance & Censorship. Legislation Will Do Nothing to Eliminate Cyber Jihad & Lone Wolf Recruiting. [online] Icitech.org. Available at: http://icitech.org/icit-analysis-the- surveillance-state-censorship-legislation-conundrum-dragnet-surveillance-censorship-legislation-will-do-nothing-to-eliminate-cyber-jihad-lone-wolf-recruiting/ [Accessed 19 Jan. 2018].

Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Youtube
Consent to display content from Youtube
Vimeo
Consent to display content from Vimeo
Google Maps
Consent to display content from Google