The Opening of the North Korean Mind
Pyongyang Versus the Digital Underground
Advice for Young Muslims
How to Survive in an Age of Extremism and Islamophobia
The Jacksonian Revolt
American Populism and the Liberal Order
How America Lost Faith in Expertise
And Why That's a Giant Problem
Asia's Other Revisionist Power
Why U.S. Grand Strategy Unnerves China
A Vision of Trump at War
How the President Could Stumble Into Conflict
Intelligence and the Presidency
How to Get It Right
Where to Go From Here
Rebooting American Foreign Policy
The Korean Missile Crisis
Why Deterrence Is Still the Best Option
When Stalin Faced Hitler
Who Fooled Whom?
How to Counter Fake News
Technology Can Help Distinguish Fact From Fiction
Trump Takes Aim at the European Union
Why the EU Won't Unify In Response
Good Foreign Policy Is Invisible
Why Boring Is Better
The Coming Islamic Culture War
What the Middle East's Internet Boom Means for Gay Rights, and More
The Women Who Escaped ISIS
From Abused to Accused
Who Is Narendra Modi?
The Two Sides of India's Prime Minister
Democracy Is Not Dying
Seeing Through the Doom and Gloom
How a Nazi Massacre Came to Be Remembered as Its Opposite
Is Putin Losing Control of Russia's Conservative Nationalists?
What the Matilda Controversy Reveals About His Rule
China's Return to Strongman Rule
The Meaning of Xi Jinping's Power Grab
During the 2016 U.S. presidential election, Macedonian teens looking to get paid for ad-clicks, Russian cyber sophisticates apparently looking to tilt the outcome, and some homegrown mood manipulators broadcast outrageous and false stories packaged to look like real news. Their counterfeit posts were nearly indistinguishable from authentic coin and remain so, even in the face of skeptical but impatient fact-checking.
Although much of the establishment has been left wringing its hands about what to do—how to ferret out fake news and those who produce it—there are already tools and systems to help digital investigations and gumshoe reporters connect the dots and discover scams. Metadata—the data about data—can provide a digital signature to identify actors on the Internet. And the Web itself allows us to examine timelines, serialize events, and identify primary sources. Some signatures are harder to find than others, but they are all there; you just need to know where to look and what to analyze.
Indeed, the intelligence community already thwarts terrorist attacks through methods like these, known in the vernacular as “tools, processes, and procedures,” and the Department of Homeland Security maintains a knowledge center of vulnerabilities. Such work will be aided by the newly created Global Engagement Center, (section 1287 of the National Defense Authorization Act signed by U.S. President Barack Obama just before Christmas), which expands the government’s repertoire and mandate to “identify current and emerging trends in foreign propaganda and disinformation in order to coordinate and shape the development of tactics, techniques, and procedures to expose and refute foreign misinformation and disinformation and proactively promote fact-based narratives and policies to audiences outside the United States.”
The language comes from a cybersecurity bill that U.S. Senator Rob Portman (R-Ohio) introduced last spring. According to co-sponsor Chris Murphy (D-Conn.), the United States now has dedicated “resources to confront our adversaries’ widespread efforts to spread false narratives that undermine democratic institutions and compromise America’s foreign policy goals” in the digital age.
Loading, please wait...