02.12.2015 Views

Strategic Communications and Social Media in the Russia Ukraine Conflict

CyberWarinPerspective_Lange_Svetoka_12

CyberWarinPerspective_Lange_Svetoka_12

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

El<strong>in</strong>a Lange-Ionatamishvili <strong>and</strong> S<strong>and</strong>a Svetoka of <strong>the</strong> NATO <strong>Strategic</strong><br />

<strong>Communications</strong> Centre of Excellence <strong>in</strong> Latvia, <strong>in</strong> Chapter 12,<br />

discuss <strong>the</strong> role of social media <strong>in</strong> this conflict. In <strong>the</strong> Internet era,<br />

<strong>the</strong> battle for hearts <strong>and</strong> m<strong>in</strong>ds has never been more important. <strong>Social</strong><br />

media is a trust-based network that provides fertile soil for <strong>in</strong>telligence<br />

collection, propag<strong>and</strong>a dissem<strong>in</strong>ation, <strong>and</strong> psychological operations<br />

(PSYOPS) to <strong>in</strong>fluence public op<strong>in</strong>ion – or to lead adversaries <strong>in</strong>to<br />

harm’s way. ‘Soft’ cyber attacks can be as severe as any attack on critical<br />

<strong>in</strong>frastructure. In Ukra<strong>in</strong>e, <strong>the</strong>y have generated fear, uncerta<strong>in</strong>ty, <strong>and</strong><br />

doubt about <strong>the</strong> economic, cultural, <strong>and</strong> national security of Ukra<strong>in</strong>e,<br />

while promot<strong>in</strong>g positive messages about <strong>Russia</strong>’s role <strong>in</strong> Crimea <strong>and</strong><br />

eastern Ukra<strong>in</strong>e. The authors provide recommendations for defence<br />

aga<strong>in</strong>st such attacks, <strong>in</strong>clud<strong>in</strong>g how to identify <strong>the</strong>m, challenge <strong>the</strong>m,<br />

<strong>and</strong> how to develop a resilient political narrative to withst<strong>and</strong> false<br />

propag<strong>and</strong>a.<br />

Disclaimer<br />

This publication is a product of <strong>the</strong> NATO Cooperative Cyber Defence Centre of Excellence<br />

(<strong>the</strong> Centre). It does not necessarily reflect <strong>the</strong> policy or <strong>the</strong> op<strong>in</strong>ion of <strong>the</strong><br />

Centre or NATO. The Centre may not be held responsible for any loss or harm aris<strong>in</strong>g<br />

from <strong>the</strong> use of <strong>in</strong>formation conta<strong>in</strong>ed <strong>in</strong> this publication <strong>and</strong> is not responsible for <strong>the</strong><br />

content of <strong>the</strong> external sources, <strong>in</strong>clud<strong>in</strong>g external websites referenced <strong>in</strong> this publication.<br />

Digital or hard copies of this publication may be produced for <strong>in</strong>ternal use with<strong>in</strong><br />

NATO <strong>and</strong> for personal or educational use when for non-profit <strong>and</strong> non-commercial<br />

purpose, provided that copies bear a full citation. Please contact publications@ccdcoe.<br />

org with any fur<strong>the</strong>r queries.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!