72.2 F
Washington D.C.
Wednesday, June 12, 2024

Don’t Be a Target: How to Identify Adversarial Propaganda

Adversarial disinformation campaigns and influence operations are “gray zone” activities that use technology and tactics to disguise themselves.

Strategic competitors, adversaries and proxies use information to gain an advantage over the U.S. joint force.

Adversarial disinformation campaigns and influence operations are “gray zone” activities that use technology and tactics to disguise themselves, making it challenging to identify the source of the content.

“At the United States Cyber Command, we see the influence piece, which is much more prevalent these days,” said U.S. Army Gen. Paul M. Nakasone, commander, U.S. Cyber Command during congressional testimony in March 2023.

Nakasone said that CYBERCOM’s operations aim to disrupt adversary campaigns designed to harm America by going “after troll farms and other different actors that are trying to create influence.”

Read more at U.S. Cyber Command

author avatar
Homeland Security Today
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.
Homeland Security Today
Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

Latest Articles