Cyber-attacks have become common occurrences which have an impact on all aspects of life ranging from business transactions to personal communications. Alarmingly, coordinated cyber-attacks are increasingly targeting politicians and their associates, political campaigns, political organizations and the broader public with political messaging. Given the novelty of these new forms of attacks, little is known of their potential impact. This thesis argues that states, state-directed actors, or non-state actors are disrupting, altering or influencing the electoral process in democratic states through coordinated cyber operations. It further argues that the purpose is to increase hyper-partisanship and erode the legitimacy of democratically-elect...
Even though there has been a rapid increase in state cybercapacity over the last two decades, resear...
The United States and its allies have been subjected to clandestine interference campaigns led by th...
Adversaries launch cyberattacks or cyber-exploits with contrasting intentions and desired outcomes. ...
Cyber-attacks have become common occurrences which have an impact on all aspects of life ranging fro...
A recent report prepared for the Senate Foreign Relations Committee unveiled President Putin’s motiv...
This dissertation studies recent types of Cyberthreats to Western democracies, most notably Russia‘s...
Since the 2016 U.S. presidential election, the threat of foreign interference in U.S. elections has ...
This work addresses how and why Russia interfered in the United States 2016 presidential election, a...
This paper primarily addresses the reasoning behind the 2016 cyber-attack orchestrated by the Russia...
This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspa...
Interstate conflict has developed beyond conventional tactics to include the cyber realm, making cyb...
The US Presidential elections of 2016 were marked by the breaches into the Democratic National Commi...
The 2016 U.S. presidential election is seen as a masterpiece of effective disinformation tactics. Co...
Cyber operations are constantly evolving as states discover new tactics to achieve strategic goals. ...
With the Russian government hack of the Democratic National Convention email servers and related lea...
Even though there has been a rapid increase in state cybercapacity over the last two decades, resear...
The United States and its allies have been subjected to clandestine interference campaigns led by th...
Adversaries launch cyberattacks or cyber-exploits with contrasting intentions and desired outcomes. ...
Cyber-attacks have become common occurrences which have an impact on all aspects of life ranging fro...
A recent report prepared for the Senate Foreign Relations Committee unveiled President Putin’s motiv...
This dissertation studies recent types of Cyberthreats to Western democracies, most notably Russia‘s...
Since the 2016 U.S. presidential election, the threat of foreign interference in U.S. elections has ...
This work addresses how and why Russia interfered in the United States 2016 presidential election, a...
This paper primarily addresses the reasoning behind the 2016 cyber-attack orchestrated by the Russia...
This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspa...
Interstate conflict has developed beyond conventional tactics to include the cyber realm, making cyb...
The US Presidential elections of 2016 were marked by the breaches into the Democratic National Commi...
The 2016 U.S. presidential election is seen as a masterpiece of effective disinformation tactics. Co...
Cyber operations are constantly evolving as states discover new tactics to achieve strategic goals. ...
With the Russian government hack of the Democratic National Convention email servers and related lea...
Even though there has been a rapid increase in state cybercapacity over the last two decades, resear...
The United States and its allies have been subjected to clandestine interference campaigns led by th...
Adversaries launch cyberattacks or cyber-exploits with contrasting intentions and desired outcomes. ...