Abstract

This paper aims to discuss how disinformation has become the most powerful tool used against the United State by foreign operatives. Of these foreign operatives, Russia and China have shown the ability to use advanced tactics to truly affect the United States security. Often these tools came in the form of state-sponsored media, influence campaigns and fake online identities. This literature review explores the evolution of Russian and Chinese disinformation tactics, examining how these approaches have changed over time and become more sophisticated. This paper will highlight major campaigns which use tools such as bot networks, and social media manipulation. The findings display the complex threat these sorts of tactics pose to the United States cyber and national security. By tracing their evolution we were able to stress the importance of stronger cybersecurity measures to defend against ongoing operations.

Faculty Advisor/Mentor

Saltuk Karahan

Document Type

Paper

Disciplines

Cybersecurity

DOI

10.25776/xkfe-pg95

Publication Date

4-17-2025

Upload File

wf_yes

Included in

Cybersecurity Commons

Share

COinS
 

The Evolution of Russian and Chinese Disinformation Tactics and the Threat They Pose to the U.S. Cybersecurity

This paper aims to discuss how disinformation has become the most powerful tool used against the United State by foreign operatives. Of these foreign operatives, Russia and China have shown the ability to use advanced tactics to truly affect the United States security. Often these tools came in the form of state-sponsored media, influence campaigns and fake online identities. This literature review explores the evolution of Russian and Chinese disinformation tactics, examining how these approaches have changed over time and become more sophisticated. This paper will highlight major campaigns which use tools such as bot networks, and social media manipulation. The findings display the complex threat these sorts of tactics pose to the United States cyber and national security. By tracing their evolution we were able to stress the importance of stronger cybersecurity measures to defend against ongoing operations.