Abstract
This paper aims to discuss how disinformation has become the most powerful tool used against the United State by foreign operatives. Of these foreign operatives, Russia and China have shown the ability to use advanced tactics to truly affect the United States security. Often these tools came in the form of state-sponsored media, influence campaigns and fake online identities. This literature review explores the evolution of Russian and Chinese disinformation tactics, examining how these approaches have changed over time and become more sophisticated. This paper will highlight major campaigns which use tools such as bot networks, and social media manipulation. The findings display the complex threat these sorts of tactics pose to the United States cyber and national security. By tracing their evolution we were able to stress the importance of stronger cybersecurity measures to defend against ongoing operations.
Faculty Advisor/Mentor
Saltuk Karahan
Document Type
Paper
Disciplines
Cybersecurity
DOI
10.25776/xkfe-pg95
Publication Date
4-17-2025
Upload File
wf_yes
Included in
The Evolution of Russian and Chinese Disinformation Tactics and the Threat They Pose to the U.S. Cybersecurity
This paper aims to discuss how disinformation has become the most powerful tool used against the United State by foreign operatives. Of these foreign operatives, Russia and China have shown the ability to use advanced tactics to truly affect the United States security. Often these tools came in the form of state-sponsored media, influence campaigns and fake online identities. This literature review explores the evolution of Russian and Chinese disinformation tactics, examining how these approaches have changed over time and become more sophisticated. This paper will highlight major campaigns which use tools such as bot networks, and social media manipulation. The findings display the complex threat these sorts of tactics pose to the United States cyber and national security. By tracing their evolution we were able to stress the importance of stronger cybersecurity measures to defend against ongoing operations.