{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T22:48:06Z","timestamp":1777330086961,"version":"3.51.4"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,25]]},"DOI":"10.23919\/cycon51939.2021.9468292","type":"proceedings-article","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T20:27:07Z","timestamp":1625516827000},"page":"257-273","source":"Crossref","is-referenced-by-count":2,"title":["Windmills of the Mind: Higher-Order Forms of Disinformation in International Politics"],"prefix":"10.23919","author":[{"given":"James","family":"Shires","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"The &#x2018;Macron Leaks' Operation: A Post-Mortem","author":"vilmer","year":"2019","journal-title":"Atlantic Council"},{"key":"ref38","article-title":"Summary: Department of Defense Cyber Strategy","year":"2018","journal-title":"Washington DC"},{"key":"ref33","article-title":"The Simulation of Scandal: Hack-and-Leak Operations, the Gulf States, and U.S. Politics","author":"james","year":"2020","journal-title":"Texas Nat Security Rev"},{"key":"ref32","article-title":"The Cyber Operation against Qatar News Agency","author":"james","year":"2020","journal-title":"The 2017 Gulf Crisis An Interdisciplinary Approach"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1080\/23738871.2019.1636108","article-title":"Hack-and-Leak Operations: Intrusion and Influence in the Gulf","volume":"4","author":"james","year":"2019","journal-title":"Journal of Cyber Policy"},{"key":"ref30","author":"sonam","year":"2020","journal-title":"Trump's Spy Chief Just Released &#x2018;Russian Disinformation&#x2019; against Hillary Clinton that He Acknowledged May Be Fabricated"},{"key":"ref37","author":"craig","year":"2021","journal-title":"When U S Blamed Saudi Crown Prince for Role in Khashoggi Killing Fake Twitter Accounts Went to War"},{"key":"ref36","first-page":"1","article-title":"U.S. Cyber Strategy of Persistent Engagement and Defend Forward: Implications for the Alliance and Intelligence Collection","author":"max","year":"2020","journal-title":"Intelligence and National Security"},{"key":"ref35","author":"brooke","year":"2020","journal-title":"DNI Declassifies Brennan Notes CIA Memo on Hillary Clinton &#x2018;Stirring up&#x2019; Scandal between Trump Russia"},{"key":"ref34","article-title":"Understanding the Tactics behind Hack-and-Leak Operations","author":"james","year":"2020","journal-title":"Atlantisch Perspectief4"},{"key":"ref10","author":"ronald","year":"2020","journal-title":"J Reset Reclaiming the Internet for Civil Society"},{"key":"ref40","article-title":"Trigger Warning: The CCP's Coordinated Information Effort to Discredit the BBC","author":"jacob","year":"2021","journal-title":"Canberra Australian Strategic Policy Institute"},{"key":"ref11","author":"andrew","year":"2020","journal-title":"Intel Chief Releases Russian Disinfo on Hillary Clinton That Was Rejected by Bipartisan Senate Panel"},{"key":"ref12","author":"jerry","year":"2020","journal-title":"Obama Was Briefed on Unverified Russian Report Claiming Clinton Approved Plan to Tie Trump to Putin and DNC Hack"},{"key":"ref13","article-title":"A Multi-Dimensional Approach to Disinformation: Report of the Independent High Level Group on Fake News and Online Disinformation","year":"2018","journal-title":"Luxembourg European Commission Directorate-General for Communication Networks Content and Technology"},{"key":"ref14","year":"2020","journal-title":"February 2020 Coordinated Inauthentic Behavior Report"},{"key":"ref15","first-page":"17","article-title":"Enabling the Army in an Era of Information Warfare","volume":"5","author":"fogarty","year":"2020","journal-title":"Cyber Defense Rev"},{"key":"ref16","author":"nathaniel","year":"2020","journal-title":"Removing Coordinated Inauthentic Behavior from France and Russia"},{"key":"ref17","author":"brian","year":"2020","journal-title":"John Ratcliffe's Dangerous Declassification Game"},{"key":"ref18","article-title":"Tainted Leaks: Disinformation and Phishing With a Russian Nexus","author":"adam","year":"2017","journal-title":"Citizen Lab"},{"key":"ref19","author":"kathleen hall","year":"2018","journal-title":"Cyberwar How Russian Hackers and Trolls Helped Elect a President - What We Don't Can't and Do Know"},{"key":"ref28","author":"thomas","year":"2020","journal-title":"Active Measures The Secret History of Disinformation and Political Warfare"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1017\/S002081832000051X","article-title":"What's in a Name? Metaphors and Cybersecurity","volume":"75","author":"jordan","year":"2021","journal-title":"International Organization"},{"key":"ref27","first-page":"512","article-title":"The Leaky Leviathan: Why the Government Condemns and Condones Unlawful Disclosures of Information","volume":"127","author":"david","year":"2013","journal-title":"Harvard Law Review"},{"key":"ref3","author":"sissela","year":"1989","journal-title":"Secrets On the Ethics of Concealment and Revelation"},{"key":"ref6","author":"david","year":"1998","journal-title":"Writing Security United States Foreign Policy and the Politics of Identity"},{"key":"ref29","article-title":"Common-Knowledge Attacks on Democracy","author":"bruce","year":"2018","journal-title":"Berkman Klein Center for Internet and Society"},{"key":"ref5","author":"ben","year":"2020","journal-title":"The Hacker and the State Cyber Attacks and the New Normal of Geopolitics"},{"key":"ref8","author":"catalin","year":"2019","journal-title":"US Wiped Hard Drives at Russia's &#x2018;Troll Factory&#x2019; in Last Year's Hack"},{"key":"ref7","author":"andy","year":"2020","journal-title":"Operation Carthage How a Tunisian Company Conducted Influence Operations in African Presidential Elections"},{"key":"ref2","author":"yochai","year":"2018","journal-title":"Network propaganda Manipulation disinformation and radicalization in American politics"},{"key":"ref9","author":"zachary","year":"2020","journal-title":"Former CIA Director Accuses Intel Chief of Selectively Declassifying Documents to Help Trump"},{"key":"ref1","article-title":"The Use of Cybertools in an Internationalized Civil War Context: Cyber Activities in the Syrian Conflict","author":"marie","year":"2017","journal-title":"CSS Cyber Defense Project Center for Security Studies ETH Zurich"},{"key":"ref20","article-title":"On Cyber-Enabled Information\/Influence Warfare and Manipulation","author":"kerr","year":"2017","journal-title":"SSRN"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1017\/eis.2019.6","article-title":"Dis information in International Politics","volume":"4","author":"alexander","year":"2019","journal-title":"European Journal of International Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316218969"},{"key":"ref24","author":"mueller","year":"2019","journal-title":"Report on the Investigation into Russian Interference in the 2016 Presidential Election Submitted Pursuant to 28 C F R &#x00A7; 600 8(c)"},{"key":"ref41","author":"patrick","year":"2021","journal-title":"China Bans BBC World News in Retaliation for UK Licence Blow"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-102801-5.50016-9"},{"key":"ref26","article-title":"Secondary Infektion","author":"ben","year":"2020","journal-title":"Graphika"},{"key":"ref25","author":"hannah","year":"2019","journal-title":"Conservative Party's &#x2018;FactcheckUK&#x2019; Twitter Stunt Backfires"}],"event":{"name":"2021 13th International Conference on Cyber Conflict (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2021,5,25]]},"end":{"date-parts":[[2021,5,28]]}},"container-title":["2021 13th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9467797\/9467799\/09468292.pdf?arnumber=9468292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T22:11:47Z","timestamp":1628547107000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9468292\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":41,"URL":"https:\/\/doi.org\/10.23919\/cycon51939.2021.9468292","relation":{},"subject":[],"published":{"date-parts":[[2021,5,25]]}}}