Overview
Syllabus
Introduction
The National Security Division
A real case
The aftermath
Every day
International terrorism cases
Crowdsource terrorism
Junaid Hussain
The blended threat
Complexity of the problem
The first case
The Wild West
North Korea
Weaponizing information
Panelists
The Disinformation Problem
Three Different Issues
Narrative Laundering
Privacy Regulation
Privacy vs Manipulation
Three Waves
Parallels
Solutions
Privacy
Computational Propaganda
Information Sharing
Regulation
Frameworks
How are you fixing this
New Executive Order
The Spectre
Critical
Cybersecurity Summit
Data Sharing
Defense Plans
Ecosystem
US vs China
Taught by
The Aspen Institute