Search Results
Your search for Megan McBride found 34 results.
- USMC Twitter Activity Relating to 2021 Extremism
- /reports/2021/10/usmc-twitter-activity-relating-to-2021-extremism
- This short paper captures the results of a recent proof-of-concept analysis that CNA conducted to assess activity within the USMC community that mentioned the issue of extremism. This particular case was tightly focused, however, this type of analysis can easily be scoped to answer a range of important questions. It can center on a community, topic, geographic region, or timeframe. It can be used narrowly to assess how a specific policy is being received (as in the case study outlined below) or broadly to assess the health of an online community (e.g., identifying sources of disinformation). Additionally, while the case below focuses on Twitter, analysis can be conducted on data from a range of social media platforms. The case described below was designed to illustrate the type of analysis that is possible and to demonstrate the value that it can provide to those active on social media.
- linked to extremism. Dr. Megan K. McBride Mr. Rikesh Nana /reports/2021/10/CNA-Case-Study-USMC-Twitter-Activity-Relating-to-the-2021-Extremism-Stand-Down.pdf /reports/2021/10/USMC.jpg /images
- The Psychology of Disinformation Case Studies
- /reports/2021/10/the-psychology-of-disinformation-case-studies
- The absorption and spread of disinformation is a pervasive phenomenon across a wide variety of topics and media. Most disinformation research focuses on the source (who created it?) and the environment in which it exists (what platform/medium transmits the information?). Recognizing that disinformation primarily works in an individual person’s mind, this report describes four normal, routine psychological mechanisms that are associated with the absorption and spread of disinformation. We then describe real-world case studies—focusing on activities linked to COVID-19, and to campaigns coordinated by US adversaries including Russia, China, and Iran—to illustrate the way these mechanisms can be manipulated to aid the spread disinformation. The report concludes with multi-pronged recommendations that DOD can use to address the vulnerabilities associated with these psychological mechanisms so as prevent the spread of disinformation and protect both US servicemembers and the country.
- , it appears that disinformation is absorbed and spread through normal, routine, and adaptive mechanisms, which malign actors can exploit and manipulate for their own objectives. Megan McBride
- Psychology of Disinformation Key Psychological Mechanisms
- /reports/2021/10/psychology-of-disinformation-key-psychological-mechanisms
- We explore the underlying psychological principles facilitating the absorption and spread of disinformation and outline options for countering disinformation grounded in in cognitive and social psychological literature.
- Countering Threats and Challenges DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited. 72 DRM-2021-U-029337-1Rev Neil Carey Megan K. McBride
- Right Wing Extremism in US Law Enforcement
- /reports/2021/04/right-wing-extremism-in-us-law-enforcement
- This paper provides an overview of the current state of knowledge about police officer engagement in rightwing extremism, including the sustained use of racist, misogynistic, and homophobic language and stereotyping, both online and offline. After surveying the contemporary right-wing extremist landscape, this paper uses publicly available sources to explore in a preliminary way aspects of extremist penetration and recruitment, pre-employment screening challenges, police participation in extremist activity, and the role of social media platforms and the internet in enabling extremism. The paper concludes with a set of analytical questions that practitioners and policy-makers must answer if they hope to mitigate the rightwing extremist threat.
- extremist threat. William Rosenau Megan McBride /reports/2021/04/what-we-know-and-what-we-dont-know-about-the-presence-of-right-wing-extremism-in-law-enforcement.pdf /reports/2021/04
- Understanding Gender and Violent
- /reports/2021/04/understanding-gender-and-violent
- The Office of the Assistant Secretary of Defense for Special Operations/Low Intensity Conflict – Stability and Humanitarian Affairs (OASD (SO/LIC-SHA)) asked CNA to study the role of women and gender in both violent extremist organizations (VEOs) and US counterterrorism (CT) and counter violent extremism (CVE) operations (hereafter CT/CVE). Our research demonstrates that the dominant stereotypes about women’s roles in VEOs miss the vast majority of female activity in these groups and fundamentally fail to capture women’s lived experiences. Despite the passage of Women, Peace, and Security (WPS) legislation in the US, we found that internal DOD activities that are truly gender considered are severely limited, lack nuance, and are not institutionalized. External US CT/CVE efforts do not consider the roles men or women play from a nuanced perspective, and they are disproportionately influenced by a set of gender stereotypes that shape expectations of men and women’s roles. Much of the current DOD approach can be traced to misunderstanding gender as a concept. This report provides an analysis of the gaps, risks, and opportunities for the Department of Defense (DOD) on understanding women and gender in extremism, and integrating a gender considered approach to CT/CVE.
- , or activities. Pamela G. Faber Megan K. McBride /reports/2021/04/Understanding-Gender-and-Violent-Extremism.pdf /reports/2021/04/Understanding-Gender-and-Violent-Extremism.PNG /reports/2021/04
- Viral Extremism COVID19 and Nontraditional Threats
- /reports/2021/03/viral-extremism-covid19-and-nontraditional-threats
- This policy brief, developed in collaboration with counterterrorism (CT) experts at CNA, seeks to answer the question of how the COVID-19 pandemic has affected domestic and international violent extremist organizations (VEOs), the US CT community, and the ability of US partners to support CT operations. Importantly, it provides a snapshot of how pandemics and other nontraditional threats can drive a cycle of violence in the future. This brief concludes that nearly every facet of VEO activities—environment, operations, resources, recruitment, and strategy—has benefitted from the chaotic and widespread effects of the pandemic. Conversely, US and partner forces tasked with containing the threat posed by terrorist groups have been affected negatively across these same five areas.
- political unrest, including the January 6, 2021, storming of the US Capitol, has drawn attention to domestic security issues. Pamela G. Faber Megan K. McBride /reports/2021/03/IOP-2021-U-029346-Final.pdf
- Social Media Bots: Laws
- /reports/2020/09/social-media-bots-laws
- While social media bots have the ability to greatly affect US national security and public discourse, the current landscape of US federal and state laws regulating such bots is limited. This study explores the challenges inherent to passing social media bot-related legislation and details current efforts to do so, including at the federal and state levels. It briefly explores the context in the European Union as well. This paper then discusses the dilemmas social media companies face as they think about effective bot policies and identifies the four main categories of policies through which the social media platforms regulate the use of bots on their sites. As they face evolving threats from bots, the social media companies will continue to adapt their policies accordingly, though it remains an open question whether and to what extent these companies should regulate themselves in the face of additional pressure from Congress and the public.
- on these issues. Kasey Stricklin Megan K McBride /reports/2020/10/DIM-2020-U-028193-Final.pdf /reports/2020/10/DIM-2020-U-028193-Final.png /reports/2020/10/jack%20dorsey.png Countering Threats
- Implication of Social Media Bots
- /reports/2020/09/implication-of-social-media-bots
- CNA initiated this study of social media bots—automated programs on social media platforms—to explore their implications for US special operations forces (SOF) and the broader national security community. This report explains social media bots and botnets, explores the threat of automation and the role of social media bots as a tool of disinformation, and introduces a taxonomy of six activities that social media bots and botnets can engage in: distributing, amplifying, distorting, hijacking, flooding, and fracturing. It then identifies likely evolutions in the nearto mid-term futures and explores the implications of those futures for SOF. The report examines opportunities and risks for SOF and concludes with examples of potential SOF use in each of the six identified social media bot and botnet activities.
- by humans but could have been conducted by social media bots or botnets. Megan K. McBride Zack Gold /reports/2020/09/DRM-2020-U-028199-Final.pdf /reports/2020/09/DRM-2020-U-028199-Final.png
- Cryptocurrency Implications
- /reports/2019/08/cryptocurrency-implications
- Cryptocurrencies are strictly digital currencies, are typically overseen by a decentralized peer-to-peer community, and are secured through cryptography. Cryptocurrencies have relative benefits for those who engage in illicit activity. This paper includes: (1) a detailed taxonomy and examples of nefarious activities involving cryptocurrencies, such as funding terrorist activity, money laundering, cybercrimes, and regulatory crimes; (2) a discussion of state-actor engagement in the cryptocurrency arena that explores Iranian, North Korean, Russian, and Venezuelan activity in skirting sanctions, mining cryptocurrencies, participating in exchange hacking and ransomware, and using cryptocurrencies to fund information operations; (3) analysis attempting to anticipate the mid-term future of the cryptocurrency ecosystem; and (4) the tactical and strategic challenges and opportunities of cryptocurrencies for US special operations forces.
- challenges and opportunities do cryptocurrencies present to SOF given the current (and potential future) state of affairs? Megan McBride Zack Gold /reports/2019/08/CRM-2019-U-020186-Final.pdf /reports/2019/08
- Cryptocurrency Primer for Policymakers
- /reports/2019/08/cryptocurrency-primer-for-policymakers
- This primer is an effort to address a gap in knowledge about cryptocurrencies and the cryptocurrency ecosystem among the policymaking community and advance the understanding of cryptocurrencies and consideration of their national security implications. Cryptocurrencies are strictly digital currencies, are typically overseen by a decentralized peer-to-peer community, and are secured through cryptography. We use clear, non-technical language to describe complex concepts and demystify overly technical terms in order to explain the technical and economic aspects of cryptocurrency, why they are used, and the benefits and drawbacks to cryptocurrencies compared to conventional currencies—like the US dollar. We conclude by considering some cryptocurrency-related issues of which greater exploration would benefit US national security.
- be extremely volatile. Cryptocurrencies typically have longer transaction times. Cryptocurrency transactions are pseudonymous or anonymous. Zack Gold Megan McBride /reports/2019/08