Przejdź do treści

Perspectives for Influence Operations Investigators

In a deteriorating international climate, influence operations span countless targets, platforms, and jurisdictions, which can complicate data collection and research. Often collated with adjacent issues like cybersecurity, hybrid operations, and information interference, influence operations offer multiple entry points, angles, and levels of analysis. As an influence operations researcher, clearly defining and recording your methodology will provide you with a solid basis for your investigation. A sound methodology will not only allow you to see where the limits and gaps in your analysis might be but also brings transparency to your work, allowing other researchers to better understand and accept your conclusions.

More external publications

  • Research and Analysis
Hand and Glove: How Authoritarian Cyber Operations Leverage Non-state Capabilities

26 June 2025
In this article, Jakob Bund examines how authoritarian states like Russia, China, and North Korea increasingly harness non-state cyber actors to expand their capabilities, blur attribution, and complicate global responses. He argues that this growing fusion of state and criminal or contractor activity demands integrated threat assessments and response tools that can operate independently of political attribution.

Welcome to our Cyber Incident Dashboard!

For best results, please view on a desktop device.