SlideShare a Scribd company logo
1 of 11
VladiNet and PutinBots
The Putinisation of the Russian Internet
Simon Ross
Putinisation and implications
Putinisation is a shift from liberal, democratic values to a more authoritarian control and use of information,
nationally and internationally, to ensure government longevity.
International sanctions imposed after Russia’s annexation of Crimea have accelerated the Kremlin’s need to
use digital communications to mitigate economic uncertainty.
To defeat a perceived Russophobe mentality among western leaders, the Kremlin assists political entities,
primarily far right candidates, that could help end or ease sanctions.
Resultantly, the Kremlin uses manipulative and disruptive strategies to distort the reliability and very narrative
of the news across foreign countries.
Russian digital skepticism
The first act of cyber-espionage against the Russians was in 1982 when a virus caused a pipeline explosion
(Barmin, Jones, Moiseeva & Winkelman, 2011).
The Arab Spring revolutions demonstrated the vulnerability of authoritarian governments to the internet
despite obedient mainstream media.
WikiLeaks and the 2013 Edward Snowden revelations on CIA surveillance justifiably concerned the Kremlin.
The Kremlin portrays crackdowns as patriotic to give policies legitimacy (Nocetti, 2015). This opposes
Introna’s (1997) idea that privacy preservation is better for communal good to ensure individualism.
The RuNet’s evolution
The RuNet, the Russian Internet, was built with western technology and its first 20 years were “free and open”
(Soldatov, 2017).
The RuNet has experienced 3 distinct chapters (Kolozaridi & Shubenkova, 2016):
- 1994 to 1999: “weakly” and not widely utilised
- 2000 to 2011: a benefit to “public development”
- 2012 to 2014: a social, national and security “threat”
Lessig’s (1998) views of privacy - focusing on the monitored, searchability and protections - reveal Russians
could be more vulnerable to Kremlin tyranny if foreign companies move servers to Russia.
Putin’s destabilising of online freedom
The government, since 2012, negates the democratic potential of the RuNet through:
- Self-censorship (Ognyanova, 2010)
- Coercing ISPs to burden surveillance costs to collaborate with security agencies (Soldatov, 2016) using
informal intimidation (Soldatov, 2017)
- Implementing vague legislation that constantly requires Kremlin clarification (Soldatov, 2017)
The ISPs have been much easier to control than their users (Soldatov, 2017) as citizens can restrict access to
content meaning (Marwick & boyd, 2014).
Alexei Navalny - Putin’s digital nemesis
41-year-old blogger, lawyer and activist with democratic but populist views, Navalny has coordinated many
anti-corruption protests despite repeated imprisonment and intimidation.
- Capitalises on social media
- Won 27% of vote in 2013 Moscow mayor bid despite ban from mainstream TV
- Coordinated unprecedented 2011 Duma and 2012 Presidential protests
Putin will likely prevent Navalny from competing in the 2018 presidential election and choose a more
preferential opponent.
Chess grandmaster and fierce Putin-critic Garry Kasparov, has also forwarded himself as a possible
candidate.
A Russian Facebook and the Kremlin Coup
Founded by Pavel Durov, VKontakte is the most popular social network in Russia. However, the 2011 and 2012
protests were coordinated through Facebook due to its reduced vulnerability to federal monitoring and
interference (White & McAllister, 2014).
Following Russia’s 2014 annexation of Crimea, the government requested the censorship of VKontakte
groups linked to Alexei Navalny.
- Durov refused, was fired and went into exile
- Kremlin-loyal oligarchs now own VKontakte (Soldatov & Borogan, 2015)
Digital policy has “unintended consequences” (Villeneuve, 2006) and Russian soldiers uploaded media to
Vkontakte during fighting in eastern Ukraine as the Kremlin denied involvement (Soldatov, 2017).
International Putinisation
The Kremlin funds political parties and movements to strengthen Russian influence abroad (Chivvis, 2017)
and uses cyber espionage to help favoured candidates.
- Destabilising Hillary Clinton’s 2016 presidential bid was a Kremlin “imperative” (Maréchal, 2017)
- Troll factories and bots are employed to aggressively spread propaganda across foreign media outlets
(Aro, 2016)
Cyberbulling tactics, “willful and repeated harm inflicted through the medium of electronic text” (Patchin &
Hinduja, 2006), are an important aspect of silencing national and international opposition.
Putinisation effectiveness
Federal agencies can block media produced by reporters or activists but not content spread by thousands
(Soldatov, 2017).
The horizontal nature of the RuNet poses an unprecedented challenge to the Kremlin compared to vertical
communication during the cold war (Soldatov & Borogan, 2015).
Overtly aggressive pro-Kremlin trolling tactics are less effective at influencing foreign opinion than subtle
commentary as that is harder to distinguish (Aro, 2016).
The majority of public opinion now favours censorship (Lipman, 2014) demonstrating Russians have accepted
reduced freedoms to preserve core values (Armstrong & Forde, 2003).
Conclusions
Putin’s digital crackdown is a recognition of his own vulnerability to the internet and, primarily, social
media.
The imposition of sanctions has led to a more international digital strategy to advance the Kremlin’s
interests.
The distinction must always be made separating authoritarian governments from the nation state
especially where democracy, the rule of law and accountability are dispensable.
2018 will be a vital year for Russia and the international community. Could there be a President
Navalny? Never rule it out.
References
Aro, J. (2016). The cyberspace war: propaganda and trolling as warfare tools. European View, 15(1), pp.121-132.
Barmin, Y., Jones, G., Moiseeva, S., & Winkelman, Z. (2011). International Arms Control and Law Enforcement in the Information Revolution: An
Examination of Cyber Warfare and Information Security. Connections: The Quarterly Journal, 10(4), pp.73-93.
Cassiday, J.A., & Johnson, E.D. (2010). Putin, Putiniana and the Question of a Post-Soviet Cult of Personality. The Slavonic and East European Review,
88(4), pp.681-707.
Chivvis, C.S. (2017). Hybrid war: Russian contemporary political warfare. Bulletin of the Atomic Scientists, 73(5), pp.316-321.
Introna, L. D. (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28(3), pp.259-275.
Kolozaridi, P., & Shubenkova, A. (2016). Internet as a matter of social policy in Russian official discourse: a “good” or a “threat”? The Journal of Social
Policy Studies, 14(1), pp.39-54.
Lessig, L. (1998). The Architecture of Privacy. Retrieved from https://cyber.harvard.edu/works/lessig/architecture_priv.pdf
Lipman, M. (2014). Russia’s nongovernmental media under assault. Demokratizatsiya, 22(2), pp.179-190.
Maréchal, N. (2017). Networked Authoritarianism and the Geopolitics of Information: Understanding Russian Internet Policy. Media and Communication,
5(1), pp.29-41.
Nocetti, J. (2015). Contest and conquest: Russia and global internet governance. International Affairs, 91(1), pp.111-130.
Ognyanova, K. (2010). Careful What You Say: Media Control in Putin’s Russia – Implications for Online Content. International Journal of E-Politics, 1(2),
pp.1-15.
Soldatov, A. & Borogan, I. (2015). RusNet on the Offensive. World Policy Journal, 32(3), pp.102-110.
Soldatov, A. & Borogan, I. (2013). Russia’s Surveillance State. World Policy Journal, 30(3), pp.23-30.
Soldatov, A. (2016). All-Encompassing Paranoia: How the Attitude Toward Security Has Changed in Russia. Russian Politics & Law, 54(4), pp.395-403.
Soldatov, A. (2017). The Taming of the Internet. Russian Social Science Review, 58(1), pp.39-59.
Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in cyberspace. First Monday,
11(1).
White, S. & McAllister, I. (2011). Did Russia (nearly) have a Facebook revolution in 2011? Social media’s challenge to authoritarianism. Politics, 34(1), pp.
72-84.

More Related Content

What's hot

How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...Araz Taeihagh
 
The Geospatial Characteristics of a Social Movement Communication Network
The Geospatial Characteristics of a Social Movement Communication NetworkThe Geospatial Characteristics of a Social Movement Communication Network
The Geospatial Characteristics of a Social Movement Communication NetworkKarissa Rae McKelvey
 
The Great White Hack. Trump is the "White Hat" Hacker of US Democracy
The Great White Hack. Trump is the "White Hat" Hacker of US DemocracyThe Great White Hack. Trump is the "White Hat" Hacker of US Democracy
The Great White Hack. Trump is the "White Hat" Hacker of US Democracyeholmes80
 
Predicting what gets ‘Likes’ on Facebook: case study of BlogTO
Predicting what gets ‘Likes’ on Facebook:  case study of BlogTOPredicting what gets ‘Likes’ on Facebook:  case study of BlogTO
Predicting what gets ‘Likes’ on Facebook: case study of BlogTOToronto Metropolitan University
 
2016Election Final Draft
2016Election Final Draft2016Election Final Draft
2016Election Final DraftSarah Abel
 
Communication's Next Top Model
Communication's Next Top ModelCommunication's Next Top Model
Communication's Next Top ModelRachel Reis Mourao
 
It's Not the Technology, Stupid: How the ‘Echo Chamber’ and ‘Filter Bubble’ M...
It's Not the Technology, Stupid: How the ‘Echo Chamber’ and ‘Filter Bubble’ M...It's Not the Technology, Stupid: How the ‘Echo Chamber’ and ‘Filter Bubble’ M...
It's Not the Technology, Stupid: How the ‘Echo Chamber’ and ‘Filter Bubble’ M...Axel Bruns
 
Communication As A Spatial Problem
Communication As A Spatial ProblemCommunication As A Spatial Problem
Communication As A Spatial ProblemSorin Adam Matei
 
Curating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond PseudonymityCurating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond PseudonymitySon Vivienne
 
Social Network Analysis and Legislative Behavior
Social Network Analysis and Legislative BehaviorSocial Network Analysis and Legislative Behavior
Social Network Analysis and Legislative BehaviorTymofii Brik
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglyJosh Cowls
 

What's hot (17)

How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...
 
9781137533890_sample
9781137533890_sample9781137533890_sample
9781137533890_sample
 
Monitoring of the Last US Presidential Elections
Monitoring of the Last US Presidential ElectionsMonitoring of the Last US Presidential Elections
Monitoring of the Last US Presidential Elections
 
The Geospatial Characteristics of a Social Movement Communication Network
The Geospatial Characteristics of a Social Movement Communication NetworkThe Geospatial Characteristics of a Social Movement Communication Network
The Geospatial Characteristics of a Social Movement Communication Network
 
The Great White Hack. Trump is the "White Hat" Hacker of US Democracy
The Great White Hack. Trump is the "White Hat" Hacker of US DemocracyThe Great White Hack. Trump is the "White Hat" Hacker of US Democracy
The Great White Hack. Trump is the "White Hat" Hacker of US Democracy
 
Predicting what gets ‘Likes’ on Facebook: case study of BlogTO
Predicting what gets ‘Likes’ on Facebook:  case study of BlogTOPredicting what gets ‘Likes’ on Facebook:  case study of BlogTO
Predicting what gets ‘Likes’ on Facebook: case study of BlogTO
 
2016Election Final Draft
2016Election Final Draft2016Election Final Draft
2016Election Final Draft
 
Communication's Next Top Model
Communication's Next Top ModelCommunication's Next Top Model
Communication's Next Top Model
 
It's Not the Technology, Stupid: How the ‘Echo Chamber’ and ‘Filter Bubble’ M...
It's Not the Technology, Stupid: How the ‘Echo Chamber’ and ‘Filter Bubble’ M...It's Not the Technology, Stupid: How the ‘Echo Chamber’ and ‘Filter Bubble’ M...
It's Not the Technology, Stupid: How the ‘Echo Chamber’ and ‘Filter Bubble’ M...
 
Framing #VemPraRua
Framing #VemPraRuaFraming #VemPraRua
Framing #VemPraRua
 
Communication As A Spatial Problem
Communication As A Spatial ProblemCommunication As A Spatial Problem
Communication As A Spatial Problem
 
Dp8497
Dp8497Dp8497
Dp8497
 
Michael Brown as a news icon
Michael Brown as a news iconMichael Brown as a news icon
Michael Brown as a news icon
 
I love Big Bird
I love Big Bird I love Big Bird
I love Big Bird
 
Curating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond PseudonymityCurating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond Pseudonymity
 
Social Network Analysis and Legislative Behavior
Social Network Analysis and Legislative BehaviorSocial Network Analysis and Legislative Behavior
Social Network Analysis and Legislative Behavior
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the ugly
 

Similar to VladiNet and PutinBots

The Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxThe Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxAASTHA76
 
MS 113 Some key concepts that you need to know to navigate th.docx
MS 113 Some key concepts that you need to know to navigate th.docxMS 113 Some key concepts that you need to know to navigate th.docx
MS 113 Some key concepts that you need to know to navigate th.docxssuserf9c51d
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracyCol Mukteshwar Prasad
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docxevonnehoggarth79783
 
Mac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lectureMac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lectureRob Jewitt
 
The Spread of Information and its Influence On State Security And Development
The Spread of Information and its Influence On State Security And DevelopmentThe Spread of Information and its Influence On State Security And Development
The Spread of Information and its Influence On State Security And DevelopmentDigital Society
 
Institutionalization of Ukraine’s information policy as a function of strateg...
Institutionalization of Ukraine’s information policy as a function of strateg...Institutionalization of Ukraine’s information policy as a function of strateg...
Institutionalization of Ukraine’s information policy as a function of strateg...Środkowoeuropejskie Studia Polityczne
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
e-Participation in Government 3.0
e-Participation in Government 3.0e-Participation in Government 3.0
e-Participation in Government 3.0samossummit
 
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...archiejones4
 
Hamilton 68 and Securing Democracy
Hamilton 68 and Securing DemocracyHamilton 68 and Securing Democracy
Hamilton 68 and Securing DemocracyInternet Law Center
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxoreo10
 
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...REVULN
 
Wedf brochure (september)
Wedf brochure (september)Wedf brochure (september)
Wedf brochure (september)Morne Olivier
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesPetter Bae Brandtzæg
 
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...Randy Siwiec
 

Similar to VladiNet and PutinBots (20)

The Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxThe Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docx
 
MS 113 Some key concepts that you need to know to navigate th.docx
MS 113 Some key concepts that you need to know to navigate th.docxMS 113 Some key concepts that you need to know to navigate th.docx
MS 113 Some key concepts that you need to know to navigate th.docx
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracy
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx
 
Mac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lectureMac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lecture
 
The Spread of Information and its Influence On State Security And Development
The Spread of Information and its Influence On State Security And DevelopmentThe Spread of Information and its Influence On State Security And Development
The Spread of Information and its Influence On State Security And Development
 
Institutionalization of Ukraine’s information policy as a function of strateg...
Institutionalization of Ukraine’s information policy as a function of strateg...Institutionalization of Ukraine’s information policy as a function of strateg...
Institutionalization of Ukraine’s information policy as a function of strateg...
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
e-Participation in Government 3.0
e-Participation in Government 3.0e-Participation in Government 3.0
e-Participation in Government 3.0
 
DG11 Global Terrorism
DG11 Global TerrorismDG11 Global Terrorism
DG11 Global Terrorism
 
Role of New Media in Democratization
Role of New Media in Democratization Role of New Media in Democratization
Role of New Media in Democratization
 
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
 
Hamilton 68 and Securing Democracy
Hamilton 68 and Securing DemocracyHamilton 68 and Securing Democracy
Hamilton 68 and Securing Democracy
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
 
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
 
Wedf brochure (september)
Wedf brochure (september)Wedf brochure (september)
Wedf brochure (september)
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sites
 
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...
 

Recently uploaded

Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 

Recently uploaded (20)

Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 

VladiNet and PutinBots

  • 1. VladiNet and PutinBots The Putinisation of the Russian Internet Simon Ross
  • 2. Putinisation and implications Putinisation is a shift from liberal, democratic values to a more authoritarian control and use of information, nationally and internationally, to ensure government longevity. International sanctions imposed after Russia’s annexation of Crimea have accelerated the Kremlin’s need to use digital communications to mitigate economic uncertainty. To defeat a perceived Russophobe mentality among western leaders, the Kremlin assists political entities, primarily far right candidates, that could help end or ease sanctions. Resultantly, the Kremlin uses manipulative and disruptive strategies to distort the reliability and very narrative of the news across foreign countries.
  • 3. Russian digital skepticism The first act of cyber-espionage against the Russians was in 1982 when a virus caused a pipeline explosion (Barmin, Jones, Moiseeva & Winkelman, 2011). The Arab Spring revolutions demonstrated the vulnerability of authoritarian governments to the internet despite obedient mainstream media. WikiLeaks and the 2013 Edward Snowden revelations on CIA surveillance justifiably concerned the Kremlin. The Kremlin portrays crackdowns as patriotic to give policies legitimacy (Nocetti, 2015). This opposes Introna’s (1997) idea that privacy preservation is better for communal good to ensure individualism.
  • 4. The RuNet’s evolution The RuNet, the Russian Internet, was built with western technology and its first 20 years were “free and open” (Soldatov, 2017). The RuNet has experienced 3 distinct chapters (Kolozaridi & Shubenkova, 2016): - 1994 to 1999: “weakly” and not widely utilised - 2000 to 2011: a benefit to “public development” - 2012 to 2014: a social, national and security “threat” Lessig’s (1998) views of privacy - focusing on the monitored, searchability and protections - reveal Russians could be more vulnerable to Kremlin tyranny if foreign companies move servers to Russia.
  • 5. Putin’s destabilising of online freedom The government, since 2012, negates the democratic potential of the RuNet through: - Self-censorship (Ognyanova, 2010) - Coercing ISPs to burden surveillance costs to collaborate with security agencies (Soldatov, 2016) using informal intimidation (Soldatov, 2017) - Implementing vague legislation that constantly requires Kremlin clarification (Soldatov, 2017) The ISPs have been much easier to control than their users (Soldatov, 2017) as citizens can restrict access to content meaning (Marwick & boyd, 2014).
  • 6. Alexei Navalny - Putin’s digital nemesis 41-year-old blogger, lawyer and activist with democratic but populist views, Navalny has coordinated many anti-corruption protests despite repeated imprisonment and intimidation. - Capitalises on social media - Won 27% of vote in 2013 Moscow mayor bid despite ban from mainstream TV - Coordinated unprecedented 2011 Duma and 2012 Presidential protests Putin will likely prevent Navalny from competing in the 2018 presidential election and choose a more preferential opponent. Chess grandmaster and fierce Putin-critic Garry Kasparov, has also forwarded himself as a possible candidate.
  • 7. A Russian Facebook and the Kremlin Coup Founded by Pavel Durov, VKontakte is the most popular social network in Russia. However, the 2011 and 2012 protests were coordinated through Facebook due to its reduced vulnerability to federal monitoring and interference (White & McAllister, 2014). Following Russia’s 2014 annexation of Crimea, the government requested the censorship of VKontakte groups linked to Alexei Navalny. - Durov refused, was fired and went into exile - Kremlin-loyal oligarchs now own VKontakte (Soldatov & Borogan, 2015) Digital policy has “unintended consequences” (Villeneuve, 2006) and Russian soldiers uploaded media to Vkontakte during fighting in eastern Ukraine as the Kremlin denied involvement (Soldatov, 2017).
  • 8. International Putinisation The Kremlin funds political parties and movements to strengthen Russian influence abroad (Chivvis, 2017) and uses cyber espionage to help favoured candidates. - Destabilising Hillary Clinton’s 2016 presidential bid was a Kremlin “imperative” (Maréchal, 2017) - Troll factories and bots are employed to aggressively spread propaganda across foreign media outlets (Aro, 2016) Cyberbulling tactics, “willful and repeated harm inflicted through the medium of electronic text” (Patchin & Hinduja, 2006), are an important aspect of silencing national and international opposition.
  • 9. Putinisation effectiveness Federal agencies can block media produced by reporters or activists but not content spread by thousands (Soldatov, 2017). The horizontal nature of the RuNet poses an unprecedented challenge to the Kremlin compared to vertical communication during the cold war (Soldatov & Borogan, 2015). Overtly aggressive pro-Kremlin trolling tactics are less effective at influencing foreign opinion than subtle commentary as that is harder to distinguish (Aro, 2016). The majority of public opinion now favours censorship (Lipman, 2014) demonstrating Russians have accepted reduced freedoms to preserve core values (Armstrong & Forde, 2003).
  • 10. Conclusions Putin’s digital crackdown is a recognition of his own vulnerability to the internet and, primarily, social media. The imposition of sanctions has led to a more international digital strategy to advance the Kremlin’s interests. The distinction must always be made separating authoritarian governments from the nation state especially where democracy, the rule of law and accountability are dispensable. 2018 will be a vital year for Russia and the international community. Could there be a President Navalny? Never rule it out.
  • 11. References Aro, J. (2016). The cyberspace war: propaganda and trolling as warfare tools. European View, 15(1), pp.121-132. Barmin, Y., Jones, G., Moiseeva, S., & Winkelman, Z. (2011). International Arms Control and Law Enforcement in the Information Revolution: An Examination of Cyber Warfare and Information Security. Connections: The Quarterly Journal, 10(4), pp.73-93. Cassiday, J.A., & Johnson, E.D. (2010). Putin, Putiniana and the Question of a Post-Soviet Cult of Personality. The Slavonic and East European Review, 88(4), pp.681-707. Chivvis, C.S. (2017). Hybrid war: Russian contemporary political warfare. Bulletin of the Atomic Scientists, 73(5), pp.316-321. Introna, L. D. (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28(3), pp.259-275. Kolozaridi, P., & Shubenkova, A. (2016). Internet as a matter of social policy in Russian official discourse: a “good” or a “threat”? The Journal of Social Policy Studies, 14(1), pp.39-54. Lessig, L. (1998). The Architecture of Privacy. Retrieved from https://cyber.harvard.edu/works/lessig/architecture_priv.pdf Lipman, M. (2014). Russia’s nongovernmental media under assault. Demokratizatsiya, 22(2), pp.179-190. Maréchal, N. (2017). Networked Authoritarianism and the Geopolitics of Information: Understanding Russian Internet Policy. Media and Communication, 5(1), pp.29-41. Nocetti, J. (2015). Contest and conquest: Russia and global internet governance. International Affairs, 91(1), pp.111-130. Ognyanova, K. (2010). Careful What You Say: Media Control in Putin’s Russia – Implications for Online Content. International Journal of E-Politics, 1(2), pp.1-15. Soldatov, A. & Borogan, I. (2015). RusNet on the Offensive. World Policy Journal, 32(3), pp.102-110. Soldatov, A. & Borogan, I. (2013). Russia’s Surveillance State. World Policy Journal, 30(3), pp.23-30. Soldatov, A. (2016). All-Encompassing Paranoia: How the Attitude Toward Security Has Changed in Russia. Russian Politics & Law, 54(4), pp.395-403. Soldatov, A. (2017). The Taming of the Internet. Russian Social Science Review, 58(1), pp.39-59. Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in cyberspace. First Monday, 11(1). White, S. & McAllister, I. (2011). Did Russia (nearly) have a Facebook revolution in 2011? Social media’s challenge to authoritarianism. Politics, 34(1), pp. 72-84.