Helsinki, Finland (CNN) – On a recent afternoon in Helsinki, a group of students gathered to hear a lecture on a subject that is far from a staple in most community college curriculums.
Standing in front of the classroom at Espoo Adult Education Centre, Jussi Toivanen worked his way through his PowerPoint presentation. A slide titled “Have you been hit by the Russian troll army?” included a checklist of methods used to deceive readers on social media: image and video manipulations, half-truths, intimidation and false profiles.
This commentary is part II of the CSIS Transnational Threats Project’s Iran satellite imagery analysis series. Part I focuses on the Imam Ali training facility in Iran, which can be found here:www.csis.org/ imam-ali. For further analysis, please see, “War by Proxy: Iran’s Growing Footprint in the Middle East,” which can be found here: www.csis.org/war-by-proxy.
There is growing Iranian activism in the Middle East despite U.S. and allied efforts to weaken Iran’s economy and politically isolate Tehran. But Iran’s primary military instrument is not its conventional army, air force, or navy, which are relatively weak. Instead, Iran has provided significant resources and power to the Islamic Revolutionary Guard Corps-Quds Force (IRGC- QF). The IRGC-QF is Iran’s main irregular force and is instrumental in helping Iran expand its influence in the Middle East and other regions. It engages in a wide range of activities, such as gathering intelligence; training, equipping, and funding state and non-state partner forces; conducting assassinations and bombings; perpetrating cyberattacks; and providing humanitarian and economic aid. The IRGC-QF has partners in countries like Syria, Iraq, Lebanon, Yemen, Afghanistan, Pakistan, and Bahrain. Continuar leyendo →
This month we will hit one of our key Year of Change milestones – the European Parliamentary elections. The composition of the next European Parliament has no doubt been a question at the forefront of many people’s minds.
But with only days to go until European citizens head to the polls, Niamh Griffin can give you some key insight into the trends likely to emerge from the election results. This comes as part of an extensive analysis we have conducted here at FleishmanHillard Brussels. Our aim has been to build a picture of what the next EU Parliament will likely look like and, more crucially, what this could mean for business in the coming years.
When Europe Goes to the polls on 23 May, the right-wing campaign spearheaded by Italy’s Matteo Salvini – leader of The League – could change the shape of European politics. Subscribe to our channel here: https://goo.gl/31Q53F Salvini is trying to create a nationalist bloc that would be the second biggest force in the European parliament. But where would that leave the centre-left or social democrats, who for decades were a natural party of government across Europe? Three former leaders – Tony Blair, Matteo Renzi and Helle Thorning-Schmidt – offer their thoughts. BBC’s Diplomatic Editor Mark Urban reports.
A new wave of far-right politics is sweeping across Europe, promising to smash the ruling elite, end migration and shake-up the EU. But are these parties fuelling hate? The Nine’s Europe Correspondent Jean Mackenzie travels across the continent, to find out why these movements are surging – meeting the people celebrating their rise and those fighting to stop them.
In the second of this three part series we head the small Baltic country of Estonia, where the far-right has just been catapulted to power. Could this open Europe up to Russian interference? Reported by Jean Mackenzie, Produced by Sara Monetta, Filmed and Edited by Andy Smythe.
En «Targeted by a Text», Fault Lines investiga cómo se está utilizando una potente tecnología, Pegasus, para piratear los iPhones de activistas de derechos humanos, disidentes, abogados y periodistas. Después del asesinato del disidente saudí Jamal Khashoggi, se reveló que uno de sus asociados, un disidente saudí con sede en Canadá, fue atacado por Pegasus, una suite de software con la capacidad de aprovechar las vulnerabilidades del sistema operativo del iPhone. Continuar leyendo →