Audiobook10 hours
Tyrants on Twitter: Protecting Democracies from Information Warfare
Written by David L. Sloss
Narrated by Graham Rowat
Rating: 0 out of 5 stars
()
About this audiobook
A look inside the weaponization of social media, and an innovative proposal for protecting Western democracies from information warfare.
Tyrants on Twitter is the first detailed analysis of how Chinese and Russian agents weaponize Facebook, Instagram, Twitter, and YouTube to subvert the liberal international order. In addition to examining the 2016 US election, David L. Sloss explores Russia's use of foreign influence operations to threaten democracies in Europe, as well as China's use of social media and other digital tools to meddle in Western democracies and buttress autocratic rulers around the world.
Sloss calls for cooperation among democratic governments to create a new transnational system for regulating social media to protect Western democracies from information warfare. Drawing on his professional experience as an arms control negotiator, he outlines a novel system of transnational governance that Western democracies can enforce by harmonizing their domestic regulations. And drawing on his academic expertise in constitutional law, he explains why that system-if implemented by legislation in the United States-would be constitutionally defensible, despite likely First Amendment objections. With its critical examination of information warfare and its proposal for practical legislative solutions to fight back, this is a must-listen in a time when disinformation campaigns threaten to undermine democracy.
Tyrants on Twitter is the first detailed analysis of how Chinese and Russian agents weaponize Facebook, Instagram, Twitter, and YouTube to subvert the liberal international order. In addition to examining the 2016 US election, David L. Sloss explores Russia's use of foreign influence operations to threaten democracies in Europe, as well as China's use of social media and other digital tools to meddle in Western democracies and buttress autocratic rulers around the world.
Sloss calls for cooperation among democratic governments to create a new transnational system for regulating social media to protect Western democracies from information warfare. Drawing on his professional experience as an arms control negotiator, he outlines a novel system of transnational governance that Western democracies can enforce by harmonizing their domestic regulations. And drawing on his academic expertise in constitutional law, he explains why that system-if implemented by legislation in the United States-would be constitutionally defensible, despite likely First Amendment objections. With its critical examination of information warfare and its proposal for practical legislative solutions to fight back, this is a must-listen in a time when disinformation campaigns threaten to undermine democracy.
Related to Tyrants on Twitter
Related audiobooks
How to Make Love to a Despot: An Alternative Foreign Policy for the Twenty-First Century Rating: 0 out of 5 stars0 ratingsOf Privacy and Power: The Transatlantic Struggle over Freedom and Security Rating: 4 out of 5 stars4/5The Problem of Democracy: America, the Middle East, and the Rise and Fall of an Idea Rating: 0 out of 5 stars0 ratingsNetwork Propaganda: Manipulation, Disinformation, and Radicalization in American Politics Rating: 4 out of 5 stars4/5Social Media, Freedom of Speech, and the Future of our Democracy Rating: 0 out of 5 stars0 ratingsLiars: Falsehoods and Free Speech in an Age of Deception Rating: 4 out of 5 stars4/5This is Not Normal: The Politics of Everyday Expectations Rating: 5 out of 5 stars5/5Politics of Disinformation Rating: 0 out of 5 stars0 ratingsStates of Neglect: How Red-State Leaders Have Failed Their Citizens and Undermined America Rating: 5 out of 5 stars5/5The Grounds of Political Legitimacy Rating: 0 out of 5 stars0 ratingsThe People vs. Democracy: Why Our Freedom Is in Danger and How to Save It Rating: 4 out of 5 stars4/5On Rumours: How Falsehoods Spread, Why We Believe Them, What Can Be Done Rating: 5 out of 5 stars5/5The Scheme: How the Right Wing Used Dark Money to Capture the Supreme Court Rating: 5 out of 5 stars5/5Trafficking Data: How China is Winning the Battle for Digital Sovereignty Rating: 5 out of 5 stars5/5What You Need to Know About Voting--and Why Rating: 2 out of 5 stars2/5The Populist Temptation: Economic Grievance and Political Reaction in the Modern Era Rating: 0 out of 5 stars0 ratingsThe Stakes: 2020 and the Survival of American Democracy Rating: 5 out of 5 stars5/5Blockchain Radicals: How Capitalism Ruined Crypto and How to Fix It Rating: 0 out of 5 stars0 ratingsAttack from Within: How Disinformation Is Sabotaging America Rating: 4 out of 5 stars4/5Let Them Eat Tweets: How the Right Rules in an Age of Extreme Inequality Rating: 5 out of 5 stars5/5The Age of Anxiety: McCarthyism to Terrorism Rating: 4 out of 5 stars4/5The Age of Insurrection: The Radical Right's Assault on American Democracy Rating: 0 out of 5 stars0 ratingsFoolproof: Why Misinformation Infects Our Minds and How to Build Immunity Rating: 4 out of 5 stars4/5Breaking the Two-Party Doom Loop: The Case for Multiparty Democracy in America Rating: 5 out of 5 stars5/5A Lot of People Are Saying: The New Conspiracism and the Assault on Democracy Rating: 4 out of 5 stars4/5Polarization: What Everyone Needs to Know Rating: 0 out of 5 stars0 ratingsCivil Resistance: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Hate in the Homeland: The New Global Far Right Rating: 3 out of 5 stars3/5Digitize and Punish: Racial Criminalization in the Digital Age Rating: 5 out of 5 stars5/5
Computers For You
Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Computational Thinking Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Once Upon an Algorithm: How Stories Explain Computing Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Artificial Intelligence For Dummies Rating: 4 out of 5 stars4/5Business Intelligence For Dummies Rating: 4 out of 5 stars4/5How to Work a Room: The Ultimate Guide to Savvy Socializing In Person and Online Rating: 3 out of 5 stars3/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Artificial Intelligence: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5The Emperor's New Mind: Concerning Computers, Minds, and the Laws of Physics Rating: 4 out of 5 stars4/5Failure Is Not an Option: Mission Control from Mercury to Apollo 13 and Beyond Rating: 5 out of 5 stars5/5Alone Together: Why We Expect More from Technology and Less from Each Other Rating: 4 out of 5 stars4/5Bored and Brilliant: How Spacing Out Can Unlock Your Most Productive and Creative Self Rating: 4 out of 5 stars4/5Who's Afraid of AI?: Fear and Promise in the Age of Thinking Machines Rating: 5 out of 5 stars5/5HBR's 10 Must Reads on AI, Analytics, and the New Machine Age Rating: 5 out of 5 stars5/5Algorithms to Live By: The Computer Science of Human Decisions Rating: 4 out of 5 stars4/5The Art of Social Media: Power Tips for Power Users Rating: 4 out of 5 stars4/5The Sentient Machine: The Coming Age of Artificial Intelligence Rating: 4 out of 5 stars4/5A Body to Love: Cultivate Community, Body Positivity, and Self-Love in the Age of Social Media Rating: 4 out of 5 stars4/5AI: Rise of the Lightspeed Learners Rating: 4 out of 5 stars4/5
Reviews for Tyrants on Twitter
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews