Chapter 39 Exercises: Information Warfare and the Future of Truth


Exercise 39.1 — Mapping the Information Warfare Ecosystem

Type: Analytical mapping | Difficulty: Intermediate | Time: 45–60 minutes

The chapter describes information warfare as involving multiple actors, tools, channels, and objectives operating simultaneously. This exercise asks you to map that ecosystem for a specific documented case.

Choose one of the following documented cases: - Russian information operations related to the 2014 Crimea annexation - IRA operations during the 2016 U.S. presidential election cycle - Chinese information operations targeting Taiwan (2018–present) - Russian information operations related to the 2022 Ukraine invasion

For your chosen case, construct a structured map addressing:

  1. Actor mapping. Identify the primary state actor and at least three specific institutions or units conducting information operations (e.g., the IRA, RT, GRU Unit 26165). What are their roles and relationships?

  2. Channel inventory. List the specific channels used: social media platforms, international broadcasting, front websites, diplomatic communications, covert media placement. What is the function of each channel in the overall operation?

  3. Narrative audit. Identify at least four specific narratives promoted by the operation. For each, identify: (a) the target audience; (b) the psychological vulnerability it exploits; (c) whether it is designed to produce belief or confusion.

  4. Consistency analysis. Are the identified narratives mutually consistent? If some are contradictory, explain why the operation might deploy contradictory narratives simultaneously.

  5. Epistemic infrastructure targeting. For each narrative, identify which epistemic institution — journalism, science, courts, electoral administration, civil society — it is primarily attacking or undermining.

Deliverable: A written map (600–900 words) with at least one visual representation (table, diagram, or matrix).


Exercise 39.2 — The Firehose Model vs. Classical Propaganda: Comparative Analysis

Type: Comparative analysis | Difficulty: Intermediate | Time: 30–45 minutes

The chapter argues that the firehose model is strategically different from classical propaganda because it pursues confusion rather than conviction. This exercise tests that distinction.

Step 1: Recall a classical propaganda campaign studied in this course. Options include: Goebbels's wartime radio propaganda, Soviet anti-American information operations during the Cold War, Big Tobacco's "Doubt Is Our Product" campaign.

Step 2: Complete a comparison matrix. For each characteristic below, describe how the classical example and the firehose model differ (or are similar):

Characteristic Classical Propaganda Firehose Model
Primary goal
Internal consistency
Volume of content
Relationship to truth
Target: belief or confusion?
Sustainable by market incentives?
Response to debunking

Step 3: Analysis questions.

  1. The chapter argues that Big Tobacco's "Doubt Is Our Product" strategy is the closest civilian antecedent to the firehose model. Do the categories in your matrix support this claim? Where does the Big Tobacco case fit relative to the two poles?

  2. If the firehose model's goal is confusion rather than conviction, what would a successful defense look like? How is it different from responding to classical conviction-seeking propaganda?

  3. Paul and Matthews argue that not debunking every claim is important to an effective response. Based on your matrix, explain why this counterintuitive advice follows from the firehose model's logic.


Exercise 39.3 — Evaluating the Post-Truth Claim

Type: Evidence evaluation | Difficulty: Intermediate–Advanced | Time: 45–60 minutes

The "post-truth" thesis has generated substantial debate. This exercise asks you to evaluate it against the available evidence.

The claim to evaluate: "Advanced democracies have entered a 'post-truth' era in which factual claims no longer constrain political discourse."

Evidence for evaluation (research each briefly):

  1. The "continued influence effect" in cognitive psychology — what does it actually claim about factual corrections and belief change?
  2. Research on the "backfire effect" — what did the original studies find, and what have replication attempts found?
  3. The Edelman Trust Barometer's annual data on institutional trust in advanced democracies — what is the general trend?
  4. Comparative media studies on misinformation exposure and correction rates in high-media-literacy countries (Finland, Denmark, Netherlands) vs. lower-media-literacy countries

After reviewing the evidence, write a structured evaluation (600–800 words) that addresses:

  1. What does the evidence actually support about changes in truth's social function?
  2. Where is the post-truth diagnosis most and least accurate?
  3. The chapter argues that "post-truth" may be U.S./UK-centric. What evidence supports or challenges this claim?
  4. Does the post-truth diagnosis imply that the problem is irreversible? Why or why not?

Evaluation criterion: A strong response will distinguish between what the evidence demonstrates and what is extrapolated or assumed.


Exercise 39.4 — Building the Epistemic Infrastructure Map for Your Community

Type: Applied analysis | Difficulty: Intermediate | Time: 45–60 minutes

This exercise directly supports the Progressive Project Future-Proofing component.

Step 1: Identify the epistemic infrastructure serving your target community (the community you have been developing your Inoculation Campaign for). For each institution type listed below, identify specific institutions that serve your community:

  • Journalism organizations (local newspapers, digital outlets, broadcast stations)
  • Academic or scientific expertise relevant to issues your community faces
  • Government information sources (local/national statistical agencies, public health authorities)
  • Civil society organizations (fact-checking groups, advocacy organizations, community organizations)
  • Platform trust mechanisms (verification systems, community notes, labeled state media)

Step 2: Vulnerability assessment. For each institution you've identified, assess its current state on two dimensions:

  • Trust level: How much does your target community currently trust this institution? (High / Medium / Low / Unknown)
  • Attack history: Has this institution been specifically targeted by propaganda or disinformation in the past five years? (Yes / Partially / No / Unknown)

Step 3: Gap analysis. Identify the two or three institutions in your community's epistemic infrastructure that appear most vulnerable — either because trust is low or because they have been specifically targeted.

Step 4: Write a brief (400–600 words) analysis of what information warfare targeting your specific community's epistemic infrastructure would look like. What would be the most effective attack vectors? What existing resilience does the community have?

Note: This exercise feeds directly into the Future-Proofing component (Section 39.15).


Exercise 39.5 — The Taiwan Model: Exportability Analysis

Type: Policy analysis | Difficulty: Advanced | Time: 60–75 minutes

The chapter presents Taiwan's information warfare response as the most developed democratic model. This exercise asks you to evaluate how exportable that model is.

Part A: Reconstruct the Taiwan model. Based on the chapter's discussion, identify the key elements of Taiwan's response: - Institutional elements (what organizations and government processes) - Strategic elements (what principles guide the response) - Cultural and social elements (what features of Taiwanese society make the model possible)

Part B: Choose a different national context. Select a country substantially different from Taiwan in size, political system, or information environment. Options: the United States, Germany, Brazil, India, Nigeria, or a country of your choice with at least basic democratic institutions.

Part C: Exportability analysis. For each element of the Taiwan model you identified in Part A, assess whether it could be implemented in your chosen country:

Element Could it work in [country]? What would make it harder? What adaptation would be needed?

Part D: Write a policy recommendation (500–700 words). Based on your analysis, what elements of the Taiwan model would be most worth attempting to adapt to your chosen country? What contextual factors would require significant adaptation? What elements are simply not transferable?

Evaluation criterion: Strong responses will engage seriously with the chapter's honest assessment of the Taiwan model's limits, not only its successes.


Exercise 39.6 — Four Scenarios: Evidence Audit

Type: Scenario analysis | Difficulty: Advanced | Time: 60–90 minutes

The chapter presents four scenarios for the next decade of information warfare: Escalation, Equilibrium, Democratic Resilience, and Fragmentation.

For each scenario:

  1. State the scenario's key claim in one sentence.
  2. Identify two pieces of evidence from the chapter that support this scenario's trajectory.
  3. Find one additional piece of recent evidence (from news reporting or research published after this textbook) that either supports or challenges this scenario.
  4. Identify the scenario's key assumption — what does this scenario assume about the behavior of states, platforms, or citizens that might not hold?
  5. Rate the scenario's current plausibility on a 1–5 scale and justify your rating.

Final synthesis (400–600 words): The chapter argues that no single scenario accurately describes the global picture — different countries may be in different scenarios simultaneously. Select two countries from different continents and argue which scenario most closely describes each country's trajectory. Justify your argument with specific evidence.

Key reminder: Scenarios are analytical tools, not predictions. Strong responses will resist the temptation to simply declare one scenario "correct" and will engage with the evidence for all four.