Bashing Facebook Is Not The Answer To Curbing Russian Influence Operations

Scapegoating Facebook is an easy way to explain the relative success of Russia's influence operations during the U.S. election in 2016. However it distracts from more fundamental questions on how election meddling should be confronted.

By Jamie Collier & Monica Kaminska

With Facebook revealing the true extent of Russia’s information operations during the U.S. election on their platform, journalists have not held back in casting social media firms as the pantomime villain in recent election interference sagas. At the core of recent criticism is the assertion that social media firms are now serious political influencers, and crucially ones that are incapable of self-policing themselves with further regulation necessary.

Although social media platforms could always improve at preventing foreign governments from interfering in elections, the recent furor distracts from more fundamental questions on how election meddling should be confronted. Crucially, further clamping down on Facebook and Twitter is not the elixir to recent election interferences that many hope for.

The role of social media in influencing elections should not be discounted. As these platforms become increasingly prevalent, their influence on our thought processes and emotions will only increase. Yet, multiple factors affect elections, ranging from the state of the economy to healthcare provision. This makes it difficult to assess the true political impact of social media strategies and their influence on voting behavior. A number of actors compete for voters’ attention including official campaigns, political action committees, the tabloid press and far-leaning ideological websites. Russian activity therefore operates in a highly congested space, and its impact is likely to get crowded out by more influential groups. For example, tabloids  possess a significant following of news-hungry potential voters, already sympathetic to a particular political stance. Likewise, official candidate campaigns have access to detailed data on prospective voters and millions of dollars to spend on digital advertising. The Trump campaign reportedly spent $90 million on Facebook, making Russia’s $100,000 ad buy look like pocket change.

Russia may be able to promote causes that coincide with Russian interests. Yet influencing those who are not already on board is increasingly difficult online given the echo chambers that exist on social media. Facebook users interact predominantly with like-minded friends, they subscribe to news outlets that coincide with their own worldview. This means there is a limited pool of swing voters that could be converted to the extremes to suit Russian interests.

Many have made the case that Russia’s real aim is not to convince others, but to exploit existing divisions within societies. Even then, it remains unclear whether social media campaigns are really that effective. Passive forms of online participation often fail to materialize into more active forms of political mobilization. Only four protesters turned up to an anti-refugee rally in Idaho organized by a Russian-backed Facebook group despite significantly higher numbers saying they were ‘interested’ online. Previous research also suggests that content on social networks is most influential when shared among close friends—strong ties trump obscure foreign-government backed campaigns.

Placing Russian-backed political social media advertising on a pedestal implies that Moscow’s approach is somehow novel. It is not. Russia, much like the United States, has used political propaganda for decades. One of the Soviet Union’s most famous campaigns was “active measures” launched during the Cold War against the election of Ronald Reagan. More recently, Russia has had a hand in political subversion in Ukraine, the Baltic States and Georgia. But while political Facebook ads might be a case of old wine in new bottles, Russian actors have been engaging in a wide range of other cyber intrusions, and it is these that merit more public attention.

If tech companies and policymakers want to address Russian election meddling, they should see Russian cyber operations as a spectrum of activity, from the relatively soft forms of interference conducted via social media, through to hacking, and even the compromise of election infrastructure (a particular concern for states that allow online voting). Instead of narrowly focusing on social media manipulation, they should focus on Russian efforts to dox and launder internal campaign emails through sites like Wikileaks. The operation against the Democratic National Committee was remarkably disruptive and effective, and similar events occurred in 2015 at the German Bundestag and Emmanuel Macron’s campaign in France earlier this year. It is these operations that have the greatest potential to directly influence an election result and damage confidence in democratic institutions, while simultaneously providing material for future influence efforts.

Bashing Facebook and Twitter do nothing to nullify the plausible deniability of election interference that Russia and influence peddlers thrive on. It is up to political campaigns, not social media platforms, to develop effective public relations strategies to counter the effects of doxing through WikiLeaks and improve their woeful cybersecurity. Likewise, governments and the media need to candidly talk about the way in which news outlets report on foreign government-backed leaks, a hugely contentious issue. Clamping down on social media firms represents an easy fix by comparison—one that does not require substantial change or compromise from within governments and political parties.

While Silicon Valley will play its part in preventing future political interference, the real change must take place in Washington DC.

About The Authors: 

Jamie Collier is a cybersecurity DPhil candidate and a research affiliate with the Cyber Studies Programme at the University of Oxford. Monica Kaminska is a DPhil candidate and previously worked on the Computational Propaganda Project at the Oxford Internet Institute.

 

 

« Wikileaks Release Details Of Mass Surveillance In Russia
N.Korea's Cyber Threats To S.Korea »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Lastline

Lastline

Lastline is the leader in advanced malware protection.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

Recruit.net

Recruit.net

Recruit.net allows job seekers to instantly find millions of jobs from thousands of web sites with a single search.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Kleiner Perkins

Kleiner Perkins

For five decades, Kleiner Perkins has made history by partnering with some of the most ingenious and forward-thinking founders in technology and life sciences.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

World Informatix Cyber Security (WICS)

World Informatix Cyber Security (WICS)

World Informatix Cyber Security provides a range of cyber security services to protect valuable information assets to global business and governments.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

Cybalt

Cybalt

Cybalt is a security services company that provides end-to-end security solutions to help clients achieve their business goals.

SeQure

SeQure

SeQure is a novel cybersecurity and data observability company that offers Fortune 100 and Governments a zero-trust service to continuously monitor large network environments.