Bashing Facebook Is Not The Answer To Curbing Russian Influence Operations

Scapegoating Facebook is an easy way to explain the relative success of Russia's influence operations during the U.S. election in 2016. However it distracts from more fundamental questions on how election meddling should be confronted.

By Jamie Collier & Monica Kaminska

With Facebook revealing the true extent of Russia’s information operations during the U.S. election on their platform, journalists have not held back in casting social media firms as the pantomime villain in recent election interference sagas. At the core of recent criticism is the assertion that social media firms are now serious political influencers, and crucially ones that are incapable of self-policing themselves with further regulation necessary.

Although social media platforms could always improve at preventing foreign governments from interfering in elections, the recent furor distracts from more fundamental questions on how election meddling should be confronted. Crucially, further clamping down on Facebook and Twitter is not the elixir to recent election interferences that many hope for.

The role of social media in influencing elections should not be discounted. As these platforms become increasingly prevalent, their influence on our thought processes and emotions will only increase. Yet, multiple factors affect elections, ranging from the state of the economy to healthcare provision. This makes it difficult to assess the true political impact of social media strategies and their influence on voting behavior. A number of actors compete for voters’ attention including official campaigns, political action committees, the tabloid press and far-leaning ideological websites. Russian activity therefore operates in a highly congested space, and its impact is likely to get crowded out by more influential groups. For example, tabloids  possess a significant following of news-hungry potential voters, already sympathetic to a particular political stance. Likewise, official candidate campaigns have access to detailed data on prospective voters and millions of dollars to spend on digital advertising. The Trump campaign reportedly spent $90 million on Facebook, making Russia’s $100,000 ad buy look like pocket change.

Russia may be able to promote causes that coincide with Russian interests. Yet influencing those who are not already on board is increasingly difficult online given the echo chambers that exist on social media. Facebook users interact predominantly with like-minded friends, they subscribe to news outlets that coincide with their own worldview. This means there is a limited pool of swing voters that could be converted to the extremes to suit Russian interests.

Many have made the case that Russia’s real aim is not to convince others, but to exploit existing divisions within societies. Even then, it remains unclear whether social media campaigns are really that effective. Passive forms of online participation often fail to materialize into more active forms of political mobilization. Only four protesters turned up to an anti-refugee rally in Idaho organized by a Russian-backed Facebook group despite significantly higher numbers saying they were ‘interested’ online. Previous research also suggests that content on social networks is most influential when shared among close friends—strong ties trump obscure foreign-government backed campaigns.

Placing Russian-backed political social media advertising on a pedestal implies that Moscow’s approach is somehow novel. It is not. Russia, much like the United States, has used political propaganda for decades. One of the Soviet Union’s most famous campaigns was “active measures” launched during the Cold War against the election of Ronald Reagan. More recently, Russia has had a hand in political subversion in Ukraine, the Baltic States and Georgia. But while political Facebook ads might be a case of old wine in new bottles, Russian actors have been engaging in a wide range of other cyber intrusions, and it is these that merit more public attention.

If tech companies and policymakers want to address Russian election meddling, they should see Russian cyber operations as a spectrum of activity, from the relatively soft forms of interference conducted via social media, through to hacking, and even the compromise of election infrastructure (a particular concern for states that allow online voting). Instead of narrowly focusing on social media manipulation, they should focus on Russian efforts to dox and launder internal campaign emails through sites like Wikileaks. The operation against the Democratic National Committee was remarkably disruptive and effective, and similar events occurred in 2015 at the German Bundestag and Emmanuel Macron’s campaign in France earlier this year. It is these operations that have the greatest potential to directly influence an election result and damage confidence in democratic institutions, while simultaneously providing material for future influence efforts.

Bashing Facebook and Twitter do nothing to nullify the plausible deniability of election interference that Russia and influence peddlers thrive on. It is up to political campaigns, not social media platforms, to develop effective public relations strategies to counter the effects of doxing through WikiLeaks and improve their woeful cybersecurity. Likewise, governments and the media need to candidly talk about the way in which news outlets report on foreign government-backed leaks, a hugely contentious issue. Clamping down on social media firms represents an easy fix by comparison—one that does not require substantial change or compromise from within governments and political parties.

While Silicon Valley will play its part in preventing future political interference, the real change must take place in Washington DC.

About The Authors: 

Jamie Collier is a cybersecurity DPhil candidate and a research affiliate with the Cyber Studies Programme at the University of Oxford. Monica Kaminska is a DPhil candidate and previously worked on the Computational Propaganda Project at the Oxford Internet Institute.

 

 

« Wikileaks Release Details Of Mass Surveillance In Russia
N.Korea's Cyber Threats To S.Korea »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

SySS

SySS

SySS is a market leader in penetration testing in Germany and Europe.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

A-LIGN

A-LIGN

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

Infoline Tec Group Berhad

Infoline Tec Group Berhad

Infoline Tec Group Berhad is principally involved in providing IT infrastructure solutions, cybersecurity service provider and solutions, managed IT and other IT services.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.

ShieldHaus

ShieldHaus

Protect your business from evolving cyber threats with ShieldHaus. Our real-time, AI-powered security solutions block malicious IPs, phishing attempts, and harmful domains to safeguard your systems an