The Limits Of Social Media Soft Power

Watching the current war in Ukraine has been hard. Through vast volumes of social media, the bravery of Ukraine’s military and moral strength against Russian savagery has been nothing less than breath taking.  TikTok, Facebook, YouTube represent very effective methods of getting messages out worldwide.

In the newest domain, Cyber Space, social media platforms can - and in the case of Ukraine - have turned social media into soft power (uniting a fractious NATO) eventually into some hard power (supplying arms to Ukraine.) And it has certainly stirred the chattering political classes to a blood frenzy – Ukrainian blood, their frenzy.

However, such “soft power” derived from the Cyber Domain’s social media doesn’t ultimately stop hard bombs. Nor does it stop, the grinding, casualty adverse warfare from an opponent who could care less what you think and who is impervious to your soft power “social media.” And it will likely contribute to a numbing and decline of popular support. The Cyber Generation is about to find out there are limits to social media’s  power.

“Hard Power” Pipes and “Soft Power” Water

Cyber Space can be place where hard power is exercised. The sheer bluntness of “hard power” actions in cyber space – for example, shutting down an electrical power grid or fouling up a gas/oil pipeline systems – is a tricky business; especially when you effect large, traditionally non-combatant populations.
  
Russia, China, and  the U.S., all have organizations built to do “hard” power cyber – whether it be U.S. Cyber Command, or Russia’s APT 28/29, or China’s PLA Unit 61398.  However, there is a certain “mutually assured destruction” in this exercise of hard cyber power.  And it has been used gingerly.

Weak Power and Winning Domains

In the Cyber Domain, “Water” soft power has been used with glee - in the past by the Russians; today by Ukraine.  However, it has not translated well on the ground of the Ukraine battlefield.  Why? Russia’s success has been its adoption of the 20th century model of controlling the domains of land, sea, and air - where it has a clear advantage. 

And with superior numbers and fire power, Moscow and Putin seem intent on destroying a free Ukraine.  In short, Russia has neutralized the cyber “water” with a grinding type of warfare that is clearly working well  - especially when you can control the soft power of social media internally to your own country and don’t care about external social media; either dismissing it as lies and or simply ignoring it.

Information Fatigue Coming

Another challenge for social media soft power, soon to come, is the inevitable challenge of information fatigue.  We’ve seen this during the COVID crisis of the last two years.  People simply grow tired of the constant negative messages and “doom scrolling.”  The problem is this often happens well before the political leaders and opinion leaders in the press and “expert class” get the message. As I said, they are obsessed by the story.  The public busy with their daily concerns – sympathetic -- but less so. 

The decline of popular support - public fatigue - can start slowly and quickly build toward cynicism and a desire to disengage.  It must be constantly battled - especially through what will likely prove a long and difficult conflict as Ukraine.  Messaging supporting Ukraine and the war crimes of Russia must be kept up to battle it.  But, understand, there will be some loss of support over time as some people get sick of hearing it.

The Long Fight

In the final analysis, the best that social media can do right now is continue to provide justification and support to arming Ukraine to better fight in the other dimensions.  But, make no mistake, as vital as that is, it will not stop a determined and ruthless enemy from its goal.  

Like sanctions, social media has its limits.  And needs to be used along with hard power to win the day.


Ronald A. Marks III is a former CIA officer, Capitol Hill staff, and President of ZPN Cyber and National Security Strategies.  He is a Visiting Professor at George Mason University and a Senior Fellow at the Atlantic Council

You Might Also Read:

Twitter Joins Ukraine’s War Effort:

 

« The US Military Want 5G Fast
AI Fills In The Missing Gaps From Ancient Greece »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

du

du

du is a telecommunications service provider providing UAE businesses with a vast range of ICT and managed services.

First Focus

First Focus

First Focus is a managed service provider for medium-sized organisations.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

Mantodea Security

Mantodea Security

Mantodea Security is an industry-agnostic powerhouse backed by extensive experience and expertise in the realm of IT security.