The Limits Of Social Media Soft Power

Watching the current war in Ukraine has been hard. Through vast volumes of social media, the bravery of Ukraine’s military and moral strength against Russian savagery has been nothing less than breath taking.  TikTok, Facebook, YouTube represent very effective methods of getting messages out worldwide.

In the newest domain, Cyber Space, social media platforms can - and in the case of Ukraine - have turned social media into soft power (uniting a fractious NATO) eventually into some hard power (supplying arms to Ukraine.) And it has certainly stirred the chattering political classes to a blood frenzy – Ukrainian blood, their frenzy.

However, such “soft power” derived from the Cyber Domain’s social media doesn’t ultimately stop hard bombs. Nor does it stop, the grinding, casualty adverse warfare from an opponent who could care less what you think and who is impervious to your soft power “social media.” And it will likely contribute to a numbing and decline of popular support. The Cyber Generation is about to find out there are limits to social media’s  power.

“Hard Power” Pipes and “Soft Power” Water

Cyber Space can be place where hard power is exercised. The sheer bluntness of “hard power” actions in cyber space – for example, shutting down an electrical power grid or fouling up a gas/oil pipeline systems – is a tricky business; especially when you effect large, traditionally non-combatant populations.
  
Russia, China, and  the U.S., all have organizations built to do “hard” power cyber – whether it be U.S. Cyber Command, or Russia’s APT 28/29, or China’s PLA Unit 61398.  However, there is a certain “mutually assured destruction” in this exercise of hard cyber power.  And it has been used gingerly.

Weak Power and Winning Domains

In the Cyber Domain, “Water” soft power has been used with glee - in the past by the Russians; today by Ukraine.  However, it has not translated well on the ground of the Ukraine battlefield.  Why? Russia’s success has been its adoption of the 20th century model of controlling the domains of land, sea, and air - where it has a clear advantage. 

And with superior numbers and fire power, Moscow and Putin seem intent on destroying a free Ukraine.  In short, Russia has neutralized the cyber “water” with a grinding type of warfare that is clearly working well  - especially when you can control the soft power of social media internally to your own country and don’t care about external social media; either dismissing it as lies and or simply ignoring it.

Information Fatigue Coming

Another challenge for social media soft power, soon to come, is the inevitable challenge of information fatigue.  We’ve seen this during the COVID crisis of the last two years.  People simply grow tired of the constant negative messages and “doom scrolling.”  The problem is this often happens well before the political leaders and opinion leaders in the press and “expert class” get the message. As I said, they are obsessed by the story.  The public busy with their daily concerns – sympathetic -- but less so. 

The decline of popular support - public fatigue - can start slowly and quickly build toward cynicism and a desire to disengage.  It must be constantly battled - especially through what will likely prove a long and difficult conflict as Ukraine.  Messaging supporting Ukraine and the war crimes of Russia must be kept up to battle it.  But, understand, there will be some loss of support over time as some people get sick of hearing it.

The Long Fight

In the final analysis, the best that social media can do right now is continue to provide justification and support to arming Ukraine to better fight in the other dimensions.  But, make no mistake, as vital as that is, it will not stop a determined and ruthless enemy from its goal.  

Like sanctions, social media has its limits.  And needs to be used along with hard power to win the day.


Ronald A. Marks III is a former CIA officer, Capitol Hill staff, and President of ZPN Cyber and National Security Strategies.  He is a Visiting Professor at George Mason University and a Senior Fellow at the Atlantic Council

You Might Also Read:

Twitter Joins Ukraine’s War Effort:

 

« The US Military Want 5G Fast
AI Fills In The Missing Gaps From Ancient Greece »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.