- The Strategist - https://www.aspistrategist.org.au -

Non-technical measures can help reduce Australia’s vulnerability to foreign influence

Posted By on April 11, 2019 @ 11:00

Most now agree that Russia interfered in the 2016 US presidential election, using social media manipulation to support its preferred candidate. In Australia, China has been engaging in old-fashioned influence operations.

To address concerns about interference, the Australian Electoral Commission is sharply upgrading [1] its cybersecurity measures and installing [2] new computer systems. Politicians are ramping up [3] their monitoring and the parliament has passed new law [4]s to deal with China’s activities. There remains, however, another less obvious threat to Australia’s foreign and defence policymaking.

Future governments are likely to face external online interference from state or non-state groups when trying to persuade Australians of the need to take military action overseas. This shift to a contested social environment reflects a revitalised appreciation of the importance of individual and collective views within society to the nation’s ability to defend itself. ‘The people’ are now being seen by some outside Australia as a centre of gravity that may be exploited to win future conflicts, potentially without any fighting at all.

Three broad strategies might be used by external entities to prevent Australian governments from mobilising the public to support national foreign and defence policies.

The simplest is to induce chaos. The Russian approach [5] is to amplify divisive social issues by employing a wide-ranging disinformation attack across a nation’s political spectrum. Whether certain groups support the policies pushed by the Russians is immaterial. The aim is to drive a nation’s people to being more confrontational [6] towards other.

The second strategy involves supporting ‘useful’ domestic groups. Terrorist groups like Islamic State [7] have already targeted vulnerable individuals on a small scale using human-intensive techniques. Now, though, big data [8], artificial intelligence and social media are making large-scale manipulation [9] of groups of people feasible.

The third and hardest strategy aims at changing people’s minds. This includes acting top-down [10] through ‘thought leaders’. Here, big data, data mining, micro-targeting and deep fakes [11] offer new technological solutions.

The three strategies all need to leverage off the target society and require an accessible and malleable audience to be successful.

Technical measures alone are unlikely to be enough of a defence given the extent of social media take-up across Australian society. Indeed, a lot of the technical measures that are being taken are meant to protect not the public but rather the computer systems of government agencies and the parliament. In practise, technical measures need to be complemented with non-technical ‘foreground’ and ‘background’ approaches to thwart an adversary’s counter-mobilisation strategies.

Non-technical foreground approaches involve building legitimacy and crafting a strategic narrative.

In this context, legitimacy mainly involves the assessments individuals make of specific actions their government is undertaking. If the actions are deemed legitimate, people will end to support the government and accept the demands made of them. Importantly, they will not actively try to subvert the government and will generally self-police to ensure others don’t either. Building legitimacy involves [12] assuring the public that the proposed action accords with societal norms, stressing that the government has appropriate expertise to deal with a situation, asserting that the actions being taken will work and, most importantly, having a compelling rationale.

The second, concurrent, foreground measure involves crafting a narrative [13] to tell a story about the strategy being implemented in a way that frames issues and policies within a consistent and coherent conceptual framework. The narrative provides an interpretive structure that people can use to make sense of historical facts, current problems and emerging issues.

Non-technical background measures work differently. They aim to favourably shape the terrain on which the online battle of ideas is being waged. Australia’s home front experience during World War II offers two useful insights, both of which were eloquently explained by official historian Paul Hasluck [14] 25 years ago.

The first is that commercial imperatives drove the non-government media to focus on bad news, while the government media, in a quandary about how to remain party-neutral, decided that the best approach was to simply censor almost all news (see Hasluck, pages 402–407 [15]). The Department of Information became the ‘department of suppression’.

The result was that people didn’t have access to an information source that gave a balanced perspective. Citizens of a democracy need to have high-quality information to make reasoned judgements about a government’s actions. This remains a difficult issue, but there is time now to develop solutions. The alternative is to leave a void that adversaries intent on social disruption can exploit.

Second, Australia’s leadership didn’t appear to fully trust the people. Hasluck observed (page 628 [16]) that a prominent feature of the Australian wartime home front was:

the lack of confidence that wartime leaders had in their people. They often complained, cajoled and even threatened, and they constantly exhorted the people to do more, but seldom did they appear to trust them. Seldom did they make the confident demand of leaders who are sure that their people are good, sound at heart and resolute.

If future Australian governments seek the people’s support, they might usefully base their rhetoric on the assumption that they ‘are good, sound at heart and resolute’. This may be especially necessary if a balanced source of information isn’t available to the public. A leader’s statements will then form the principal counterweight to more troubling opinions elsewhere and help shape a future online battle of ideas.

Social mobilisation may seem arcane. But adversaries that seek to manipulate Australians’ views to alter the government’s foreign and defence policies already have the online mechanisms available to try to do that. With such external social disruption operations possible for the foreseeable future, thought needs to be given to responses.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/non-technical-measures-can-help-reduce-australias-vulnerability-to-foreign-influence/

URLs in this post:

[1] sharply upgrading: https://www.itnews.com.au/news/aussie-electoral-systems-get-24x7-monitoring-for-2019-election-517559

[2] installing: https://www.itnews.com.au/news/cyber-fears-trigger-australian-electoral-commission-core-systems-rebuild-514425

[3] are ramping up: https://www.afr.com/news/politics/federal-mps-to-monitor-threats-of-foreign-interference-in-australian-politics-20190106-h19ryp

[4] new law: https://www.theguardian.com/australia-news/2018/jun/29/sweeping-foreign-interference-and-spying-laws-pass-senate

[5] Russian approach: https://apo.org.au/node/211311

[6] more confrontational: https://apo.org.au/node/211296

[7] groups like Islamic State: https://content.sciendo.com/view/journals/irsr/5/3/article-p191.xml

[8] big data: https://www.theguardian.com/technology/2017/oct/01/cambridge-analytica-big-data-facebook-trump-voters

[9] large-scale manipulation: https://www.cjr.org/analysis/breitbart-media-trump-harvard-study.php

[10] acting top-down: https://home.gwu.edu/~finnemor/articles/1998_norms_io.pdf

[11] deep fakes: https://www.abc.net.au/news/2018-09-27/fake-news-part-one/10308638

[12] legitimacy involves: https://www.jstor.org/stable/40072146?seq=1/subjects

[13] crafting a narrative: https://www.aspistrategist.org.au/strategic-narratives-our-defence-white-papers-and-their-audiences/

[14] Paul Hasluck: https://www.awm.gov.au/collection/C1417320

[15] Hasluck, pages 402–407: https://s3-ap-southeast-2.amazonaws.com/awm-media/collection/RCDIG1070626/document/5519909.PDF

[16] page 628: https://s3-ap-southeast-2.amazonaws.com/awm-media/collection/RCDIG1070629/document/5519912.PDF

Copyright © 2016 The Strategist. All rights reserved.