America Can Learn About Russian Disinformation From Europe

In 2014, United States officials encountered a new form of Kremlin disinformation in Ukraine. As men streamed into the country’s south, blatant falsehoods over anything from the history of World War II to weapon-system deployments spread across the Internet and the airwaves. 

Propagandists disguised as professors, activists, and journalists sowed confusion about what was actually happening on the ground: soldiers bearing no flag had occupied strategic territory in eastern Ukraine

Intelligence collectors supplied propagandists with tapped calls and hacked emails containing compromising language, and the Kremlin leaked all of this to the media at key moments.

US officials engaged in an aggressive campaign to build a global understanding of what was actually happening in Ukraine, and united Western allies in a chorus of condemnation. As a result, the West backed a sanctions regime that, remarkably, remains intact. But over time, with a peace process theoretically underway and the situation cooling, the State Department’s focus on counter-influence campaigns waned, and the unit leading the charge dissolved. 

Two years later, disinformation campaigns using very similar tactics targeted the US electorate in the run-up to the 2016 vote, spreading so-called “fake news” and encouraging divisiveness in an effort to influence the election and American democracy itself.

As with the propaganda around Israel’s Operation Cast Lead in 2009, but even more so of the foreign interference around the Brexit vote in 2016, and, of course, of Ukraine in 2014, the United States has failed to maintain its guard.

Northeast Europeans, by virtue of their location, experience, and foresight, have come to understand how to build resistance to disinformation: organising campaigns to raise awareness of the problem; educating to resist propaganda; and coordinating across government agencies, civil society, and the media. 

Theoretically, these tactics are replicable in America in the current midterm election season.

Historically, the countries of northeast Europe have contended with more than their fair share of disinformation. 

“We all thought in Poland that 300 years of partitioning and 50 years of communism made us immune to propaganda, not only Russian propaganda, but any kind of disinformation aiming at influencing the behavior of larger parts of society,” Jan Hofmokl, an official with Poland’s Ministry of Foreign Affairs, explained. 

“However, we have to admit it: We were caught off guard, and it took some time before we were able to admit there is a problem. Because there clearly is one.”

Academic research around disinformation isn’t new, but our empirical understanding of how to cope with the tactic remains limited. Northeastern University’s Briony Swire-Thompson researches the cognitive psychology behind disinformation effectiveness. 

“It is important to let the public know as soon as possible where the information comes from,” she explained. “This is because when deciding on whether information is true or false, people place a great deal of weight on the source of information.”

NATO strategist Elina Lange-Ionatamishvili is worried about extremely realistic audio-video editing, as did Geir Hågen Karlsen, director of Strategic Communication and Psychological Operations at the Norwegian Defense University College. 

“In the future we will have to deal with Troll Factory 2.0: human trolls replaced by advanced bots and a few operatives,” and also “artificial intelligence, algorithms like natural language generation, manipulation of speech, imagery, and soon also video, higher speed, and most importantly, more sophisticated manipulation,” he said.    

In Estonia, even some technology experts advise against focusing too closely on technology. In the spring of 2017, Liisa Past, the chief research officer at the Cyber Security Branch of the Estonian Information System Authority, attended a meeting on i-Voting, Estonia’s remote voting system. The gathering focused on technology to protect the electoral process from cyber-attacks. But Past felt her colleagues ignored non-technological, human vulnerabilities. “First I got scared,” she said, “then I got reasonably loud.” An attack on the vote-counting system itself was possible, she explained to her colleagues, but expensive. 

More realistic attacks would target the candidates and the parties, who lacked the technical expertise of the government, and the “news or information space layer,” sowing doubt and confusion among the electorate without needing to hack secure systems.

Finland made a concerted effort to educate its military officers, civilian officials, and journalists on the social science behind disinformation, in order to more thoroughly process influence campaigns and determine how to respond effectively. The government didn’t pursue purely technical solutions or quick fixes, but rather delved into the empirical evidence behind human vulnerability to disinformation. This allowed officials to confront the complexity of the problem and devise more thoughtful responses. This, too, is possible in America.

The Baltic experience can also inform what not to do. “First, the West should not submit to the temptation to shoot from the hip and engage in counter-propaganda,” Latvia’s Mellakauls said. Poland’s Hofmokl agreed: “We should be all afraid that we will end up in a dystopian world where propaganda is being fought by more propaganda.”

Unfortunately, many advantages that northeast European countries have in the war against disinformation may not exist in the United States. Their ability to implement whole-of-government solutions relatively easily is enviable, but challenging for a country as large and diverse as America. 

Perhaps the most important potential import from Northeastern Europe is an awareness of what is at stake. In the long run, the contest of narratives is about core postwar values such as multilateralism, individual rights, and the rule of law. 

“If we are serious about defending Western values, now is the time,” instructed Lithuania’s Foreign Minister Linas Linkevičius. Disinformation is a “very efficient weapon to demotivate people, to create doubt in leadership … the vacuum is never empty, but is filled by populism or nationalism or radicalism … we are just starting to realise this is real.”

Defense One

You Might Also Read: 

The Internet Is No Place For Elections:

Defensive Measures: Estonia Will Store  Citizens’ Data In The UK:

How A Cyber Attack Transformed Estonia:

 

« Cybercrime: Under-Reporting Gives Hackers A Green Light
Chinese Hackers Steal Naval Warfare Secrets »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

Anch.AI

Anch.AI

Anch.AI is an Ethical AI Governance platform that helps you comply with EU regulations and avoid risks and penalties when developing and using AI as part of your business.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.

Surf Security

Surf Security

SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.