Center for Security Research Articles Fake news is a threat to electoral security

Fake news is a threat to electoral security

Aleksandar Nacev

By participating in free and fair elections, citizens cast their votes expecting the officials they elect to represent their interests in the best possible way. The voters’ choice grants legitimacy to the elected representatives and the parties they are part of. This legitimacy allows politicians to enact and amend legislation in the way they find most appropriate and suitable – usually along the lines of a published policy platform or manifesto. While the competition for political power is an essential element in ensuring the democratic diversity of interests, the election process can become exposed to malicious attempts to influence the result, including attempts from foreign powers to try and manipulate voters with false messaging as well as outright interference in the electoral count.

 This reason alone should be enough to understand that protecting the integrity of elections is therefore a clear priority; both for individual states, but also for international organisations, such as the European Union. The threat has clearly been growing in the past couple of years, with a series of fairly blatant attempts to manipulate electoral processes in at least 18 countries, including the USA, Netherlands and the Ukraine.

Today’s incredibly complex and dynamic environment has created unprecedented ways of influencing voters’ choices and the results of elections. This requires national administrations and relevant institutions to assess the potential risks and challenges facing democratic processes in a holistic way, and to consider the most suitable approach to ensure the relevant resilience levels.

The diversity of views, preferences and priorities of different groups in society make up the backbone of a modern democracy but can make it difficult to distinguish and spot undemocratic or artificially injected processes orchestrated by (foreign) actors outside the legitimate space of debate and citizens’ rights.

The concept of foreign malicious influence attempts – deliberately designed, tailored and targeted to influence the decisions of voters – are very difficult to distinguish from the legitimate processes in the political arena. Every political party and candidate will try to influence the actions of voters, hoping to gain more votes for themselves. The main difference, and also the most difficult to prove, is whether attempts to influence the elections have malicious foreign elements.

On the other hand, protecting elections is a multi-layer and multi-stakeholder process that necessitates the development of new coordination mechanisms, new methods and tools to monitor and assess the election, improved routines for risk and vulnerability analysis and a framework to assess and respond to election interference.

Any malicious actor needs to be understood from the perspective of its will and ability to influence an election. For that reason, the methods of the malicious actor should be understood based on an assessment of its intention and capacity, paired with potential opportunities to act. Deliberate attempts to manipulate elections, electoral infrastructure and campaign information systems are becoming a significant threat to our democracies, a threat which need to be actively combated using all available means.

As technological progress continues apace new developments, that have little similarity to anything else in democracy’s long history, will continue to emerge. Whether those developments bolster democracy—or whether they undermine it—will be decided by how well today’s policymakers and civil society cooperate to produce principles and standards that withstand the test of time.

This article was originally published for Conservatives Global.

Related Post

How do terrorist groups exploit the corona pandemic?How do terrorist groups exploit the corona pandemic?

Rabie W. Sedrak

The spread of the Corona pandemic has changed the dynamics of most political processes at the local, regional, and international levels. However, it is remarkable that actors of current terrorist groups from various ideologies have demonstrated significant abilities to adapt rapidly to those changes caused by the spread of Corona virus. Indeed, some terrorist groups have tended to use the virus as a tool to achieve their goals, such as the attempt of some terrorists in Tunisia to spread the virus among security personnel earlier this month. Through monitoring the behavior of violent extremist groups worldwide during the past weeks, it was possible to identify a number of paths through which Corona virus have influenced the movement of such extremist groups, or rather the paths that these groups are employing, to serve their purposes.
(more…)

Psychological aspects of modern warfarePsychological aspects of modern warfare

Aleksandar Nacev

While war has long been viewed as a competition between adversaries, peace has been defined by absence of such conflict. But what happens when the line between war and peace is blurred and hardly visible? Countries today face a number of actors who use a wide range of political, informational, military, and economic measures to influence, coerce, intimidate, or undermine its interests or those of its friends and allies. To accomplish military goals without putting one’s nation, civilians, or even opposition troops at mortal risk is certainly the ideal manner in which to win a war. (more…)

Cybersecurity basics more important than ever in the new normal of remote workCybersecurity basics more important than ever in the new normal of remote work

Blagoja Janakievski

In this new work-from-anywhere environment that we’re all in thanks to the COVID-19 pandemic, cybersecurity, trust, and protecting customer data is more important than ever. We saw the largest workforce transmit transformation in history as everyone went remote almost overnight in March 2020.

The best thing that any business can do in securing yourself, especially as adapting to this new environment, this new work from anywhere environment, is to nail the basics. There are a small number of really important cybersecurity hygiene actions, so think about it in the current climate as washing your hands from a cybersecurity perspective, that businesses can do to really eliminate the risk associated with a lot of common cybersecurity threats. So some examples of this are enabling strong multi-factor authentication or ensuring that you’re rapidly patching all of your devices to it to inoculate them against known vulnerabilities, to prevent things like ransomware attacks. And then finally, treating cybersecurity like a team sport, building a culture of awareness in your company so that all the employees in your company can act like security trailblazers.

(more…)