Center for Security Research Articles Fake news is a threat to electoral security

Fake news is a threat to electoral security

Aleksandar Nacev

By participating in free and fair elections, citizens cast their votes expecting the officials they elect to represent their interests in the best possible way. The voters’ choice grants legitimacy to the elected representatives and the parties they are part of. This legitimacy allows politicians to enact and amend legislation in the way they find most appropriate and suitable – usually along the lines of a published policy platform or manifesto. While the competition for political power is an essential element in ensuring the democratic diversity of interests, the election process can become exposed to malicious attempts to influence the result, including attempts from foreign powers to try and manipulate voters with false messaging as well as outright interference in the electoral count.

 This reason alone should be enough to understand that protecting the integrity of elections is therefore a clear priority; both for individual states, but also for international organisations, such as the European Union. The threat has clearly been growing in the past couple of years, with a series of fairly blatant attempts to manipulate electoral processes in at least 18 countries, including the USA, Netherlands and the Ukraine.

Today’s incredibly complex and dynamic environment has created unprecedented ways of influencing voters’ choices and the results of elections. This requires national administrations and relevant institutions to assess the potential risks and challenges facing democratic processes in a holistic way, and to consider the most suitable approach to ensure the relevant resilience levels.

The diversity of views, preferences and priorities of different groups in society make up the backbone of a modern democracy but can make it difficult to distinguish and spot undemocratic or artificially injected processes orchestrated by (foreign) actors outside the legitimate space of debate and citizens’ rights.

The concept of foreign malicious influence attempts – deliberately designed, tailored and targeted to influence the decisions of voters – are very difficult to distinguish from the legitimate processes in the political arena. Every political party and candidate will try to influence the actions of voters, hoping to gain more votes for themselves. The main difference, and also the most difficult to prove, is whether attempts to influence the elections have malicious foreign elements.

On the other hand, protecting elections is a multi-layer and multi-stakeholder process that necessitates the development of new coordination mechanisms, new methods and tools to monitor and assess the election, improved routines for risk and vulnerability analysis and a framework to assess and respond to election interference.

Any malicious actor needs to be understood from the perspective of its will and ability to influence an election. For that reason, the methods of the malicious actor should be understood based on an assessment of its intention and capacity, paired with potential opportunities to act. Deliberate attempts to manipulate elections, electoral infrastructure and campaign information systems are becoming a significant threat to our democracies, a threat which need to be actively combated using all available means.

As technological progress continues apace new developments, that have little similarity to anything else in democracy’s long history, will continue to emerge. Whether those developments bolster democracy—or whether they undermine it—will be decided by how well today’s policymakers and civil society cooperate to produce principles and standards that withstand the test of time.

This article was originally published for Conservatives Global.

Related Post

CSR was part of the research project on cyber bullyingCSR was part of the research project on cyber bullying

On January 31st 2022, three WEASA alumni members from different editions presented their research on cyberbullying in Macedonia and Serbia. One of the researchers was Oliver Risteski MA, our Head of the Department for Law Enforcement Research. The valuable piece of the research caught the attention of the attendees, who shared their appreciation and feedback after the presentation, and demonstrated their deep interest in the topic. The research found out that mostly women and underaged girls are under attack by ex-husbands or ex-partners/boyfriends who share personal photos online without their consent, conduct blackmail, and harass for revenge or other reasons. 

On the following link you can find the full research with the recommendations:

https://www.weasa.org/wp-content/uploads/2021/02/Research-on-cyber-stalking-in-North-Macedonia-and-Serbia.pdf

When an order endsWhen an order ends

By Alessandro Politi, Director of the NATO Defense College Foundation

This article intends to discuss three points: the quest for a new world order, echoing the one established in 1945, is pointless; what should be done when an existing order cannot be adapted, and how the transition to a different order should be presently governed, taking into account also the new US administration.

The solutions proposed are to: adopt a flexible globalisation model where shared responsibilities and decision-making are realistically rebalanced; to refuse a fragmenting multipolarism; to relaunch global sustainability by redressing social imbalances at home and abroad in order to tackle climate change and to phase out an outdated model of consumerist capitalism. The overarching global priorities are essentially two: ensuring human security vis-à-vis climate change (and attendant pandemics) and favouring shared prosperity, which means the transition to a fairer hybrid economic system where economic policies are fully accountable to the taxpayer.

Will the Biden presidency understand these two strategic priorities? In short, the answer is: in word yes, in deed yo, with a strong tendency towards a no. Political handicaps in Congress and American socio-cultural conditions may significantly limit the President’s concrete choices, reducing complex decisions to a zero-sum game with China and risking an economic stalemate that could turn into hot confrontation. (more…)

Cybersecurity basics more important than ever in the new normal of remote workCybersecurity basics more important than ever in the new normal of remote work

Blagoja Janakievski

In this new work-from-anywhere environment that we’re all in thanks to the COVID-19 pandemic, cybersecurity, trust, and protecting customer data is more important than ever. We saw the largest workforce transmit transformation in history as everyone went remote almost overnight in March 2020.

The best thing that any business can do in securing yourself, especially as adapting to this new environment, this new work from anywhere environment, is to nail the basics. There are a small number of really important cybersecurity hygiene actions, so think about it in the current climate as washing your hands from a cybersecurity perspective, that businesses can do to really eliminate the risk associated with a lot of common cybersecurity threats. So some examples of this are enabling strong multi-factor authentication or ensuring that you’re rapidly patching all of your devices to it to inoculate them against known vulnerabilities, to prevent things like ransomware attacks. And then finally, treating cybersecurity like a team sport, building a culture of awareness in your company so that all the employees in your company can act like security trailblazers.

(more…)