From Russia With Love
36 Pages Posted: 20 Sep 2017 Last revised: 19 Mar 2021
Date Written: March 15, 2021
This Article examines the questions of Election Interference in a digital interconnected age. It identifies a typology which distinguishes between: (1) “Election Hacking,” which targets infrastructure and records; and (2) “Influence Operations,” which comprise persuasive messaging targeting how or whether individuals choose to vote. It distinguishes between the types of technological and legal solutions available to each category, and between the types of ex ante and ex post legal solutions and redress which are available in each category.
Using this typology of problems and potential solutions, this Article concludes that the persuasive messaging regarding policy matters poses the greatest challenge in unlawful foreign Election Interference. These Influence Operations are not amenable to technological methods of prevention and face significant challenges for legal solutions. Ex ante legal solutions face steep First Amendment hurdles and ex post legal redress either is unavailable or non-justiciable.
Despite these challenges, this Article argues that three categories of actors, working within their respective capacities and limitations, can significantly mitigate the impacts of unlawful foreign Influence Operations. Government actors can conduct investigative and counterintelligence operations to identify unlawful foreign activities, shut them down, and potentially stop dissemination before it enters the protected political sphere. Such activities also can inform the choices of social media platform operators to enforce rules, flag content, and provide links to official or trusted third-party information sources on their “private property.” And engaged, respectful, and persuasive discourse among individual citizens can directly mitigate the impact of Influence Operations. Indeed, this information “market” has functioned for centuries in traditional media, and there is no reason to believe that it cannot continue to do so, buttressed by carefully-construed government assistance.
Keywords: cybersecurity, elections, hacking, risk management
Suggested Citation: Suggested Citation