<<

D

CAN C PUBLIC SURVIVE THE ? BOTS, ECHO CHAMBERS, AND

Edited by Shawn Powers and Markos Kounalakis May 2017

TRANSMITTAL LETTER

Tothe President, Congress, Secretary of State and the American People:

Established in 1948, the U.S. Advisory Commission on (ACPD) is authorized pur­ suant to Public Law 114- 113 to appraise all U.S. government efforts to understand, inform and in­ fluence foreign publics. We achieve this goal in a variety of ways, including, among other efforts, offering policy recommendations, and through our Comprehensive Annual Report, which tracks how the roughly $1.8 billion in appropriated funds is spent on public diplomacy efforts throughout the world.

Part of the Commission’s mandate is to help the State Department prepare for cutting edge and transformative changes, which have the potential to upend how we think about engaging with foreign publics. This report aims to achieve precisely that. In order to think carefully about public diplomacy in this ever and rapidly changing communications space, the Commission convened a group of private sector, government, and academic experts at ’s Hoover Insti­ tution to discuss the latest research and trends in strategic communication in digital spaces. The results of that workshop, refined by a number of follow-on interviews and discussions with other organizations interested in similar questions, are included in this report.

Can Public Diplomacy Survive the Internet? features essays by workshop participants that focus on emergent and potentially transformative technology and communication patterns. The essays also highlight the potential challenges and opportunities these changes create for public diplomacy practitioners in particular and the U.S. government more broadly. We explore how public diplo­ macy practitioners can continue to productively engage with audiences around the world in the face of likely shifts in communication patterns, continue to effectively and efficiently help the to achieve its foreign policy priorities, and synchronize American interests with the interests of citizens and governments around the world.

Respectfully Submitted,

Sim Farar, Chair ()

William J. Hybl, Vice Chair Lyndon L. Olson, Vice Chair (Colorado) (Texas)

Penne Korth Peacock Anne Wedner Georgette Mosbacher (Texas) (Illinois) (New York) TABLE OF CONTENTS

Transmittal Letter ii Forward: Public Diplomacy in a Post- Society 1 Francis Fukuyama, Olivier Nomellini Senior Fellow at the Freeman Spogli Institute for International Studies (FSI), and the Mosbacher Director of FSI’s Center on Democracy, Development, and the Rule of Law

Executive Summary 2 Shawn Powers, Executive Director, U.S. Advisory Commission on Public Diplomacy Remarks on “Public Diplomacy in a Post-Truth Society” 7 Bruce Wharton, Acting Under Secretary for Public Diplomacy and Public Affairs , Stanford University, Stanford, California, March 20, 2017

DIGITAL’S DARK SIDE

Computational and Political Bots: An Overview 13 Samuel C. Woolley,Director of Research, Oxford Internet Institute’s Computational Propaganda Project Understanding the Behind Computational Propaganda 19 MattChessen,F oreignServiceScience,Technology and ForeignPolicyFellowatThe George Washington University

Rethinking Countermeasures in the Age of Computational Propaganda 27 Tim Hwang,ExecutiveDirector, Pacific Social

Public Diplomacy’s (Misunderstood) Digital Platform Problem 33 Sam Ford, Research affiliate and consultant with Massachusetts Institute of Technology’s Program in Comparative Media Studies/Writing

Understanding the Challenges of Artificial and Computational Propaganda to Pub- lic Diplomacy 39 MattChessen,F oreignServiceScience,Technology and ForeignPolicyFellowatThe George Washington University

DISINFORMATION

Psychological Principles for Public Diplomacy in an Evolving Information Ecosystem 49 Jeffrey T. Hancock, Professor of Communication, Stanford University Matter, and People Care: An Empirical Perspective 55 Ethan Porter, Asst. Professor at George Washington University School of Media and Public Affairs VOA: A Weapon of Truth in the War of Words 61 Amanda Bennett, Director, U.S. 2016 Elections: A Case Study in “Inoculating” Public Opinion Against Disinformation 65 Jonathan Henick, Principal Deputy Coordinator for International Information Programs and Ryan Walsh, Senior Advisor for Digital Product, Bureau of International Information Programs

In Defense of Truth, and the Threat of Disinformation 71 JasonStanle y, Jacob Urowsky Professor of Philosophy,YaleUniversity

NARRATIVES

Public Diplomacy and Strategic Narratives 77 Laura J. Roselle, Professor of Political Science and International Studies,Elon University Crafting Resilient State Narratives in Post Truth Environments: and Georgia 83 Vivian S. Walker,Professor of National Security Strategy, National War College America’s Strategic Narrative and a Path for Public Diplomacy 91 Markos Kounalakis, Visiting Fellow, Hoover Institution, Stanford University

Contributor Biographies 98 FORWARD: PUBLIC DIPLOMACY IN A POST-TRUTH SOCIETY

Modern electronic communication is transforming the spread and impact of ideas in unpredictable ways. Individuals and organizations can now share in- formation widely and instantly at no cost, bypassing conventional media and its traditional role in curating , focusing civic agendas, and moderating debate.

While technological advances have enabled broader participation in public discussion, they have also fractured it into silos where dubious assertions and accusations can reverberate unchallenged. is disseminat- ed for profit or political advantage. Extremists have new forums in which to spread hatred and lies with impunity. And foreign actors influence domestic policy undetected. Compounding the problems, individuals have little ability to discern the identity of interlocutors or basis for distinguishing from fiction.

The speed and scale of today’s “weaponization of information” is unprece- dented. Propelled by novelty, falsehood often travels faster than truth, leav- ing context and provenance behind. The traditional answer to the spread of bad information has been to inject good information into the mix, on the as- sumption that the truth would rise to the top. But in a world of trolls and bots, where simple facts are instantly countered by automated agents, this strat- egy may not be adequate. It is unclear how effectively democratic societies can continue to deliberate and function, and how hostile foreign actors can be identified and neutralized.

I’m thrilled to have been supportive of the Advisory Commission on Public Di- plomacy’s work, in conjunction with Stanford’s Hoover Institution, on better understanding how the U.S. government can get its messages out and con- nect with foreign audiences in this challenging and remarkable era of global- ly-networked communications.

Francis Fukuyama

Olivier Nomellini Senior Fellow at the Freeman Spogli Institute for In- ternational Studies (FSI), and the Mosbacher Director of FSI’s Center on Democracy, Development, and the Rule of Law EXECUTIVE SUMMARY By Shawn Powers, Executive Director of the U.S. Advisory Commission on Public Diplomacy

Scientific progress continues to accelerate, and while we’ve witnessed a revolution in communication tech- nologies in the past ten years, what proceeds in the next ten years may be far more transformative. It may also be extremely disruptive, challenging long held conventions behind public diplomacy (PD) programs and strategies. In order to think carefully about PD in this ever and rapidly changing communications space, the Advisory Commission on Public Diplomacy (ACPD) convened a group of private sector, government, and aca- demic experts at Stanford University’s Hoover Institution to discuss the latest trends in research on strategic communication in digital spaces. The results of that workshop, refined by a number of follow-on interviews and discussions, are included in this report. I encourage you to read each of the fourteen essays that follow, which are divided into three thematic sections: Digital’s Dark Side, Disinformation, and Narratives.

Digital’s Dark Side focuses on the emergence of social bots, artificial intelligence, and computational propa- ganda. Essays in this section aim to raise awareness regarding how technology is transforming the nature of digital communication, offer ideas for competing in this space, and raise a number of important policy and research questions needing immediate attention. The Disinformation section confronts Oxford English Dic- tionary’s 2016 – “post-truth” – with a series of compelling essays from practitioners, a social scientist, and philosopher on the essential roles that truth and facts play in a democratic society. Here, theory, research, and practice neatly align, suggesting it is both crucial and effective to double-down on fact-check- ing and evidence-based news and information programming in order to combat disinformation campaigns from our adversaries. The Narrative section concludes the report by focusing on how technology and facts are ultimately part of, and dependent on, strategic narratives. Better understanding how these narratives form, and what predicts their likely success, is necessary to think through precisely how PD can, indeed, sur- vive the Internet. Below are some key takeaways from the report.

IN DEFENSE OF TRUTH • We are not living in a “post-truth” society. Every generation tends to think that the current generation is less honest than the previous generation. This is an old human concern, and should be seen today as a strategic narrative (see Hancock, p. 49; Roselle, p. 77). Defending the value and search for truth is crucial. As Jason Stanley notes (p. 71), “without truth, there is just power.” • Humans are remarkably bad at detecting . Studies show that people tend to trust what oth- ers say, an effect called the truth bias. This bias is actually quite rational—most of the messages that a person encounters in a day are honest, so being biased toward the truth is almost always the correct response(seeHancock,p.49). • At the same time people are also continuously evaluating the validity of their understanding of the world. This process is called “epistemic vigilance,” a continuous process checking that the informa- tion that a person believes they know about the world is accurate. While we have a difficult time de- tecting deception from interpersonal cues, people can detect lies when they have the time, resources, and motivation. Lies are often discovered through contradicting information from a third source, or evidence that challenges a deceptive account (see Hancock, p. 49). • Fact checking can be effective, even in hyper-partisan settings (see Porter, p. 55), and is crucial for sus- tained democratic dialogue (Bennett, p. 61; Stanley, p. 71). Moreover, it is possible, using digital tools, to detect and effectively combat disinformation campaigns in real time (Henick and Walsh, p. 65). ACPD | Executive Summary 3

COMPUTATIONAL PROPAGANDA • Computational propaganda refers to the coordinated use of platforms, autonomous agents and big data directed towards the manipulation of public opinion. • Social media bots (or “web robots”) aretheprimary toolsused in the dissemination of computational propaganda. In their most basic form, bots provide basic answers to simple questions, publish con- tent on aschedule or disseminatestories in responsetotriggers(e.g. breaking news). Bots canhave a disproportionate impact because it is easy to create a lot of them and they can post a high-volume contentata highfrequency (see Woolley,p.13). • Political bots aim to automate political engagement in an attempt to manipulate public opinions. They allow for massive amplification of political views and can empower a small group of people to set conversation agenda’s online. Political bots are used over social media to manufacture trends, game hashtags, megaphone particular content, spam opposition and attack journalists. The noise, spam and manipulation inherent in many bot deployment techniques threaten to disrupt civic conversations and organizationworldwide (see Chessen,p.19). • Advances in artificial intelligence (AI) – an evolving constellation of technologies enabling computers to simulate cognitive processes – will soon enable highly persuasive machine-generated communica- tions. Imagine an automated system that uses the mass of online data to infer your personality, polit- ical preferences, religious affiliation, demographic data and interests. It knows which news websites and social media platforms you frequent and it controls multiple user accounts on those platforms. The system dynamically creates content specifically designed to plug into your particular psychologi- cal frame and achieve a particular outcome (see Chessen, p. 39). • Digital tools have tremendous advantages over humans. Once an organization creates and config- ures a sophisticated AI bot, the marginal cost of running it on thousands or millions of user accounts is relatively low. They can operate 24/7/365 and respond to events almost immediately. AI bots can be programmed to react to certain events and create content at machine speed, shaping the narrative almost immediately. This is critical in an information environment where the first story to circulate may be the only one that people recall, even if it is untrue (see Chessen, p. 39) • PD practitioners need to consider the question of how they can create and sustain meaningful con- versations and engagements with audiences if the mediums typically relied upon are becoming less trusted, compromised and dominated by intelligent machines. • Challenging computational propaganda should include efforts to ensure the robustness and integ- rity of the marketplace of information online. Defensively, this strategy would focus on producing patterns of information exchange among groups that would make them difficult to sway using tech- niques of computational propaganda. Offensively, the strategy would seek to distribute the costs of counter-messaging broadly, shaping the social ecosystem to enable alternative voices to effectively challenge campaigns of (see Hwang, p. 27). In the persuasive landscape formed by social media and computational propaganda, it may be at times more effective to build tools, rather than construct a specific message. • Practitioners are not alone in their concern about the escalating use of social bots by adversarial stateactor s. Theprivatesect or is, too.Socialmediaplatforms seethis trend as a potentiallyexist ential threattotheirbusinessmodels,especially if therise of bots andcomputational propagandaweakens users’ trust in the integrity of the platforms themselves. Coordination with private sector is key, as theirpoliciesgoverninga utonomous bots willadaptand, thus,shape what is and isn’t feasibleonline. 4 ACPD | Can Public Diplomacy Survive the Internet?

MOVING PAST “FOLK THEORIES” • Folk theories, or how people think a particular process works, are driving far too many digital strate- gies. One example of a folk theory is in the prevalence of echo chambers online, or the idea that people are increasingly digitally walled off from one another, engaging only with content that fits cognitive predispositions and preferences. • Research suggests that the more users rely on digital platforms (e.g. and ) for their news and information, the more exposure they have to a multitude of sources and stories. This re- mains true even among partisans (though to a lesser extent than non-partisans). It turns out we hav- en’t digitally walled ourselves off after all (see Henick and Walsh, p. 65). • Despite increased exposure to a pluralistic media ecosystem, we are becoming more and more ideo- logical and partisan, and becoming more walled off at the interpersonal and physical layers. For ex- ample, marriages today are twice as likely to be between two people with similar political views than they were in 1960. • Understanding this gap between a robustly diverse news environment and an increasingly “siloed” physical environment is crucial to more effectively engaging with target audiences around the world. Interpersonal and in-person engagement, including exchange programs, remain crucial for effective PD moving forward (see Wharton, p. 7) • Despite this growing ideological divide, people are increasingly willing to trust one another, even com- plete strangers, when their goals are aligned (see the sharing economy, for example). This creates interesting opportunities for PD practitioners. Targeting strategies based on political attitudes or pro- files may overshadow the possibility of aligned goals on important policy and social issues (see Han- cock, p. 49)

RETHINKING OUR DIGITAL PLATFORMS AND METRICS • Virality – the crown jewel in the social media realm – is overemphasized often at the expense of more important metrics like context and longevity. Many of the metrics used to measure the effectiveness of social media campaigns are vulnerable to manipulation, and more importantly, don’t measure en- gagement in any meaningful way. These metrics were built for an industry reliant on for revenue generation, and as a result, may not be well-suited when applied to the context of PD (see Ford, p. 33; Woolley, p. 13). • Overemphasizing certain metrics, such as reach or impressions, fails to account for the risks creat- ed by relaying on the same portals as other, less truthful and more nefarious actors. We need to be cautious and aware of the various ways in which the business industries are shaping PD content, be aware of the risks, and think carefully about safeguarding the credibility U.S. Department of State PD programs operating in this space (see Wharton, p. 7; Ford, p. 33).

STRATEGIC NARRATIVES • Strategic narratives—a means for political actors to construct a shared meaning of the past, present and future of politics in order to shape the behavior of other actor s—provide the ideological backdrop for how audiences assess the meaning and significance of curre nt events and br eaking news . Pu t another way, they help people make sense of what would otherwise be a dizzying onslaught ofnewsthey areexposed to onadaily basis(seeRoselle,p. 77;Kounalakis,p.91). ACPD | Executive Summary 5

• Crafting effective narratives require a genuine consensus-even if limited or temporary-on our policy priorities and their underlying values, as well as a detailed understanding and appreciation of local grievances and concerns about the related policy issue (see. Wharton, p. 7; Roselle. P. 77). As such, effective strategic narratives must be mutually constructed. • Rather than focusing on trending news topics and stories alone, we need to develop greater capacity to understand competing public narratives in foreign contexts and track how they adapt over time. Understanding distinctions between system (or governance), value, and identity narratives would al- low PD practitioners to construct policy narratives that speak to, or at least acknowledge, the under- lying pillars of belief in agiv en community(see Walker,p. 83; Roselle, p. 77). • Every new administration creates new opportunities forforeign engagement. A shift towards amor e transactionalapproachtoPD,focusedless on valuesbutmore on shared policyprioritie s, couldallo w forimprovedrelationsandcooperationwithanumber of countries previouslyhostiletoAmerican PD efforts and programs (see Kounalakis, p. 91). Bruce Wharton at TechCampWarsaw, Photo by U.S. Embassy Warsaw REMARKS ON “PUBLIC DIPLOMACY IN APOST-TRUTH SOCIETY”

By Bruce Wharton, Acting Under Secretary for Public Diplomacy and Public Affairs Hoover Institution, Stanford University Stanford, California March 20, 2017

NearlysixdecadesagoHerbertHoov er said he want - In such a world, the public policy debate is framed ed the Hoover Institution “to sustain for America the largely by what “feels” true and what correlates with safeguards of the American way of life,” so it is fit - people’ s pre -existing set of beliefs and prejudices, ting that we have gathered here today to debate a which can often be disconnected from actual facts pressing challenge for both our nation and the world and the specifics of policy. It isn’ t so much that facts community – the idea of a “Post- Truth Society.” I am are dismissed entirely, but rather they are of second - grateful to the Hoover Institution and to the U.S. Ad - ary importance or simply not as compelling, especial - visoryCommissionforPublicDiplomacyforbringing ly when they challenge what feels true at an instinctu - us together forthisimportantdiscussion. al level. In this context, all opinions have equal weight, regardless of how extreme they may be.

“POST -TRUTH” SOCIETY While this is not a new concept — it has played a role There has been much discussion in the media, aca - in politics since antiquity — in our age, social media demia, and within the U.S. government about living has exacerbated the problem, accelerating the speed in a “post- truth” or “post- factual” society and how to at which false stories spread, creating “digital wild - operate in it. Much was made of Oxford Dictionary’ s fires ” of misinformation. By the time a false story is decision to make “post- truth” the Word of the Year out there, it is often too late to mount an effective re- in 2016, an adjective they defined as “relating to or buttal based on facts. denoting circumstances in which objective facts are less influential in shaping public opinion than appeals Compounding the problem is the active work of non - state and state actors who aim not only to dissemi to and personal belief.” - 8 ACPD | Can Public Diplomacy Survive the Internet?

nate misinformation but, most damaging, to erode increased since a similar poll in 2014, and both peo- trust in traditional sources of information. These ac- ple who voted to leave and to remain in the EU shared tors — whom Get Smart fans might collectively call much the same view. “KAOS” — do notnecessarilyw antpeople tobelieve On this side of the Atlantic, polling also shows that they are telling the truth, but rather to think that no hunger for factual truth. According to a one is.Their goal is todiminishpublictrust in govern- study by the Media Insight Project, a partnership of ment institutions, established media outlets, and sub- the American Press Institute and the AP-NORC Cen- ject matter experts, leaving citizens open to the in- ter for Public Affairs Research, nearly 90 percent of fluence of an onslaught of questionable information Americans say it is “extremely” or “very important” generated through re-enforcing social media loops. that the media get its facts correct. Furthermore, about 40 percent say they can remember a specific While there is much that is accurate about this de- incident that eroded their confidence in the media, scription, I would like to contest that we are most often one involving inaccuracies or a perception living in a “post-truth” society — if by that we mean of one-sidedness, making factual accuracy the most truth and facts no longer matter. Facts do exist. They important component of public trust in journalism. are out there; we cannot operate without them. And theyremaincompellingwhenthey arepart of alarger There are also dangers in accepting a post-truth par- truth-based narrative that is backed up by support- adigm. Communicators, experts, and officials may ing actions. Crafting and effectively putting forth that feel overwhelmed and succumb to inaction or, worse, narrative with foreign publics is the real challenge be seduced into adopting “post-truth techniques” of Public Diplomacy today.Making sure “our actions that appeal only to emotion and sideline facts or chal- match our words” is everyone’s challenge. lenging audiences’ beliefs.

There is also the temptation to counter the barrage COMPETITION FROM PSEUDO-FACTS of misinformation by attempting to rebut every false story, but this is a losing proposition. There are too As I said, I don’t think we are in a world beyond facts. many of them, they spread too quickly, and there are What we are facing now is intense competition at too few of us to chase them. all levels. Facts compete with pseudo-facts on sub- stance, on speed, and for audiences’ attention. And A paper published by RAND in 2016, titled “The Rus- yes, people accept stories that “feel” true more read- sian ‘Firehose of Falsehood’ Propaganda Model,” ily than stories that challenge their beliefs. But they made three important observations: 1) people tend to accept them because they believe they are true. believe something when it is repeated, 2) propagan- “The way to counter pseudo-facts and misinforma- tion is to present a compelling narrative of our own”

Brexit is often cited as an example of the post-truth dists gain the advantage when they get to make the phenomenon — with a leading pro-exit member of first impression, and 3) subsequent rebuttals may ac- Parliament famously saying that “people in this coun- tually work to reinforce the original misinformation, try have had enough of experts.” But about the same rather than dissipate it. The paper’s conclusion is that time, the Institute for Government, a British govern- the most effective way to respond to misinformation ment organization, released a poll conducted by the is not to counter every false story out there, but to research firm Populus, indicating that 85 percent of direct a “stream” of accurate messaging at whatev- those surveyed wanted politicians to consult profes- er the firehose of falsehoods is aimed, in an effort to sionals and experts when making difficult decisions lead the targeted audience in a more productive di- and 83 percent wanted government to make deci- rection. sions based on objective evidence. In the UK, trust in experts and confidence in government have both Ia gree withthisapproachandhave so for years. The way tocounter pseudo-factsandmisinformation is to ACPD | Remarks on “Public Diplomacy in a Post-Truth Society” 9

present a compelling narrative of our own, one that CASE STUDY – STATE’S APPROACH TO is true, defensible, and based on the enduring values and goals that people share, not the least of which is FIGHTING EXTREMIST IDEOLOGY strengthening our collective security and prosperity. After the 9/11 terrorist attacks, we in government — To gain credibility and make our narrative relevant, and those of you in academia and the think tank world we must also listen to and acknowledge our audienc- — were desperate to find explanations for what had es’ underlying fears, grievances, and beliefs. happened and, more importantly, to prevent some- thing similar from happening again, with a particular But it is not just a matter of telling a good story; the focus on containing and countering the appeal of vio- narrativem ust be tiedtoaction. lent extremist ideology.

A case in point is the history of space exploration in All ideas were encouraged, and we pressed our peo- this country, in particular the quest to put a on ple to think creatively and to try new approaches. the moon. In the context, this effort was an One approach aimed at mass appeal was the $15 important security goal, one that required public sup- million “Shared Values” campaign featuring Muslims port, resources, and full political commitment over living happily in the United States. As well intended as many years. In 1961, President Kennedy gave his his- this was, the messaging did not acknowledge under- toric speech before a joint session of Congress that lying grievances and was not considered effective in set the United States on a course to the moon, which reaching young Muslim audiences overseas. he followed with other speeches and public acts that inspired not just the American people, but invited au- Another idea you may remember from a just few diences around the globe to be part of this great en- years ago was the “Welcome to ISIS Land” video, deavor. And foreign publics responded by embracing which went viral for all the wrong reasons. It was U.S. aspirations on behalf of the human race. When heavily criticized for embracing the enemy’s tac- the entire planet watched Neil Armstrong alight from tics and coming across as . Most critically, it the Eagle lunar module and utter the phrase “That’s proved to be ineffective as the U.S. government was one small step for man, one giant leap for mankind,” not a credible source of information for the intend- he distilled into these few words a decade-long nar- ed audience, who only seemed to be alienated by the rative that fueled the imagination and hopes of bil- message. lions around the world. Hampering our efforts was an inability to measure Another example is the Voice of America. I am glad the impact of our work reliably. For instance, the Amanda Bennet is here and will talk more about this former Center for Strategic Counterterrorism Com- later, but something she said last week at a public munications (CSCC), which was established in 2010 meeting on really struck me. She described to counter extremist ideology, could point to the size VOA as “exporting the First Amendment” – that is to of its Facebook and Twitter followings — and the say,the value and importance that Americans place number of death threats and efforts to shut down its on a free and independent press – by providing fact- accounts were evidence that the center had gotten based, balanced reporting to millions of people in under the skin of ISIS — but it could not measure ef- closedsocieties everyday. We talkaboutit,andwe do fectiveness. As aresult, it was never clear whether its it. Nothing is as powerfulas alivingexample,and as a efforts reached those at risk of joining ISIS, let alone Public Diplomacy practitioner,Icould not be prouder diverted them from that path. of the message, both literal and figurative, that VOA delivers. The CSCC was also under resourced. Its budget hov- ered in the range of $5-6 million per year, while the In short, we’ve got to “walk the talk,” or risk losing Pentagon was spending about $150 million on simi- credibility. This is not to say countering disinforma- lar efforts and the CIA even more. This situation even tion is easy. It requires strategic thought, creative emerged as a media story, with ABC News describing tactics, and sustained investment. The State Depart- the U.S. government’s messaging strategy to counter ment and other parts of the federal government have extremist ideology as underfunded and ineffective. been focused on this issue for several years, and analyzing how these efforts have fared is helping us Thisexperience provided us withawealth of valuable chart the way ahead. lessonsforchartinga neww ay forward in countering 10 ACPD | Can Public Diplomacy Survive the Internet?

false narratives, including: The GEC also enjoys strong support on the Hill, from • Not imitating the enemy, both sides of the aisle. In fact, it was Congress that expanded the GEC’s mandate — which originally fo- • Having a credible message based on facts cused solely on non-state actors — to include recog- and evidence that acknowledge underlying nizing, understanding, and exposing state-sponsored grievances, propaganda and disinformation and countering its effects. • Partnering with credible, independent, trust- ed messengers, In terms of resources, the GEC is funded at approx- • Using technology to identify the right audi- imately $16 million dollars for FY-17 and is slated to ences and the best approaches for reaching have an additional $19.8 million in supplemental them, funding in FY-18. Further, Congress has authorized – although not mandated – the Department of Defense • Employing analytics to evaluate effectiveness to transfer up to $60 million a year, in both FY-17 and and feeding that information back into the FY-18, to supportGECactivitie s. process, and We are focusing today on the importance of facts, • Securing political and bureaucratic support, and central to the work of the GEC is injecting fac- including sufficient funding and personnel. tual content into the information space to counter On the technology front, I am particularly enthusi- violent extremist radicalization and recruitment. astic about the potential to use tools such as social Content is developed through collaborative, thematic graph analysis (SGA) to help us identify credible indi- campaigns in coordination with the U.S. interagency viduals who drive and shape online opinion within e and with members of the Counter-ISIS Coalition and ach country. Network analysis can provide informa- other global partners. GEC support includes funding, tion in two critical areas: 1) topics important to people technical assistance, capacity building, and conceiv- in target audiences and 2) the most uniquely influen- ing and implementing joint projects. tial people within those topical clusters. This informa- tion, which is used daily by business to analyze con- Using this approach, we have reduced direct engage- sumers’ tastes and persuade them to buy more, can ment on violent extremism in favor of partner-driv- provide a clearer view for engaging target audiences en messaging at the local level. These partners are in partnership with the influencers they trust most. credible voices that can deliver messages that reso- We in the U.S. government are prohibited from using nate with at-risk populations, such as NGOs, schools, such tools when the information of U.S. citizens is in- young people, social and civil society leaders, reli- volved. gious leaders, and governments. Additionally, the GEC is utilizing data science from both the public and private sectors — including ANEWAPPROACH polling operations, audience studies, and academic The beneficiary of these lessons is the State Depart- research — to identify and understand target audi- ment’s new Global Engagement Center (GEC), which ences, to guide and inform the development of mes- is legislatively given the task “to lead, synchronize, saging and content, and to measure effectiveness. and coordinate efforts of the Federal Government to recognize, understand, expose, and counter foreign For instance, the GEC’s “Defectors” campaign used state and non-state propaganda and disinformation content from 14 Coalition countries that highlighted efforts aimed at undermining United States nation- the lived experiences of ISIS defectors and the ef- al security interests.” In this role, the GEC leads the fects of their recruitment on their families. In just one interagency in developing a whole-of-government week,the campaign reached 2.4 million people who approach to countering malign actors in the informa- watched over onemillion minutes of video.Ultimate - tion space, seeking to fully leverage the strengths and ly, the Defectors campaign reached seven million capabilities of each agency involved in this effort. A individuals and garnered 780,000 “click-throughs” key element to ensuring coordination and maximum from people identified as being at risk for recruit- efficacy is an interagency synchronization meeting ment by violent extremists. Despite the impressive hosted weeklybyGEC. ACPD | Remarks on “Public Diplomacy in a Post-Truth Society” 11

numbers, the cost of this data-driven campaign was chaff are vital. One way we are doing this is through only$15,000. TechCamps focused on disinformation. These inter- active workshops, led by technical experts, build the Of course,theGEC is stillfairly new, so Ilook forward capacity of key foreign influencers in civil society to to letting you know in future discussions how it is far- push back on fake news. A special fund dedicated to ing. But I think we are on the right track in countering incubating collaborative follow-on projects maximiz- an ideologythat trades in falsehoods by workingwith es each workshop’s impact and has resulted in such credible partners to present the facts and alterna- innovations as a one-stop data verification tool for tives that aretrue. Ukrainian journalists to fact-check online media con- tent.

CONCLUSION To be truly effective, however, we must start at a Going back to my original premise, I respectful- younger age. A recent study by Stanford showed ly disagree with the concept that we are living in a that students at most grade levels cannot tell the difference between fake and real news as they often “post-truth society.” What we are facing instead is in- lack the skills needed to separate creased competition from pseudo-facts, but the truth is still valued, desired, and ultimately compelling. We truth from misinformation. Game theory has the po- tential to help us develop smarter ways to build the just need to find the right ways to communicate it. fact-checking skills of students, and video games could contain elements that help players of all ages And while some of my remarks have been focused on the messaging component of Public Diplomacy, become more aware – and wary of – faux facts. This realization has prompted some teachers across the we must remember that many other PD tools play “Our challenges aret oo bigand our resources too limited to go it alone.”

a vital role in sharing the truth, such as educational country to use games, such as Simon says, to help and cultural exchanges, youth initiatives, and English students build these skills. teaching programs. These types of people-to-people interactions help reframe conversations on conten- Beyond these ideas, I believe we should be asking tious issues, demonstrate the value of transparency, what economic mechanisms might be used to en- and build trust with key audiences. courage skepticism and objective . Are there known business models that reward honesty and pe- Finally,there is onelastcriticalelement in thisdebat e. nalize dishonesty? Perhaps some of you here may be In addition toofferingcompelling, truthful narratives, tempted to undertake research in these areas. Ibelievewem ustalsohelp foreignaudiencestar get- ed by concerted disinformation campaigns to better Ilookforwardtodiscussingtheseissueswithyoufur - understand the dangers of accepting everything at ther, but before we open the floor for questions and facevalueandencouragethemtocultivatea “healthy comments, I want to thank all of you for your interest skepticism.” By this I do not mean to promote para- in,andsupportfor,thework of Public Diplomacy. We noia, simply vigilance. But how do we do this effec- in government need your input, your ideas,and your tively when people, especially young people, are bom- talent. Our challenges are too big and our resources barded with so much dubious information? How do too limited to go it alone.Together,Iknowwecansuc - we help them become healthy skeptics? cessfully navigate the current sea of misinformation and propaganda and find a productive path forward. Training and education programs that both cultivate Afterall,wehavetruth on our side. a questioning mindset and build the skills of infor- mation consumers to separate the wheat from the :) ! !!

<3 ... Photo: CC-BY-NC-ND 2.0 [ad7m] [ad7m] 2.0 CC-BY-NC-ND Photo:

[ad7m] COMPUTATIONAL PROPAGANDA AND POLITICAL BOTS: AN OVERVIEW

By Samuel C. Woolley, Director of Research, Oxford Internet Institute’s Computational Propaganda Project

Computational propaganda is best defined as the on social media platforms to undertake tasks and assemblage of social media platforms, autonomous mimic real users. Over the last four years, numerous agents and big data directed towards the manipu- news outlets, from to The Guardian, lation of public opinion. Social media bots are the have covered rising and evolving usage of bots. They primary tools used in the dissemination of computa- attempt to explain how these socially oriented au- tional propaganda. When bots are used to automate tomated scripts work in specific contexts, from the political engagement in attempts to manipulate pub- world of online dating to that of real-time ad shar- lic opinion our team at the University of Oxford calls ing. The ways bots are being deployed, however, are them “political” bots. Political bots allow for massive evolving beyond social spheres to those discretely amplification of political views, they can empower a political. Politicians, governments and military or- small group of people to set conversation agenda’s ganizations have begun using a special variety of bot online. They are used over social media to manufac- software to manipulate political communication and ture trends, game hashtags, megaphone particu- engagement, choke off debate and muddy political lar content, spam opposition and attack journalists. issues. When in the hands of powerful, well-resourced, polit- ical actors these automated tools can be used to both Until roughly five years ago, social bots were most- boost and silence communication and organization ly harnessed by technologically adept marketers to among citizens in both democratic and authoritarian send spam in the form of automatically tweeted ad- regimes. vertising content. Politicians have taken note of and emulated celebrity Twitter users’ tactics of purchas- Security experts argue that more than 10 percent of ing massive amounts of bots to significantly boost content across social media websites, and 62 per- follower numbers. Militaries, state-contracted firms cent of all web traffic, is generated by bots—pieces and elected officials now use political bots to inva- of computer code that automate human tasks online. sively spread various forms of propaganda and flood Bots dominate many mundane tasks on the internet, newsfeeds with political spam. Recent research re- from aiding in the generation of personal online news veals the pervasive breadth of global political bot preferences, to ad generation, to promoting matches use across online social networks. For instance, re- “Security experts argue that more than 10 percent of content across social media web- sites,and62p ercentofallw eb traffic, is gen- erated by bots”

on social media. News organizations now use bots searchers at the University of Southern California to track and disseminate breaking articles. Sites believe as many as 48 million accounts (around 15 like , which generate publically accessible percent) on Twitter are actually bots. This number is knowledge, use bots as an essential part of their la- a 7 percent increase from the projection of automat- bor force. ed accounts that Twitter gave in an 2014 SEC report. Moreover, bots have been the main tools for online The latest social bots are automated software used astroturf1 and smear campaigns during political mo- 14 ACPD | Can Public Diplomacy Survive the Internet?

ments worldwide: the U.S. midterm elections of 2010, automation work must be studied to build knowledge the ongoing crisis in Syria, and the 2014–15 disputes on the larger industries and organizations that dom- over Crimea. inate the digital sphere. To that end, more academic work must be done to build understandings via first- Politically oriented bots are an emergent phenomena hand interaction with the people who build and de- and are amongst the most important recent innova- ploy political bots. As Markham and Baym argue, field tions in political strategy and communication tech- research and other qualitative methods are critical nology. Bots are prevalent and active in social media to adding breadth in understandings of emergent conversations—and their presence in these spaces techno-social phenomena—particularly online. continues to grow. The noise, spam and manipulation inherent in many bot deployment techniques threat- Many computer and social scientists treat bot-gen- en to disrupt civic conversations and organization erated traffic as a nuisance to be detected and man- worldwide. aged, thus extant systems work to simply identify or accounts that appear to be running as automat- ic scripts. This approach is too simplistic and avoids QUESTIONS focusing on the larger, systemic problems presented by political bot software. Political bots suppress free Several questions are at the heart of research on expression and civic innovation via the demobiliza- the automated tools known as “political” bots and on tion of activist groups and the suffocation of demo- their chief output, computational propaganda: cratic free speech. Political bots and computational propaganda must, therefore, be better understood • How does the use of this technology affect public for the sake of free speech and digitally mediated opinion, or behavior around voting and civic en- civic engagement. The information that exists on po- gagement? litical bots is disjointed and often isolated to specific, country or election-oriented, events. • What do internet-oriented companies, particu- larly social networking platforms like Twitter and Facebook, do to track and curatepoliticalcont ent generated by bots? BOT TYPES AND CASES OF USE Any taxonomy of social bots should begin by discuss- • How are bots used by or against other demo- ing the tasks for which public facing bots are built. cratic institutions, particularly the free press and Within this discussion are questions about the ca- non-governmental organizations, to generate or pabilities and sophistication of these automated and influence content and communication? semi-automated social actors. A simple typology of bots should be based upon technical input and com- • How are bots challenging traditional notions municative output. This method of distinction runs of agency in the field of science and technology on a scale from simple bots preprogrammed with studies and traditional conceptualizations of “the a corpus of simple phrases or words that are then actor” as a unit of study in political communica- transmitted to internet viewers to smart bots using tion? machine learning tactics to scrape data from both websites and crowd-sourced interactions to then communicate with publics in a unique and, potential- UNDERSTANDING COMPUTATIONAL ly,unforeseen way. PROPAGANDA An example of a simple bot in the former category Relatively little academic work—especially empirical could be a spam bot that sends out the same com- research focusing on critical social considerations— mercial link to users on a particular platform or an has been done on social bots and the processes art-oriented bot like @everyword that tweets all associated with them, within the social sciences. words in the English language from the Oxford En- Political automation, especially automation that chal- glishDictionary over a setperiod of years. Microsoft’s lenges the foundations of civic life, is a significant is an example of a smart bot—what developers, techno-cultural phenomenon. It is also one that was and indeed Microsoft itself, deem an “AI chat bot.” unforeseen by the early 2000s social platform move- Tay,regardless of the nightmareshe ment. The social ties of those who work within the caused for Microsoft, was built to learn from those ACPD | Computational Propaganda and Political Bots: An Overview 15

around her. Her communicative and computational tion. There are three general types of transparency functionality was somewhat rudimentary—she could when it comes to bots: 1) transparent bots—bots that be prompted to reiterate phrases by simply being told are clearly labeled as bots (e.g., @sortingbot, which “Tay, repeat after me…”—but this machine learning, sorts Twitter users into Hogwarts houses); 2) semi- crowd-sourcing, net-scraping bot is indicative of the transparent bots—those that claim to be bots, but direction of similar social assistance/communication are human-like or that have real-time dual human/ software: Cortana, Siri, Viv, Now, Alexa and computational input (e.g., Facebook’s “M,” which can others. answer questions through automated computational search or by accessing an in-house human team; or Another way of envisioning a typology of social bots Tay, which is a bot that acts like a teenage girl); and is through questions of transparency. Simply put, is 3) nontransparentbots —bots thatclaimto be human the bot transparently a bot or does it pretend to be (e.g.,the bots used by theMexicangovernment in at- human? The last five years have seen a rise in the so- tempts to sway public opinion during the 2012 presi- cio-political use of bots that pass themselves off as dential election). human—both implicitly through a lack of bot identify- ing information and explicitly by claiming outright to A typology of political bots can be built that usefully be human—in attempts to manipulate public opinion, catalogues the most pervasive uses of bot technology stymie and perpetuate trolling of opposi- and reveals emergent patterns may be helpful. Gov- Timeline of major developments in bots and their political use

Image credit: Samantha Shorey 16 ACPD | Can Public Diplomacy Survive the Internet?

ernments and other political actors most generally political actor notices that their opponent’s support- deployed political bots during elections or moments ers consistently use the tag #freedomofspeech in or- of distinct, and country-specific, political conversa- ganizational messages, then that actor might make tion or crisis. For example, bots used in an army of bots to prolifically re-tweet this specific focused solely on attempts to manipulate public opin- tag. The effect of this is that the opponent’s support- ion in state. The Syrian government has reportedly ers have a very difficult time searching common tags used bots to generate pro-regime propaganda tar- in attempts to organize and communicate with their geted at both in state and external targets on Twitter fellows. during the ongoing revolution. In both these cases, bots were created in response to the local political Propaganda Bots: Many cases of propaganda bot use climate. occurwhengovernmen ts targetperceivedcyber- se- curity threats or political-cultural threats from other Though the ways in which political bots have been states.Themostwidely reported case of state-sanc- used varies from country to country and political in- tioned propaganda bots occurred in . In this stance to political instance, there are three primary instance, Russian bots were allegedly used to pro- types of political bots: 1) follower bots—those used to mote regime ideals or combat anti-regime speech boost political figures’ follower numbers and passive- against targets abroad. Chinese propaganda bots ly like or re-tweet content; 2) roadblock bots—those have also attacked other countries and commercial used to spam hashtags associated with activists or entities. Political actors in Azerbaijan, Iran and Mo- political opposition in order to shut down or interrupt rocco reportedly used propaganda bots in attempts dissent via non-traditional communication channels; to combat anti-regime speech and promote the ide- and 3) propaganda bots—those used to mimic hu- als of thestat e. mans while sending out effusively positive informa- tion about an embattled government or politician or Governments, politicians and contractors employ to propagate negative attacks against the opposition. combinations of both propaganda and roadblock bots to attack in-state targets on social media. De- Follower Bots: Follower bots have also been used scriptions of bot usage in are particularly during elections and security crises to pad politicians’ representative of this automated strategy. Accord- social media follower lists. In these cases, politicians ing to numerous sources, the Mexican government buy bot followers—which mimic real human users— has used Twitter bot armies to stifle public dissent in attempts to look more politically relevant or tech- and effectively silence opposition through spam tac- nologically savvy. There are several prominent ex- tics. Peñabots, named after the Mexican President amples, particularly in Western states. According to Enrique Peña Nieto, have also been used to send out Inside Croydon, UK political candidate Lee Jasper used pro-government propaganda. In , journalists bots to boost the number of his Twitter followers in report that both President Recep Tayyip Erdogan’s order “to give a false impression of the popularity of government and the opposition Republican People’s his campaign.” There was a similar bid by former U.S. Army have used political bots against one another presidential candidate in which political in efforts to spread propaganda, fight criticism and bots were used for padding his social media follow- block dissent. ers. According to an NBC article, “[in] over 24 hours starting July 21, the presumptive Republican nomi- In , and in the Chinese administrative regions of nee acquired nearly 117,000 followers—an increase Tibet and , bots have been used to quash sov- of about 17 percent.” This increase is so substantial ereignty movements while promoting state ideals. it is unlikely to have occurred naturally, through the According to journalist Brian Krebs, “Tibetan sym- actions of human twitter users. pathizers […] noticed that several Twitter hashtags related to the conflict—including #tibet and #freet- Roadblock Bots: During elections, roadblock bots ibet—are now so constantly inundated with junk have been used to demobilize an opposing party’s tweets from apparently automated Twitter accounts followers. In this case, the deployer sends out Twit- that the hashtags have ceased to become a useful ter “bombs:” barrages of tweets from a multitude of way to track the conflict.” bot-driven accounts. These tweets co-opt tags com- monly used by supporters of the opposing party and Propaganda bots have been used during elections re-tweet them thousands of times in an attempt to to send out pro-government or pro-candidate social prevent detractors from organizing. For instance, if a ACPD | Computational Propaganda and Political Bots: An Overview 17

media messages. The New York Times points to South information to intimidation, complicates the ways in Korean state prosecutors’ allegations that “agents which politics are conducted and perceived both on from the National Intelligence Service of South Ko- and offline. While tools, such as BotorNot and Twitter rea posted more than 1.2 million Twitter messages Audit, are able to determine an account or users au- last year to try to sway public opinion in favor of Park tomation levels, they are not equipped for doing the Geun-hye, then a presidential candidate, and her deeper work of uncovering coordinated attacks or party ahead of elections in 2012.” Geun-hyeeventu - botnets. No effective tools currently exist for uncov- ally won the presidency, but the intelligence chief ering who proliferates political bot attacks or where in charge of the bot-driven effort was jailed and re- attacks originate. There is also a need for basic un- mains in prison. Geun-hye has since been ousted and derstandings of how the use of political bots plays out indictedon charges in of widespreadcorruption. in both local and comparative contexts. Our project at Oxford is currently working on a series of case stud- Our team at Oxford has also found that political ies, to be released in mid-June 2017, that will analyze bots—automated accounts used over social media the role of bots across several countries. This report to spread political content—had a significant role in will provide key insight into the ways this technology spreading information and misinformation during is being developed and deployed, but also regulated the U.K.’s Brexit referendum. Our report on Twitter and resisted, in Europe, North America, South Amer- and Brexit found that the family of hashtags associ- ica, Africa and Asia. ated with the for leaving the EU dominated both general conversation. Parts of this conversation More work needs to be done to study the effects were driven by armies of political bots messaging ef- of computational propaganda. Though social me- fusivelyinsupportofthe“leave” side. Furthermore, we dia platforms, and tools like political bots, are being found that less than 1 percent of sampled accounts— harnessed to spread misinformation in attempts to most of them highly automated—generated almost manipulate public opinion, little is known about how one-third of all messages about the leave campaign. theirusechangesa ctual votingbehavior or moreflu - More work, however, needs to be done to determine id aspects of public lifesuch as citizens’ conceptions whether the use of political bots had a specific effect of a particular candidate or issue. Global policymak - upon electoral outcomes: did automated messaging ers, academics, technology professionals and others change the way people voted? must work together to build continued understand- ings of this rapidly progressing phenomenon.

CONCLUSION Moreover, these same actors and their communities must begin to generate solutions to the problems of The study of computational propaganda is, by its computational propaganda. Hypothetical fixes, in- very nature, a transdisciplinary endeavor. Such work cluding both defensive and offensive measures, must necessitates a combination of disciplinary and pro- transcend pure technological or social solutionism fessional input from fields ranging from psycholo- and combine both software tools and media litera- gy to information science, public policy to machine cy—and other, yet unforeseen and unconsidered ap- learning, political science to sociology. The spread proaches and efforts—in order to succeed. of political bots, and associated content from mis-

ENDNOTES 1. refers to the practice of masking the sponsors of a message or organization (e.g., political, advertising, religious or public relations) to make it appear as though it originates from and is supported by a grassroots participant(s). ~., ~., ~., • • • ~ ~ ~ ~t-1 ~-J ~ ~

~~ ~ ~

~• ~• ~ ~

~1-1• ~-J• ~ ~

~• ~• ~ ~

~11• ~-J• ~ ~ UNDERSTANDING THE PSYCHOLOGY BEHIND COMPUTATIONAL PROPAGANDA

By Matt Chessen, Foreign Service Science, Technology and Foreign Policy Fellow at The George Washington University

Machine-driven communications tools (MADCOMs) • Companies use MADCOMs for , are frequently used by a variety of actors to spread persuading you to purchase their product or ideas online. Computational propagandists increas- service. They also use MADCOMs for custom- ingly use these tools for influence and disinformation. er service and as human-like “faces” for fulfill- Their effectiveness is based on principles from cog- ing back-end business processes. nitive psychology and the science of . This paper is a companion piece to the accompanying • Politicians use MADCOMS to create the ap- articles on computational propaganda, MADCOMs pearance of massive grassroots support and artificial intelligence tools and will illustrate how (astroturfing), to amplify messages and sup- these technologies exploit persuasive techniques. press opposition communications.

• Terrorist and hate groups use MADCOMs to spread their messages of intolerance, to sup- MACHINE DRIVEN COMMUNICATION press opposition efforts and to identify new TOOLS (MADCOMS) recruits. The most commonly used MADCOMs are simple bots • Nations use MADCOMs for public diplomacy, (web robots) that post content on social media, web- service delivery, propaganda, counter-mes- 1 sites, comment sections and the like. Their current saging, disinformation, espionage, democ- capabilities are limited to providing basic answers racy suppression and intimidation. In the to simple questions, publishing content on a sched- future, networks of competing, state-spon- ule or disseminating content in response to triggers. sored artificial intelligence MADCOMs will However, bots can have a disproportionate impact use human-like speech to dominate the in- because it is easy to create a lot of them and bots can formation-space and capture the attention of post content with high volume and high frequency. the most online users. Little expertise is required to run simple bots. An in- dividual can easily operate hundreds of Twitter bots In short, all groups may use MADCOMs for political with minor technical knowledge using readily avail- purposes, including persuasion, disinformation, as- able hardware and software. Bots and other MAD- troturfing, undermining speech, intimidation, COMs are currently used by corporations, politicians, and distraction from politically inconvenient topics. , individuals, state-sponsored groups, NGOs and terrorist organizations in an effort to influence conversations online. Bot users’ goals are myriad: A SIMPLE TAXONOMY OF • Individuals use MADCOMs for many pur- MACHINE-DRIVEN DISINFORMATION poses, including making profits, making the world a better place or making mischief. AND PROPAGANDA Computational propaganda is a new term for the • Academics use MADCOMs to network with use of machine-driven communication tools and as- their communities, share ideas and conduct sociated technologies for political purposes. These research. purposes can range from relatively benign amplifi- cation of political messages to insidious state-spon- • Organizations use MADCOMs to gain support sored trolling and disinformation. Computational for their causes, inform a wider range of peo- propaganda typically uses simple bots to influence ple, and connect disparate and dispersed ac- conversations online. These bots operate on social tivist groups. media user accounts that may have sophisticated, human-like profiles. 20 ACPD | Can Public Diplomacy Survive the Internet?

“Security experts argue that more than 10 percent of content across social media web- sites,and62p ercentofallw eb traffic, is gen- erated by bots”

Bots typically follow three general patterns of behav- HOW MACHINES EXPLOIT VULNERA- ior: BILITIES IN HUMAN MINDS • Propaganda bots attempt to persuade and in- Computational propaganda has its roots in tradition- fluence by spreading truths, half-truths and out- al propaganda, cognitive psychology and the science right fake news in a high volume or in response of persuasion. Computational propaganda tools ex- to triggers (e.g., keywords or a politician’s tweet). ploit a number of traditional theories of influence and persuasion, including: • Follower bots fake the appearance of broad sup- port for an idea or person. They can hijack algo- • Variety of sources: Multiple sources, prefer- rithms that determine trending news or trending ably presenting different leading people by generating “likes” for content or by fol- to the same conclusion, are more persuasive lowing users en masse. than single-channel, single-message cam- paigns.3 And the volume of different argu- • Roadblock bots undermine speech by diverting ments supporting a conclusion are more im- conversations. This could be relatively benign— portant thanthe quality of the actual individual like nationalist cheerleading or a “look at this cat arguments.4 Bots allow propagandists to use video” type of distraction. Or it could be more in- thousands of social media accounts to circu- sidious—like hashtags used by activ- late a high volume of messages from multiple ists so their topical conversations and coordina- online sources using text, images and video, tion are overwhelmed with gibberish. all pointing to the same conclusion. Bots can outperform humans by posting content con- At their most extreme, bots are used to troll/intimi- sistently throughout the day, or by spamming date journalists, activists and others into silence by high-volume content in response to specific bombarding them with thousands of threatening triggers. This constant repetition of themes or hateful messages. (Note: for more information through multiple channels creates the appear- on computational propaganda, see the accompany- ance of consensus. ing papers by Samuel Woolley, Tim Hwang and Matt Chessen). • Number, volume and variety of endorsements: Endorsement by large numbers of users, re- Computational have also gardless of their individual credibility, boosts been combined with more traditional hacking meth- persuasiveness.5 In information rich envi- ods—like disclosures of information from politician ronments, people favor the opinions of highly email accounts or distributed denial of service at- endorsed users over experts.6 Follower bots tacks on election monitoring websites and apps— allow propagandists to generate high-volume and are typically used as elements of a larger infor- likes and follows for selected content and us- 2 mation strategy. ers. Propaganda bot networks will retweet and share content among machine-driven ac- counts, creating the perception of mass sup- port. This astroturfing (faking the appearance of grassroots support) can push low-quali- ACPD | Understanding the Psychology Behind Computational Propaganda 21

ty, questionable or outright false content to that contradict their messaging operation. the top of trending topics lists, enhancing its Propagandist attacks may present multiple al- credibility and persuasiveness. In the high-in- ternative arguments that undermine credibil- formation online environment, this mass user ity through volume rather than quality. These endorsement trumps expert views. may be combined with personal attacks, hate speech, trolling and doxing intended to intim- • Social proof from others: The psychological idate the user and frighten them into silence. theory of implicit egotism explains that hu- False consensus effects can result in human mans have an unconscious preference for users “piling on” believing that their communi- 7 12 things they associate with themselves. Re- ty finds this behavior acceptable. cipients are more likely to believe messages from users they perceive as similar to them- • Conversion theory of minority influence: Mi- selves. People believe sources are credible if nority groups can have disproportionate influ- they think other people believe them credible. ence over the majority by expressing a confi- Popular users and content are perceived as dent, consistent message over time.13 Bots can more important. Propagandists often cre- disseminate high-volume content constantly, ate user profiles for bot accounts with imag- with significant sharing between bots, creat- es, usernames and background information ing the appearance of a tight-knit community that is similar to their target audience. The with unwavering beliefs. audience likely doesn’t know the account is machine-driven and believes it is another hu- • The authority principle: People are more like- man with similar interests and demograph- ly to believe others who look like they know ics. Bot-driven accounts follow real users and what they are doing or are in positions of other bot-driven accounts en masse, creating power.14 Propagandists frequently create ma- the perception of a large following. This large chine-driven accounts with false credentials— following enhances perceived credibility, at- like affiliation with government agencies, tracting more human followers and creating a corporations, political parties, etc. —to boost positivefeedba ck cycle. credibility.

• The false consensus effect is a cognitive bias • The : People believe mes- where people overestimate the extent to which sages to be true after repeated exposure, their views reflect wider society.8 It is espe- even if ridiculous. Familiar messages are also cially prevalent when individuals are in groups critiqued with less precision than unfamiliar that reinforce their beliefs. People think it’s ones.15 Propagandists generate “” appropriate to believe, feel or act when they by using bots to spam our feeds with high-vol- think that people comparable to them are also ume content supporting their ideas. Over time, believing, feeling or acting in the same way.9 these messages become familiar and more When computational propagandists use bot likely to be accepted. networks to troll individual users or groups with hate speech, it creates the perception • Belief perseverance, motivated reasoning and among some users that this is acceptable the first-mover advantage: Once a person behavior. This behavior then becomes nor- forms a belief it can be difficult to change his malized among the group and human users or her mind, even if the information creating will replicate the trolling behavior without bot the belief is patently false and factual informa- 10 16 provocation. tion is later presented. In fact, corrections can actually reinforce confidence in the original • Mass criticism undermines expertise and misinformation.17 Corrections are especial- trustworthiness: Mass attacks on the credi- ly ineffective where the correct information bility of messengersdiminishes theirtrust and threatens a person’s self-identity or world- credibility and reduces the chance that users view.18 Even if people understand and accept will act on their content.11 Propagandists use corrections, the initial disinformation can have bots for mass trolling attacks on human users lingering, negative, attitudinal impacts called (like journalists, rights activists and experts) “belief echoes.”19 Computational propaganda and competing networks of users and bots can shape false narratives broadly and quickly, 22 ACPD | Can Public Diplomacy Survive the Internet?

making it difficult for factual, well-researched goes viral, a difficult and resource intensive proposi- or fact-checked messages to gain traction. tion. This messaging would be immunological rather Even if corrected, the rapid activity of bots and than counter—designed to build resistance to the virality of social networks can cause lingering disinformation in targeted communities before the belief echoes that can be reinforced over time. disinformation has time to infect them, rather than Opinionated human generate false be- directly contradicting the disinformation. However, liefs but bot networks have greater reach and other research suggests that there are specific con- 20 volume and are far more insidious. ditions under which corrections of disinformation can be effective.23 This would call for more selec- tive and precise applications of counter-messaging. Other studies show that many of the misinformed IMPLICATIONS FOR PUBLIC DIPLO- are likely to have already encountered and rejected MACY EFFORTS correct information that was discomforting to their 24 Computational propaganda is not a vision of the fu- self-concept or worldview. ture. Computational propagandists are using MAD- Layered on top of this complexity are the network COMs to exploit all of these persuasive tech- now dynamics common to all social networks, as well niques. Emerging artificial intelligence technologies as the unique network dynamics of individual social will improve the effectiveness of MADCOMs and networks, and the network dynamics of the various computational propaganda significantly over the 21 user communities that are the targets of disinforma- nextseveral years. tion or counter-messaging. Within this context, mis- information dynamics are different than those for These insights from cognitive psychology and per- information deficits. Discrediting the sources of dis- suasion may imply or suggest best practices for pub- information and imposing reputational costs can be lic diplomacy professionals, but there are multiple— effective, but this is an immensely imposing challenge and sometimes conflicting—perspectives on nearly in an environment of computational propaganda and any topic. Emily Thorson, an assistant professor of distributed, and easily replicable bot net- media and public affairs at the George Washington works. University, illustrates one facet of this complexity: In short, this is a highly complex problem with asym- “The existence of belief echoes provides metric challenges. Computational propagandists do an enormous incentive for politicians to not require well researched articles or precise tar- strategically spread false information geting of messages. They can spam disinformation with the goal of shaping public opinion through bot networks and see what works. Failures on key issues. However, results from two impose few costs. Meanwhile, the media, govern- more experiments show that politicians ments and others who trade in truth require signifi- also suffer consequences for making cant investments in researching and presenting that false claims, an encouraging finding truth, and slight mistakes can generate mistrust and that has the potential to constrain the imperil reputations. behavior of politicians presented with the opportunity to strategically create What is clear is that the Department of State and belief echoes. While the existence of be- public diplomacy professionals must carefully exam- lief echoes may also provide a disincen- ine and address the problem of computational pro- tive for the media to engage in serious paganda from a multidisciplinary approach. This will fact-checking, evidence also suggests require elements of cognitive psychology, network that such efforts can also have positive and influencer analysis, effective content creation, consequences by increasing citizens’ and the use of machine-driven communication tools 22 trust in media” and artificial intelligence systems. To accomplish this mission, the Department should commission a Similarly, much of the literature suggests that di- comprehensive assessment and evaluation of the rectly counter-messaging disinformation with cor- literature of the science of persuasion, disinforma- rections may be ineffective or counterproductive. tion and counter-messaging in the context of mod- This implies that any counter-messaging should be ern information and communication technologies. focused on short-circuiting misinformation before it It should assess technology tools available for com- ACPD | Understanding the Psychology Behind Computational Propaganda 23

batting computational propaganda and consider de- dations and best practices for public diplomacy pro- sired new tools. The assessment should identify key fessionals, both generally and situationally,that they gaps in knowledge as well as promising areas for can apply in their strategic planning and daily work academic and practical experimentation. Finally, this tocountertheeffects of computational propaganda. assessment should drive a set of specific recommen-

ENDNOTES 1. MADCOMs can include many autonomous tools, including: robo-dialing systems; web robots; AI chatbots like Zo and Xiao- ice; home assistants like Amazon Echo; and cutting edge (and mysterious) AIs like “T” that dynamically create thousands of fake news videos for YouTube.

2. For more information on computational propaganda, see http://politicalbots.org/

3. See Stephen G. Harkins and Richard E. Petty, “The Multiple Source Effect in Persuasion: The Effects of Distraction,” Personality and Social Psychology Bulletin, Vol. 7, No. 4, December 1981; and The Multiple Source Effect: https://en.wikipedia.org/wiki/Social_proof#Multi- ple_source_effect

4. See Harkins and Petty, “Information Utility and the Multiple Source Effect,” Journal of Personality and Social Psychology, Vol. 52, No. 2, 1987; and Joseph W. Alba and Howard Marmorstein, “The Effects of Frequency Knowledge on Consumer Decision Making,” Journal of Consumer Research, Vol. 14, No. 1, June 1987.

5. See Andrew J. Flanagin and Miriam J. Metzger, “Trusting Expert- Versus User-Generated Ratings Online: The Role of Information Volume, Valence, and Consumer Characteristics,” Computers in Human Behavior, Vol. 29, No. 4, July 2013.

6. See Chanthika Pornpitakpan, “The Persuasiveness of Source Credibility: A Critical Review of Five Decades’ Evidence,” Journal of Applied So- cial Psychology, Vol. 34, No. 2, February 2004; and Source Credibility: https://en.wikipedia.org/wiki/Source_credibility#Source_credibility

7. See Cialdini, Robert (2009). Influence: Science and Practice. Boston, MA: Pearson Education, 114-166; and Implicit Egotism: https:// en.wikipedia.org/wiki/Implicit_egotism

8. See Dean, Jeremy (2007). “Why We All Stink as Intuitive Psychologists: The False Consensus Bias”. PsyBlog; http://www.spring.org. uk/2007/11/why-we-all-stink-as-intuitive.php; and False Consensus Effect https://en.wikipedia.org/wiki/False_consensus_effect

9. See Cialdini, R. B. (2016). Pre-Suasion: A Revolutionary Way to Influence and Persuade. New York: Simon & Schuster, 192-208.

10. This author believes that radicalizing young men online may be a goal of some state-sponsored trolling groups. These trolls use bots to create the appearance that hate speech is common, so that new online users find this behavior normal and mimic it.

11. See Michael G. Hughes, Jennifer A. Griffith, Thomas A. Zeni, Matthew L. Arsenault, Olivia D. Copper, Genevieve Johnson, Jay H. Hardy, Shane Connelly, and Michael D. Mumford, “Discrediting in a Message Board Forum: The Effects of Social Support and Attacks on Expertise and Trustworthiness,” Journal of Computer-Mediated Communication, Vol. 19, No. 3, April 2014; Flanagin and Metzger, 2013; and Hughes et al., 2014.

12. For an excellent overview of the above techniques in the context of Russian disinformation, see Christopher Paul and Miriam Matthews, “The Firehose of Falsehood” December 2016, http://www.rand.org/content/dam/rand/pubs/perspectives/PE100/PE198/RAND_PE198. pdf

13. See Saul McLeod, “Moscovici and Minority Influence,” 2007, https://www.simplypsychology.org/minority-influence.html; and Conversion Theory of Minority Influence: https://en.wikipedia.org/wiki/Conversion_theory_of_minority_influence

14. Cialdini, Robert (2009). Influence: Science and Practice. Boston, MA: Pearson Education, 208-236.

15. See Hasher, Lynn; Goldstein, David; Toppino, Thomas (1977). “Frequency and the conference of referential validity” (PDF). Journal of Verbal Learning and Verbal Behavior. 16 (1): 107–112; and The Illusory Truth Effect: https://en.wikipedia.org/wiki/Illusory_truth_effect

16. See Brendan Nyhan and Jason Reifler, “Misinformation and Fact-checking: Research Findings from Social Science,” January 2012, New America . http://www.dartmouth.edu/~nyhan/Misinformation_and_Fact-checking.pdf ; and Belief Perseverance: https:// en.wikipedia.org/wiki/Belief_perseverance; and Motivated Reasoning: https://en.wikipedia.org/wiki/Motivated_reasoning 24 ACPD | Can Public Diplomacy Survive the Internet?

17. See Brendan Nyhan and Jason Reifler, “When Corrections Fail: The persistence of political misperceptions“, 2010. Political Behavior 32(2): 303-330. https://www.dartmouth.edu/~nyhan/nyhan-reifler.pdf; and Joe Keohane, “How facts backfire”, Boston.com, July 11, 2010, http://archive.boston.com/bostonglobe/ideas/articles/2010/07/11/how_facts_backfire/?page=full

18. See, Brendan Nyhan and Jason Reifler, “The roles of information deficits and identity threat in the prevalence of misperceptions”, February 24, 2017, https://www.dartmouth.edu/~nyhan/opening-political-mind.pdf

19. See Thorson, Emily, “Belief Echoes: The Persistent Effects of Corrected Misinformation” (2013). Publicly Accessible Penn Dissertations, http://repository.upenn.edu/edissertations/810/

20. http://scienceblogs.com/cortex/2010/07/13/political-dissonance/

21. See accompanying article by Matt Chessen describing how AI will transform machine driven communications

22. Thorson, Emily, “Belief Echoes: The Persistent Effects of Corrected Misinformation” (2013). Publicly Accessible Penn Dissertations. 810. http://repository.upenn.edu/edissertations/810

23. See Brendan Nyhan and Jason Reifler, “The roles of information deficits and identity threat in the prevalence of misperceptions”, February 24, 2017, https://www.dartmouth.edu/~nyhan/opening-political-mind.pdf; Kuklinski, James H. and Paul J. Quirk (2000). “Reconsidering the rational public: cognition, heuristics, and mass opinion.” In Arthur Lupia, Mathew D. McCubbins, and Samuel L. Popkin, eds., Elements of Reason: Understanding and Expanding the Limits of Political Rationality. London: Cambridge University Press, http://citeseerx.ist.psu. edu/viewdoc/download?doi=10.1.1.94.4875&rep=rep1&type=pdf

24. See Cohen, G. L., Aronson, J., & Steele, C. M. (2000). When Beliefs Yield to Evidence: Reducing Biased Evaluation by Affirming the Self. Personality and Social Psychology Bulletin, 26, 1151-1164. ACPD | Understanding the Psychology Behind Computational Propaganda 25 @) o .... ,,, .. ~o ~·••ltt

Jason Raish - Illustrator RETHINKING COUNTERMEASURES IN THE AGE OF COMPUTATIONAL PROPAGANDA

By Tim Hwang, Executive Director, Pacific Social

From the rise of radio to the global adoption of social media, changes in technology have always powerful- COMPUTATIONAL PROPAGANDA: A ly influenced the landscape of communication. As a BRIEF OVERVIEW task that requires a nuanced and deft navigation of Recent years have seen the emergence and increas- that landscape, public diplomacy is shaped by the ing sophistication of campaigns designed to manipu- available channels of mass communication, the dis- late political discourse and suppress dissent. These tribution of access to those channels and the favora- efforts, referred to here as “computational propa- bility of those channels to certain styles of messaging ganda,” have blended together a set of common defined by technology. components, merging automation with sophisticat- ed hoaxing, targeted messaging and cyberattacks in Developing a strategy to effectively conduct public support of their objectives. diplomacy and to counter emerging threats requires an understanding of the continuous technological Bots—fake user accounts that often autonomous- shifts under way and the dynamics of communication ly repeat the same or meaningless content—have that it gives rise to. figured prominently. Activists in Turkey and Syria have been subject to bot spamming campaigns that This paper represents a preliminary attempt to artic- attempt to drown out oppositional political speech ulate how one emerging technological phenomena occurring on popular Twitter hashtags. In the United might impact the strategic doctrine of public diplo- States, false accounts have been used to bolster the macy in the modern era. Specifically, it takes up the apparent grassroots support of political candidates, phenomena of “computational propaganda”—the sometimes with a particular emphasis among key increasingly prominent combination of automation, constituencies. In Mexico, one recent presidential sophisticated hoaxing and targeted messaging by election cycle featured two opposing groups of bots state and non-state actors to manipulate discussion attempting to contest the other on social media. Bots and spread misinformation online. By thinking holis- were also a prominent feature of the online politi- tically about these techniques and their objectives, it cal discussion around the “Brexit” vote in the United seeks to provide a framework for characterizing the Kingdom, helping to rally support around the deci- nature of the threat they create, and the role of public sion to leave the . diplomacy in responding to the challenge. Fakeidentities areonlypart of thepictur e. Beyond bot Part I will examine the current and likely future of accounts,effortshavealsobeenuncov ered that inte- play, giving an account of how state and non-state ac- grate these methods as just one component of more tors are leveraging computational propaganda. Part sophisticated strategies for shaping public opinion. II will make an assessment of the threat, character- Oneexampledetailed in the NewYorkTimes in 2015 izing it as distinct in a number of ways from previous is the Russian “,” which generations of strategic persuasion. Part III will turn has been connected with elaborate misinformation to proposing a set of strategic principles defining the schemes that include fabricated videos and realistic changing nature of communication and the conflicts clones of actual news sites. These types of actions of ideas taking place on online platforms. Part IV will are not limited to comparatively well-resourced gov- then extend this doctrine to tactics, arguing that this ernmentagencies.Bloombergreport ed in April2016 analysis informs the potential approaches that might the story of Andrés Sepúlveda, who was involved in be used in countering these techniques. Finally, I will a series of private efforts to sway elections in Latin conclude by discussing further avenues for research Americathroughacombination of bots,compromise and technological development. of voting machines and digital eavesdropping, among other techniques.

28 ACPD | Can Public Diplomacy Survive the Internet?

Our existing knowledge of these campaigns of com- of these experiments remain the realm of academic putational propaganda set a baseline in the sense inquiry, the results are openly published and might in- that they indicate strong interest from state and form the deployment of computational propaganda non-state actors in engaging in these tactics. To the going forward. Future campaigns might more accu- extent that we expect these campaigns to continue rately model the behaviors of key influencers within to improve and become more sophisticated, it is pos- a network to better shape their behavior, or better sible to make projections along what dimensions we identify key moments for spreading information for might see them develop in. Two technological trends maximal impact. seem particularly poised to bolster these tactics, namely, the recent breakthroughs in the field of arti- Both trends point toward a space in which com- ficial intelligence (AI), and the development of better putational propaganda techniques become more quantitative models of human group behavior. effective at manipulating discussion online. These changes will increasingly create unique applications Machine learning (ML)—the subfield of AI research and threats which differentiate this phenomena from focused on the study of algorithms that improve earlier methods of propaganda. themselves from data—has seen a rapid pace of de- velopment in recent years, driven by advancements in computing power and the availability of data. This SIMILAR OR DIFFERENT? has produced major breakthroughs in the capabil- ities of machines to accomplish many tasks previ- From leafleting to radio broadcasts, the strategic ously believed to be difficult to automate—from the use of persuasion by state and non-state actors to ability to recognize objects in images and translate forward political objectives is nothing new. The tech- languages, to the operation of automobiles and mas- niques of computational propaganda are therefore terful play of the game “Go.” In the context of compu- not without precedent—they represent only the lat- tational propaganda, these research developments est development in a historical legacy of methods may enhance the ability to create more believable meant to influence and manipulate discourse. To that fake identities and fabricated content in support of end, many established principles in public diplomacy

“...many established principles in public diplomacy can and will continue to apply in meeting the chal- lengeposed by this new breedof propaganda. ”

campaigns of misinformation. Recent experiments can and will continue to apply in meeting the chal- have demonstrated the ability for ML to create realis- lenge posed by this new breed of propaganda. tic simulations of faces, including those of celebrities and world leaders. ML is also enabling the design of However, a commonality of historical purpose across better conversational software, which can communi- techniques should not distract from the ways in which cate believably with a human and potentially be lever- new techniques might shape the costs, risks and op- aged to increase the apparent credibility, authenticity portunities that actors face when choosing how to and persuasiveness of a bot account online. manipulate public opinion. In this respect, computa- tional propaganda appears to differ in three major

Another advancing frontier of research is quantita- ways from earlier methods of strategic persuasion. tive social science—an emerging field focusing on leveraging data available about social behavior to de- First, campaigns of computational propaganda can velop insights into how groups behave at scale. This be conducted at significantly lower cost than per- field is generating interesting results, from develop- suasion campaigns of the past. As easily replica- ing mathematical models for how ideas become pop- ble software, large numbers of bots can be quickly ular online, to understanding the design factors that generated for a low investment and little technical might influence people to turn out to vote. While many infrastructure. Even groups with little technical ex-

ACPD | Rethinking Countermeasures in the Age of Computational Propaganda 29

pertise may be able to quickly acquire bots and com- effectiveness at ever falling costs. Bots provide small promised accounts through purchase online. Earlier groups the ability to influence at global scale at sub- strategies relying on printed media, or control over stantially lower expenditure, and give well-resourced communications infrastructure, were comparatively groups an affordable compliment to more elabo- moreexpensive. rate influence efforts. At the same time, the costs of generating verified information and debunking false Second, the speed and geographic scope of per- information remain relatively more expensive. This suasion operations are considerably augmented by margin of cost between generating and countering computational propaganda. Social media provides falsehood may grow as the fabrication of realistic a channel whereby a persuasion campaign can im- images, audio and video becomes cheaper and more mediately begin efforts to build trust and message to accessible as a technology. In short, social media targeted groups throughout the world. While limited may produce the circumstances under which the of- by internet penetration and the adoption of certain fense of computational propaganda systematically platforms, computational propaganda benefits from has an edge against the defense of verification and the global scope of social media. This provides a lev- fact-checking. el of access that would be cost-prohibitive to many organizations in an earlier communications environ- Moreover, the emerging landscape is one in which ment. it may be increasingly difficult to halt threats defini- tively and systematically. For one, commitments of Third, techniques of computational propaganda can public diplomacy to values of freedom of speech may be targeted and customized to a level of granularity exclude the use of approaches that attempt to drown greater than in the past. As opposed to a radio broad- out opposing discourse using similar “computation- cast or leafleting campaign, bots can customize their al” methods. It is also difficult to avoid the constraints purported identity and their messaging to best take placed on governments by the fact that much of the advantage of the biases and preferences of their tar- focus of computational propaganda is on social me- gets. This might take place on a level as granular as dia platforms operated by private corporations. This messaging tailored to an individual user online, using may limit the ability for governments—particularly known data about that specific user to maximize the when the platform is based within the boundaries of effectiveness of a persuasive effort, something diffi- another state—to obtain the needed data to effective- to do effectively with earlier channels of commu- ly attribute and counter campaigns, and to constrain nication. the open creation of new accounts through which to engage in computational propaganda. Taken together, these are changes in degree that suggest a change in kind, particularly as computa- Multiplicity of the threat is also accompanied by the tional propaganda compounds shifts already under- challenge of evaluating the importance of a given way as a result of broader connectivity wrought by threat. Not only are computational propaganda cam- the spread of mobile devices and the global adoption paigns able to leverage a wide range of attack vectors of social media. These changes will inform the strate- that make them difficult to detect, it is also difficult to gic doctrine which guides public diplomacy as it con- assess whether a given campaign will have an im- tinually evolves to meet a changing communications pact on real events. Computational propaganda may environment. occasionally serve as a distraction, creating exten- sive engagement and discussion on online channels without necessarily producing significant outcomes. AN EVOLVING STRATEGIC DOCTRINE However, what differentiates an ineffectual campaign from one that is a legitimate threat can be challeng- The unique attributes of computational propaganda ing to ascertain at the outset. By the time success is from earlier generations of strategic persuasion have evident, it may be too difficult to halt the momentum several implications on the landscape of communica- of the effort. In a context of limited resources, this as- tion. This informs an overall strategic doctrine—that pect of the landscape may present a major dilemma is, a characterization of the nature of the challenge around how and when to deploy public diplomacy as- and the objectives of public diplomacy within it. sets. These decisions are particularly difficult in the shadow of the so-called “Streisand effect,” in which For one, it appears that the generation of falsehood efforts to directly confront a given message online it- is poised in the near-term to enjoy ever increasing self produces greater spread and discussion.

30 ACPD | Can Public Diplomacy Survive the Internet?

The proliferation of persuasive power, augment- propaganda. Offensively, the strategy would seek to ed by trends in automation, machine learning and distribute the costs of counter-messaging broadly, quantitative social science, will mean that a strate- shaping the social ecosystem to enable alternative gic posture purely aimed at counter-messaging to voices to effectively challenge campaigns of misin- certain strategically important audiences will face formation. greater challenges over time. A multitude of parties will control the means to engage in effective mass misinformation, with limited ability to detect, eval- TAKING A COUNTER-NETWORKING uate and challenge each effort. Organizations with limited resources will quickly exhaust themselves APPROACH confronting or containing falsehood, particularly as In order to be valuable, strategic doctrine should the believability of fabricated content continues to have a direct influence on tactics. How might a new grow over time. Moreover, the available measures focus on counter-networking manifest in concrete that have a possibility of categorically hindering approaches to resisting the spreading use of com- these tactics are likely to conflict with other com- putational propaganda? To make the approach mitments towards preservation of the freedom of more tangible, here are a set of different potential speech and media. routesforexploration:

As discussed above, the novelty of computational Network topology: In a counter-networking context, propaganda should not distract us from the reality it may be critical to adopt from the language of so- of it as just that—aform of propaganda.Tothatend, cial network science, which provides a collection of public diplomacy should continue to apply estab- key metrics for summarizing the patterns of con- lishedtechniquesforconfr ontingcoordinat ed cam- nections between individuals.Public diplomacyini - paigns of misinformation and strategicpersuasion. tiatives might be targeted at shifting these metrics in amorediscret e, tactical way,such as the average Nevertheless,the new communications landscape number of direct “friends” or “followers” possessed and the computational propaganda techniques by an individual in the network, or the average num- evolving within it introduce considerations that ber of links between any two individuals of the net- should join these established methods. Specifically, work. Raising or lowering these numbers strategi- it may be critical tobring a “counter-networking” ap- cally within segments of users on a social network proachtoaccompanyexisting efforts aroundcount - may give a more influential voice to allies and limit er-messaging. the overallimpa ct of misinformation efforts.

In this context, the goal of public diplomacy would Leveraging automation: Bots may be used in a myr- not be to defeat a specific narrative or propaganda iad of ways beyond simply direct counter-messag- campaign, but instead to ensure the robustness of ing. It may be possible to leverage bots to signal to the marketplace of information online. This would allies that misinformation is spreading, working to be both an offensive and defensive agenda that fo- rally them to engage in a dialogue and push back cuses on the pattern of connections between social online. Similarly, swarms of bots might be used to groups online. Defensively, this strategy would fo- bridge connections between social groups not reg- cus on producing patterns of information exchange ularly communicating online, helping to break echo among groups that would make them difficult to chambers and diversify points of view. Doing so in a effectively sway using techniques of computational targeted way may create network topologies which

“...thego al ofpublicdiplomacywouldnotbeto defeat a specific narrative or propaganda cam- paign, but instead toensuretherobustne ss of the marketplace of information online. ”

ACPD | Rethinking Countermeasures in the Age of Computational Propaganda 31

are more or less favorable to particular positions or should not necessarily be seen as grouping of similar feature a more ubiquitous distribution of individuals case studies or a blend of tactics being deployed by willing to actively challenge misinformation. a specific adversary, but instead as a symptom of a changing landscape of communication. Tools vs. messages: In the persuasive landscape formed by social media and computational propa- Such a frame enables thinking that looks beyond im- ganda, it may be attimesmoreeffectivetobuildtools, mediate challenges towards developing a general ap- rather than construct a specific message. Apps that proach to characterizing these threats and a ground- signal to users that a coordinated persuasive effort ed approach to addressing them. The falling cost and is taking place targeting them, for instance, may be rising effectiveness of misinformation campaigns more effective than an effort that attempts to chal- online multiply threats in a manner that makes a sin- lenge each misinformation campaign as it is detect- gular focus on counter-messaging to specific audi- ed. Similarly,opentoolsthatmake it easiertoidentify ences less efficient over time. To that end, traditional and debunk certain kinds of fabricated content may techniques might be bolstered by data-driven, count- distribute the costs of identifying and investigating er-networking efforts that seek to shape the patterns cases as they appear. of connections between users online into topologies that are less susceptible to misinformation efforts These efforts are just a beginning. Counter-network- and that help shoulder the costs of counter-messag- ing approaches may also significantly shape the ing. collection of talents that are needed to conduct ef- fective public diplomacy. Adopting the three tactical This might manifest across a number of different suggestions discussed above would necessitate the countering tactics, each of which require further development of more nimble software development, development and may involve greater collaboration quantitative social science and machine learning ca- with researchers not typically within the public diplo- pability within organizations combatting computa- macy community. However, as methods of compu- tional propaganda. tational propaganda continue to proliferate and im- prove, such partnerships may become increasingly critical to meet the rapidly moving challenges posed CONCLUSION bythe se techniques. Ultimately, this essay represents a preliminary anal- ysis that is intended as an initial jumping off point for discussion. Whatever the eventual strategic approach, the rise of computational propaganda

r • I I & • It I~ * I' I L I & * & • ~ .& • • PUBLIC DIPLOMACY’S (MISUNDERSTOOD) DIGITAL PLATFORMPROBLEM

By Sam Ford, Research affiliate and consultant with Massachusetts Institute of Technology’s Pro- gram in Comparative Media Studies/Writing

In 2013, an academic book I co-authored with Henry dividuals, or the ways in which social bots can drive Jenkins and Joshua Green, Spreadable Media: Creating how content spreads (or does not spread, as the case Value and Meaning in a Networked Culture, was published.1 may be). The book examines the shifting business and cultural dynamics of a media environment where a signifi- And I have consistently encountered new environ- cant portion of the public plays a more active, every- ments and challenges beyond those we explored in day role in the circulation of media texts. Specifically, Spreadable Media—such as the pressing question of we examined: how these shifts in the media landscape affect how effective public diplomacy is achieved across varied “An emerging hybrid model of circulation, national and cultural contexts. where a mix of top-down and bottom-up forces determine how material is shared In this piece, I reflect on how my research of, and ex- across and among cultures in far more perience in, the media realm may have direct affect participatory (and messier) ways. The deci- on those carrying out public diplomacy, with particu- sions that each of us makes about whether lar focus on how emerging business models for digi- to pass along media texts—about whether tal platforms threaten the integrity, not only of those to tweet the latest gaffe from a presiden- platforms, but of the messages—including U.S. gov- tial candidate, forward a Nieman Marcus ernment messages—therein. cookie recipe email, or share video of a shoplifting seagull—are reshaping the me-

dia landscape itself.” USING METAPHORS PAST THEIR DUE Spreadable Media lays out how changes in the media DATE landscape had already been, and would be, affecting In retrospect, perhaps my biggest regret from strategic communication professionals, emerging in- Spreadable Media is that, by demonstrating the impact dependent media producers, the audiences for those that everyday people are having on what circulated, texts, and our greater communication landscape as how it circulated, we inadvertently overly empha- a result—particularly the international communication sized examples where things spread fast, and far, landscape. when some of the most impactful, enduring content that spreads does so deeply, within and around par- If anything, the past four years have shown just how ticularcommunities.This is tosay,wemayhave over- rapidly the media landscape shifts. Marketing and emphasized pure virality without fully appreciating public relations practitioners have poured budgets theimportance of longevityandcontext. into tools to gather data on and—in some cases—

qualitatively listen to discussions happening among This reflects a problem that the media industries, their customers. properties have industries with which governments and diplomatic moved rapidly to find new models to satisfy audienc- actors are increasingly intertwined, are confronted es looking to engage with content on-demand. And with today. The business models of industries like newsrooms have put significant emphasis on track- television, radio and newspaper/magazine publishing ing, and encouraging, sharing of their stories online. were created at a time where companies had limited ability to understand the audiences they reached. As But, as the past four years have progressed, I have a result, these industries sought an advertising-sup- also watched developments unfold that we did not ported model focusing on answering two simple focus deeply in the book. For instance, the depth with questions: “who and how many”? which the algorithms of social network portals and

2 se arch engines shape the circulation practices of in-

34 ACPD | Can Public Diplomacy Survive the Internet?

Yet, as media professionals shift away from the mass the reach of their strategic communications cam- media era of the 20th century, they have failed to paigns and outreach initiatives. For instance, Russia’s shed outdated assumptions and models embedded RT touts itself as the most viewed news channel on within the industry. Instead, media companies have YouTube, despite the fact that the content driving its been hard at work trying to make current realities popularity, if authentic, is largely apolitical. Similarly, fit the industry architecture they are all so deeply in- the Voice of America heavily emphasizes its weekly vested in. reach as proof of its continued relevance, even if oth- er markers may be far better proof of its impact and Take, for instance, the power of the phrase “going value. viral”—a metaphor that has been particularly attrac- tivetomedia organizationsandmarketersbecause it In short, as we have entered a new communication is defined by reachingthatmass-scaleaudiencethat landscape with powerful possibilities to tell new sto- a previousmedia eraw as abletoconvene.Even if the ries in new ways, and to support them in a global phrase, in most cases, does not accurately describe market, the primary media platforms we depend on the cultural phenomenon it intends (people typically have preserved the business of the broadcast are making a range of active choices when choos- world. And the rise of big data makes this focus on 3 ing whether to watch/read/listen to something and what is most easily counted more central than ever. then share it, as opposed to how we typically spread viruses amongst ourselves without intent or event Much of this continued support of old advertising awareness),the scale of “virality” has made it such a models has been exacerbated by “investor story- powerful metaphorthatevenaudiences nowusesit. time.”4 Ethan Zuckerman explains, “investor story- time is persuading investors that your ads will be Virality brings with it the illusion that content can worth more than everyone else’s ads. That is because somehow be self-propagating. Television ratings, on- most online ads are not worth very much.”5 This line traffic rankings, demographic segment profiles, means each of the primary digital platforms—Face- focus group results and various other creations of book, Google, Twitter and the like—target the same the world come to haunt us. Often these programmatic ad budgets. Convincing investors to benchmarks of virality are applied with little acknowl- support a new digital platform or publication is ul- edgment that they were convenient shorthand—not timately about explaining why your “viral engine” is reflections of reality—intended to make sense of a going to lead to better traffic, or why your native sur- messy world that then outlived their usefulness. veillance techniques allow improved target advertis- ing, or about how you can deliver an audience more cheaply than competitors. CLINGING TO OUR BUSINESS MODELS As Joe Marchese—currently president of advanced Despite the new possibilities offered by today’s digital advertising for Fox Networks Group—writes that one platforms, the journalism and strategic communica- of the fundamental problems is that new “impres- tion industries are still by and large governed by the sions” are created in a digital landscape, without nec- “who are they, and how many of them are there?” essarily any real gain in human attention.6 In short, business model. This approach remains driven by platforms can add auto-play videos to people’s social metrics of reach, clicks, shares and views, which ties feeds, a new advertising spot on a page, or an extra success (either in terms of remuneration or strate- ad to pre-roll and count it as new “impressions,” even gic influence) to breadth and a logic of scale, particu- if there is no actual gain in meaningful attention from larly within target demographics. Governments, too, an audience. It is as if people forgot that social media emphasize these types of metrics in demonstrating “It is as if peoplefor gotthatsocialmedia met- rics are proxies for something else, and instead started taking their own creations literally.”

ACPD | Public Diplomacy’s (Misunderstood) Digital Platform Problem 35

metrics are proxies for something else, and instead provide paid links to stories on other sites, deeply started taking their own creations literally. It is one researched news articles conclude with links to ar- thing to employ storytime for the people who you are ticles from publications with much lower editorial trying to get to pay you. It is another to use it on your- standards, or even disinformation sites. self. And, in reverse, look at the various ways digital pub- lishers engage in paid promotion to drive traffic to NOT ENOUGH DISTANCE their stories, for instance, by paying to get a link to a This tail-chasing of outdated metrics is not merely a legitimate news story on a non-news or even an in- waste of financial and human resources. By relying tentionally misleading site. on platforms grounded in faulty business logic, orga- nizations, governments and companies risk severely But why? According to Lucia Moses, “publishers compromising their and credibility too. need to show big numbers,” which “rewards tricks to inflate the size of their audiences and to make them 8 One problem is that well-known, fact-based news- appear younger than they actually are.” rooms and storytellers rely on the exact same media hubs (e.g, Facebook, Twitter, etc.) as thin news and This means we have created a dynamic where there openly partisan sites to distribute their content. But is not as much distance as there should be between these hubs are primarily focused on click-throughs, the business practices of legitimate journalistic or- or when a user clicks on an advertisement, which can ganizations and the realm of scam artists and spam- then be leveraged into additional or more profitable mers. As Sean Blanda has written, “The methods ad . Publishers, both benign and malicious, are used to fund modern journalism simultaneously un- thus forced to compete with one another, not based dermine trust in the news outlets…News publications on the quality of their content, or the longevity of their aren’t (or can’t afford to be) policing their ads. Seedy brands, but by using catchy and sensational headlines brands are literally stealing the credibility of news 9 to try and lure views from users as they dash through sites for a few pennies.” the social media feed. These are, incidentally, the ex- act same tactics utilized by tabloid publications like One of the fundamental reasons this has happened the National Enquirer to grab attention at a check-out is that media industries and advertising metrics do counter, only scaled to every smart phone and com- not seem to account for negative ROI, or the erosion puter in the world. And now journalists and scam of trust that may result from clickbait headlines and artists are competing with one another for your at- rankings that highlight gross/unique views while ig- 10 tention, side-by-side. The only difference is that sites noring bounce and completion rates. The scam art- disseminating thin news or outright disinformation ist is not concerned about “negative ROI,” because do not have to pay the overhead that comes along the goal is not to build a permanent, lasting or with producing fact-based and deeply contextualized trust with citizens. news. This dynamic is further driven by the fact that legiti-

Consider, for instance, one tactic dubbed by Variety’s mate journalism enterprises in an online setting are Andrew Wallenstein as a “controversial practice” often selling their ad inventory based on “Who are whereby digital publishers are “inflating traffic num- they, and how many of them are there?” In an envi- bers”7 by counting traffic that does not come from ronment where impressions are commodified, all its own sites. Rather, publishers strike deals with in- the infrastructure of running a legitimate news oper- dependent sites to sell their ad inventory alongside ation starts to appear as a drag on the bottom line, the ad space on their own sites.So,whenapublisher with no upside. If you do not focus on a business mod- talks about its audiencereach, it is actuallyincluding el wherein having a dedicated readership, a trusted the traffic of sites it does not own or control. relationship with an audience, or a publishing brand that means something over time, then organizations Or take into account the ways in which journalism whose standards for publishing something is lower, sites engage in business practices that deeply inter- or who make no pretense for building a long-term twine them in a tangled web of digital publishing with following and brand, might be able to generate the non-news current event sites, openly partisan sites, semblance of enough traffic to compete on volume scandalous articles and blatantly misleading articles. by engaging in many of the same tricks, with much Often, through “content amplification windows” that lessoverhe ad.

36 ACPD | Can Public Diplomacy Survive the Internet?

Journalism brands, driven by a concern about es commonly adhere to the same business models monthly traffic patterns, at the exclusion of building and engage in many of the same business practices, a long-term brand, have business models that give we run the risk of driving audiences from healthy 13 no value to their strongest asset. As my former Fusion skepticism into cynicism and moral relativism. colleague wrote in 2016, “If you have lots of traffic but little brand value, then you can disappear more or Yet, should be concerned about more than less overnight: look at Upworthy. On the other hand, just how these tactics are undermining the credibility if you have low ratings but a strong global brand, then of legitimate news brands. As the U.S. government you can still be worth a fortune: look at CNN.”11 Yet, it pays $1.8 billion a year in taxpayer dollars to deliver is a common concern for traffic that leads news or- our messages to audiences around the globe, public ganizations to continuously make choices that sacri- diplomacy practitioners are increasingly dependent fice long-term trust for the daily, weekly, or monthly on the same media ecosystem described throughout traffic goals—leading to clickbait-style headlines that this essay. While news organizations are controlled sometimes do not sound as different as they should by an advertising-driven business model that needs from, say, , The Huffington Post, and to bring revenue in, public diplomacy is not. Yet, like The Gummy Post (examples only chosen because of strategic communication teams in various sectors, it what different “posts” each should have). Writes is easy to fall into the same trap of measuring success Blanda about misleading headlines from legitimate heavily by reach, clicks, shares and views, and shap- news sources, “The problem isn’t that news outlets ing initiatives, content and traffic around what best make these mistakes. It’s that they make them be- reaches those goals. 12 causethey have business incentives to do so.” For-profit media companies will likely continue to The current model not only does a disservice to jour- struggle to find ways to appropriately value engage- nalism and the public, but it often leads news organi- ment depth, completion rates, story shelf life and zations awry from their missions and seeks to create their long-term brand strength, among other factors, deceptive metrics, artificially inflating the broadest over the breadth that dominates programmatic dig- audience possible for advertisers. If the current ital ad buying. However, there is no reason that the model contributes to the erosion of trust across our same problems must plague how public diplomacy is shared digital platforms, then this creates a funda- measured and evaluated. As many of the commercial mental problem for anyone relying on the digital forces behind digital publishing and sharing continue spaces to connect with audiences, including the pub- to shape an environment that lead publishers down lic diplomacy community. a path of diminished reader trust, public diplomacy practitioners should be careful not to head down the

same trail. Instead, the should develop publishing and circulation strategies that are measured by meaning- CONCLUSION: THE RAMIFICATIONS ful metrics and be careful to avoid the traps in which FOR PUBLIC DIPLOMACY for-profit publishers and platforms currently find themselves. By taking into account the potential for Diplomats rely on trusted, rigorous journalism insti- negative ROI that comes along with many methods tutions to provide more credible verification of facts. of achieving reach and scale, and by finding ways to However, the damaging business practices erode the measure success through where and how messag- authority independent corroboration from a news es are meaningfully resonating with their audienc- organization can provide. And they make it even more es, the State Department will be better prepared to prone for various actors—from other governments, safeguard its content and brand from tactics meant private industries and overtly politically partisan to challenge the credibility of their messages and en- players—to question the veracity of information writ- gagements around the world. large. As rigorous journalism and quasi-news sourc-

ACPD | Public Diplomacy’s (Misunderstood) Digital Platform Problem 37

ENDNOTES

1. , Sam Ford, and Joshua Green, Spreadable Media: Creating Value and Meaning in a Networked Culture. New York: New York University Press, 2013.

2. Ilya Vedrashko, “How Spreadability Changes How We Think about Advertising,” Spreadable Media, 2013, http://spreadablemedia. org/essays/vedrashko/.

3. As we have more ways to gather data on audience, the illusion of certainty these numbers bring with them have made quantified reach even more central in the narratives of reach organizations tell the outside world and themselves.

4. Maciej Ceglowski, “The Internet with a Human Face,” talk at Beyond Tellerrand in Düsseldorf, , on 20 May 2014, http:// idlewords.com/talks/internet_with_a_human_face.htm.

5. Ethan Zuckerman, “The Internet’s Original Sin, The Atlantic, 14 August 2014, https://www.theatlantic.com/technology/ar- chive/2014/08/advertising-is-the--original-sin/376041/.

6. Joe Marchese, “Outside Voices: Beware The End of Advertising?” Wall Street Journal, 07 November 2014, https://blogs.wsj.com/ cmo/2014/11/07/outside-voices-beware-the-end-of-advertising/. The challenge is that adding new elements to your page—two new slots for ads on a page, for instance—may count as additional “impressions,” but the amount of attention the audience has to give has not increased, as it is a finite resource.

7. Andrew Wallenstein, “Vice Media Traffic Plummets, Underscoring Risky Web Strategy,” Variety, 21 March 2016, http://variety. com/2016/digital/news/vice-media-traffic-plummets-underscoring-risky-web-strategy-1201733673/.

8. Lucia Moses, “The Favorite Publisher Trick that Makes Their Digital Audiences Look Bigger and Younger,” Digiday, 18 February 2016, https://digiday.com/media/favorite-publisher-trick-makes-digital-audiences-look-bigger-younger/.

9. Sean Blanda, “Medium, and the Reason You Can’t Stand the News Anymore,” Medium, 15 January 2017, https://medium.com/@ SeanBlanda/medium-and-the-reason-you-cant-stand-the-news-anymore-c98068fec3f8.

10. The phrase “clickbait” refers to articles with headlines that are focused on trying to generate as much curiosity and clicks as pos- sible, even if they may be particular scandal-driven, partisan, or even misleading. Gross page views refer to the number of overall views a site’s pages have received in a particular time period, while unique views refer to the total number of people who have passed through the site in a given time. Bounce rate refers to the percentage of viewers who come to the site, only to instantly leave without spending enough time on the site to engage with any content. Completion rate refers to the percentage of a piece of content that the audience gets through before leaving.

11. Felix Salmon, “Why Messaging Is the Future of the News Brand,” Fusion, 11 February 2016, http://fusion.net/why-messaging-is-the- future-of-the-news-brand-1793854684.

12. Blanda.

13. For more on my call to action to the news industry, see Sam Ford, “The Year We Talk about Our Awful Metrics,” Nieman Lab, Decem- ber 2016, http://www.niemanlab.org/2016/12/the-year-we-talk-about-our-awful-metrics/.

Five years from now you won’t have any idea whether you are interacting with a human online or not. In the future, most online speech, digital engagement and content will be machines talking to machines. UNDERSTANDING THE CHALLENGES OF ARTIFICIALINTELLIGENCEANDCOMPUTATIONAL PROPAGANDA TO PUBLIC DIPLOMACY

By MattChessen,ForeignServiceScience,TechnologyandForeignPolicyFellow at The George Washington University MACHINES TALKING TO HUMANS Machine-driven communications tools are a reality now and the addition of emerging artificial intelli- TALKING TO MACHINES TALKING TO gence (AI) tools will enable machines to dominate the MACHINES online information space. This paradigm shift isn’t Advances in artificial intelligence will soon enable limited to artificial personal assistants like Siri and highly persuasive machine-generated communica- recreational chatbots like Xiaoice.1 It refers to ma- tions. Imagine an automated system that uses the chine-driven communication overwhelming Face- mass of online data and easily available marketing book, Twitter,YouTube,Tinder, Snapchat, Reddit, chat databases to infer your personality, political prefer- rooms, news site comment sections and the rest of ences, religious affiliation, demographic data and the social web. All of it will be dominated by machines interests. It knows which news websites and social talking. This machine communication will become media platforms you frequent and it controls multi- nearly indistinguishable from human communica- ple user accounts on those platforms. The system tion. The machines will be trying to persuade, sell, dynamically creates content—everything from com- deceive, intimidate, manipulate and cajole users into ments to full articles—specifically designed to plug whatever response they are programmed to elicit. into your particular psychological frame and achieve They will be unbelievablyeffectiv e. a particular outcome. This content could be a collec- tion of facts, fake news or a mix of just enough truth There is an urgent need to think strategically about and falsehood to achieve the desired effect. what this transformed information ecosystem

means for the practice of public diplomacy (PD). In The AI system has a chatbot that can converse with addition to discussions of competing with compu- you, through text, voice or even video. The chatbot will tational propaganda efforts, PD practitioners need be nearly indistinguishable from a human being and to consider the question of how they can create and will be able to operate in multiple languages. The AI sustain meaningful conversations and engagements chatbot will engage you in online discussions, debate with audiences if the mediums typically relied upon you and present compelling evidence to persuade are becoming less trusted, compromised and domi- you. It could also use information from databases or nated by intelligent machines. Put simply, we current- social media to discover your weaknesses and use ly take for granted that there are trusted platforms in this information to troll you and threaten your family. virtually every country we operate to directly engage with local audiences. The integrity of these platforms The AI system will be able to detecthumanemotions will be threatened, and we need to start thinking as well or better than people can. Similarly, it will now about how to best engage foreign audiences in mimic convincing human that resonate a world dominated, if not overwhelmed by, artificially with your own personality and emotional state. It will intelligent computational propaganda. be a learning machine, so it will figure out approach- es and messages that influence you the best. It will Also, utilizing new AI tools for public diplomacy will select for success and improve constantly. It will run require a reinvention and reimagination of business A-Bt ests withpeoplewhosharey our characteristics processes that takes into account the speed, person- to determine what messages are most effective and alization, autonomy and learning capabilities of AI then deploy those messages to similar populations. systems. We cannot just replicate the same process- es using new tools. That would be a failure. Public di- Like other digital tools, once created, the marginal plomacy must be completely reinvented for the 21st cost of creating more is almost zero. So there could Century. be millions of AI chatbots prowling the internet, 24 hours a day, seven days a week, vying for your atten-

40 ACPD | Can Public Diplomacy Survive the Internet?

tion so they can infect your brain with their message block and propaganda bots are used for amplifying and change your behavior. people and ideas, suppressing or diverting online speech, and more traditional influence operations. Systems looking for humans to influence will inevita- Emerging AI tools will radically enhance the efficacy bly wind up trying to persuade other machine-driven of MADCOMs and computational propaganda tech- accounts posing as humans. The machines will talk niques. (Note: For more information on computa- to, at and over each other, drowning out human con- tional propaganda, see the accompanying papers by versations online with a tidal wave of machine-driv- MattChessen,SamuelWoolley and Tim Hwang). en speech and content. The online information envi- ronment will be overwhelmed with machine-driven speech designed to sell, persuade, intimidate, dis- ARTIFICIAL INTELLIGENCE WILL RAD- tract, entertain, advocate, inform, misinform and ma- nipulateyou. ICALLY ENHANCE COMPUTATIONAL PROPAGANDA EFFICACY This is a highly probable vision for the information Artificial intelligence (AI) popularly refers to an environment we will move into over the next sever- evolving constellation of technologies that enable al years. Our actions now will shape whether spaces computers to simulate cognitive processes, such as are preserved for democratic speech and discourse, elements of human thinking. AI is also a discipline or whether the social web will be destroyed by an in- (like biology or chemistry) that is concerned with cre- vasion of highly intelligent machine driven communi- ating machines that can make decisions well under cation tools. Our uptake of these tools and redesign uncertainty, perceive data or the environment, and of PD business processes around new technologies act to satisfy some objective. Today’s AI is confined now is the only way to ensure U.S. public diplomacy to specific tasks (“narrow” AI), like providing driving remains relevant in the future. directions or recognizing faces in images, and is not a general intelligence applicable across many domains or a super-intelligence exceeding human abilities. MADCOMS AND COMPUTATIONAL PROPAGANDA Machine learning is a subset of AI. Machine learning extracts patterns from unlabeled data (unsupervised The basic technologies for this evolving information learning) or efficiently categorizes data according to environment are MAchine Driven COMmunication pre-existing definitions embodied in a labeled data (MADCOM)tools.Thew eb robot, or “bot,” is themost set (supervised learning). Machine learning is used in 2 commontype of MADCOM. Botcapabilities are lim- Google’s search algorithm, digital advertising and on- ited to providing basic answers to simple questions, line personalization tools (e.g. the Amazon and Netflix publishing content on a schedule or disseminating recommendation engines; the Facebook newsfeed). content in response to triggers. However, bots can Machine learning also extends into quantitative pro- have a disproportionate impact because it is easy to cesses—such as supply chain operations, financial create a lot of them and bots can post a high volume analysis, product and procurement bid pre- content at a high frequency. An individual can easily dictions. Nearly every industry is exploiting machine operate hundreds of Twitter bots with little techni- learning applications. cal knowledge using readily available hardware and software. Bots are currently used by nations, corpo- Deeplearning is atype of machine learningthatuses rations, politicians, hackers, individuals, state-spon- additional, hierarchical layers of processing (loose- sored groups,NGOsandterrorist organizations in an ly analogous to neuron structures in the brain) and effort to influence conversations online. large data sets to model high-level abstractions and recognize patterns in extremely complex data. Deep Computational propaganda is a new term for the learning systems manage very large data sets better use of machine-driven communication tools for polit- than other AI tools and are ideal for understanding 3 ical purposes. These purposes can range from rela- data-rich and highly complex environments. tively benign amplification of political messages to in- sidious state-sponsored trolling and disinformation. These tools are not confined to wealthy corporations Currently, primarily simple (i.e., non-AI) bots are used or state-sponsored actors. AI tools are widely avail- for computational propaganda. These follower, road- able (Google’s TensorFlow, Microsoft’s Control Toolkit

ACPD | Understanding the Challenges of AI and Computational Propaganda to PD 41

and many other AI tools are free and open-source) tion. Emerging debating technologies7 will allow AI and operate on common computer hardware. chatbots to persuasively argue by analyzing a corpus of knowledge, determining pro and con arguments, and creating dynamic, persuasive content in support HOW AI WILL TRANSFORM MACHINE of a position.

DRIVEN COMMUNICATIONS AI tools are increasingly sophisticated at affective AI chatbots are increasingly capable of engaging computing,8 one aspect of which is determining hu- in robust conversations about complex topics. For man emotional states9 from text, expressions example, Microsoft’s Mandarin language AI chatbot and vocal patterns. This will allow machines to inter- ‘Xiaoice’ has sophistication, empathy and conversa- pret whether you are happy, sad, anxious, relaxed or tional flexibility that make “her” extremely popular. open to a communication when they interact with Xiaoice has 20 million registered users, average us- you. AI tools can then tailor their communication to ers interact with her 60 times a month and she was your mood with just the right amount of emotional ranked as Weibo’s top influencer in 2015. She aver- emphasis to achieve the desired effect. If an affective ages 23 exchanges per user interaction. That is not AI tool detects that the target is impatient and doesn’t trivial experimentation; it is a conversation. Some us- feel like conversing at the moment, the AI can cease ers relate intimately to Xiaoice and consider her an communication and try messaging them later when 4 always-available friend and confidant. they are more persuadable. If a target is curious and wants to talk politics, the AI will detect openness in Currently Xiaoice requires a team of engineers to their communications and can engage them in a live- achieve this level of sophistication. This level of chat- ly conversation (or argument). If the AI detects emo- bot technology is well within the capabilities of a tional vulnerability, it could prey on those emotions to corporation or nation-state, but still unavailable to persuade, manipulate, or intimidate. the masses. However, like all digital technology, it will improve in capability and accessibility. Over the In another twist on affective computing, scientists next several years, high-end chatbots like Xiaoice will are training AIs to accurately emulate human emo- become indistinguishable from humans in a broad tions10 in the facial expressions of avatars. This will

“Over thenextseveralyears, high-end chatbots like Xiaoice will become indistinguishable from humans in a broadrangeofconv ersations.”

range of conversations. When the technology prolif- be useful for generating custom, persuasive video, erates, chatbots will converse fluidly with humans on but the technology can also be used to alter reality platforms ranging from social media apps to news and generate disinformation. Researchers at Stan- discussion boards to dating sites, about a wide vari- ford University have developed real-time facial re- ety of topics. enactment tools11 that allow users to take existing videos—like a speech by a world leader—and realis- AI tools arealsoimprovingatdynamicallygenerating tically manipulate the speaker’s facial expressions. unique content and will soon be developing custom The resulting videos12 show realistic, if not yet per- propaganda, disinformation and persuasive argu- fect, manipulations of the speaker’s face and mouth. ments. Currently, humans develop content for com- Concatenative speech synthesis,13 or better yet, voice putational propaganda that is then distributed by conversion14 technologies like Google Deep Mind15 bots. AI tools are already capable of generating be- will allow machines to replicate anyone’s voice from spokecontent, like news articles5 and novels,6 using samples. If combined with affective computing, fa- predefined parameters. The quality of this content cial re-enactment tools and an AI chatbot, this would will improve and AI systems will be able to commu- give propagandists the capability to create videos of nicatea crossmoresubjects with greatersophistica - anyone saying anything, or more insidiously, to subtly

42 ACPD | Can Public Diplomacy Survive the Internet?

modify existing video for propaganda or disinforma- know us personally and intimately. The communica- tion purposes. Affective computing allows the emo- tions generated by AI MADCOMs won’t be mass me- tional inflection of an altered human speaker or a dy- dia, they will be custom tailored to speak to an indi- namic AI MADCOM to be precisely tailored to achieve vidual’s political frame, worldview and psychological the desired influential outcome. needs and vulnerabilities.

Big data combined with machine learning tools will Because AIs are learning systems, they improve enhance the ability of MADCOMs to influence people rapidly with experience. An AI could autonomously through highly personalized propaganda. In the Unit- determine which of its thousands of pieces of pro- ed States alone there are several thousand data bro- paganda, disinformation or intimidation are most kers. One company, Acxiom, claims to have16 an aver- effective and emphasize or evolve those, while quick- age of 1,500 pieces of information on over 200 million ly ending failing campaigns. AI tools will test target Americans. Another company, Cambridge Analytica, weak points and learn what provokes the desired claims to have 3,000-5,000 data points per individ- emotional response. By probing with multiple ac- ual17 and psychological profiles18 on 230 million U.S. counts andmessages, an AI could learnthatperson - adults. We give away our data when we shop using al threats to a particular journalist provoke little re- supermarket club cards, when we browse the inter- sponse, but threats to their loved ones provoke fear. net, when we take “fun” Facebook personality tests,19 So, the MADCOM AI could pose as members of a local and through hundreds of other seemingly innocuous hate group who threaten the journalist’s children un- activities. The spread of “Internet of Things” devices til they stop reporting. And while that journalist might means a proliferation in the amount of data that could not be troubled by from afewMADCOM trolls,

“Since machines are notlimit ed by humant em- poral constraints, they can operate 24/7/365 andrespondtoeven ts almostimmediat ely.”

be captured about our lives. Virtual reality will give an onslaught of threats from thousands of AI-driven others the opportunity to test our actual reactions to accounts, most of which look and speak like people hypothetical stimuli and to measure our responses to in their community, would significantly escalate the products and ideas subtly introduced into the back- effectiveness of the campaign. ground of virtual experiences. Data breaches from private companies and government databases have Digital tools have tremendous advantages over hu- exposed extremely private information about us and mans. Once an organization creates and configures our associates. And we increasingly volunteer our a sophisticated AI chatbot, the marginal cost of run- most intimate details online, posting photos of family ning that tool on thousands or millions of user ac- vacations and tweeting our opinions. AI tools could counts is relatively low. Since machines are not limit- use all of this information to tailor persuasive, dis- ed by human temporal constraints, they can operate tracting or intimidating speech towards individuals 24/7/365 and respond to events almost immediately. based on their unique personality and background. Once an AI is trained to understand a subject domain, it can be programmed to react to certain events with Human cognition is a complex system, and machine speech and content produced at machine speed, learning tools are very good at decoding complex shaping the narrative almost immediately. AI tools systems. When provided rich databases of informa- will know key influencers and populations with per- tion about us, machines will know our personalities, sonality profiles or political inclinations that are wants, needs, annoyances and fears better than we susceptible to their messages. The AI systems will know them ourselves. Machines will know how to in- target additional vulnerable users with dynamical- fluence people who share our traits, but they will also ly generated communications instantly and in real

ACPD | Understanding the Challenges of AI and Computational Propaganda to PD 43

time as events unfold. This is critical in an informa- as technologists improve AI detection tools and pro- tion environment where the news cycle is continually pagandists improve AI MADCOMs to avoid detection. squeezed into smaller and smaller windows. Often, the first story to circulate is the only one that people The most sophisticated machine accounts will be recall, even if it is untrue. Research demonstrates20 nearly indistinguishable from the human accounts. that once a fake news story is believed, it is very diffi- But many propagandists may not bother with detec- cult to change people’s minds, even when presented tion tools since there is little marginal cost to spam- with compelling contrary evidence. ming machines and people with speech and content. So, in a bizarre twist, machines will frequently run How can journalists, diplomats, public relations staff, their information campaigns against other machines.21 politicians and government officials plan to compete Those targeted, machine-driven accounts will re- with AI MADCOMs that can interpret and react to spond with their own communications and the online stories almost instantly, developing and deploying information space be swamped with machines ar- customized communications personalized to indi- guing with machines. MADCOMs will overwhelm hu- viduals and groups before humans can even begin a man-generated speech and communication online. first draft? How can a government press release, or a carefully crafted, researched and fact-checked news This raises a number of larger policy questions for article, or a corporate public relations campaign, governments and the private companies that make precisely developed over months, ever compete with up the social communications infrastructure. Social real time, personalized, always available, dynamically media companies could adjust their tools and pol- generated, instantaneous, machine-driven manipu- icies to make it much harder for machines to oper- lative speech, text, video and other content? ate on their platforms.22 However, there are often financial incentives against restricting MADCOM ac- The answer is: humans cannot compete alone. On counts, depending on the platform. Prohibiting ma- digital networks, only humans teamed with AI ma- chine-driven accounts could significantly change the chines can compete with AI machines. The rise of nature of the business model and communication on AI-driven MADCOMs will spur an information arms the platform. Similarly, MADCOMs raise complicated race as empowered individuals, NGOs, corpora- questions where they are used by adversary govern- tions and governments all strive to shape narratives ments. These range from basic cybersecurity con- around events. The “bad guys” will have their MAD- cerns to questions about the role of free speech and COM AIs, and the “good guys” will have their own. definitions of acceptable norms for state behavior in Everyone will have AI tools that try to identify adver- cyberspace. For countries that respect universal hu- sary MADCOM accounts. These attribution tools will man rights and democratic values, MADCOMs pose be used to anticipate computational propaganda a threat to the integrity of discussion spaces used by campaigns, respond to ongoing operations and dif- citizens. But efforts to regulate them would certain- ferentiate human users from machine users. Similar ly create unpredictable follow-on effects and should to the cybersecurity struggle, the internet will be the not be attempted without careful consideration. battleground for a continual cycle of one-upmanship

FROM COMPUTATIONAL PROPAGANDA TO COMPUTATIONAL DIPLOMACY: REC- OMMENDATIONS FOR PUBLIC DIPLOMACY PROFESSIONALS

Awareness of MADCOMs, computational propagan- Practitioners should maintain awareness of new re- da and emerging artificial intelligence technologies search in computational propaganda, AI, bots and 23 is crucial for understanding the modern information related technologies. environment. Information on these tools and tech- niques should be included in every level of training The Department of State should develop a compre- for PD professionals. This will allow practitioners hensive strategy and plan of action for managing to understand the dynamics of online communica- the impact of MADCOMs, analyze the possibility of tions, identify where computational propaganda utilizing MADCOMs in public diplomacy and intro- techniques are in play and effectively counter them. duce in-house AI tools where appropriate.24 The

44 ACPD | Can Public Diplomacy Survive the Internet?

Department should consider the worst-case scenar- bassy websites worldwide, or located on popular io and be prepared for the possibility that the online messaging platforms like Facebook Messenger or information environment may be completely overrun Kik. They can be an effective way to engage technolo- with machine-driven speech. This would have a sig- gy-friendly youth and provide a means for communi- nificant impact across a broad range of diplomatic cating policy ideas across a wide variety of platforms efforts that use the internet for messaging and com- without direct human intervention. Debating systems munications. will soon allow chatbots to have robust discussions about complex topics, including U.S. foreign policy. In a world dominated by machine-generated, self- learning and propagating content, maintaining the The Department should develop AI scanning tools integrity of our communications campaigns and our that improve on keyword searches by autonomously commitment to truthful content with open attri- scanning for conversations and content relevant to bution is crucial to the efficacy of our efforts. Within U.S. foreign policy and flagging those items for action. these parameters, the Department should develop When relevant conversations are identified, humans its own in-house MADCOM and AI tools. This does could intervene with a conversation or content, or AI not mean the department should engage in disinfor- chatbots could be tasked with autonomously engag- mation efforts or unattributed propaganda. Like all ing users in discussions that promote U.S. policies or technology, artificial intelligence can be used for both ideas. Short of interventions, using AI machines to good and bad purposes. simply track these conversations on the internet can be helpful in providing real-time insights into opin- A number of tools and methods are available to help ions about U.S. foreign policy, unearthing nuances human public diplomacy practitioners counter pro- between key audiences in certain countries, and en- pagandists and their machines. The Department abling careful thinking about how to properly articu- must continue to develop sophisticated AI detec- late American policies to these same audiences. tion and attribution tools to identify and counter disinformation campaigns before they spread. The Department should investigate tools for auton- The psychology behind computational propagan- omous content creation regarding U.S. policy posi- da effectiveness indicates that counter-messaging tions. AI’s are already capable of writing content for established messages is unlikely to be effective.25 sports and earnings reports that is indistinguishable This implies that the best, and perhaps only way, to from human generated articles. This capability will counter computational propaganda is to detect dis- increase significantly over the next several years. AI information campaigns when initiated and develop tools will soon be able to write first-drafts of speech- rapid-response messaging campaigns to stifle the es, create press releases and generate text, images disinformation before it goes viral. and video for social media faster than a human can begin to consider a first draft. Such tools may be- Machine learning tools will be critically important in come crucial as the Department is asked to accom- identifying and monitoring adversary bot networks. plish more with fewer resources. There may also be utility in “outing” bot networks to social media companies, but this may have the un- AI chatbots, conversation scanning tools and dynam- intended consequences of forcing propagandists to ic content creation tools will require systems that un- improve their tools or driving them to more diverse derstand the semantics and intent of people when channels. As adversary MADCOMs become more they communicate. This requires research into ma- sophisticated and integrate AI technologies, AI tools chine learning and natural language processing tools may be required for users to determine whether they and the creation of an ontology for foreign affairs are interacting with a human or a machine online. topics. Essentially, the AI system will need to learn The Department should work with private companies the language of foreign affairs. This requires a signif- and academia to make these tools available. icant, long-term investment of resources. However, such a system will have additional diplomatic ben- The Department should develop AI chatbots. These efits outside of public diplomacy. AI tools to extract chatbots could discuss U.S. foreign policy generally, meaning from conversations could be used to discov- or specific topics like countering violent extremism er hidden knowledge and patterns from internal de- or assisting U.S. businesses abroad. These chatbots partment communications. AI scanning tools could could be language localized and placed on U.S. em- be used as supplementary analytical “assistants” for

ACPD | Understanding the Challenges of AI and Computational Propaganda to PD 45

U.S. diplomats.Thesewouldincreaseemployeesit ua- tional awareness, productivity and efficiency through The U.S. government must adapt to the new threats enhanced predictive abilities and automated coun- from AI-enabled computational propaganda before try-specific event monitoring. AI content creation the online information environment is toxified from tools would enable semi-automated speech-writing machine-generated speech. At the turn of the 21st and document preparation. AI conversational tools century, the internet was seen as a mortal threat to could be used to share information among the De- authoritarian regimes due to increased openness, partment’s various networks of contacts to support access to information and ability to organize online. 26 diplomatic initiatives. Some regimes neutralized this threat and a number of actors have turned our own technology against The Departmentshould also build capabilitiesfor us by hacking free speech. MADCOMs have given personalized targeting of persuasive communica- foreign actors the ability to reach directly into the tions based on individual psychological profiling United States with unprecedented reach, speed and and big-data analytics (within the parameters of key effectiveness. Artificial intelligence technologies will statutes like the Privacy Act of 1974 and Smith-Mundt soon boost those capabilities with additional velocity,

“The machines are here and they want to have a word with us.”

Act). This would allow personalized messaging, or personalized targeting, human mimicry, increased mass-market communications campaigns to accu- operational tempo and machine learning. Regulation rately tailor messages to target populations. These is one option,28 but hardly the only option. The gov- tools would include affective computing technolo- ernment needs a comprehensive, strategic response gies to identify and convey the appropriate emotional to the current threat but also to the environment we tone in messaging. Machine-learning tools can also are rapidly moving into. be used to run test campaigns on individuals that help optimize mass market campaigns for similar au- Responding to the threat of AI-enabled machine-driv- diences. en communications tools, and capitalizing on op- portunities posed by AI MADCOMs, will require a Public diplomacy business processes will need to conceptual leap in understanding into the world of adapt to use the new tools and operate closer to personalized, psychology-based, machine-driven machine speed. Content creation processes must persuasion. This struggle will take place 24 hours accelerate and approval cycles must compress. The a day, every day and will become so rapid and com- Department will need to gain comfort with machines plex that humans cannot hope to operate effectively operating autonomously without tedious clearance alone. Rather than using new tools to do the same old processes. The Department will also need to consid- processes better (e.g., dynamically generated press er forming permanent rapid-response task forces releases), new artificial intelligence and MADCOM that can respond to emerging computational propa- tools must be integrated thoroughly into PD business ganda campaigns with high velocity rather than rely- processes that are reinvented and reimagined to take ing on one-off efforts. advantage of those tools. This will require PD profes- sionals to learn to team with intelligent machines. It The Department should consider how to promote will also require AI tools of high enough quality that the development and availability of real-time we can trust them with the autonomy they will re- fact-checking27 and bot detection tools. These may quire. This will take years of hard work to accomplish. be useful for validating news and content and identi- fying whether an account is machine-driven. Stand- We must accelerate our efforts immediately. alone tools would rely on the user proactively access- Themachines arehereandtheyw anttohavea word ing them, but technology companies could integrate with us. Our level of preparation forthis emergingre - these functions into browsers, applications and oth- ality will determine the fate of the internet, our soci- er platforms. etyand our democracy.

46 ACPD | Can Public Diplomacy Survive the Internet?

ENDNOTES

1. See Meet XiaoIce, Cortana’s Little Sister: https://blogs.bing.com/search/2014/09/05/meet-xiaoice-cortanas-little-sister/; and https://en.wikipedia.org/wiki/Xiaoice 2. MADCOMs can include anything from robo-dialing telemarketing tools, to AI home assistants like Amazon Echo, to cutting edge (and mysterious) AIs like “T” that dynamically create thousands of fake news videos for YouTube. 3. See this video from DARPA that explains how AI evolved and how machine learning segments manifold data: https://www.you- tube.com/watch?v=-O01G3tSYpU 4. See For Sympathetic Ear, More Chinese Turn to Smartphone Program: https://nyti.ms/2peM3T6; and Meet XiaoIce, Cortana’s Little Sister: https://blogs.bing.com/search/2014/09/05/meet-xiaoice-cortanas-little-sister/ 5. See AP’s ‘robot journalists’ are writing their own stories now: http://www.theverge.com/2015/1/29/7939067/ap-journalism-au- tomation-robots-financial-reporting 6. See An AI Written Novel Has Passed Literary Prize Screening: https://futurism.com/this-ai-wrote-a-novel-and-the-work-passed- the-first-round-of-a-national-literary-award/ 7. See IBM Debating Technologies: http://researcher.watson.ibm.com/researcher/view_group.php?id=5443 8. See Affective Computing: https://en.wikipedia.org/wiki/Affective_computing 9. See Research on Affective Pattern Recognition and Modeling: http://affect.media.mit.edu/areas.php?id=recognizing 10. See This Freaky Baby Could Be the Future of AI: https://www.youtube.com/watch?v=yzFW4-dvFDA&feature=youtu.be 11. See Face2Face: Real-time Face Capture and Reenactment of RGB Videos: http://www.graphics.stanford.edu/~niessner/thies- 2016face.html 12. See Face2Face: Real-time Face Capture and Reenactment of RGB Videos: https://www.youtube.com/watch?v=ohmajJTcpNk&- feature=youtu.be 13. See Concatenation synthesis https://en.wikipedia.org/wiki/Speech_synthesis#Concatenation_synthesis 14. See A system for voice conversion based on probabilistic classification and a harmonic plus noise model: http://ieeexplore.ieee. org/document/674422/?reload=true 15. See Google’s DeepMind develops creepy,ultra-realistic human speech synthesis: www.geek.com/tech/googles-deepmind-devel- ops-creepy-ultra-realistic-human-speech-synthesis-1670362/ 16. See The Secretive World of Selling Data About You: http://www.newsweek.com/secretive-world-selling-data-about-you-464789 17. See The Secret Agenda of a Facebook Quiz: https://www.nytimes.com/2016/11/20/opinion/the-secret-agenda-of-a-facebook- quiz.html 18. See Behind the scenes at ’s UK digital war room: http://news.sky.com/story/behind-the-scenes-at-donald-trumps- uk-digital-war-room-10626155 19. Have you ever taken a personality test on Facebook? If so, you’ve probably given a marketer your personality and possibly psy- chological profile, along with your name, email address and friend list. 20. See the accompanying paper “Understanding the Psychology Behind Computational Propaganda” 21. This balance between MADCOMs precisely targeted towards people and MADCOMs targeted towards machines and people is an unknown variable. Raising the costs to MADCOMs through filtering might have a significant positive impact on the information environment. As an analogy, filtering reduces but does not eliminate email spam. 22. Facebook’s ‘Real Name’ policy and Twitter’s automation policy are two examples of efforts to fight bots and fake accounts. 23. Politicalbots.org is an excellent resource for computational propaganda information and has a recommended reading list. The Observatory on Social Media publishes research on information diffusion in social media. The author maintains a directory of AI policy issues and resources on Medium. 24. The State Department already uses MADCOMs and AI as they are built into social media platforms; e.g. Facebook targeted adver- tising relies on machine learning to reach the desired audience. 25. See the accompanying paper: “Understanding the Psychology Behind Computational Propaganda”

ACPD | Understanding the Challenges of AI and Computational Propaganda to PD 47

26. Creation of this initial ontological system would likely cost upwards of $5 million and would require significant annual invest- ments to build capabilities and expertise in specific topics. However, the benefits in terms of increased capabilities, productivity and efficiency argue for this long-term investment. Otherwise the State Department will soon find that it is the only comparably sized, global organization without enterprise AI tools built into its business processes, and will suffer for this lack of capability. 27. See Automated Fact Checking: The Holy Grail of Political Communication: http://nordicapis.com/automated-fact-check- ing- the-holy-grail-of-political-communication/ 28. This raises 1st Amendment Concerns, but foreign actors do not have Constitutional protections, nor do machines. The United States has regulated false speech in areas where there is consensus that the false speech is against the public interest, like , slander and libel cases.

CC BY-NC-ND 2.0, elle a PSYCHOLOGICAL PRINCIPLES FOR PUBLIC DIPLOMACY IN AN EVOLVING INFORMATION ECOSYSTEM

By Jeffrey T. Hancock, Professor of Communication, Stanford University

In this essay I focus on some of the psychological aspects of how communication technology affects AN ANCIENT PSYCHOLOGICAL the way that people deceive and trust one another. CONCERN The deep concerns we’ve been facing lately about a Every generation tends to think that the current gen- “post-truth society” are really a reflection of how we eration is less honest than the previous generation. can trust one another in a world dominated by social This is an old human concern. In western culture we media, a place in which people we may or may not have Diogenes, the Greek philosopher who searched know can communicate with us at any time and from for a single honest man, failing to ever find one. In anywhere. How can we tell if someone is lying to us in the east, the Chinese were so concerned with hon- their tweet, their Facebook post, the news that they esty that they developed the first deception detection shared via a text or an online video? Worse yet, some technique over 2000 years ago. They put dry rice of those people might not even be people, but bots into a suspected liar’s mouth. If the suspect couldn’t coordinating to promote some propaganda or com- talk then it suggested they didn’t have enough saliva, mercial interest. which the Chinese believed was a symptom of lying.

Concerns about misinformation, fake news and These ancient examples highlight that it is important whether my new friend is a bot can lead us to con- to historicize our current concern with deception clude that social media is dramatically increasing and misinformation with social media. As a society, deception in the world, and that soon we’ll be unable we have long been concerned with truthfulness, and to trust one another, or establish what information is this concern is often made more salient when new true. But as Bruce Wharton, Acting Un- communication technologies are introduced, from der Secretary for Public Diplomacy and Public Affairs, the printing press to the radio. With social media, we suggests in this report, I believe that we are not in a see a similar pattern. To put deception and social me- post-truth society. Although we’re paying more atten- dia into context, it is useful to understand what psy- tion to the topic of truth and evidence, social media chology has uncovered about how deception works. and related technologies do not spell the end of hon- esty. Instead, that technology will transform how de- ception takes place, how we detect lies and how we A ON DECEPTION DETECTION come to trust one another. What does the hundreds of studies by psychologists These changes to truth-telling and trust will not be and communication researchers on deception detec- random or unpredictable, but will be driven by prin- tion tell us? First, and surprisingly, there is no reliable ciples and factors that the social sciences have been cue that always indicates whether a person is lying. identifying over the past century. We need not throw There is no Pinocchio’s nose, as much as TV shows out the book of psychology, for example, to under- or self-help magazines would like us to believe. While stand how public diplomacy needs to adapt to the there are some contexts, such as interrogations and changes wrought by social media. Below I review interviews and other high-stake situations, where these principles and provide an overview of the latest reliable cues to deception can be elicited, there is no research on deception detection and trust, conclud- nonverbal cue that reveals lying in all the different ing with insights on what those engaged in public di- domains of human discourse. Recent work suggests plomacy need to address most to succeed in an evolv- that deception can be more reliably revealed in lan- ing communication and information environment. guage patterns, but sophisticated training or com- puter programs are required to identify the linguistic footprints of lies.

50 ACPD | Can Public Diplomacy Survive the Internet?

An overall meta-analysis of hundreds of deception deception by just relying on cues in the message, we experiments reveals that humans perform at chance now have information tools available that can help levels (54 percent) when detecting deception. We investigate potential that were hard to really aren’t very good at telling if someone is lying imagine just a few years ago (for more on the value based on verbal or nonverbal cues, in part because of fact-checking efforts, see Ethan Porter’s essay in there are no reliable cues. This difficulty in detecting this report). deception transfers over to social media deception. In studies examining attacks, where decep- The last finding from the deception literature that is tive emails are used to access sensitive information important to share is that people lie for a reason, and (as was the case in the hacking of the Clinton cam- these reasons are widely varied. While this may seem paign accounts), even sophisticated users can be de- obvious, it is important to note this when considering ceived, online or off. how deception operates in the current environment. Fake news articles in the last election cycle were pro- In fact, there is only one reliable finding in every de- duced sometimes to influence voters, but more often ception detection study: people tend to trust what the motives were simply profit. Without considering others say, an effect called the truth bias. Our default the reasons for deception, it is impossible to counter state is to trust what other people say. This bias is them.

“Everygenerationtendstothink thatthe cur- rent generation is less honest than the previous generation. This is an old human concern.”

actually quite rational—most of the messages that a person encounters in a day are honest, so being bi- DECEPTION AND TRUST IN AN EVOLV- ased toward the truth is almost always the correct response. This tendency to trust messages is, of ING COMMUNICATION ENVIRON- course, one of the reasons that lies can succeed, but MENT it’s important to note how fundamental the truth bias Deception is the deliberate attempt to create a false is. Language philosophers even argue that for lan- belief in another, so to understand deception it is guage to work we must assume a cooperative part- important to understand how beliefs are formed. ner, suggesting that the truth bias is fundamental to Cognitive science research reveals that we tend to communication. believe information that we receive, which gives rise to the truth bias described above. This initial belief There are two other important findings from the de- is “sticky” and the belief can persist even when it is ception literature that are relevant to public diploma- later shown to be false or incorrect, suggesting that cy.Whilewehaveadifficulttime detectingdeception the first mover in sharing information has an advan- from cues,likeeyegaze or vocalpitch,peoplecan de- tage. Further, as information is repeated, these initial tectlieswhentheyhavethetime,resourcesand moti- beliefs become even more difficult to overturn, a fact vation. Lies are often discovered through contradict- that advertisers know well. ing information from a third source, or evidence that challenges a deceptive account. Much like the way At the same time people are also continuously evalu- police officers investigate witness statements and ating the validity of their understanding of the world. suspectalibis, peopleoft ende terminethattheyhave This process is called “epistemic vigilance,” a contin- beendeceived by seeking out and learning from oth- uous process checking that the information that a er information. Our recent work suggests that most person believes they know about the world is accu- lies that people detect rely on information from oth- rate. Epistemic vigilance works in parallel with the ers, or come from using search engines like Google truth bias, alert to any signals that information about or examiningactivitiespost ed on social networksit es the world may be incorrect, such as inconsistencies likeFacebook. Thus, while we may be badat detecting

ACPD | 51

across sources. Thus, while our default is to trust in- them for the gain of others. Without knowing more cominginformation,peoplealsoevaluatetheir infor- about people’s folk theories of these complex sys- mation environmenttoensurethattheirunderstand - tems, it is difficult to predict how audiences will react ing of theirworld is valid. to messages that are shared through them, such as whether they trust them or not. As our information ecology evolves to be more me- diatized1 and digital, the operation of epistemic vigi- lanceneedstoevolve as well.Considerthesharing of SOME REASONS FOR HOPE: LESSONS afake newsstory by Shawn on Facebook that is read by Markos. There are several signals Markos’ epis- FROM THE SHARING ECONOMY temic vigilance might rely on: the degree to which There is substantial reason to be optimistic in the long Markos knows and trusts Shawn, how often the ar- term about truth and trust with technology. Although ticle has been “liked” by others, and the number of trust in institutions, such as media, government and times the article has been shared. If these signals religion, has been in decline for over a decade, there are all high, then there is little to trigger additional has been substantial trust observed in how people vigilance or signal for Markos to move away from his are believing each other via technology. For example, default state of trust. when purchasing new products and services, most people will rely on online reviews to make decisions Since the alarms over fake news emerged, social about what hotel to reserve or which car to buy. More network sites and journalists have begun to develop people trust peers when making these decisions additional signals that can help people assess the than any other form of media. In another domain, we validity of information. For example, Facebook now see huge trust in social support groups that operate allows users to flag stories that may be fake. These on the internet, with strangers providing support stories are then examined by fact checkers, and if the and advice to other strangers, trusting one another story is fake an alert is shown whenever the story is to help each other face cancer, overcome the loss of shared on the platform. This kind of signal functions loved ones, or how to recover from bankruptcy. to trigger epistemic vigilance and help individuals make decisions about whether to trust the informa- This inversion of trust, decreasing trust in institu- tion or not. While this is a promising development, it tions but rise in interpersonal trust, can also be ob- is still too early to measure the effectiveness of these served in the sharing economy, from home-sharing measures. This change nonetheless points to at least to car-sharing. Consider the level of trust required to one direction for improving our ability to assess in- allow strangers to stay in your home. Or the amount formation in social media. of trust required to hop into a stranger’s car late at night in a strange neighborhood. How does trust op- Much more is required toestablish trustworthy com- erate in this multi-billion-dollar economy, and what munication in our evolvinginformation environment. insights can it provide for public diplomacy in this While substantial work is required to continuing im- evolving communication environment? proving the trustworthiness of our cyber systems, wealsoneedto betterunderstandthesocialaspects First, the trust placed in these services is warranted. of these newtechnologies. In our own work,wehave Very few rides on Lyft or Uber result in any negative begun to look at how people reason about social incident. The same is true for house-sharing services technologies, like Facebook or Twitter newsfeeds. We like Airbnb. One reason for this is that the users’ goals find that people have folk theories about these tech- are aligned. One user would like to sell their service nologies, which represent the person’s general un- while the other user wants to buy this service. When derstanding of how a system works. These theories goals are aligned, trust can facilitate many social weighquestions,suchas: How do algorithmsdecide transactions. Public diplomats know this well—mes- to share info? How are sources perceived? To what sages must be aligned with the goals of the audience degree do these systems validate information? or the partner. Forgetting this can undermine any diplomatic enterprise. For example, we find that some people think of Face- book’s newsfeed as a personal shopper, helping the Second, while we usually think about the person tak- person find things of interest to them. Others, how- ing the risk when we think about trust situations, it is ever, think of the newsfeed as a spy or as paparaz- important to consider the psychological dynamics on zi, concerned that the system is designed to exploit the other side of the risk, the person being trusted.

52 ACPD | Can Public Diplomacy Survive the Internet?

When people are trusted with something valuable, behaviors, taking millions of rides with strangers and such as being allowed into a stranger’s home, they of- allowing millions of strangers to stay at their homes. ten experience feelings of responsibility and are even nervous about harming the other person. Indeed, many Airbnb hosts report that their homes are in LESSONS FOR PUBLIC DIPLOMACY: great shape after renting them out. Trust often leads to trustworthy behavior. TRAINING AND IMPLEMENTATION As people engaged in public diplomacy adapt to the Third, users of these services believe that there is in- evolving communication environment to engage frastructure in place to protect them from violations with foreign audiences, what are some of the keys for of trust. Users expect that brands like Airbnb will re- success? The first is recognizing that the goals and imburse them for any damages. Further, there trust is values of the United States and its allies and adver- built on layers of older, legacy infrastructure, like law saries are paramount. It is important to keep a focus enforcement and financial regulation. In addition to on goals, objectives and our own values. Deception is the brand of a service, such as Airbnb, users expect to often detrimental in the long term, and the costs to be supported by the enforcement of legal institutions reputations can be severe. In one study asking peo- put in place long before social media came on the ple to rank traits, the one ranked lowest from a total scene, from the police department to the Consumer of over 500 was “liar.” Financial Protection Bureau. These layers of infra- structure that build trust should also be considered It is also important for those serving in a public di- in public diplomacy campaigns. Programming that plomacy role to receive new forms of training and aims to establish relationships, and build on those re- education. This training should involve an emphasis lationships over time, is likely to result in robust net- on media literacy, including both the social science of works of shared interests and understanding. technology and also enhancing technical skills. One model may be the computational journalism pro- Finally, technology plays an important role. Users gram at Stanford University, which seeks to trans- of Uber report feeling safe in part because the app form journalism by providing journalists with com- constantly records where they are. They believe putational capacities that will change how they can that should something go wrong, there will be a re- investigate issues of public interest. I can imagine a cord, and that this record keeps people honest. In- new program for “computational diplomacy” that has deed, one of the most important transformations similar goals, to develop new skills for diplomacy that of the communication environment is the record of incorporate computational abilities and social sci-

“Trust often leads to trustworthy behavior”

so many more behaviors and actions. Deception is ence training for understanding the social and tech- made more difficult when there’s a record, as most nical aspects of new communication environments. politicians caught up in personal scandals can attest. Public diplomacy practitioners must remain vigilant Finally, the United States needs to continue to devel- in ensuring their outreach is transparent and mes- op its technical capabilities to be able to detect and saging grounded in empiricism. counter misinformation and other attacks by hostile others. Importantly, this should be coupled with a Overall, the sharing economy points out a possible similar investment in training in the social sciences, path for how trust can emerge and thrive in a fully from the psychology of technology discussed here to mediatized information environment, and how many social network analysis. All of these technological ca- partners and layers of infrastructure can be lever- pacities and social analysis skills will be required to aged to make it work. Importantly, it is also reassur- best engage our foreign audiences. ing to see that people trust one another with their

ACPD | 53

ENDNOTES 1. In media studies, mediatization is a theory suggesting that the media shapes and frames the processes and dis- course of political communication as well as the society in which that communication takes place.

Image: CC BY-NC-ND 2.0, Martin Sommer

FACTS MATTER, AND PEOPLE CARE: AN EMPIRICAL PERSPECTIVE

By Ethan Porter, Asst. Professor at George Washington University School of Media and Public Affairs

Does fact-checking work? That is, if we provide peo- they can do so even when the issues are complicated ple with information that corrects their mispercep- and when the facts challenge their most cherished tions, do they respond by accepting the new infor- political beliefs. mation—or do they reject it and cling to their prior beliefs, no matter how wrong they might be? There is Academic research offers many reasons to be skepti- ample reason to be pessimistic. Hardly a day goes by cal that citizens can learn and that fact-checking can without a or public figure bemoaning the arriv- work. From a bird’s eye view, the public appears to be al of a “post-truth” age, in which the stuff of facts and terribly misinformed. For example, in both the Unit- evidence no longer matters. Although media institu- ed States and the —two of the most tions devote considerable resources to fact-check- well-educated states in the world—citizens dramat- ing, the naked eye suggests that such efforts are ically over-estimate the amount of money their gov- mostly for naught. One only has to spend a little time ernments spend on foreign aid, sometimes by factors on the internet, or talk with family members, to be- of ten.4 The picture only gets worse from here. Not come acquainted with a vast variety of confidently only do citizens know very little about politics, they asserted mistruths offered by all sides of the political are virtually incapable of learning more. Their level of spectrum. commitment to their party of choice is so strong that their partisanship effectively precludes them from Researchers are of two camps on this matter. On learning new information that conflicts with their the one hand, some have offered evidence implying political commitments. Partisanship, it has been said, that efforts to raise the level of political knowledge instills what has been evocatively called a “perceptu- and correct misinformation are unlikely to succeed. al screen” that comes between everyday people and According to this school of thought, people know the empirical world around them. When confronted very little about politics and they are so committed with information that challenges their political be- to their political beliefs that they have difficulty ac- liefs, they may aggressively seek out information that 1 5 cepting facts that challenge those beliefs. In fact, at- confirms those beliefs. tempting to correct misperceptions may only serve to strengthen people’s commitments to their misper- Perhaps the most infamous example of citizens’ un- ceptions.2 According to another perspective, howev- willingness to brook new, challenging facts comes in er, pessimism about citizens’ political knowledge and the form of the supposed “backfire effect.” The back- their receptivity toward factual information is grossly fire effect proposes that, when people are presented overstated. Though people may not know as much with facts that correct misstatements made by their about politics as policymakers and educators might co-partisans, they will become more convinced of the wish, they are quite capable of learning more, even misstatements. That is, rather than move toward the when doing so requires them to break from their po- factually accurate position, they will move in the other litical commitments or to think through complicated direction. First identified in the study of attitudes to- 3 policy issues. ward the Iraq War, during which time conservatives backfired against corrections relating to the United In this essay, I review both perspectives. I then de- States failure to find weapons of mass destruction scribe three studies, administered over large num- (WMD), the backfire effect has also been observed bers of people in the United States and the United in relationship to attitudes about tax policy and vac- Kingdom, that puncture the pessimists’ consensus. cinations.6 As the name of the phenomenon implies, The studies make clear that, while people may not fact-checking does not simply fail—it backfires, pro- know much about politics, they can learn more and, ducing the opposite effect of what those who imple- crucially, that their misperceptions can be corrected. ment it intend. Fact-checking may not work to the degree that some hope it will but, as a general matter, it does seem to For nearly just as long as some scholars have offered work. Not only can people learn about politics, but reasons to think that citizens cannot learn, others

56 ACPD | Can Public Diplomacy Survive the Internet?

have disagreed. Several have argued that well-known it, but so have a lot of other people. There’s estimations of political ignorance are wildly overstat- something wrong when hedge fund man- ed.7 Others have shown that offering small monetary agers make more, and pay less in taxes, incentives for accurate responses can dramatically than nurses or truck drivers.” reduce the amount of partisan bias that colors an- swers to factual questions.8 Still others have shown Then, those randomly assigned to see the correction that citizens can, over time and with some effort, in- saw: crease their store of political knowledge—they can 9 “learn together, slowly.” “In fact, according to the Bureau of Labor Statistics, the average hedge fund manag- Three recent studies have tested these competing er pays about 20 times as much income tax schools of thought. In the first study, conducted in as the average truck driver or nurse.” Spring 2016, we attempted to map out the backfire effect among U.S. citizens, to identify the specific pol- All subjects were then asked to agree or disagree icy areas that would provoke certain ideological and with the factually incorrect statement offered by the partisan groups to backfire. Similar to the original politician. We were not afraid to identify Hillary Clin- studies that found backfire in relationship to WMDs ton’s partisan affiliation; we placed it squarely next to in Iraq, we searched for instances in which political her name. By the logic of backfire, this presentation office holders or political office seekers made factu- should compel Clinton’s co-partisans to reject the al misstatements. We then randomly exposed some correction provided, and become more convinced of 10 survey takers to a correction to the misstatement. the factually inaccurate position articulated by Clin- In all cases, the correction explicitly referred to neu- ton. We also found instances of policy areas in which tral government data. We then asked all subjects members of both parties had made misstatements. whether they agreed with the factually accurate po- For example, Democrats and Republicans have ex- sition espoused by the politician who had made the aggerated the amount of U.S. debt that China owns. 11 statement. Again, we provided all subjects with these biparti- san misperceptions, randomly showed some survey We were careful to include a broad variety of issues takers a correction based on data from a neutral and politicians from both parties. (Perhaps unsur- government source and then asked everyone if they prisingly, we found many examples of misstatements agreed or disagreed with the misperception. Finally, from both parties.) In one experiment, subjects were because some of the earlier backfire work embedded randomly assigned to see only a misstatement and misstatements and the attendant corrections in (fic- then a neutral correction. For example, all respon- titious) newspaper articles, we created newspaper dents were presented with the following statement articles of our own. We took a new set of misstate- by : ments made by leaders of both parties, crafted arti- cles around such misstatements and, in some of the ”We need to get back into the habit of ac- articles, included corrections to the misstatements tually rewarding workers with increases in based on neutral government data. their paychecks...Warren Buffett has said “...when the correction went against their co-partisan, they sided with the correction over and above their partisanship. When a fellow partisan is being corrected, people still learn from the correction, albeit grudgingly. ”

ACPD | Facts Matter, and People Care: An Empirical Perspective 57

All told, this study enrolled 8,100 people and tested 36 the general election. This study consisted of two ex- different issues’ capacity to generate backfire. On 35 periments designed to whether the white heat of the issues, we observed no backfire. Regardless of their general election would make people more suscepti- 13 own partisan beliefs, and regardless of the party affil- ble to backfire than they would be otherwise. iation of the politician being corrected, those survey takers who saw the correction became more con- In the first experiment, we exploited a statement vinced of the factually accurate position. To be sure, made by then-candidate Trump during the 2016 Re- people were more reluctant to accept the facts when publican National Convention about crime. Not only the facts corrected a fellow partisan than when the was the statement at odds with data produced by the facts corrected a member of the opposite party. But Federal Bureau of Investigation, but when media fig- even when the correction went against their co-par- ures critiqued him for it, his campaign responded by tisan, they sided with the correction over and above denigrating the quality of the data and implying the their partisanship. When a fellow partisan is being existence of an anti-Trump conspiracy within the FBI. corrected, people still learn from the correction, al- Once again, we devised several fictitious news arti- beit grudgingly. cles. In one version, we merely relayed Trump’s state- ments. In another, we included a correction. In still As noted, we observed one instance of backfire. In another, we included the correction and the Trump this case, it was the same issue that yielded back- campaign’s denigration of the data. In yet another, fire in the initial backfire study—whether the United we included the correction, the Trump campaign’s States had found WMD in Iraq. Once again, conser- denigration of the data and its insinuation that an an- vatives shown a correction clarifying that no WMD ti-Trump conspiracy within the FBI had meddled with were in fact found became more convinced that WMD the data. were found. However, even this replicable instance of backfire was quickly overturned when we changed In the second experiment, we exploited a misstate- the wording of the survey question. When the ques- ment made by Trump during the first debate of the tion was made more succinct, backfire vanished. general election. While we conducted the experi- Once again, regardless of their partisan identifica- ment on the convention statements six weeks after tion, everyone was willing to accept the factual cor- the convention, we conducted the experiment about 12 rection provided to them. the debate on the same night as the debate. During the debate, he made a claim about unemployment Of the 36 issues we tested, 35 did not generate back- that diverged from available Bureau of Labor Statis- fire; and the one that did was highly susceptible to tics data. On the night of the debate, we paid people question-wording effects. Just as important as what to watch the debate. After it ended, we showed ev- we found—that backfire is, at best, a byproduct of eryone Trump’s inaccurate unemployment claim and question wording—was what we didn’t find. We found then showed some the BLS correction. no evidence that people exposed to more factual cor- rections over the course of our studies became more In both experiments, all subjects proved willing to ac- or less willing to accept factual corrections. Nor did cept the factual correction provided to them.14 Trump we find evidence that the order of factual corrections supporters did the same, even though their candi- one saw had any impact on one’s willingness to indi- date was being corrected in the midst of a presiden- cate agreement with the facts. In attempting to map tial election. However, their views of their preferred out the contours of the backfire effect, we found it candidate did not budge. In the convention study, was far smaller than previous research indicated. Trump supporters who saw the correction became no less favorable to Donald Trump—even though In the study just described, all experiments were they accepted the content of the correction. We ob- conducted in the United States in Spring 2016—as served a similar pattern in the debate study. Trump the presidential race was ongoing, but before both supporters who saw the correction did not subse- parties had selected their nominees. According to quently change their minds about candidate Trump. the pessimistic school of thought, the relationship Though they accepted the factual correction, thereby between facts and partisan loyalty matters quite a conceding that their preferred candidate had made bit. And if this is the case, then it stands to reason statements at odds with the facts, they were no less that the relationship might be at its apex after both willing to support him as a result. The verdict is clear: parties have selected nominees. To account for this People can accept factual correction, even when do- possibility, we conducted an additional study during ing so forces them to break from their preferred po-

58 ACPD | Can Public Diplomacy Survive the Internet?

“To issue a correction does not amount to putting the thumb on the scale and favoring one candidate over another... the only consequence of fact-checking... is that it increases the extent to which the public be- lieves in factually accurate information.”

litical parties, and even in the midst of a presidential money. However, we found no effects on related po- election. litical attitudes. In this study, people were not asked to break from a fellow partisan and accept a factual Can people also learn about politics when a complex correction; instead, they were asked to break from policy matter, independent of partisan politics, is at their own prior misperceptions. And they did so. To stake? A third study suggests that they can. In 2014, be sure, they did not know much about politics before the United Kingdom mailed “taxpayer receipts” that the receipts went out. But they could learn. And they offered itemized descriptions of how government could do so without changing their views on related had spent the tax money it collected, presented on matters. a per-capita basis, to 26 million taxpayers. Work- ing in coordination with the U.K. tax authorities, we For those with public responsibilities, the erosion empaneled a large group of survey respondents.15 of the pessimistic consensus has significant im- We then randomly assigned some people to receive plications. Fact-checkers should take their foot off reminders and encouragements about the taxpay- the break. Where they see erroneous claims, they er receipt that they would receive soon in the mail. should be unafraid to intervene. When administered We surveyed everyone before and after the receipts to counter a fiction, a correction can prevail even went out about their level of political knowledge and over the power of partisanship. This is true not only a host of political attitudes. To measure levels of po- when political figures make misstatements, but when litical knowledge, we asked subjects to estimate how vast numbers of citizens believe in policy mistruths, much their government had spent on various items as with foreign aid. Again and again, the facts get over the previous year. This information, contained through. in the receipts themselves, has confounded many people in many countries. As mentioned above, peo- That we find no evidence that increasing political ple are notoriously lacking in knowledge about how knowledge causes related attitude change should much their governments spend on foreign aid—and further fuel the fire of those who wish to increase 16 we asked everyone precisely this question. political knowledge. To issue a correction does not amount to putting the thumb on the scale and fa- Across a range of knowledge measures, we found voring one candidate over another. Instead, the only that the receipts caused a significant uptick in politi- consequence of fact-checking that we can consis- cal knowledge. Measured a number of different ways, tently detect is that it increases the extent to which we find that, indeed, the receipts made people more the public believes in factually accurate information. likely to provide accurate estimates of the amount Whatever one’s political position, this seems a laud- their government was spending on foreign aid. We able end. found similar effects for other uses of government

ACPD | Facts Matter, and People Care: An Empirical Perspective 59

ENDNOTES 1. Carpini, Michael Delli and Scott Keeter. 1996. What Americans Know About Politics and Why It Matters. New Haven, Connecticut: YaleUniversity Press. 2. Nyhan, Brendan and Jason Reifler. 2010. ``When Corrections Fail.” Political Behavior. 32 (2): 303-330. 3. Hill, Seth. 2017. ``Learning Together, Slowly.’’ Journal of Politics. Forthcoming. 4. Klein, Ezra. 2013. “The Budget Myth That Won’t Die.” Washington Post Wonkblog, https://www.washingtonpost.com/ news/wonk/wp/2013/11/07/the-budget-myth-that-justwont-die-americans-still-think-28-percent-of-the-budget- goes-to-foreign-aid/; Kings College London and Ipsos Mori. 2013. “Perils of Perception.” Survey Release, 9 July 2013. https://www.ipsos-mori.com/researchpublications/researcharchive/3188/Perceptions-are-not-reality-the-top-10- we-get-wrong.aspx#_edn6. 5. Lodge, Milton and Charles Taber.2013. The Rationalizing Voter. New York, New York: Cambridge University Press. 6. Nyhan and Reifler 2010; Flynn, D.J., Brendan Nyhan and Jason Reifler. 2016. ``The Nature and of Mispercep- tions: Understanding False and Unsupported Beliefs about Politics.’’ Advances in Political Psychology. 7. Gibson, James L. and Gregory Caldiera. 2009. Citizens, Courts and Confirmations. Princeton, New Jersey: Princeton University Press. 8. Bullock, John G, Alan S. Gerber, Seth J. Hill, and Gregory A. Huber. 2015. “Partisan Bias in Factual Beliefs about Poli- tics.” Quarterly Journal of Political Science. 10: 519-78. 9. Hill 2017. 10. In the first study described, all subjects were recruited over Amazon’s Mechanical Turk, a low-cost platform survey subject acquisition in wide use in the social sciences (Berinsky, Huber and Lenz 2012). 11. Wood, Thomas J. and Ethan Porter. 2016. ``The Elusive Backfire Effect.’’ Wood, Thomas and Porter, Ethan, The Elu- sive Backfire Effect: Mass Attitudes’ Steadfast Factual Adherence (August 5, 2016). Available at SSRN: https://ssrn. com/abstract=2819073 12. The original question wording read: ``Immediately before the U.S. invasion, Iraq had an active weapons of mass destruction program, the ability to produce these weapons, and large stockpiles of WMD, but Saddam Hussein was able to hide or destroy these weapons right before U.S. forces arrived.’’ We changed that to: ``Following the U.S. invasion of Iraq in 2003, U.S. forces did not find weapons of mass destruction.’’ 13. Nyhan, Brendan. November 5, 2016. ``Fact-Checking Can Change Views? We Rate That As Mostly True.’’ The New YorkTimes. 14. For the experiment about Republican National Convention, we recruited subjects from Mechanical Turk and a na- tionally representative sample from Morning Consult. Results were indistinguishable across both samples. For the experiment about the debate, we used Mechanical Turk to recruit subjects. 15. We used YouGov U.K. for this study, which provided us with a nationally representative sample. 16. Barnes, Lucy and Feller, Avi and Haselswerdt, Jake and Porter, Ethan, Can Citizens Learn? An Evaluation of the Tax- payer Receipt (June 6, 2016). Available at SSRN: https://ssrn.com/abstract=2877248

Voice of America VOA: A WEAPON OF TRUTH IN THE WAR OF WORDS

By Amanda Bennett, Director, Voice of America

Does truth matter? In a simple word, yes. Are we liv- comprehensive projection of significant American ing in a post-truth era? No. Despite the flood of misin- thought; and that it will present U.S. policies clear- formation and our own fears of being overcome by it, ly and effectively, along with responsible discussion history shows that truth is one of our most powerful and opinions of those policies. weapons. Against the current backdrop of propa- ganda and falsified news in the global media environ- Some argue that in today’s environment that is not ment, truth and facts stand out—informing, educat- enough, that given the efforts of networks such as ing and empowering citizenry. Russia Today (RT) and China Global Television Net- work (CGTN), we need to do more, fight fire with fire. Voice of America, for 75 years, has been offering just However, truth will always be much more power- that—the truth. In its first broadcast, William Har- ful than propaganda in the long run—and the effort lan Hale said “The news may be good for us. The news to counter disinformation must be just that: a long- may be bad. But we shall tell you the truth.” Much has term play. During World War II, U.S. sailors may have changed since the days of Nazi propaganda and listened to Japanese propaganda disseminated by shortwave radio. The revolution in technology and “Tokyo Rose.” They enjoyed the music, but they didn’t vast proliferation in social media use over just the believe what was said because it was so obviously past decade has dramatically upended the way infor- false. I was in China when the post-Cultural Revolu- mation is gathered and shared. tion control of information was near-absolute. Even then, people understood they did not have the whole These technological advancements initially raised truth. Today, Russia’s Sputnik TV is so biased in favor hopes for more informed and connected societ- of the Kremlin that its influence on rational observers ies—and perhaps a diminishing need for a govern- is muted. Despite the billions spent on their efforts, RT ment-funded broadcaster like VOA. However, this and China’s CGTN have relativelysmallaudience s. optimism must be tempered by today’s reality. State and non-state actors alike are trying to undermine There are also indications that falsified, or overly Western democratic principles and are using tradi- hyped and biased views, can backfire. In Germany, tional and social media to distribute their message. far-right groups have revived the Nazi-era term “Lu- Bots and trolls disrupt civil debate online and web- genpresse” or “” to describe the media, in sites masquerading as news sites offer sensational particular, its coverage of refugees and the German headlines just to make a quick, click-through, dollar. government’s immigration policies. However, a new The effort to manipulate or incite is not new. In the annual survey conducted by the University of Würz- past, whole swathes of the globe were denied access burg shows that German trust in the media actual- to truthful information. However, the problem today ly went up sharply in 2016. The level of trust, at 55.7 is compounded by the ease and speed with which percent, is the highest since the survey was started false information can be disseminated. This can cre- in 2000. Even the number of respondents who con- ate a sense of chaos and uncertainty about what to sidered themselves right-wing and said they trust believe and whom to trust. the press increased by 18 percent over the last year, rising from 33 percent in 2015 to 51 percent in 2016. VOA, with its commitment to fact-based journalism, connections to far-flung audiences, and its vast net- Heavily biased content is seen for what it is. The need work of affiliates, is an effective communications tool for accurate, comprehensive, news and information against such threats because it can be trusted; trust- is evident by the fact that many of those in the VOA ed to provide comprehensive news, information and audience risk their lives just to access it. In China and context. Its mission was codified into law in 1976 in Tibet, efforts to circumvent government censors are the VOA Charter which states that VOA will be a con- widespread. In Iran, satellite dishes are illegal, but sistently reliable and authoritative source of accu- you can find them everywhere. People try to disguise rate news; that it will tell America’s story, not any sin- and hide them in order to access VOA and other gle segment of American society, but a balanced and western content.

62 ACPD | Can Public Diplomacy Survive the Internet?

In addition, journalists risk their lives to work for By adhering to the principles of good journalism, VOA. One reporter who worked for VOA in the Feder- VOA represents significant American thought in- ally Administered Tribal Areas (FATA) region and Pa- cluding demonstrating the value of the rights to free khtunkhwa province of Pakistan had his house blown speech and a free press. It also establishes a bulwark up and was eventually forced to flee to the United against disinformation. VOA is a voice the audience States. Another was gunned down in a mosque near can trust—in good times and in bad. Its authoritative, Charsadda, a town close to FATA. Yet another report- engaging rapport builds a solid foundation for posi- er working for VOA in Syria recently had his house tive, long-term relationships. It takes years to estab- bombed by ISIS. Others faced torture and abuse just lish the high level of trust VOA has earned; but if you to have the opportunity to exercise the right of a free take away that credibility and authenticity, trust can press. disappear immediately.

In parts of the world where alternate sources of in- Edward R. Murrow, then Director of the U.S. Informa- formation are very limited or virtually non-existent, tion Agency, stated in 1963 in congressional testimo- or where systems are highly polarized, VOA is a bea- ny, “American traditions and the American ethic require con of light. By providing unfettered access to news us to be truthful, but the most important reason is that and information in 47 languages, VOA reaches peo- truth is the best propaganda and lies are the worst. To be ple in a way that CNN cannot. In fact, VOA reaches persuasive, we must be believable; to be believable, we more than three times the domestic (U.S.) audience must be credible; to be credible we must be truthful. It is of CNN, MSNBC and combined. By the end as simple as that.” of 2016, VOA’s global weekly audience stood at 236.6

“VOA reaches more than three times the do- mestic (U.S.) audienceof CNN, MSNBC and Fox Newscombined. By theendof2016,VOA ’sglob - al weeklyaudiencest ood at236.6 million...”

million—the highest number ever recorded and a 26 From its beginnings, this is what set VOA apart. percent increase over the previous year. Whether it be German propaganda in World War II or Soviet propaganda in the Cold War, facts and bal- The size of the audience, while impressive, is just one anced reporting were powerful weapons. Fast for- part of the story of VOA impact. Research shows that ward to state-sponsored false narratives, radical Is- 86 percent of the audience finds VOA to be trust- lamist propaganda, and a bewildering array of things worthy, and three-fourths say VOA helps them to un- passing themselves off as fact online. We may not be derstand U.S. policy and current events. able to counter every falsehood or half-truth point- by-point, but we can paint a different narrative, one The highest-ranking ever to defect from that is truthful and constructive. Compared to the North Korea, Thae Young-ho, recently said that while plethora of anti-U.S. propaganda splattered across still a foreign ministry official in Pyongyang, he read the internet, VOA provides an alternative canvas of what he termed “reference radio materials of VOA” news and information that is believable because it is every morning and afternoon. He said the “North Ko- based on facts. True stories about Americans, dias- rean regime also pays great attention on the contents pora communities, U.S. government and public poli- of VOA, so I think it is very important that VOA should cies, health and technology issues. further strengthen its activity, and also its contents so that, one day, I hope VOA is remembered by North When VOA tells these stories, the audience often Korean people as a kind of, you know, the main player perceives more than we may even realize. Last year, who contributed a lot for the reunification of the Ko- VOA’s Khmer service reporter was providing cover- rean peninsula.” age of pro- and anti-gun protestors at the Republican

ACPD | VOA: A Weapon of Truth in the War of Words 63

NationalConventionviaFacebookLive.The crowds trust in VOA reporters that led the Somali President were particularly rowdy and tense. However, what in Mogadishu and Somali immigrants in the United really stood out to Cambodian viewers was some- States to agree to take part in a joint town hall. The thing else. Among their comments on Facebook in same trust and credibility prompted one of Ukraine’s real time were “Police in the U.S. do not beat up pro- leading television networks to ask a VOA anchor to testors like Hun Sen’s police in Cambodia” and “If it moderate a parliamentary debate. was in Cambodia, Hun Sen would send police and dogsto beat and bitethe protestorsalr eady.” Whether they are covering wars, natural or man- made disasters, telling American stories or explain- This is just one example of how, by sharing truthful ing U.S. government policies—VOA reporters and facts, VOA not only explains the context of a news sto- programmers are trusted and reliable. Truth and ry, but also shows what life in the United States is like. fact-based journalism are what the audience needs

VOA journalists often go to great lengths and face atthis time—and arethes trongestweaponswehave significant risks to get the facts straight. It is the in the war of words.

CC BY -NC 2.0,RayyaneTabet_Architect ureLessons_2013c,MANYBITS U.S. 2016 ELECTIONS: A CASE STUDY IN “INOCULATING” PUBLIC OPINION AGAINST DISINFORMATION

By Jonathan Henick, Principal Deputy Coordinator for International Information Programs and RyanWalsh,SeniorAdvisor for Digital Product,Bureau of InternationalInformationPrograms

Following the 2016 U.S. presidential election cycle, formation Programs’ most popular content is shared politicians and pundits sounded the alarms over “fake across as many as 400 of these properties. That said, news” and its potential role in influencing public opin- U.S. public diplomacy efforts have struggled to keep ion. Facebook and Google scrambled to build tools pace with the torrent of foreign state-sponsored dis- and partnerships to address the more egregious cas- information. es and to shore up the confidence of their consumers and advertisers. While “fake news” remains poorly U.S. efforts have been constrained by a number of fac- defined and includes some novel efforts to exploit tors including resource limitations, the proliferation the landscape for political and personal of self-described digital “news” outlets unconstrained profit, one subset has long been a principal concern by fact, and the policy clearance process, but perhaps for public diplomacy practitioners: state-sponsored the greatest challenge has to do with how individuals disinformation. Throughout much of the Cold War, process new information. We would like to believe for example, Soviet propaganda engaged prolifically that veritas omnia vincit (i.e., truth conquers all) and in such efforts in an attempt to undermine Western that rational people will be persuaded by factual evi- principles and sustain support behind the Iron Cur- dence. The reality is that philosophers have long ob- tain. The United States and its allies, meanwhile, em- served, and academic research strongly suggests, ployed their own tools, programs and platforms—in- that people are highly susceptible to “confirmation cluding the Voice of America and other broadcasting bias.” In other words they ignore information that affiliates—to counter such disinformation. contradicts, and actively seek out information that 3 confirms, their preexisting beliefs. In fact, people Since the end of the Cold War certain state actors who are presented with contradictory information or have continued to invest in traditional broadcasting “facts” often become even more dogmatic in defense platforms while also developing new programs and of their opinions. Other studies have demonstrated techniques to take advantage of the ongoing trans- a “primacy effect” in which people are most likely to formation in the media landscape—particularly the embrace the first piece of information they consume emergence of social media. These new techniques on a particular subject, particularly when introduced include the use of coordinated internet “troll” farms, to negative information.4 This is especially true if that employed to aggressively disseminate disinformation information is later reinforced with the help of confir- in an effort to sow mistrust and inflame and exploit mation bias. Another phenomenon known as “source societal and political tensions through social media.1 amnesia,” which prevents people from recalling The Voice of America and its sister broadcasting or- correctly exactly where, when or how information ganizations have also adapted to the digital age and was acquired, compounds the problem.5 As a result, are producing a steady stream of content designed state-sponsored disinformation amplified through a to inform foreign audiences and correct disinforma- multitude of distribution channels and widely shared tion. At the same time, the U.S. Department of State by armies of internet “trolls” has been remarkably has become the “world’s leading user of eDiploma- effective at influencing public opinion, even when the cy,” directly engaging on social media platforms with stories are easily debunked by U.S.-supported or in- hundreds of accounts managed from Washington or dependent mainstream media sources. by U.S. embassies and overseas.2 Today, Department of State maintains approximately 750 The Bureau for International Information Programs individual Facebook and Twitter (400 Facebook and (IIP)—one of thethr eebur eaus in thepublicdiploma - 350 Twitter) accounts worldwide, and when it expe- cy “family” in theU.S. Department of State—haspilot - riences peak traffic, the Bureau of International In- ed a new approach designed to address this partic-

66 ACPD | Can Public Diplomacy Survive the Internet?

ular challenge and to generally improve U.S. efforts were emerging narratives that had not yet achieved to engage and inform foreign publics. Executed in the broaddistribution in thesemediamarkets. weeks preceding the 2016 U.S. presidential election, the initial pilot aimed to identify and counter specific Next, IIP’s editorial and video units, as well as state-sponsored disinformation that sought to cast its speaker and interactive offices, worked quickly to doubt on the legitimacy of the U.S. electoral process plan content—both by developing new content and and, subsequently, U.S. support for human rights and modifying existing articles, videos and interactive democratic principles abroad. The effort brought programs designed to address the negative narra- together teams of experts from across IIP including tives identified earlier. This content did not seek to native foreign language speakers, content creators, “counter” or directly refute disinformation, but in- social media experts and data analysts to develop an stead presented factual and engaging narratives in cycle targeted content development approach, il- clarifying the election process without reference lustrated below: to the disinformation themes. Much of the content was made available on a specially designed U.S. elections web page on IIP’s ShareAmerica website. IIP’s analytics team designed and executed a paid social media targeted advertising campaign with the goal of “inoculating” broader audiences in targeted countries before they consumed reports containing the disinformation. Finally, IIP evaluated the ongo- ing campaign and repeated the cycle, as needed, to identify new disinformation narratives, develop more content and target new audiences for inoculation.

“We would like to believe

that... truth conquers all

First, team members from the office of analytics and that rational people equipped IIP’s in-house language experts with pub- lically available tools to engage in social listening by examining foreign language social media in a num- will be persuaded by fac- ber of priority regions to identify when and where state-sponsored disinformation about the upcoming tualevidence.Thereality U.S. elections were trending.Once stories surfaced through the social monitoring tools, the language and regionalexpertsreview ed thestoriesforqualita - isthatphilosophershave tive nuance to identify the broad disinformation tar- geting the U.S. election process. Identified narratives long observed, and aca- included false accusations that the United States had denied permission for international election observers to access polling stations. Another trend- demic research strong- ing thread suggested that ballot boxes in the Unit- ed States were susceptible to fraud and vote tallies ly suggests, that people could be easily subject to political manipulation. Each of these narratives was targeted at foreign publics to undermine the legitimacy of the U.S. elections and arehighlysusceptibleto discredit ongoing U.S. efforts to promote democrat- ic rights and principles abroad. Importantly, these “.””

ACPD | U.S. 2016 Elections: A Case Study in “Inoculating” Public Opinion Against Disinformation 67

Above: IIP Analytics Tools Depict Spiking Disinformation and Emerging Narratives in November 2016

The results of this pilot program suggest that this views and over 100,000 unique video views. Perhaps approach has considerable merit and success in more important than just achieving unique views of countering state-sponsored disinformation. Specifi- IIP content are the accompanying high engagement cally, over a 10-day period leading up to the U.S. elec- numbers—a strong indicator of interest by the end tions, IIP delivered over 13 million advertisements user. For example, IIP observed a dramatic spike in to foreign audiences in 20 countries searching for average session length: 5 minutes 25 seconds for information about the U.S. electoral process in their election articles (compared to a normal average 2 native language. As a result, the IIP election web minutes 44 seconds) and 1 minute 25 seconds for page, which included 25 unique pieces of content in election videos (compared to a normal average of 21 six languages, attracted over 300,000 unique article seconds).

68 ACPD | Can Public Diplomacy Survive the Internet?

Above: Examples of Disinformation and Counter-Narrative IIP Elections Content

Notably, subsequent analysis of a major state-spon- guage homepage, was distributed in the feeds of over sored disinformation outlet found that IIP content 100 individual Department of State properties by so- produced to counter false narratives often per- cial media managers in the field, and generated over formed on par or better than the disinformation, as 400 unique public feed shares to a potential audience measured by Facebook’s publically available data on of over 16 million people. In addition, the paid distribu- shares and reach. Specifically, individual IIP election tion strategy, in English alone, reached an additional stories averaged 145 public shares to an estimat- 1.6 million unique Facebook users in key markets vul- ed potential audience of 5.4 million per story. The nerable to disinformation. While these numbers re- state-sponsored disinformation outlet, on the other flect just publically available data from Facebook, and hand, achieved an average of 218 public shares per don’t account for “private” (and offline) shares, it is story reaching a potential audience of just 2.9 million. encouraging to see the comparatively strong perfor- Industry standards suggest that the actual reach of mance of IIP content relative to the disinformation content is 1–2 percent of potential reach, meaning outlet, particularly considering the potential impact ShareAmerica content was likely seen by an organic of other external factors, such as the possibility that audience of 128,000 users, over two times the esti- state-sponsored disinformation may be boosted by mated average size of the organic audience the disin- fake accounts, or be the benefactor of bot networks 6 formation was able to reach (58,000+). programmed to share its stories.

One reason for the disparity in audience numbers These social media metrics suggest that not only is that the Department of State has a comparative did the analytics team and language experts cor- advantage in leveraging its network of hundreds of rectly identify where and when negative narratives social media properties. In fact, each IIP story pro- about the U.S. election were trending, but the paid duced to dispel election disinformation was posted, distribution strategy worked by effectively placing on average,to29+individual newsfeeds of other De- content relevant to the news cycle in front of target partment of State social media properties. This has audiences right when they were most likely to be ex- exponentialimplications on reach.F or example, IIP’s posedtodisinformationabouttheelections. Further, top performing page, the IIP elections English-lan- and perhaps most importantly, as demonstrated by

ACPD | U.S. 2016 Elections: A Case Study in “Inoculating” Public Opinion Against Disinformation 69

Above: Unique views of IIP election content peak the week before the 2016 U.S. Election

increased average session length and engagement already opted-in to see one another’s status updates. metrics, IIP election content resonated with target audiences and, correspondingly, the reach of IIP’s All Indications are that state-sponsored disinforma- positive narratives increased. The spike in engage- tion on social media will remain a serious challenge ments, specifically “shares,” are critical to social net- to U.S. public diplomacy efforts moving forward. work algorithms for priority placement in the news- With metrics suggesting strong performance of this feeds of others who did not originally engage with initial “inoculation” effort, IIP will use this campaign the content—those in “secondary networks.” This not as a case study to demonstrate the power and ef- only can result in increased reach of the content, but fectiveness of integrating data and analytics to drive it can also contribute to the perceived credibility of content production, precisely target audiences and the content itself, due to the fact that a “share” intro- quantitatively measure results as we continue to in- duces the content to the target audience’s secondary stitutionalize these practices throughout the depart- network via a newsfeed curated by those who have ment’s public diplomacy efforts.

ENDNOTES 1. Paul, Christopher & Matthews, Miriam, “The Russian “Firehose of Falsehood” Propaganda Mode,” RAND Corporation, 2016. 2. Hanson, Fergus, “Revolution @State:TheSpr ead of Ediplomacy,” LowyInstitut e, 2002. 3. Nickerson, Raymond S., “Confirmation Bias:A UbiquitousPhenomenon in Many Guises,” Review of GeneralPsychology, Vol. 2, No. 2: p. 175-220, 1998. 4. Thorson, Emily A, “Belief echoes: The Persistent Effects of Corrected Misinformation,” Political Communications, Vol 33, p. 460-480, 2015. 5. Schacter, Daniel L., Joanne L. Harbluk, and Donald R. McLachlan, “Retrieval without Recollection: An Experimental Analysis of Source Amnesia,” Journal of VerbalLearning andVerbalBehavior, Vol. 23, 593-611 (1984). 6. The Social Media Examiner reports that organic reach is approximately 2 percent of a Facebook page’s fan base for public pages with 500,000+ page likes. (See Smith, Mari. 2017. “How to Maximize Facebook Reach.” . Accessed 20 April 2017.)

CC BY -SA 2.0, Dennis Jarvis

IN DEFENSE OF TRUTH, AND THE THREAT OF DISINFORMATION

By Jason Stanley, Jacob Urowsky Professor of Philosophy, Yale University

There is an international, anti-democratic,nationalist are ones that persuade by “manipulation”. But what movement buoyingauthoritarians abroad,thr eaten- is it to persuade by manipulation? Here is a natural ing to end hopeful democratic moments in Eastern characterization: Europeandelse where. Howmuch is dueto newtech - nology delivering novel means of propaganda? And Manipulation: Manipulation is the use of how much of it is the pendulum of history, returning devious methods to get an audience to do us to age-old concerns about the stability of liberal one’s bidding. democratic states? In this essay, I place these con- cerns in historicalandphilosophicalcontext,toeluci - What are “devious methods”? One might answer that date both the problem and thebestresponse. devious methods are those that involve propaganda. In short, our first attempt is thoroughly uninforma- In section I, I begin with the problem of defining the tive. Let’s try again. topic. What is propaganda? In section II, I trace the roots of the problem back to the founding texts of Second attempt to define propaganda: western philosophy. In section III, I give a defense of Propaganda is cherry-picking facts. truth, and further expand on the risks of disinforma- tion efforts. I conclude with some recommendations But what is “cherry-picking facts”? Is “ about how public diplomacy can be marshaled tore - facts” not listing all the facts? But it is impossible to spondtothe problem of authoritarian propaganda. list all facts. If someone were to try to list all facts, it would take more seconds than there are in the uni- verse. Any list of all facts would have to, for example, list the facts about all the molecules presently found SECTION I: PROPAGANDA DEFINED under my left pinky fingernail. Whenever one pro- One of the problems with the current debate about videsinformation,one selects some facts to present “fake news” and propaganda is thelack of acle ar the- and neglects others. This suggests a second defini- oretical taxonomy. I begin this section by explaining tion of “cherry-picking facts.” One cherry-picks facts the difficulty of characterizing the topic of propagan- when one omits relevant facts. But this is both too da. Using definitions from my 2015 book How Propa- broadand not broadenough. It is too broad,because ganda Works, I attempt what I hope to be a more use- it includes cases of propagandathat include justbad ful definition of propaganda. In Section III, I use this arguments (some people are just wrong about what definitiontochara cterizeauthoritarian propaganda. is arelevantfact).Andeven if weemendthedefinition to “intentionally omits relevant facts,” it omits cases It might be thought simple and straightforward to ofpr opagandathatinvolvefalse claims,which are of characterize our topic, but it is useful to look at some course notfactsatall. candidate definitions of propaganda to see that it is morecomplexthanonemayinitiallyrealize. Here is another definition that overcomes some of these weaknesses: First attempt to define propaganda: Propa- ganda is the manipulation of public opinion. Third attempt to define propaganda: Pro- paganda consists of known falsehoods. This is a familiar characterization of propaganda and, yet, it is uninformative. Any attempt to persuade However, propaganda can be true. Suppose an an- a public of something involves giving an argument of ti-Semitic leader gives a talk in front of their parlia- some kind. In defining propaganda, we want to know ment, bringing out victims of (for example) predatory what the difference is between giving a propagandistic lending practices by bankers who happen to be Jew- argument, and giving a non-propagandistic argument. ish. Let’s suppose there are victims of such practices This definition tells us that propagandistic arguments by bankers who happen to be Jewish, as is plausi- ble—though of course people of Jewish faith are no

72 ACPD | Can Public Diplomacy Survive the Internet?

more likely to perpetrate such financial impropriety Here are some definitions of propaganda from my 2 than people who are not of Jewish faith. And let’s own work: suppose the people being presented as victims are indeed victims of such predatory lending practices. It Political propaganda: An argument that is still propaganda to present them as such, since it employs a political ideal in the service of suggests that there is some distinctive problem with a goal, seeking to advance or undermine the Jewish faith. Propaganda does not need to con- that ideal by non-rational means. sist of known falsehoods. Themostcen tral kind of political propaganda is what A series of perfectly true assertions can constitute I call undermining propaganda. propaganda. Omission of crucial information is char- acteristically propagandistic. If I am only told that Undermining propaganda: An argument the blue tribe killed my grandfather, I might form a that employs a political ideal to undermine lifelong hatred of members of the blue tribe. But if I that very political ideal. am also given the information that my grandfather enjoyed murdering children from the blue tribe for Given my definition, propaganda can be either good sport, then I will instead develop a more nuanced or bad. It is good when it is used to undermine bad view of my personal history. ideals, and bad when it is used to undermine good ideals. Assuming the ideals of liberal democracy are Just as a series of true statements can be clearly pro- good, we can characterize demagoguery as: pagandistic, a series of perfectly false assertions can be clearly non-propagandistic. In teaching physics, Demagoguery: An argument that employs one may spend one semester on Newtonian Mechan- democratic ideals to undermine demo- ics. Newtonian mechanics is false. It is nevertheless a cratic ideals. good theory to teach, since it is approximately enough true of middle-sized physical objections. The method- These are unfamiliar characterizations of propagan- ology of the natural sciences is governed by the ideal. da. I have argued that the familiar ones do not help It is natural to slip into teaching an ideal model as if it us characterize the terrain. More persuasively, these were reality. The divergences between the ideal mod- definitions allow us to see that the structure of dema- el and reality are not important for the science. Still, goguery we face today fits straightforwardly into the if one is teaching an ideal model of physics or chem- model I have outlined. The journalist Peter Pomerant- istry, or even rationality, one is saying false things. sev characterizes the “political system in miniature” Physics classes are not thereby propaganda. of , the author of Putin’s propaganda regime, as “democratic rhetoric and undemocratic 3 Nor is deception necessary for propaganda. It is un- intent.” questionably true that Hitler was a deeply committed anti-Semite. Nevertheless, in , Hitler is very Now that we have defined the terrain, we can begin clear that he is also using anti-Semitism propagan- with an overview of its history. I will argue that the ef- distically. ficacy of the propaganda of tyranny is not a byprod- uct of novel technologies. It is rather, historically, the Is propaganda the use of words to skew debate? It chief obstacle to the stability of democracies. What really is not possible to use any word without “skew- we see in Eastern Europe today, for example, is the ing debate” in some way. In his essay, “General Se- fragility of democracy when confronted with some of mantics and Propaganda,” published in 1939, S. I. its chief obstacles. Hayakawa writes:

“In fact, there is nothing that can be named, let alone described, without invoking the SECTION II: PROPAGANDA, IDEOLOGY wraiths of an entire contextual system. AND DEMOCRACY What is ‘money’? What is a ‘house of cor- Plato and Aristotle both regarded stability as a vital rection’? What is a ‘professor’? What is a metric by which to evaluate political systems, though ‘musician’? … a ‘tom-boy’? … a ‘mortgage’? they differed on their judgments about democracy. 1 … a ‘cat’?” Plato’s Republic is about proper governance of “the ” and “the soul,” and includes a description of “the

ACPD | In Defense of Truth, and the Threat of Disinformation 73

characteristics of democracy,” such as “the city’s tol- The equal participation of all citizens in the formation erance.” In summary, “it wouldseem to be apleasant of the policies that will be adopted and fairly applied constitution, which lacks rulers and not variety and lends the system its stability. Aristotle also emphasiz- whichdistribut es asort of equality to both equals and es democracy’s epistemic virtues, arguing that open 4 unequals alike.” and honest cooperative deliberation about policy be- tween all citizens yields better results, in the form of A culture whose central value is liberty will lead to wiser policy, further strengthening the stability of the sweeping social equality. In a democratic city, stu- system. Democracy requires a clean public square. dents in the academies challenge their teachers. A democratic culture equalizes those who are natu- Plato’s democratic city is based upon a notion of liber- ral-born and immigrant; in such a system “[a] res- ty as unconstrained freedom to satisfy one’s desires, ident alien or a foreign visitor is made equal to a freedom from the limitations of customs and tradi- citizen.” Democracy is inconsistent with enslaving tions. Aristotle’s conception of democracy, by con- others. And in a democracy, there is equality between trast, allows democratic societies to have communal 5 men and women. values. However, this is possible only if all citizens freely and equally participate in the decision to adopt Socrates recognizes that the flourishing of liberties, them, decisions that must be continually revisited. the diversity of practices and customs, and social Participating equally in such decisions is, for Aristo- equality, may seem attractive. However, he urges us tle, genuine freedom. to attend to its risks. People are not naturally inclined to self-governance, “always in the habit of setting up Contemporary liberal democracies differ from these one man as their special champion, nurturing him conceptions of democracy in at least two ways. First, and making him great.”6 Democracy also creates a they incorporate essential insights of Christianity,

“Plato sees in democracy’s ideal of the free- dom of speech the cause of its potential downfall. ”

vast amount of resentment, due to the social upheav- such as the concept of human rights. Secondly, they al required by prizing freedom and the attendant involve elected representatives to act on behalf of our costs to traditions, customs and hierarchies. best interests, tasked to deliberate with one another reflectively, openly and truthfully, with willingness to Plato sees in democracy’s ideal of the freedom of changing their minds and compromise. speech the cause of its potential downfall. Pressure for freedom and equality leads to resentments of fel- American democracy differs in a significant way low citizens, as will the inevitable hypocritical use of from most other Western democracies, which make these ideals (e.g., when the ideal of liberty is used to Plato’s concerns particularly relevant. Democracies justify corruption). These resentments can be exploit- throughout the world, in the words of Jeremy Wal- ed by outside forces to stoke fear of fellow citizens. dron, have the “conviction that a liberal democracy must take affirmative responsibility for protecting Since tyranny is liberal democracy’s greatest enemy, the atmosphere of mutual respect for its citizens.” the propaganda of tyranny characteristically takes But our Constitution provides the broadest protec- the form of undermining propaganda, and what is of- tions for speech in the political arena. ’s first ten referred to these days as disinformation. amendment bans hate speech; our first amendment protects it. If Plato is right, with the rise of ubiquitous, Aristotle was more sanguine. In Aristotle’s demo- mobile connectivity, the global public sphere is at risk cratic city, all citizens participate in the formation of of being overrun with competing resentments from the laws by which they are governed, an activity that around the world. for Aristotle was the purest expression of freedom.

74 ACPD | Can Public Diplomacy Survive the Internet?

There is much attention that has been given to the Aristotle argues that a society in which each citizen force of technology; and it is true that we have seen is fully represented in public debate will not lead to a a new way to target specific voters by ideology by breeding ground for anti-democratic resentment. If observing their online habits. But we also face an old Aristotle is right, the greatest advertisement for our problem in new form. We speak now about how the democratic system abroad is afullandopencommit - internet has unleashed the tide of free expression, menttodemocraticparticipation by all ofour citizens. bringing with it supposedly novel dangers. Yet Victor Toadv ertisedemocracy is toadv ertisea system with Klemperer, in his 1957 book The Language of the Third Re- easy access to the ballot box, where public disputes ich, writes, about the Weimar Republic: are aired openly in an atmosphere of transparency. Hypocritical employment of ourvalueswill be seized “The Republic, almost suicidally, lifted all upon by our adversaries as evidencethatdemocratic controls on freedom of expression; the values areonly ever masksforinjustice. National Socialists used to claim scornfully that they were only taking advantage of the rights granted to them by the constitution SECTION III: IN DEFENSE OF TRUTH when in their books and newspapers they mercilessly attacked the state and all its in- The eminent ethicist Stephen Darwall describes a stitutions and guiding principles using ev- well-constituted democratic society as one “in which ery available weapon of satire and belliger- people are answerable to one another for their con- ent sermonizing. There were no restraints duct … one that values public inquiry, getting at the whatsoever in the realm of the arts and sci- truth behind social appearances and ‘speaking truth ences, aesthetics and philosophy. Nobody to power’ … Whenwe … respect allequally … wecom - was bound to a particular dogma or ideal mit ourselves to a mutual accountability that implicit- 9 of beauty, everyone was free to choose. ly honors fact over appearance.” This motley intellectual freedom was cele- brated as a tremendous and decisive leap Truth underlies the democratic ideal of equal re- 7 spect. Without truth, there is no way to speak truth to forward compared with the imperial age.” power. Truth underlies dissent. Without truth, there As we have seen, Plato is clear-eyed about the risks is no way to dissent by appealing to facts that under- that certain forms of propaganda pose to liberal mine the authority of a leader. Truth underlies trust. democracy; free expression allows for the airing of Without trust, our institutions cannot function; their views that inflame and divide the public against one authority merely will rest on power. That is not dem- another, leading to tyranny. Nor was this point un- ocraticauthorit y. known to democracy’s greatest enemies in the 20th century. said freedom of expres- Democratic and cooperative systems depend on sion “will always remain one of the best jokes of de- truth, because truth underlies equal political equality. mocracy, that it gave its deadly enemies the means by Truth and falsity, indeed reality, are the referees in the 8 public arena. If the public arena is guided by truth, which it was destroyed.” someone lacking material power can nevertheless The contemporary democratic system of the West is be a political equal, since they can appeal to facts hardly the first to face challenges posed by its most against those with more material power. Truth is the cherished values, nor will it be the last. The virtues essential backbone of a democratic society. of democracy—the ever-expanding circle of liberty, encompassing women, religious minorities, gays and Given the foregoing, what, then, is the shape and form other groups—are evident to many. But philosophers of disinformation? Characteristically, disinformation from Plato through Hobbes and Rousseau have ar- takes the form of the undermining of reality. Exam- gued that its commitment to liberty is likely to render ples in include efforts to weaken public confidence in it less stable than authoritarian systems. Yet, this very democratic institutions, or the establishment news weakness is also its greatest strength. sites using false information to undermine legitimate news institutions. Media outlets masquerading as Aristotle, in the Politics, paves the way for democrat- news, like the numerous portals that popped up in ic stability, arguing that a genuine commitment to Macedonia in 2016, are perfect examples of this. They equality makes society less susceptible to revolution. appeal to the ideal of objective truth to undermine Aristotle’s conception of equality is political equality. objective truth.

ACPD | In Defense of Truth, and the Threat of Disinformation 75

CONCLUSION part, driven by the modern media ecosystem (the or- igins of which are detailed in Sam Ford’s essay in this Public diplomacy practitioners have their work cut report). out for them, but should also feel reassured in that the challenges we face today are, to a large extent, Encouraging civil, respectful discursive engagement rooted in thedeephistory of humancivilization.Dem - needs to also be a priority, given the threat of uncivil ocratic systems, by the very nature of being open discourse presents to democratic systems. Empha- societies, are more vulnerable to foreign efforts to sizing this point in exchange program curriculum spreaddisinformation.Moderntechnologiesamplify should be prioritized, for example. Embassies and in- this threat, at least at first. ternational broadcasters can both contribute to this through their public programing around the world. Insofar as public diplomacy aims to support dem- Models of democratic debates on important public ocratic systems of governance abroad, emphasis policy issues that embody respectful, fact-based back must be placed on restoring confidence in the value and forth and consensus building are a good way to of widespread public participation in politics, and remind foreign citizens, and ourselves, that discur- a faith in transparent to be capable and/ sive disagreements need not aggravate social cleav- or redeemable in serving the public. In short, public ages. diplomacy needs to confront the cynicism that is, in

ENDNOTES

1. S.I. Hayakawa, “General Semantics and Propaganda.” ThePublic Opinion Quarterly 3, no. 2 (1939): 197-208. 2. Jason Stanley, How Propaganda Works (Princeton: Princeton University Press, 2015). 3. Peter Pomerantsev, “The Hidden Author of Putinism: How Vladislav Surkov invented the new Russia”, The Atlantic, November 7, 2014. 4. Plato’s Republic, p. 558b/c. 5. Plato’s Republic,p.562e/563b. 6. Plato’s Republic,p. 565d. 7. Victor Klemperer, The Language of the Third Reich (Max NiemeyerVerlag, Halle, 1957). 8. Paul Jospeh Goebbels was a German politician and Reich Minister of Propaganda in from 1933 to 1945. Goebbels is quoted in Karl Dietrich Bracher, Manfred Funke, and Hans-Adolf Jacobsen, Nationalsozialistishe Diktatur, 1933-1945: Eine Bilanz (Bonn: BundeszantralefurPolitischeBilding,1983),p. 16. 9. Stephen Darwall, Honor, History, and Relationship: Essays in Second-Personal Ethics II (Oxford, Oxford University Press, 2013).

~ ~11r J ~ a~11r UNITED STATES INFORMATION AGENCY Max, Peter, 1937, from the Library of Congress of Congress the Library from 1937, Max, Peter, 1 PUBLIC DIPLOMACY AND STRATEGIC NARRATIVES

By Laura J. Roselle, Professor of Political Science and International Studies, Elon University

This essay makes five interrelated arguments about how international order is structured, who the efficacy of public diplomacy efforts: (1) public di- the players are and how the system works. plomacy cannot be understood without understand- For example, a Cold War narrative suggests ing the importance of narratives in social and polit- a bi-polar international ordermark ed by con- ical relations; (2) public diplomacy involves shared flict between two competing powers (and narratives created with publics abroad; (3) a new most often even now these countries are communication ecology undergirds public diploma- identified as the United States and the Rus- cy efforts; (4) the “post-truth society” is a narrative sianF ederation). that focuses attention away from public diplomacy; and (5) multi-method analyses are needed to under- • Identity narratives describes the political ac- stand narrative creation, diffusion and effects. tor, what values it has and what goals it has. Narratives about what led to the creation of NATO,its values and what goals it has today, would be an example. PUBLIC DIPLOMACY CANNOT BE UNDERSTOOD WITHOUT UNDER- • Policy narratives set out why a policy is need- ed and how it will be implemented. This in- STANDING THE IMPORTANCE OF NAR- cludes narratives that seek to persuade peo- RATIVES IN SOCIAL AND POLITICAL ple to support a particular policy or action. RELATIONS. Usually policy narratives reference, at least A narrative is “a sequence of events tied together by implicitly, identity and system narratives to a plot line” and is a social product produced within a set the policy within a context to enhance its social context.2 Narratives are central to the way hu- legitimacy. man beings think. They are important to people as It is important to recognize that these different types conceptual organizing tools that allow individuals to of strategic narratives can complement or under- understand one another within a particular context. mine each other. If a policy, for example, does not The importance of narratives is recognized by nu- seem to be in accord with a state’s identity narratives, merous fields including political science, psychology, support for that policy may suffer as a result. In addi- anthropology and sociology. tion, actions taken by a state can undermine broad- er narratives that are meant to support longer-term Strategic narratives are defined as “a means for po- goals about constructing a shared understanding of litical actors to construct a shared meaning of the how the international system should function. For ex- past, present and future of politics in order to shape ample, a post-Cold War system narrative that might 3 thebehavior of otheractor s.” have incorporated a greater reliance on cooperation and diplomacy was undermined by U.S. and Russian Debates over the environment, energy provision, re- 4 military actions in Iraq and Chechnya, respectively. form of global institutions, security and power tran- sition can all be understood through the lens of stra- tegic narrative. Each proposal to confront problems of the international community is driven by underly- PUBLIC DIPLOMACY AS SHARED ing narratives that may be strategically deployed by NARRATIVES actors. This is a complex endeavor as the world is A dominant strain of academic literature makes some marked by contestation over narratives, but a com- crucial points about public diplomacy. First, public di- pelling narrative may become a power resource on plomacy is designed to “foster mutual trust and pro- its own. ductive relationships,” typically for a strategic pur- 5 There are three different types of strategic narra- pose. This implies that the goal of public diplomacy is the enhancement of . Rather than focusing tives that we identify: on hard power as the ability to coerce or induce an- • International system narratives describe other to do something, scholars and politicians often

78 ACPD | Can Public Diplomacy Survive the Internet?

say that soft power is the ability to influence others timing and audience as political actors (including in- through the attraction of culture, values, narratives dividuals), non-state actors, NGOs, terrorist cells and and policies—which are soft power resources.6 A dif- international organizations have access to communi- ferent way to think about soft power is as the ability cation technologies that will reach a vast audience.8 to create consensus around shared meaning. Creat- Soft power may be a resource on which leaders can ing a shared consensus, however, can be much more draw; however, skilled political leadership is still re- difficult than using hard power to force another to do quired as soft power is employed in foreign policy and something, but there is reason to believe that the re- . As Richard Holbrooke once sults can be more lasting. Soft power resources may commented to Michael Ignatieff, “Diplomacy is not set the stage for shared understandings and this en- likeche ss. . . It’smore like jazz—a constant improvisa- “Creating a shared consensus, however, can be much more difficult than using hard power to force another to do something, but there is reason to be- lieve that the results can be more lasting.”

hances other types of interactions, including oppor- tion on a theme.” The ability to devise and implement tunities in enterprise and coordination of shared hu- a coherent strategy rests on the vagaries of events man goals, such as the alleviation of human . and the views of others.9 It also rests on collaboration rather than unilateral, one-way communication. Second, public diplomacy implies listening and cre- ating narratives with foreign publics. This suggests that the strategy of narrative construction should be “POST-TRUTH SOCIETY” AS A STRATE- collaborative. Public diplomacy does not imply that a narrative is constructed in isolation for political rea- GIC NARRATIVE sons to be injected into a foreign population. As act- Yet, a review of the popular media and some scholar- ing under secretary for public diplomacy and public ship done on new communication technologies, sug- affairs, Ambassador Bruce Warton notes: “Crafting gests the idea—the narrative—that we live in a “post- and effectively putting forth that narrative with for- truth society.”10 This narrative, by asserting that there eign publics is the real challenge of public diplomacy is no desire for, or focus on, “truth,” actually under- 7 today.” mines the ability to construct strategic narratives based on shared understandings of international How are narratives constructed with foreign pub- order and policy. The post-truth narrative is, itself, lics? That is the crucial question that should guide both strategic and problematic from the perspective thinking on public diplomacy. of conducting effective and ethical public diplomacy.

Instead of a post-truth society, it may be more apt to A NEW COMMUNICATION ECOLOGY say that we are living in a world with more narrative contestation. There are more ways to construct and UNDERGIRDS SOFT POWER POSSIBIL- share narratives. This does not necessarily mean that ITIES the truth is less important, but this does point to the The importance of understanding strategic narra- need to recognize that public diplomacy will succeed tives as being mutually constructed is even more only when multiple narratives are recognized and un- important in our new communication ecology. New derstood. This suggests that it is important to under- means of communication and the greater ability of stand how different people and groups experience people around the world to access these new com- the world in different ways, and that the acknowl- munication technologies shape public diplomacy to- edgement of multiple perspectives and narratives day. Elites have lost relative power over information, can undergird the legitimacy of public diplomacy. We should note that there are still facts in the world, and

ACPD | Public Diplomacy and Strategic Narratives 79

lies or falsehoods can and should be challenged, but U.K. narratives about potential policies towards Syria multiple perspectives and narratives may be helpful in 2013–2014, six elite narratives were found in both in understanding an issue or policy. cases, but six differently constructed U.K. respon- dents’ narratives and four differently constructed It may also mean that people in democracies need U.S. respondents’ narratives were found.13 That is, to become more skilled in reading power in commu- there were patterns to respondent narratives but nication messages. Experience in the Soviet case is they did not replicate or match elite narratives. In the informative. In the people were exposed U.K. respondents’ narratives there was agreement in to the repetition of media messages controlled by the a number of narratives that the international com- government, but we know that the hypodermic mod- munity has a responsibility to uphold international el of media effects did not work in this context.11 Sovi- law (system), but whether or what action to take was et citizens learned to “read” the media messages not unclear (policy), and British leadership (identity) was as presenting the “truth,” but as presenting the sto- supported strongly in only one narrative. In the U.K. ry that the powerful wanted to project. In the Soviet case, most respondent narratives opposed interven- case, overbearing, controlled messages did not work tion saying it might do more harm than good—which in the long run. People learn to read power relations. was shared in many of the elite narratives found in the House of Commons debate—but there was dis- That citizens in the West might not be good at this agreement about what that might mean for the U.K. is interesting, but hardly surprising—and it may be and the world more broadly (identity and system nar- changing. Evidencefrom Q-sorts,12 done in issue ratives). areas as diverse as the environment and U.S./U.K. policies discussions about Syria, show that people So, it is important to note that there may be different do not swallow narratives whole, but craft their own narratives even among those who may support a spe- narratives from the broadcloth of existing narratives cific policy. In Q-methodology consensus statements and from theiro wn livedexperiences. are those that are shared between different narra- tives. We found no consensus statements among U.K. respondents’ narratives in the 2013–2014 study. This MULTI-METHOD ANALYSES ARE NEED- confirms the picture of U.K. public attitudes to for- eign affairs being particularly ambivalent during this ED TO UNDERSTAND SOFT POWER period of time. In the U.S. case, there was consensus There are many new ways of monitoring, measuring around six basic statements about foreign affairs and evaluating the impact of strategic narratives in within the four U.S. respondents’ narratives. For ex- a new media environment. Examples of quantita- ample, all four narratives shared disagreement with tive measures include: analyses of reach, time spent the statement that U.S. intervention in Syria would with online content, number of Twitter followers and radicalize American Muslims and bring terrorism retweets and positivity of sentiment. However, these to the streets of the United States. The consensus may not capture the quality of engagement and what statements give a perspective on shared component follows fromit. Additionally, thesemay notcapturethe parts of what may be different narratives. Looking for patterns of public narratives that do not match elite similarities in system and identity narratives among narratives. If public diplomacy is to be most effective those who disagree on policy, and looking for differ- in increasing U.S. attractiveness, strategic narratives ences in system and identity narratives among those must be constructed with an understanding of sys- who agree on policy, offer insight into future support tem, identity and policy narratives within the public and legitimacy for policy proposals. realm. For example, a policy narrative is usually tied to system and identity narratives that seek to place In the U.S. case, no respondents’ narrative support- the policy within a specific context. Additional qual- ed the statement that the United States must act as itative research is needed—including focus groups, leader of the international community, although one interviews and participant observation. A multifac- supported the statement that the world is looking to eted approach is needed to fully understand the use the United States for action. One narrative strongly and effectiveness of public diplomacy. supported the idea that the 2003 Iraq war showed the difficulty of using military intervention, while all For example, using Q-sort methodology can show narratives agree, to varying degrees, that interven- how policy narratives may differ between elite and tion could lead to escalation. There was strong sup- the public. For example, in an analysis of U.S. and port for humanitarian concerns in one narrative. Two

80 ACPD | Can Public Diplomacy Survive the Internet?

narratives in the study agreed that domestic politics speak to, or at least acknowledge, those underlying was driving U.S. policy, but these narratives did not system and identity narratives. The Russian Achilles’ include support for unilateral congressional action heel is that the Russian system and identity narra- or support for calling President Obama an imperial tives are exclusive, shutting others out by asserting president. Knowing something about identity narra- that those with power should do what they want. U.S. tives (what the United States is and should be) and public diplomacy—conceived as listening and collab- system narratives (the structure of the international orative—avoids that Russian vulnerability. system itself) allows a more refined understanding of support for specific policies. Overall, public diplomacy should focus on under- standing system, identity and policy narratives with It is important to understand how public narratives audiences around the world. In addition, audiences change over time. It is also important to recognize will be more discerning about media messages that there are multiple (but not an unlimited num- when they appreciate the power relations involved ber of) public narratives, and that they may or may in media messages. Finally, multi-method analyses not mirror elite narratives. Understanding system are needed that focus on audience narrative con- and identity narratives would allow those involved in struction in a nuanced and subtle way. public diplomacy to construct policy narratives that

ENDNOTES 1. Part of this text is derived from Laura Roselle, “Written Testimony to the U.K. House of Lord’s Select Committee on Soft Power and U.K. Influence.”

2. Cristina Archetti, “Narrative Wars: Understanding Terrorism in the Era of Global Interconnectedness.” In Forging the World: Strategic Narratives and International Relations. University of Michigan Press, 2017, 218-245, 220-221.

3. Alister Miskimmon, Ben O’Loughlin, and Laura Roselle, “Forging the World: Strategic Narratives and International Relations.” University of Michigan Press,2017.

4. Laura Roselle, “Strategic Narratives and Great Power Identity,” in Alister Miskimmon, Ben O’Loughlin and Laura Roselle, eds. Forging the World: Strategic Narratives and International Relations. (Ann Arbor: University of Michi- gan, 2017, 56-84).

5. https://uscpublicdiplomacy.org/page/what-pd

6. Nye sets out culture, values, and policies as important resources of soft power. http://www.foreignpolicy.com/ar- ticles/2006/02/22/think_again_soft_power Of course, these are not distinct, as all are mutually constructed. I add narratives to the list of soft power resources. Conceptually “narratives” focus attention on communicative process- es associated withsoft power.

7. https://www.state.gov/r/remarks/2017/268592.htm , emphasis added.

8. Robin Brown, “Getting to War: Communication and Mobilization in the 2002–03 Iraq Crisis,” in Media and Conflict in the Twenty-First Century, edited by Philip Seib (New York: Palgrave, 2005); Andrew Chadwick, The Hybrid Media System: Politics and Power (Oxford: Oxford University Press, 2013); Monroe E. Price, Media and : The Global Information Revolution and Its Challenge to State Power (Cambridge: MIT Press, 2002)

9. Miskimmon, O’Loughlin, and Roselle, 2013, 69.

10. For example, see: Francis Fukuyama, “The Emergence of a Post-Fact World,” Project Syndicate, Jan. 12, 2017, https:// www.project-syndicate.org/onpoint/the-emergence-of-a-post-fact-world-by-francis-fukuyama-2017-01; Peter Pomerantsev, “Why We’re Post-Fact,” Granta, July 20, 2016, https://granta.com/why-were-post-fact/; Kathleen Hig- gins, “Post-Truth: A Guide for the Perplexed,” Scientific American, Dec. 5, 2016, https://www.scientificamerican.com/ article/post-truth-a-guide-for-the-perplexed/

ACPD | Public Diplomacy and Strategic Narratives 81

11. See the work of Ellen Mickiewicz on this point.

12. Q-methodology allows the study of this remixing of narratives. The aim is not to understand how individuals process information per se, but rather to see how narratives morph and change in the midst of contestation and competition to form new common narratives. Respondents are asked to assess various component parts of narratives (Q-sort) and factor-analysis is used to look for patterns in how new/different narratives are constructed. Ben O’Loughlin, Laura Roselle, and Alister Miskimmon. “Public Narratives about Syria: A Q-Sort Analysis in the U.K. and U.S.” Paper presented at the ISAAnnualConference, NewOrleans, 18–21 February 2015.

13. The Q-sort sought to understand youth narratives about Syria policy in each country. Ben O’Loughlin, Laura Roselle, and Alister Miskimmon. “Public Narratives about Syria: A Q-Sort Analysis in the U.K. and U.S.” Paper presented at the ISAAnnualConference, NewOrleans, 18-21 February2015.

Excerpt from Illustration by Jason Reed (Fair Use) CRAFTING RESILIENT STATE NARRATIVES IN POST TRUTH ENVIRONMENTS: UKRAINE AND GEORGIA

By Vivian S. Walker, Professor of National Security Strategy, National War College

The rapid evolution of communications paradigms, interspersed with long stretches of conflict. Russia as well as vulnerabilities created by unlimited and un- and Turkey, for example, have treated Georgia as a filtered access to information, challenge a state’s abil- pawn in a series of attempts to assert regional domi- ity to craft a credible narrative about its interests and nance, much as Ukraine has been subject to a series aspirations in the service of its strategic goals. 1 First, of invasions and occupations by , the Crimean difficulty in discerning objective fact from subjective Khanate, Hapsburg Austria and Tsarist Russia. Both belief in a “post-truth” information environment de- countries enjoyed a taste of independence before be- grades narrative authenticity.2 Moreover, the erosion ing swallowed into the Soviet Union in the aftermath of public trust in state institutions and traditional of the Russian revolution. media sources further damages a state’s capacity to make its case in the public sphere. Following the collapse of the USSR, Georgia and Ukraine began the slow process of democratic insti- Russia has taken advantage of this overloaded and tution building and political integration with Western compromised information space to launch punitive institutions. Georgia’s 2003 Rose Revolution, which disinformation campaigns against former satellite resulted in a peaceful transition of power, was her- states seeking lasting relationships with Euro-At- alded as a “new wave of democratization” for the lantic institutions. Russian information attacks force region.4 Similarly, the 2004 Orange Revolution in these vulnerable emerging democracies to confront Ukraine upheld and validated the power of the elec- existential questions about national identity, values toral process and civil resistance. But Russia’s 2008 and models of governance. To neutralize the toxic invasion of Georgia and subsequent of and often destructive effects of Russian propaganda, South Ossetia and Abkhazia, followed by the 2014 an- targeted countries must project a coherent, consis- nexation of Crimea, highlighted the fragility of these tent account of their unique political, economic and gains. Today Georgia, like Ukraine, is a country under security assets. This counter narrative must also es- actual Russian occupation. Their sovereignty has tablish the state as a resilient security and economic been compromised, and the threat of sustained or power in the region. renewed conflict with Russia has limited and simulta- neously polarized, their foreign policy options. At the A comparison of Russian disinformation effects in same time, both countries remain at war in the infor- Georgia and Ukraine offers useful insights into the mation space, vulnerable to Russia’s adroit manipula- challenges associated with the creation of viable tion of facts and ability to exploit audience paranoia statenarrativ es in a post-truth environment. Russia’s and predilections. weaponization of information has recently attracted a greatdeal of internationalscrutin y, especially in the aftermath of Putin’s triumphal annexation of Crimea RUSSIAN DISINFORMATION EFFECTS: and the occupation of two Eastern Ukrainian prov- inces.3 Less well documented, but equally troubling, IDENTITY is the ongoinginformation war being waged in Geor- Into that space between East and West, between tra- gia. Russia’s 2008 invasion, in which it took control ditional and modern cultures, between illiberal and of two Georgian territories, provides a chilling coun- liberal political institutions, Russia inserts an insidi- terpoint to its powerful, and potentially destabilizing, ous and potentially undermining series of messages disinformation campaign to bring Georgia back into about the supremacy of the “Russian World.” These itssphere of influence. include a call for a return to the mythologized ver- sion of a “Greater Russia;” a reminder of the target Historically Georgia and Ukraine have been at the country’s place historical and cultural place in the mercy of aggressive regional powers and competing Russian world; the promotion of Euro-skepticism religious and cultural influences. For centuries, both along with an effort to discredit the target country’s countries experienced brief periods of sovereignty European (EU) and Euro-Atlantic (NATO) aspirations; 84 ACPD | Can Public Diplomacy Survive the Internet?

a rant against an aggressive and hostile “West” that gia, which turns on the question of national identity threatens Russian’s regional security and economic and language, illustrates the uniqueness of the Geor- interests; a tendency to blame current conflicts and gian case. The Russian narrative attacks on Ukraine global economic threats on selfish Western nations suggest that to be Russian is vastly better than to be corrupted by their national interests; and an appeal Ukrainian, to which the Ukrainians respond with de- to a pan-Slavic orthodoxy as an antidote to corrupt fiant, inspirational messaging in support of their na- and overbearing Western values. 5 tional identity.7 When it comes to Georgia, however, Russia blurs and softens the boundaries of nation- As part of its anti-Western discourse, Russia’s broad al character—making it difficult to discern what it campaigns focus on the consol- means to be Georgian. At the same time the Russian idation and spiritual repatriation of ethnic Russian narrative does not, as a rule, denigrate Georgia’s na- minorities, based largely upon the rationalization of a tional identity, unlike its evident display of contempt shared identity. The striking similarities between the for Ukraine’s political, social and economic attributes Ukrainian and Georgian experiences of identity driv- and consistent descriptions of its leadership as “na- en disinformation campaigns typify post-Soviet state tionalists, neo-Nazis, Russophobes and anti-Sem- 8 vulnerability to Russia’s revisionist resurgence. Both ites.” countries are linked to Russia by shared borders and a long history of political, economic and religious op- The difference in narrative description of national pression, not to mention occupation. Following the identity is reinforced by language. In Ukraine, home collapse of the former Soviet Union, Georgia, like to a sizeable ethnic Russian minority, propaganda ef- “Russia’s subtleappropriationofGeorgianand Ukrainian national identities originates in Sovi- et efforts to control its minority populations.” Ukraine, has attempted to repudiate its Soviet legacy forts are almost entirely in Russian and consciously and establish itself as a nation built on constitutional play up themes of ethnic isolation, cultural devalua- principles. tion and feelings of disenfranchisement.9 The Rus- sian narrative actively portrays Russian minorities Russia’s subtle appropriation of Georgian and in Ukraine as victims of government sponsored vio- Ukrainian national identities originates in Soviet ef- lence and encourages pro-Russian separatist efforts forts to control its minority populations. The USSR to discredit and even destabilize the ruling party. devalued the concept of ethnic identity and re- pressed the spread of ethnically motivated political In Georgia, however,ethnic Russiansonly make up 1.5 nationalism by replacing “nationalattachmen ts” with percent of the population, so the target for Russian generic (and artificial) values of solidarity and frater- propaganda efforts is almost exclusively Georgian.10 nity.6 Removing ethnic singularity from the political In fact, the pro-Russian voice in Georgia is Georgian.11 lexicon enabled the Soviets to preempt radicalized The Russian narrative does not attempt to appeal to discourse. Today Russia disinformation efforts in a disenfranchised Russian minority, nor does it dis- both countries are framed in a set of fuzzy assertions credit current leadership. Rather it promotes pro about a shared historical and religious heritage. Georgian sentiments—albeit on Russian terms—and Theseeffortsincludeglossing over Stalin’s eviscera- lays the foundation for the claim that to be Georgian tion of the Georgian Orthodox Church or the fraught is to be Russian—or at least not European. history of multiple Russian imperial annexations of Ukrainian territories. The resultant narratives are laden with false claims to shared cultural and spiri- RUSSIAN DISINFORMATION EFFECTS: tual ethnicity. VALUES However, an important distinction between the Rus- The pro-Russian, anti-European narrative in the sian disinformation campaigns in Ukraine and Geor- countries of the former Soviet Union asserts the ACPD | Crafting Resilient State Narratives in Post Truth Environments: Ukraine and Georgia 85

existence of a shared set of deeply held, historically perverse mode of life” by the West and claims that as based and culturally embedded shared values. Inev- part of the package of the EU Association Agreement, itably, the Russian narratives portray the so-called Ukrainian and Georgian citizens must embrace these “morally bankrupt West” in unflattering terms and corrupt values.16 Local, pro-Russian political leaders play to deep-seated fears and prejudices held by tar- reinforce this homophobic narrative, conveying ag- get audiences. The Russian narrative then offers the gression toward and contempt for “LGBT people or 17 solace of a morally superior, pan-Slavic orthodoxy. their lifestyle or culture.” The battle for the narrative in these countries plays out in a dynamic of opposing political, social and cul- tural norms. RUSSIAN DISINFORMATION EFFECTS:

Much of the dominant imagery in the Russian nar- MODELS OF GOVERNANCE rative recalls past glories and recasts Russian impe- The Russian narrative derives much of its illiberal, rial dominance in the region as examples of benign anti-democratic impetus from its national security stewardship. These narratives also retell Georgian strategy, which describes a series of politically moti- and Ukrainian history in terms that laud Russian mil- vated threats to Russian sovereignty: itary and political intervention. In reality, Russia has waged a series of wars in the region, using Georgia “The activities of…foreign and internation- and Ukraine as a staging ground for its exploits and, al nongovernmental organizations, and fi- in the process, absorbed territory and subjugated nancial and economic structures and also citizens. The Russian version of these events, how- individuals, focused on destroying the unity ever, tells a story of benevolent protectionism rather and territorial integrity of the Russian Fed- than territorial occupation. eration, destabilizing the domestic political and social situation—including through in- In addition to retelling history, the Russian narra- citing ‘color revolutions’—and destroying 18 tive in Georgia and Ukraine posits the existence of Russianreligious and moral values.” a closed community, hermetically sealed within the boundaries of greater Russia. For Georgia in partic- The Rose and Orange Revolutions, which opened ular, the EU and the NATO represent a direct threat the door to increasing liberal democratic models of sovereignty and territorial integrity: “The EU Com- governance, posed an existential threat to Russia. No mission” will “define [Georgia’s] way of life, economic wonder that much of the Russian propaganda effort issues [and] policies…. This Commission is consid- in Georgia and Ukraine attacks attempts to pursue ered the parallel government of Georgia.”12 Mean- further democratic reforms. A commentator on a while, as a consequence of a deepening relationship pro-Russian Georgian language television station ar- with NATO, Georgia will become “a transit territory… gued, for example, that: with a NATO camp training international terrorists.”13 Similarly the Russian narrative calls for the reunion “As long as the U.S. is in the region of the of Russia and Ukraine through the embrace of their Caucasus, the dirtiness like the so-called 14 “shared” culture and history. Revolution of Roses, Orange Revolution and other troubles are very possible. They The Russian disinformation narrative in Georgia, were invented to strengthen [the] Ameri- 19 as in Ukraine, touts the primacy of the Orthodox canregime .” Church, including the propagation of extremely con- servative attitudes about gender equality, sexuality By contrast, Russian propaganda narratives in Geor- and tolerance. This narrative is particularly powerful gia and Ukraine assert Putin’s political invincibility, in Georgia, where prominent Georgian political and and the futility of resisting Russia’s might.20 Russian religious figures routinely claim that the West is in a occupation of their territories reinforces this mes- “fight against Orthodox Christianity.” In other words, sage. the only way that Georgia can be “saved” from a god- 15 less West is by “partnering with Orthodox Russia.” However, the anti NATO narrative plays out differently in the two countries. For Ukrainian audiences, Russia In championing the morays of the Orthodox church, portrays NATO as a purely aggressive entity, bent on the Russian narrative frequently alludes to Europe’s encircling and destroying Russia.21 By contrast, in “legalization” of “homosexuality, pedophilia and a Georgia, Russian propaganda draws on fears that

86 ACPD | Can Public Diplomacy Survive the Internet?

the West has abandoned the Georgian people. The strategic priorities. Narrative resilience also requires fact that Georgia has not been invited to join NATO, coordination across government on messaging con- for example, becomes, in Russia’s nihilistic narrative, tent and dissemination, both internal and external. proof that the West does not have confidence in Geor- When appropriate, messaging should be synchro- gia as a security partner. Instead, the Russians argue, nized with nongovernmental organizations (NGOs) it is better for Georgia to embrace its neutrality as a and media sectors, at home and abroad. More indig- “non-Bloc” state.22 Finally, while Ukraine is already in enous programming content should be developed to active conflict with Russia, Georgia’s leadership fears project a truly national identity and shared values. the resurgence of open hostilities over South Osse- Existing legislation governing media and NGO licens- tia and Abkhazia and therefore has chosen not to run ing, ownership and financing must be improved and the risk of a public embrace of NATO. The subtext of implemented for greater political transparency. the Russian narrative in Georgia is simple in its ma- levolence—Georgia needs Russia to restore its terri- Next, the Ukrainian and Georgian governments torial integrity. must deepen their understanding of target audienc- es needs and interests in order to develop effective The Russian anti-EU narrative in both countries plays message content. Visually compelling and easily un- on rural economic vulnerabilities, as well as residual derstandable representations of strategic interests nostalgia among older citizens who remain nostalgic and potential must appeal to external and internal for the relative security and stability of life in former audiences, as well as local and international opin- Soviet Union.23 Unlike Ukraine, however, which re- ion makers and journalists. Finally, the government, tains a sizeable industrial base and technology sec- in cooperation with public and private sector insti- tor, Georgia’s economy is still largely agrarian and tutions, must build a regional and ultimately global depends primarily on agricultural outputs. Accus- network of journalists and news organizations that tomed to generous state subsidies and minimal prod- can support efforts to professionalize official media uct standardization under the old regime, Georgia’s output and expand outreach efforts. Such networks farmers and food processors must now contend with would also facilitate the systematic investigation and complicated EU trade export regulations and the re- exposure of the Russian state’s “weaponization” of in- ality of open market competition under the EU Free formation. Trade Zone. By contrast, Russia offers Georgia’s ag- ricultural producers immediate and unrestricted ac- These steps can diminish Russia’s narrative domi- cess to its own markets as well as membership in the nance in Georgia and Ukraine. But the emergence 24 less stringent Eurasian Economic Union. of a truly viable counter-narrative requires that both countriesofferrealisticassessmen ts of thecos ts and The Russians also regularly exploit challenges to the risks associated with Euro-Atlantic integration. Un- EU integration such as the Dutch failure to ratify the met promises about NATO membership are easily ex- Ukrainian accession treaty or the long delay in Geor- ploited, as are the stringencies of EU market access gia’s entry into the EU visa liberalization program. The and production requirements. Russian version of events suggested that the West did not want to open its doors to Georgia’s “criminal ele- For Georgia, the development of a consistent count- ments,” arguing that blocked a first-round de- er-narrative is further challenged by an apparent cision to grant Georgian visa liberalization because it ambivalence within current leadership about the re- “feared a spike of crimes committed by Georgians lationship with Russia and the West on all fronts—po- in Germany.”25 Even after the implementation of the litical, economic and military.26 This, in turn “create[s] visa regime, it was all too easy to characterize as yet a feeling of in society and contribute[s] to another instance in which Europe failed to behave ex- Euro-skepticism.”27 Finally, the absence of official dis- peditiously as Georgia’s advocate and partner. course about linkages to liberal, pro-Western agenda creates a narrative void, allowing Russia to depict it- self as Georgia’s only viable ally and champion.

BUILDING A COUNTER-NARRATIVE At the same time, the Ukrainian narrative, in particu- lar,shouldfocus on therepresentation of its potential Construction of a viable counter-narrative for Geor- as a regional economic and security partner, rather giaandUkraine in the post-truth environmentbegins than a recap of its past victimization. The current fo- with a clear, consistent and unified articulation of cus on the present crisis leaves no room for the pro-

ACPD | Crafting Resilient State Narratives in Post Truth Environments: Ukraine and Georgia 87

jection of a better future. Moreover, if left unchecked, intent to become a liberal “beacon of democracy”28 Ukraine’s healthy defiance of Russian can be compromised by its domestic political, economic easily morph into the projection of a form of ultra-na- and security vulnerabilities? Finally, both countries tionalism not in keeping with its image as a tolerant, must commit to a system of democratic governance pluralistic nation. consistent with stated values. But can they embrace “civic nationalism” and tolerance as long as the im- Before either country can arrive at a viable artic- petus for illiberal “blood patriotism”—e.g. the annex- 29 ulation of strategic intent, they have some difficult ation of their sovereign territories—remains? questions to answer. First, they must decide on their respective identities in the post-cold war political sys- Ultimately, the sustainability of the Georgian and tem. Can Ukraine transition from a largely defensive Ukrainian narratives in the global information space account of its grievances to a positive projection of depends on the will and capacity to shift from a its regional potential? Will Georgia continue to be a threat-driven reactive discourse to an opportuni- ty- beleaguered satellite of an imperious Russia or join based narrative that frames potential security and the ranks of nations vying to exert power in a com- economic benefits in terms that resonate with target plex media environment? audiences. At all costs their narratives must avoid the tyranny of the stark rhetorical choice between “furi- Then, both countries must live up to the values es- ous Russia” and the “disgraceful West.”30 Effective poused in their strategic narratives. Can Ukraine’s persuasion lies in nuance, and the ability to commu- government make good on the civic momentum of nicate the character and resilience of their national the EuroMaidan? Will Georgia’s post-independence identities, values and models of governance.

ENDNOTES 1. See, for example, Alister Miskimmon, Ben O’Loughlin, and Laura Roselle, Strategic Narratives: Communication Power and the New World Order, 2013.

2. Fukuyamadescribes “the emergence of a post-fact world, in which virtually all authoritativeinformation sources[ar e] called into question and challenged by contrary facts of dubious quality and provenance.” Francis Fukuyama, “The Emergence of a Post-Fact World,” Project Syndicate, January 12, 2017. https://www.project-syndicate.org/onpoint/the-emergence-of-a-post-fact-world-by- francis-fukuyama-2017-01

3. See, for example, Peter Pomerantsev and Michael Weiss, “The Menace of Unreality: How the Kremlin Weaponizes Information, Culture and Money,” a special report presented by The Interpreter, November 22, 2014 (New York: The Institute of Modern Russia), 12. http://www.interpretermag.com/wp-content/uploads/2014/11/ The_Menace_of_Unreality_Final.pdf. See also Vivian S. Walker, “State Narratives in Complex Media Environments: The Case of Ukraine,” Case 331, Institute for the Study of Democracy (Washington, DC: GeorgetownUniversit y, 2015).

4. Georgi Kandelaki, “Georgia’s Rose Revolution: A Participant’s Perspective,” United States Institute for Peace Special Report, No. 167, July 2006, 11. https://www.usip.org/sites/default/files/sr167.pdf

5. See for example, Lasha Tugushi, Threats of Russian Hard and Soft Power in Georgia, GMF European Initiative – Liberal Academy Tbili- si, 2015 http://www.ei-lat.ge/images/doc/threats%20of%20russian%20soft%20and%20hard%20power.pdf and Tamar Kint- surashvili, Anti-Western Propaganda: Media Monitoring Report, 2014-2015, Media Defense Foundation, Tbilisi, Georgia, 2015. http://www. media-diversity.org/en/additional-files/documents/Anti-Western_Propaganda_Media_Monitoring_Report.pdf. See also Analysis of Russia’s Information Campaign Against Ukraine, NATO StratComm Centre of Excellence, 2014 http://www.stratcomcoe.org/analy- sis-russias-information-campaign-against-ukraine.

6. See Natalie Sabanadze, “Georgia’s ethnic diversity: A challenge to state-building,” in The Making of Modern Georgia, 1918-2012, Stephen F. Jones, ed. (Routledge,2013),1 20-121,12 3.

7. See for example, “Heaven Admits No Slaves,” trailer for documentary film, July 26, 2014. https://www.youtube.com/watch?v=bO- wi13a6Hd4.

8. , “Address by President of the Russian Federation,” The Kremlin, Moscow, March 18, 2014. http://en.kremlin.ru/ events/president/news/20603

9. Cited in Lasha Tugushi, Threatsof Russian Hardand Soft Powerin Georgia, 12. Latvia—26.2 percent, Estonia—24.8 percent, Ukraine—17.3 percent.

10. Ibid.

88 ACPD | Can Public Diplomacy Survive the Internet?

11. Author Interview with Giorgi Kldiashvili, Director of the IDFI, Tbilisi, Georgia, September 13, 2016.

12. From Russian sourced media cited in Tamar Kintsurashvili, Anti-Western Propaganda: Media Monitoring Report, 2014-2015, 27.

13. Ibid, 30.

14. See Analysis of Russia’s Information Campaign Against Ukraine, NATO StratComm Center.

15. Cited in Tamar Kintsurashvili, Anti-Western Propaganda: Media Monitoring Report, 2014-2015, 41.

16. Ibid, 11.

17. Homophobia and Gender Identity, Media Monitoring Report 2014-2015, Media Development Foundation, Tbilisi, Georgia, 10-11. http:// mdfgeorgia.ge/uploads/library/Homophobia-ENG-web%20(1).pdf

18. From Chapter IV, “Ensuring National Security,” in The National Security Strategy of the Russian Federation, #683, December 31, 2015. Cited in Tamar Kintsurashvili, Assessment of the EU Integration Communication and Information Strategy and its Action Plan of the Govern- ment of Georgia: Survey Report, Media Development Foundation, Tbilisi, Georgia, 2016, 12. http://ewmi-access.org/wp-content/up- loads/2016/06/Research-Publication-ENG.pdf

19. From Obiektivi TV cited in Tamar Kintsurashvili, Anti-Western Propaganda: Media Monitoring Report, 2014-2015, 22.

20. Author interview with Tamara Chergoleishvili, Publisher of Tabula, Tbilisi, Georgia, September 14, 2016.

21. See Analysis of Russia’s Information Campaign Against Ukraine, NATO StratCom Center.

22. See “Kremlin’s Information War: Why Georgia Should Develop State Policy on Countering Propaganda,” Policy Paper, Institute for Development of Freedom of Information, Tbilisi, Georgia, August 22, 2016. https://idfi.ge/en/informational-war-of-krem- lin-against-georgia-the-necessity-of-having-state-policy-against-propaganda

23. Author interview with George Targamadze, Senior Fellow, Georgian Foundation for Strategic and International Studies (GFSIS), Tbilisi, Georgia, September 12, 2016.

24. Author interview with EU Delegation representatives, Tbilisi, Georgia, September 16, 2016.

25. “Hahn Confident on Ukraine, Georgia Visa Liberalization,” RFE/RL, September 3, 2016. http://www.rferl.org/a/hahn-confident- ukraine-georgia-visa-free-2016/27965380.html

26. Author interview with Ambassador David Sikharulidze, Director, of Georgia, Tbilisi, Georgia, September 13, 2016.

27. Tamar Kintsurashvili, Assessment of the EU Integration Communication and Information Strategy and its Action Plan of the Government of Geor- gia, SurveyReport , 9.

28. See text of President George W. Bush Freedom Square speech in Tbilisi, Georgia May 10, 2005, BBC News. http://news.bbc. co.uk/2/hi/europe/4534267.stm

29. In articulating a “vision of Ukrainian identity for the 21st century,” Ukrainian politician Svyatoslav Vakarchuk argued: “We need to stop building a state based on blood patriotism and begin building a state based on constitutional patriotism. We shouldn’t be united by a common past, heritage, blood or appearance, but by a common set of values, lifestyles, rules and a constitution.” Or, as the Economist paraphrased it—there is a need to “replace ethnic nationalism with a more civic sort.” Economist, “Front man: Ukraine’s rock star politician,” October 22, 2016. http://www.economist.com/news/europe/21709067-pop-star-tries-help-coun- try-war-reinvent-itself-front-man

30. “This God-given land is attacked by tanks from furious Russia and by asses from the disgraceful West.” Cited in Tamar Kint- surashvili, Anti-Western Propaganda: Media Monitoring Report, 2014-2015, 25.

ACPD | Crafting Resilient State Narratives in Post Truth Environments: Ukraine and Georgia 89

CC BY 2.0, USSR Political Poster from NichoDesign AMERICA’S STRATEGIC NARRATIVE AND A PATH FOR PUBLIC DIPLOMACY

By Markos Kounalakis, Visiting Fellow, Hoover Institution, Stanford University The underlying strategic narrative driving American assassination plots—citizens in developed and devel- foreign policy priorities for the past 70-plus years, oping nations looked to the United States as a land utilized time and again to encourage acceptance of of equality, political freedom and economic promise. Western values, is increasingly at risk. To be clear, They were willing, if not eager, to forgive American this is not the result of one administration’s poli- mistakes as temporary deviations from what was cy preferences over another’s. Rather, consensus otherwise a noble and promising vision of the world. around certain values and goals—good democratic This instinct to forgive speaks precisely to the power governance as a fundamental human right, the need of a strategic narrative and its centrality for effective to care for communities in crisis, a desire for equal public diplomacy. rights for all, for example—is increasingly contested. This contestation isn’t because people have turned There is a prevalence of stories that have created a their backs on one another, are increasingly narcis- widespread domestic and international perception sistic, or mean spirited. Rather, it is because the sys- of an America that has finally come to terms with its tems that this narrative support and normalize have own seemingly latent issues of corruption, conspira- failed to serve a large number of communities, both cy and cynicism. Schadenfreude mixed with a confir- here in the United States and abroad. As crucial as matory bias towards anti-Americanism, however, is new technology is to getting the right message out a growing narrative as images, news stories and so- to the right audience, even the sleekest public diplo- cial media amplify and focus on America’s perceived macy campaign may be for naught unless we rebuild slights toward foreign leaders, policy failures and di- a domestic consensus regarding what we stand for visiveness and hatred here at home. as a nation and articulate how these values translate into foreign policy goals and priorities. Put simply, the world can no longer buy the mystique, invest in the national brand and look to America as A Greek friend, Yannis, always used to say that when the beacon of freedom and defender of human rights he was younger, in the 1960s and 1970s, he was al- if, as former Secretary of State Hillary Clinton once ways proud to see the Greek flag be the first to enter told me, “we no longer believe that story ourselves.” an Olympic stadium and, naturally, always rooted for his countrymen to win in competition. But he always had a second favorite nation: The United States. He A RETURN TO BIG, BAD AMERICA felt it was patriotic and right to root for America to Many have tried to attribute the three Cs of corrup- win over the dictators and demagogues who sat in tion, conspiracy and cynicism to the American polit- the special seats reserved for the corrupt leaders of ical and economic systems. Generally they have met other nations. Greece first, America second was how with little success, in part because of our self-cor- he saw the world. And he was not alone. recting and responsive political, economic and legal systems. Yet, the arrival of digital media platforms Times have changed. Yannis no longer has a second and a more sophisticated adversarial class utilizing pick in these international competitions. He has not bots and other digital tools may finally be muddying switched to rooting for Russia or Germany, but he no America’s messages with three Cs-themed criti- longer feels that emotional tug and viscerally driven, cisms, sometimes (but not necessarily) grounded in positive orientation towards America. Once again, he a modicum of fact. is not alone. In the quest for an “America first” policy, “America” may not last in the world’s popular imagi- While a return to big, bad America is a contempo- nation. rary aberration, it is not an historic exception. Recall the Reagan-era Kirkpatrick doctrine proposing a Traveling abroad, I’ve heard similar comments along moderate approach towards friendly authoritarian the lines of, “The United States used to be better.” states and a more confrontational posture contra There was a time when regardless of American foi- totalitarian communist regimes. The same friend-foe bles—self-serving government interventions or,even, calculus—sometimes described as a transactional

92 ACPD | Can Public Diplomacy Survive the Internet?

“Even the sleekest public diplomacy cam- paign may be for naught unless we rebuild a domestic consensus regarding what we standforasanationandarticulatehowthese values translate into foreign policy goals and priorities.”

approach—is being used today as the current admin- ample, in clear contrast to previous administrations, istration assesses its policies toward and the domes- a recent visit to Moscow by Secretary of State Rex tic stability of much of the Middle East. The recent Tillerson did not include meetings with civil society praise of Egypt’s President Abdel Fattah el-Sisi was or opposition leaders. Establishing this top-down a calculated articulation of support for an authori- approach in the early stages of a government may tarian regime that could be considered endangered be necessary to reinforce both respect for national by liberalization, with a concern that a rapid, uncon- sovereignty and the building of trustworthy relations trolled liberalization could again bring about a radi- between senior governmental officials. cal, illiberal regime such as the Muslim Brotherhood government voted into power post-Mubarak. Similar It is understandable that an administration and of- levels of support have been expressed by the Amer- ficials with minimal prior interactions at a govern- ican leadership for Turkey’s President Recep Tayyip ment-to-government level would seek such closed- Erdogan after the recent referendum granting him door and top-level interactions, eschewing pressures greater authority and power. to test another nation’s tolerance or question its do- mestic approach or agenda. While understandable, This transactional approach, seemingly distant from this approach is also likely not sustainable. Domes- a values-based approach that undergirded U.S. for- tic pressure from an American press and populace eign policy for so long, requires those who are deliv- will demand interactions with opposition forces, civil ering public diplomacy goods and services to pivot society actors, minority groups and the cultural and is some significant ways. To start, public diplomacy educational institutions that make up the complex needs to become more top-down, focusing on sys- fabric of any society. This pressure, coupled with the temically aligning efforts with American national long-term national interests of the United States, security priorities, while syncing with local, shared, should expand the otherwise natural inclination to policy goals. work more insularly and transactionally toward lim- ited goals and tight agendas. This approach may also mean less focus on national popular will and more on political elites, both demo- But even a short-term transactional approach will cratically elected and not, capable of leading public requireengagementwithindividuals and institutions opinion toward consensual national alignment and currently out of power or out of favor with governing support for American national security and econom- regimes and ruling political elites. Public diplomacy ic interests. must continue to build civil society actors and lead- ers, as they are likely to become the next generation In such an environment, civil society oppositional of political leaders. Basic business logic and invest- forces in foreign nations do not and, in the short run, ment strategies familiar to many within the adminis- may continue not to receive top-level access, support tration require the hedging of bets, spreading of risk or recognition by U.S. government leaders. For ex- and investment in the future of any foreign govern-

ACPD | America’s Strategic Narrative and a Path for Public Diplomacy 93

ment or administration. Shifts in political fortune and erning elites or regime change. In such a framework, favor can be fickle and a strategy that makes medi- however, adversarial regimes are subject to the full um- and long-term plays is a secure public diplomacy spectrum of American power and public diplomacy, strategy. from informational and educational programs to civil society infrastructural development for regime op- Public diplomacy emphases of the recent past have positional forces. Access to the populations of these now changed and, either contemporarily or conse- adversarial regimes is the dominant constraint, of quently, the message of liberal democracy has lost its course, but these populations should be a primary shine, credibility and purchase. Given the espousal of American public diplomacy target. Regions, nations a more transactional, efficient, business-centric, in- and regimes that are either neutral in their relations vestment-dominant and sovereignty-accepting polit- with the United States or are contested by regimes ical leadership in Washington, a more effective public that are U.S. adversaries could also be a public diplo- diplomacy approach will need to be dramatically dif- macy priority. Access to the potential audiences of ferent in order to be effective. these contested places could face fewer constraints and their leaderships could be more open to straight Ifa Cold Warpublicdiplomacy modelishelpfulincom- transactional engagement, depending on whether municating an approach to those formulating and the contested state is leaning towards the United implementing policy, then there is a cognate in the States or towards an adversary. The following table contemporary framework. The dominant Cold War represents this renewed public diplomacy approach adversary, however, is no longer a Moscow-based re- in a resource constrained environment: gime promoting a flavor of global communist ideolo- gy. The adversarial relationship with the Soviet Union has, in part, been supplanted by Beijing and Tehran (at the “peer-competitor” or “rising” state level) and “radical Islamic terrorism” (at the ideological level). As the Soviet successor state, Russia continues to challenge and threaten American interests—in par- ticular Russia’s still unfolding, yet the clearly formi- dable, information operations that are being investi- gated and assessed. But in the early days of the new administration, China and Iran were assigned great- er adversarial value.

Given the relative power of these states and their ability to operate outside of a transactional frame- work, proxy conflicts may be primarily conducted be- tween the United States and China, with the potential for some alliance participation, and against Iran via a combination of military, economic and propaganda IRAN & ISIS means aimed at containing and degrading the capac- ISIS is under significant military attack and Iran is ities of those states and their leadership structures. under increasing political and military pressure, giv- Recent April 2017 recalibrations regarding Rus- ing support to domestic oppositional forces in both so-American relations may change some of the pub- ISIS-held territory and within Iran. Public diplomacy lic diplomacy formulations, but to date the campaign activities should find greater receptivity in such an and administration policy pronouncements and early environment. administration actions dominate this analysis. In seeking a public diplomacy means for undermin- Moving towards an updated Cold War II public diplo- ing the ideological basis for supporting the current macy framework and a rekindled reliance on a mod- Iranian or ISIS structures, an emphasis on “Islamic ernized Kirkpatrick doctrine will mean that America Reformation” should factor in heavily. Two practi- respects a strong sovereignty approach towards cal target groups for this approach are women and friends and allies—regardless of their regime-type— youth, though they are by no means the only potential and abstain from assertive policies and support for a targets. civil society that can lead to dissatisfaction with gov-

94 ACPD | Can Public Diplomacy Survive the Internet?

Focusing on female empowerment as the primary an assertive public diplomacy approach with a more public diplomacy goal within the Islamic-influenced “one-size fits all” model. world will allow the United States to maintain a mor- al component for American power and its liberation Given the previously outlined confrontational Ameri- narrative. can posture and constrained environment where an- ti-communist regime dissent will feel support, it will The demographic dominance of youth—and youth be in the U.S. interest to reinforce the more liberal unemployment—in this region also offers a unique factions of opposition and to seek support for a dif- opportunity to focus public diplomacy efforts on in- fuse anti-Peoples Republic of China nationalist lead- culcating a dissatisfied demographic component ership base as well as expanded centers of regime with the tools and education to organize and con- opposition. Taiwan is a natural ally in this approach. front the inherent contradictions of these societies, Still vibrant forces—individuals and organizations in such as religious elite privilege, regime elite power, , in particular—should be targets of Cold social conformist demands, structural unemploy- War-style public diplomacy efforts. American diaspo- ment realities, etc. Here, again, Cold War methods ra, visiting scholars and students, business interests and practices are instructive in helping to introduce with foreign investment in China, and other intersec- and reinforce messages and methods for organiza- tional individuals and institutions should be cultivated tion and opposition to regional regimes. and the targets of a public diplomacy program that can have impact.

In terms of proxy practices favored during the Cold CHINA War, China has made significant inroads into both China’s current “Three Warfare” approach (using the African continent and in Latin America, using psychological, legal and media warfare) to policy a successful combination of infrastructural invest- priorities will be less effective in a U.S.-enforced, ment and regime support. Chinese public diplomacy less permissive, global trade, maritime, military and efforts have promoted Chinese interests and used political environment. In a more constrained, Ameri- an “anti-colonial” narrative to undermine Western

“Public diplomacy has an opportunity to in- fluence a different international influencer class—the business, political, military and social elite.”

can-led, global environment, Chinese access to glob- efforts in the recent past and into the current mo- al markets could become less open, free movement ment. A constant and credible propounding of the of shipping will encounter friction, and a state of “hu- failure of the “Washington Consensus” model of de- miliation” could be perceived by any forced standing velopment—in particular in light of the 2008 global down of Chinese military (e.g. naval) and hybrid forc- recession—has particular resonance. The promotion es (e.g., off the North Korean coast). of the “Beijing Consensus” (sometimes sold in combi- nation with the “Singapore Model”) and the promise China poses a greater challenge in terms of popu- of the Asian Infrastructure Investment Bank (AIIB), at lation, geographic size and public diplomacy pene- a time when American aid and diplomatic resources tration. But there is a Cold War corollary here, too, are retrenching, could be a winning combination. including some natural advantages that did not exist during the Cold War. The most obvious one is that Despite these inroads, there are some fairly straight- greater linguistic homogeneity allow for scalability of forward ways to mitigate China’s public diplomacy gains. Countering the Chinese narrative should be

ACPD | America’s Strategic Narrative and a Path for Public Diplomacy 95

a public diplomacy goal. Dissatisfaction with the the NBA or amateur athletics and Olympic Chinese practice of demanding Chinese workforce sports, is the primary and popular way to deployment that accompanies Beijing-funded infra- achieve a level of cross-cultural penetra- structure projects (e.g., Ethiopia’s recently built rail- tion. Sports are a favored means to pop- road system) and requires the on-going employment ular interest. An emphasis on American of Chinese nationals is already causing local conflict. sports, training facilities, exceptional ath- letes and historical events can all build a Chinese finance terms for development is anoth- positive image of a disciplined, admired er source of irritation to host nations. Kickback and dominant America. The NBA is a global schemes, regime-level corruption, media takeover brand and marketing machine with a di- and dominance, cultural imposition, societal elite verse and global group of athletes playing fealty, and other characteristics of Chinese condi- in a uniquely American context. tionality are ripe targets for a public diplomacy cam- paign to countering the current dominant Chinese 2. Targeting authoritarian states that had relationships and accommodations. Cold War public fallen into disfavor during previous admin- diplomacy practices, again, are directly applicable, istrations as a result of an emphasis on though demanding of localization in different parts of democratic transition and transparency. the African continent and in Latin America. This is a moment during which countries where public diplomacy efforts have been Outside of the Islamic and Chinese front, public di- unwelcome, rebuffed or countered in the plomacy and diplomatic efforts in general, should be past are now welcome. Hungary, Poland more concentrated in areas that are contiguous to and the Philippines are only a few coun- those regions and that fall into what would be consid- tries that come to mind. Some authori- ered a traditional geographic sphere of influence or tarian countries that have been courted ideological affinity zone. Other nations with natural heavily by China in the last decade are now or traditionally allied relations with the U.S. fall from potentially in play. In the Middle East, a any priority targeting and can be the recipients of strongman posture that favors an elite and whatever legacy public diplomacy programs exists to emphasizes America’s own, new—if partly exchange cultural, educational and professional per- romanticized—strongman leadership and sonnel. Diplomatic relations should be maintained projected, tough-guy posture has an op- as close to status quo as is possible, all the while an- portunity for penetration. When consider- ticipating unplanned and occasional unpredictable ing public performance or appearance, a social media attacks or policy pronouncements that newer, more visible and heavier reliance could be counterproductive. Early indications are on diplomatic security with military pres- that there will be an active attempt on the part of ad- ence to emphasize strength and perma- ministration cabinet members both to limit any po- nence is favored to reinforce the big, bad tential damage, reinforce a policy continuity where it nature of America. Think Death Star over is aligned with previous administration foreign policy Rebelforces. positions, and actively seek to privately reassure for- eign leaders and nations of the otherwise consistent 3. Framing public diplomacy will be as import- application of policy and favor. ant as implementation of public diplomacy programming, especially as we move away In this environment, public diplomacy has an oppor- from the “soft power” formulation. One tunity to influence a different international influencer potential frame: The ideal state for a more class—thebusine ss, political, military and social elite. transactional public diplomacy environ- ment would be one that moves away from Below are a few ideas: the “soft power versus hard power” con- struct and its inaccurate implications that 1. One productive way to do public diploma- “soft” is “weak” and instead move toward a cy when policy priorities are unclear—or public diplomacy deployment of “full spec- locally unpopular—is to go back to reliable trum power,” where strong military, busi- projects and programs, such as empha- ness, educational institutions and cultural sizing sporting competitions and events. products are forward leaning, leading and American prowess in athletics, whether unrelentingly winning globally. Assuring

96 ACPD | Can Public Diplomacy Survive the Internet?

and exhibiting that these institutions are relationship with the defense attaché and with the the best globally would be consonant with commercial section will be required at post to make the administration’s approach to policy and sure that public diplomacy is greatly aligned with U.S. power projection. “Making America great commercial and business interests, as well as nation- again” includes—in fact, requires—“mak- al security priorities. ing American public diplomacy great again. This is a comfort zone forautocratic regimes and the Overall, the shift is for America to be feared and re- transactional nature of the relationship is more de- spected and away from an emphasis on openness fined, reliableand predictableforleadership in these and attraction. countries. Instead of playing towards a dissident elite, the target audience for the near future will be Achieving some of these program shifts in public theruling elite. Thecompetition will be Chinesepub - diplomacy will be difficult given the traditions and lic diplomacy, in many cases, but mayinclude a Russia culture of the majority of the American electorate both trained and successful at adversarial public di- and State Department training and practice to date. plomacy practice. Some will be easier to achieve, such as the athletic and sporting component. Others will be more chal- Finally, as this policy re-orientation may be tempo- lenging, such as adjusting public diplomacy messag- rary, it is important not to burn all bridges. Maintain- ing and practice to accommodate authoritarian lead- ing relations with the non-ruling class will be helpful ers, their sycophants and supporters. in the future. But taking advantage of the current mo- ment and in places where American public diploma- In certain instances, public diplomacy profession- cy has either been shut out or unwelcome in the past, als may feel estranged from the new foreign elite will allow for this administration’s policy priorities to that will be their audience and customer. A tighter find a more receptive audience.

ACPD | America’s Strategic Narrative and a Path for Public Diplomacy 97

CONTRIBUTOR BIOGRAPHIES

Amanda Bennett is a Pulitzer Prize-winning author, investiga- science. He was a member of the Political Science Depart- tivejournalist and editor and director of the Voice of Ameri- ment of the RAND Corporation, and of the Policy Planning Staff ca. Previously, she was executive editor at Bloomberg News, of the U.S. Department of State. Fukuyama is chairman of the where she created and ran a global team of investigative re- editorialboard of The AmericanInterest ,which he helpedto porters and editors. Bennett was editor of The Philadelphia found in 2005. Inquirer from June2003toNovemb er 2006,and prior tothat waseditor of the Herald-Leader in Lexington,Kentucky.Ben - Sam Ford researches how organizations are listening to, nett served as a Wall Street Journal reporter for more than developing relationships with, telling stories to, and putting 20 years. A graduate of Harvard College, she held numerous themselves in the shoes of the audiences they seek to reach. posts at the Journal, including auto industry reporter in De- He currently consults on a range of projects, including act- troit in the late 1970s ande arly 1980s,Pen tagon and State De- ing as lead producer for a new Future of Work initiative in partment reporter, Beijing correspondent, management ed- Kentucky for the MIT Open Documentary Lab. Previously, in itor/reporter, national economics correspondent and, finally, 2015–2016, he ran the Center for Innovation and Engagement chief of the Atlanta bureau until 1998, when she moved to The for Univision’s Fusion Media Group. Ford received his master’s Oregonian. She was also acontributing columnist for The degree from MIT. He is arese arch affiliate and consultant with Washington Post. Bennett shared the 1997 Pulitzer Prize for MIT’s Program in Comparative Media Studies/Writing and national reporting with her Journal colleagues, and in 2001 teaches for Western Kentucky University’s Popular Culture ledateam from TheOregonian toaPulitz er forpublicservice. StudiesPro gram. In 2013, he co-authored Spreadable Media (NYU Press), which has been translated into seven languages. MattChessen is aU.S.diplomat,technologistandAmerican author who served in some of the most challenging assign- Jeff Hancock is a professor in the Department of Communi- ments in the Foreign Service. He began his diplomatic career cation at StanfordUniversity where he studies the psycholog- in Monrovia and subsequently served at the U.S. embassy in icaland interpersonal processes in socialmedia.Hisrese arch Iraq, where he managed various disarmament programs. specializes in using computational linguistics and experi- Returning to Washington, he led regional security and arms mentstounderstand howthewor ds weusecanrevealpsy - sales initiatives for the Bureau of Political-Military Affairs, chological and social dynamics, including studying the mental covering Central Asia, Afghanistan and Pakistan. Chessen modelspeoplehavere garding algorithms in socialmedia.His then served two years in Kabul advising NATO forces on the research also explores how people use deception with tech- implementation of the Afghanistan Peace and Reintegration nology, from sendingt exts and emails to detectingfakeonline Program. He worked in Washington,D.C., in the Office of eDi- reviews. His TED Talk on deception has been seen over 1 million plomacy from 2013–2014,where he led theimplementation of times and his research has been published in over 80 journal an innovative, open source, crowd-working platform called articles and conference proceedings with support from the Open Opportunities. He subsequently served as the Coordina- U.S. National Science Foundation and the U.S. Department of tor for International Cyber Policy for the Bureau of East Asian Defense.Hiswork on lyingandtechnology hasbeen frequent- and PacificAffair s. Chessen is currentlyservingatthe George ly featured in thepopular press,includingthe NewYorkTimes , Washington University, where he researches the international CNN, NPR, CBS and the BBC. implications of artificial intelligence as theStateDep artment’s Science, Technology and Foreign Policy Fellow. Jonathan Henick, a member of the Senior Foreign Service, currently serves as the principal deputy coordinator forthe Francis Fukuyama is Olivier Nomellini Senior Fellow at the Bureau of International Information Programs. He served Freeman Spogli Institute for International Studies (FSI), and previously as the acting deputy assistant secretary and di- the Mosbacher Director of FSI’s Center on Democracy, De- rector for press and public diplomacy in the Bureau for South velopment, andthe Rule of Law. He is professor (bycourtesy) and Central Asian Affairs, where he was responsible for the of political science. Fukuyama has written widely on issues in conduct of U.S.public diplomacy in 13 countries, including Af- development and internationalpolitics.His book, TheEnd of ghanistan, Pakistan and India. He has also served overseas as History and the Last Man, waspublished by Free Press in 1992 the counselor for public affairs in Turkey, the deputy chief of and has appeared in over 20 foreign editions. His most recent mission in Timor-Leste, as well as in other positions in Azer- book, Political Order and Political Decay: From the Industrial baijan, Turkey, Portugal and Uzbekistan. He has worked as a Revolution to the of Democracy, was published public diplomacy fellow and professor at George Washington in September 2014.Fukuyamareceived his B.A. from Cornell University’s School of Media and Public Affairs and as a visiting University in classics, and his Ph.D. from Harvard in political research fellow and diplomat-in-residence at the East-West

ACPD | Contributor Biographies 99

Center in Honolulu, Hawaii. He hasreceivedthe Public Diplo- in academic and mainstream outlets, including The Washing- macy Alumni Association Achievement Award, as well as in- ton Post, Guardian and Huffington Post. His research has been dividual Superior Honor Awards from the State Department. supportedby grants from the British Council, U.S. Depart- Henick speaks Russian, Portuguese, Turkish and Azerbaijani, ment of Defense, U.S. Department of State, European Com- and holdsaPh.D. in politicalscience from the University of mission, Knight Foundation, Open Society Foundation, and Hawaii. U.S.InstituteforPeace. He has alsoreceivedfellowships from the London School of Economics, University of Pennsylvania, Tim Hwang is a partner at Robot, Robot & Hwang, a law firm and Oxford University. and technology consultancy focusing on experiments at the intersection of legal and computer code. He leads its initiative Laura Roselle is professor of political science and internation- seeking to develop general principles and common frame- al studiesatElon Universitywhereshe is currentlyasenior works to guide policymaking as intelligent systems emerge faculty fellow. Roselle holds degrees from Emory University and become increasingly ubiquitous in a variety of arenas (math/computer science and Russian) and Stanford Univer- including capital markets, warfare, medicine, transportation sity (Ph.D., political science). She has served as president of and sociallifeat large. the International Communication Section of the International Studies Association and of the Internet Technology and Pol- Markos Kounalakis is a visiting fellow at the Hoover Institu- itics Section of the American Political Science Association. tionatStanf ordUniv ersityanda senior fellowatthe Center She is the author of Media and the Politics of Failure: Great for Media, Data and Society at Central European University Powers, Communication Strategies, and Military Defeats (Pal- in Budapest, Hungary. He is a presidentially appointed mem- grave,2 006 & 2011), and, with co-authors Alister Miskimmon ber of the J. William Fulbright Foreign Scholarship Board, and Ben O’Loughlin, of Strategic Narratives: Communication president and publisher emeritus of the Washington Month- Power and the NewWorldOrder (Routledge, 2013) and Forg- ly, and writes a foreign affairs column for The Sacramento ing the World: Strategic Narratives & International Relations Bee and McClatchy-Tribune News. Kounalakis received his (University of Michigan Press, 2017). Roselle is co-editor of Ph.D. from Central European University in 2016 and is current- the journal Media, War and Conflict, and co-editor of the book ly writing a book on the geopolitics of global news networks. series, Routledge Studies in Global Information, Politics and He has written three books: Defying Gravity: The Making of Society. She won the 2017 Distinguished Scholar Award from Newton (Beyond Words Publishing, 1993); Beyond : The the International Communication Section of the International Power of Strategic Corporate Journalism (coauthor, Jossey- Studies Association. Bass Publishers, 1999); and Hope is a Tattered Flag: Voices of Reason and Change for the Post-Bush Era (PoliPointPress, Jason Stanley is the Jacob Urowsky Professor of Philosophy 2008). Kounalakis serves on the Board of Councilors at the atYaleUniversit y. BeforecomingtoYale in 2013, he wasdis tin- University of Southern California’s (USC) Annenberg School guished professor in theDepartment of PhilosophyatRutgers for Communication and Journalism; and the Board of Advi- University. He has also been a professor at the University of sors at USC’s Center on Public Diplomacy (CPD). Michigan (2000–2004) and Cornell University (1995–2000). His Ph.D. was earned in 1995 at the Department of Linguis- Ethan Porter is an assistant professor at George Washing- tics and Philosophy at MIT (Robert Stalnaker, chair), and he ton University in the School of Media and PublicAffair s. He received his bachelor’s degree from the State University of received his Ph.D. in political science from the University of New York at Stony Brook in 1990. Stanley has published four in 2016. His research interests include public opinion, books—two in epistemology, one in philosophy of language politicalcommunication,politicalpsychology and experimen- and semantics, and one in social and political philosophy. His tal design. Porter has received grants from the National Sci- latest book, How Propaganda Works, was published by Princ- ence Foundation and the Omidyar Network. eton University Press in May 2015. It was the winner of the 2016 PROSE award for the subject area of philosophy. In 2015, Shawn Powers serves as the executive director of the Unit- Stanley received a doctor of humane letters, honoris causa, ed States Advisory Commission on PublicDiplomacy. He has from Binghamton University. a Ph.D. from the Annenberg School for Communication and JournalismattheUniversity of SouthernCalifornia(USC) and Vivian S. Walker is a professor of national security strategy more than a decade of experience working at the nexus of at the National War College in Washington, D.C. Previously she publicdiplomacy,developmentand national security. Powers served as a professor of strategic and security studies at the researchesthe geopolitics of information and technology and National Defense College of the UAE and a visiting professor published (with Michael Jablonski) the award winning The atthe Near East South Asia Center for Strategic Studies at Real Cyber War: A Political Economy of Internet Freedom (The the National Defense University. In her career with the State University of IllinoisPress,2015). He hasover40publications Department, she twice served as a

100 ACPD | Can Public Diplomacy Survive the Internet?

(Croatiaand Armenia),twice as an office director(Southeast - Bruce Wharton is theactingunder secretaryforpublicdiplo - ern Europeand EUR’s Office of Press and PublicDiplomacy), macy and public affairs at the U.S. Department of State. Am- a public affairs officer (Kazakhstan), a cultural affairs officer bassador Wharton served as the principal deputy assistant (Tunisia), and an information officer (Haiti). Other assign- secretary in the Bureau of African Affairs from 2015–2016. ments include a professorship at the National War College, Prior to that he served as the U.S. ambassador to Zimbabwe the regional border coordinator in Afghanistan, and a fel- from September 2012–November 2015. He has also served lowship on the U.S. Atlantic Council, where she led the first as the Bureau of African Affairsdeputy assistant secretary interagency discussion on public diplomacy post 9/11. Walker forpublic diplomacy,Africanaffairsdirector of the Office of graduated from ’s School of Foreign Public Diplomacy and Public Affairs, and deputy coordinator Service and received a doctorate from the University of Chi- of the Department of State’s Bureau of International Informa- cago. She speaks French,Russian and Croatian. tion Programs. From 2003–2006 he was the deputy chief of missionattheU.S.embassy in Guatemala.Whart on received Ryan E. Walsh is senior advisor for digital product at the De- Superior and Meritorious Honor Awards from the Depart- partment of State’s Bureau of International Information Pro- ment of State and the U.S. Information Agency, and was the grams (IIP) where he is responsible for the planning, produc- 2011 recipient of the Edward R. Murrow AwardforExcellence tionandoptimization of digitalcont entforuseatpos t. Ryan in PublicDiplomacy. He is a graduate of theUniversity of Texas joined IIP with over10 years of private sectorexperience in in Austin and speaks Spanish and German digital-first content development, newsroom editorial strate- gy and social network data analysis. Most recently, he helped Sam Woolley is the director of research for the Oxford In- launch the data-driven online news startup Vocativ. In its ternet Institute’s European Research Council (ERC)-funded first year as a site, Vocativachieved an average of 5 million Computational Propaganda Project. Sam specializes in the unique monthly views and the Scripps Howard Foundation study of automation and politics, with special interests in po- recognized Ryan as a finalist for the national award in digital litical communication and science and technology studies. His innovation. He previously worked in crisis communications work on bots and public opinion hasbeen published in several forGoldmanSachsand is adigitaladvertisingagency veteran academic journals and collections. For his research, he has of McCann WorldGroup. He holds a master’s degree in global been featured in publications such as Wired, Fast Company, affairs from NYU and a bachelor’s degree in history from Prov- The Washington Post, The Economist and Bloomberg. Sam is idenceCollege. aPh.D.candidate(ABD)attheUniversity of Washington in the Department of Communication, and a fellow at Jigsaw,the In- stitutefor the Future, and the TechPolicy Lab at the University of Washington.

ACPD | Contributor Biographies 101

------• • •

www.state.gov/pdcommission