POLICY, POLITICS, AND THE PUBLIC - THE SECURITIZATION OF FOREIGN INTERFERENCE IN NORTH AMERICA - uO Research
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
2019 POLICY, POLITICS, AND THE PUBLIC THE SECURITIZATION OF FOREIGN INTERFERENCE IN NORTH AMERICA STEPHANIE HENDERSON [5568888] GRADUATE SCHOOL OF PUBLIC AND INTERNATIONAL AFFAIRS MAJOR RESEARCH PAPER FALL 2019 SUBMISSION SUPERVISOR: DR. A. GHECIU
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) Table of Contents: Abstract……………………………………………………………………………………….…....1 1.0 Introduction………………………………………………………………..………………..…2 1.1 Understanding Modern Security Threats………………………………………..……..……4 1.2 Securitization and the Copenhagen School……………………………………………...…..7 2.0 Case Study: United States…………………………………………………………………...13 2.1 Actors………………………………………………………………………………………....13 2.2 Audience………………………………………………………………………………...........18 2.3 Analysis…………………………………………………………………………………..…...21 3.0 Case Study: Canada……………………………………………………………………….....26 3.1 Actors………………………………………………………………………………………....27 3.2 Audience…………………………………………………………………………………..…..31 3.3 Analysis………………………………………………………………………………….........33 4.0 The Rest of the Five Eyes…………………………………………………………………....39 4.1 Trends and Contrasts……………………………………………………………………..…43 4.2 Conclusion...…………………………………………………………………………………..47
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) Abstract: The rise of social and digital media in modern society have resulted in new forms of security threats which have both shifted the way in which security organizations respond to threats, but also how political and security leaders communicate their existence in order to develop a response that counters and contains the threat. The Copenhagen School’s securitization theory seeks to understand how and why issues facing different sectors – military, environmental, economic, political, and societal – become matters of national security. Specifically, it examines the process following the declaration that an issue should be immediately moved from the political agenda to the security agenda. What makes foreign interference unique, is that both the securitization process and the attacks focus on the same method – public discourse. Using securitization theory, this paper will unpack the phenomenon of foreign interference and how its shift to the security agenda has occurred in two nations: The United States and Canada. These two case studies will explain how and why foreign interference has been securitized, what makes it unique, and what the threat of foreign interference on societal security could mean for policy in North America. Each nation faces distinct threat environments with specific – and in Canada’s case non-specific – threat actors resulting in different calls to action, or speech acts, by both securitizing and functional actors seeking the acceptance of the audience or general public. Unlike traditional security threats such as terrorism or espionage, foreign interference targets the sovereignty and legitimacy of democratically elected governments by using digital and social media to manipulate public opinion and discourse. Thus, the Copenhagen School has been used as the framework for analysis in understanding how the threat of foreign interference has been perceived and accepted by political and societal sectors in North America. 1
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) 1.0 Introduction Advances in technology have shifted reality; our understanding of what humanity can do, where it can go and how it can interact, has ultimately narrowed the distance between people and places that used to be beyond our reach. These technological triumphs have thrust the 21st century into a new era of connectivity. Digital communications have made it easier than ever to engage with people halfway across the globe. Our dependence on technology has also given rise to a new facet of security. “Defence of critical infrastructure” no longer exclusively refers to defending physical structures; security forces are now tasked with protecting networks and data as well. Shifting protective measures to encompass the cyber realm is easy enough – it is a defined space with specific needs and clear targets. What do we do when the digital threat moves beyond “ones and zeros” and targets thought and identity? Is it possible to protect the abstract of ideas? This is the threat posed by foreign interference. Since foreign interference happens in the social space, it is reliant on socially constructed realities and public discourse. This is not to say that all digital security threats are social constructions, merely that interference operations rely on communications. Without the existence of individual perspectives and social media discourse, foreign interference would not be as effective as it is. Due to its reliance on perception and individual interpretation, this paper uses the Copenhagen School’s securitization theory as a means of understanding how foreign interference has been securitized, as a non-traditional security threat, by political leadership in Canada and the United States. It will identify how the general public within these two countries have accepted and understand the threat defined by each respective political leadership group. 2
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) This is not a study on actions taken, but rather why these actions are taken and how democratic leaders in North American have sought support for these actions through the process of securitization. A broadly-based threat with varying definitions will result in broadly-based policy with varying responses. As previously stated, the Copenhagen School’s securitization theory will be the framework within which the following analyses will be conducted. The first section of this paper will define the concept of security and the origins of foreign interference. The second section will unpack the main characteristics of securitization theory and the Copenhagen School by applying the characteristics to the threat environment created by foreign interference. There I will define and identify the target actors, referent objects, and audience and will also break down the two main security sectors impacted by foreign interference: societal and political. The third section will contextualize the current situation in both the United States and Canada, two countries that have developed responses to foreign interference. Following the context portion of the case studies, I will use securitization theory to define the actions taken by the securitizing and functional actors in the United States and Canada and assess their impact on their respective audiences. In the final section, I will compare the similarities and differences in each nation’s responses to identify which aspects of foreign interference lend themselves to securitization theory and what trends have emerged. I will briefly touch on the experiences of our allies to further the claim that foreign interference relies on a socially constructed reality wherein values and identity play a pivotal role in both the advancement and acceptance of foreign interference as a legitimate security threat. The purpose of this paper is to determine how political leaders, or 3
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) securitizing actors, define the threat of foreign interference and how they garner public, or audience, support for the threat definition and the actions taken to protect against it. 1.1 Understanding Modern Security Threats Security as a concept has been debated and theorized for centuries and follows a relatively consistent definition across the political thought spectrum, namely that security equals preservation. A Hobbesian understanding of security follows the laws of protection and preservation: “…the first and fundamental law of nature, which is: to seek peace and follow it… [and] the second, the sum of the right of nature, which is: by all means we can to defend ourselves” (Hobbes, 1651, 80). While the Hobbesian perspective focuses inward on the natural laws preserving the individual, classical liberal thinkers err on the side of liberty. Montesquieu writes that the “… political liberty of the subject is a tranquility of mind arising from the opinion each person has of his safety” (Montesquieu, 1748, 173). A utilitarian perspective drives the notion that the primary goal must be to increase the happiness of the individual, or as argued by Jeremy Bentham, “[by] averting pain or danger, which is the chance of pain: that is, by affording security” (Bentham, 1781, 126). Lastly, John Locke explains that, while dependent on the establishment of a commonwealth, society “…could nowhere find a greater security to their peace, liberties, and fortunes than in the rule of a father” (Locke, 1823, 137). This glance into the history of security is not an exercise in political thought, rather it is to demonstrate that the theme throughout history in defining security has consistently relied on preservation and protection of fundamental freedoms. The theorists mentioned above, despite their contrasting attitudes, share important characteristics in what it means for an individual or society to be secure. This baseline 4
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) understanding of security has influenced centuries of security theory, including the Copenhagen School, which this paper is based on. The Copenhagen School is not without controversy. Some authors consider the methodology used to explain securitization downgrades or diminishes legitimate security threats because it does not focus on the empirical inclination of traditional security studies (Knudsen 2001, 361). The realist tradition tends to classify issues of identity and welfare to be ‘low politics’ issues and thus not immediate threats (Hough, 2008, 3). The challenge with foreign interference is that it is both a matter of soft politics in that it targets identity and public discourse but does so to destabilize the relationship between the government and the governed. Authors who argue that the Copenhagen School does not consider the implications “…of whether (or not) there is a connection between the realm of normal politics and that of security…” may find their answers to that question by acknowledging that the digital domain has closed that gap – social politics and governments are facing the same threat simultaneously (Williams, 2015, 117). There is no internationally accepted definition of foreign interference though according to various security agencies, as will be discussed later, foreign interference activities typically fall into two categories: influence operations through domestic diaspora communities, and election interference via social and other digital media (ASIO, 2017; CSIS, 2018; Nielsen, 2019). Unlike traditional security threats such as terrorism or even network-based cyber operations, foreign interference does not have a clear physical target. Interference operations seek to exploit thought and identity through digital technology. This presents unique policy challenges in addressing the threat that foreign interference operations pose, particularly in liberal democratic societies where 5
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) freedom and privacy are pinnacle rights for their populations. One must not only define the threat and the threat environment, but also prepare a reasonable response without compromising fundamental freedoms. The post-9/11 context sees the security environment operating on a precedence of immediate national security responses to traditional security threats, but foreign interference does not operate within the same bounds. Rather than having defined outcomes, the effects of foreign interference are much more insidious, using prolonged communications campaigns to slowly eat away at ideology through public discourse rather than physical infrastructure or networks. Foreign interference finds its roots in hybrid warfare, a term coined by retired U.S. Marine Officer Frank Hoffman. Since the first World War, tactics have evolved and shifted toward what are now considered asymmetrical threats such as those posed by non-state actors like Al Qaeda or Daesh and state-sponsored firms like the online troll factories operating in Russia. According to Hoffman, today’s battlefield “incorporates a range of different modes of warfare including conventional capabilities, irregular tactics and formations, terrorist acts including indiscriminate violence and coercion, and criminal disorder” (Fridman, 2018). Hoffman’s intention was to develop a more holistic application of tactical analysis and battle strategy that incorporates the reality of a wider range of actors, tactics, and targets (Fridman, 2018). The result has been the acceptance of a broader base for responding to different types of threats. The question then becomes what is the best way to respond to it? Traditional security studies suggest that military deterrence is the best way to ensure that external actors keep their distance, but how does one prepare a military response for a non-military attack (Hough, 2008, 3)? In terms of proportionality, is a hard power response appropriate for a Facebook campaign? 6
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) Knudsen suggests that the Copenhagen School contradicts itself, arguing that securitization “…refers to the act (or process) of removing an issue from and raising it above politics…” while also pointing to “… the act (or process) of taking an issue out of obscurity or neglect and placing it on the political agenda” (Knudsen, 2001, 361). This is exactly the point of securitization theory; a double-edged sword for analysis. Politicization of issues can serve two purposes, advancing a desired political agenda (such as the series of events surrounding the September 11th attacks), or shedding light on lesser known security issues (such as the 2015 Syrian migration crisis). Foreign interference provides a unique opportunity for policy analysis because it brings two typically distinct areas of security together into one threat environment: domestic discourse and state sovereignty. 1.2 Securitization Theory and the Copenhagen School The Copenhagen School has greatly contributed to the modern discourse surrounding security studies, primarily with its focus on the unfolding of non-traditional defence and security issues and how society responds to them. The most profound application of the Copenhagen School is its securitization theory. Formally introduced to academia in the 1998 book “Security: A New Framework for Analysis” by authors Barry Buzan, Ole Waever, and Jaap de Wilde, securitization theory provides a framework of analysis on how security issues are formulated and what makes something a matter of national security. More specifically, they argue that “…security is a speech act that securitizes, that is constitutes one or more referent objects… as threated to their physical or ideational survival and therefore in urgent need of protection” (Waever in Hansen, 2009, 1156). 7
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) In this theoretical framework, security is not a matter of protecting borders or preserving the state. Qualifying something as security is an action in and of itself. This is not to say that traditional understandings of security do not exist; a missile strike or a ground incursion are security issues. Securitization theory seeks to add an additional scope of analysis in characterizing threats in two ways: where the call to action against a threat comes from, who is being threatened, and if those threatened accept the call to action as a matter of their own security. For Buzan et al., security is “… a move that takes politics beyond the established rules of the game and frames the issue either as a special kind of politics or as above politics” (Buzan et al., 1998, 23). It is not an issue, but rather an action or process. Figure 1 explains the process of securitization as broken down by Ole Waever, specifically that securitization relies on causality. Figure 1: Waever, O. (2011). Politics, Security, Theory. 42(4-5). Security Dialogue: Denmark. p.477. 8
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) To securitize means to justify action beyond the normal process of public policy and governance and thus it can be identified with the arrow on the left (Buzan et al., 1998, 24). For an issue to be properly securitized, the call to action must be legitimized by the audience being threatened. “A discourse that takes the form of presenting something as an existential threat to a referent object does not by itself create securitization… the issue is securitized only if and when the audience accepts it as such” (Buzan et al., 1998, 25). This is the cornerstone of securitization theory, not the action itself, but the recognition of it by an actor and the acceptance of it by an audience as security matter. This recognition of a specific act as being one of security relies on what is known as a speech act and is identified in Figure 1 by the central circle. The speech act hinges on survival, that ignoring an issue will result in catastrophic consequences for the audience which is being targeted. “In a democracy, at some point it must be argued in the public sphere why a situation constitutes security and therefore can legitimately be handled differently” (Buzan et al., 1998, 28). This notion of acceptance is completely reliant on the audience legitimizing the claim that an issue is one of security. The audience will vary in its understanding of a security issue being one of immediate importance, lending itself to the intersubjectivity of interpreting the current reality of a security environment, identified as the right arrow in Figure 1. The social construction of understanding is where the success of a securitization takes place, requiring “…both intrinsic features of speech and group that authorizes and recognizes that speech” (Buzan et al., 1998, 32). The intersecting arrow in the middle of Figure 1 brings this all together; “[the] spatio-temporal contingency of securitization is checked by, for example, risk- management practices; changing relations between risk, uncertainty and danger…” (Waever, 2011, 477). This means that the process of securitization relies on both a tangible physical 9
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) understanding of the threat while also interpreting the effects of danger as experienced by the audience, as well as constantly shifting knowns and unknowns, on a specific target. Buzan et al. point to various forms of securitizing actors, functional actors, and referent objects. Securitizing actors can be political leaders, firms, movement groups, or any actor with an ability to act on behalf of a community of people (Buzan et al., 1998, 36). Functional actors are those who can influence the dynamics of a sector or lens of all possible “constituent units”, such as interest groups, experts external to the decision-making process, and the media (Buzan et al., 1998, 36). Referent objects are those things that are being threatened or targeted by a security issue and can be communities, vulnerable or marginalized groups, or even concepts like freedom and democracy (Buzan et al., 1998, 36). The audience is the authorizing force, the group that accepts the claims of the securitizing or functional actors in making something an emergency (Buzan et al., 1998, 36). In sum, the securitizing actor will be the one that takes a referent object and moves it onto the agenda as being threatened by a security issue, the functional actors will contribute to the narrative, and the audience will take the securitizing actor’s claim and either accept it or reject it. This process is what ensures a matter is being securitized. As will be explained in the case study section, foreign interference has two main functions: destabilizing the state and destabilizing communities. For this paper, the securitizing actor will be focused on political leadership and government officials. The functional actors are the think tanks, non-governmental organizations, and media who have all furthered the narrative on foreign interference as an immediate threat. The referent object is democracy, specifically the main concept that has been threatened by interference through campaigns to destabilize elections 10
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) through the manipulation of political identity. Finally, the audience is the governed within liberal democratic nations. Each unit of securitization as described above can be linked to a sector of the international community. Buzan et al. discuss five sectors in total, the environmental sector, the economic sector, the military sector, the societal sector, and the political sector. Since foreign interference relies on governance structures and public discourse, the analysis will focus on the latter two. The societal sector is primarily about identity and community membership such as language, religion, nationality, or culture. As Buzan et al. put it “[threats] to identity are thus always a question of the construction of something as threatening some ‘we’ – …contributing to the construction or reproduction of ‘us’” (Buzan et al., 1998, 123). In order for the ‘we’ to be threatened, the identity of the audience or referent object must be the target of the attack. But what is meant when the term “identity” is invoked? In a response to critical questions about what the Copenhagen school means by societal security and identity, Buzan and Waever suggest that identity refers to the “…defining point regarding existential threats for a society because it defines whether ‘we’ are still us” (Buzan et al., 1997, 242). In the context of foreign interference, attacks use public political discourse to undermine electoral outcomes in democratic societies. This attack specifically targets sovereignty which “…defines when a threat is existential, because if a state is no longer sovereign, it is no longer a state…” (Buzan et al., 1997, 242). For this paper, the identity area being targeted is the freedom of individuals to engage in society by understanding and discussing political issues in the context of civic engagement. 11
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) Securitizing the societal sector can lead to extraordinary measures because identity is the fundamental baseline upon which all other aspects of political, military, economic, and environmental life are built. “Individuals seek to defend their group boundaries because, as social identity theory postulates, group belonging satisfies basic cognitive and emotional needs” (Theiler, 2003, 264). With foreign interference, this is where the political and societal sectors intersect. While anything can be construed as political, the purpose of this sector is distinct. Buzan et al. recognize that political security can bridge across the other sectors, but in order for a security threat to be one that impacts the political sector it must encompass “…threats to the legitimacy or recognition either of political units or the essential patterns (structures, processes or institutions) among them” (Buzan et al., 1998, 144). When a security threat targets the national identity or political ideology of a state (the threads that bind communities to their respective government), the threat is targeting the stability of the political order (Buzan et al., 1998, 150). Any threat against a state’s structure or components, especially in liberal democracies where structure is imposed by the people who elect their governments, is thus an attack on the sovereignty of the state. Foreign interference incorporates threats against both the societal and political sectors. In feeding on public discourse through troll factories, targeted social media ads and pages, and media engagement, interference operations seek to unravel or influence the collective identities of those communities within a political order. It challenges sovereignty, state stability, and security by manipulating norms and values like freedom of speech, freedom of association, political debate and discussion, and open democracies. The following sections will look at real world examples of securitizing actor and referent object or audience responses in the United 12
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) States and Canada. Despite geographic proximity, the responses that have emerged from these two countries are significantly different both in the recognition of the threat and the actions taken. Following discussion of what has been done to date, an analysis using the securitization framework will be applied to each nation’s security environment. 2.0 Case Study: United States The case of the United States is important since this outlines the most recent, internationally-recognized incident of foreign interference and thus lays the groundwork for the cascading responses from allied nations. The 2016 U.S. election was a heated race between Donald Trump and Hillary Clinton, leading to extensive coverage of the inner and outer workings of the election. The interference experienced during the pre-election period has been said to have originated in Russia, with Kremlin-based sources leading the activity. Following the 2016 election, intelligence awareness of the severity of the threat has grown into social awareness. This awareness has largely relied on the security of elections, but not solely on hardline security. For the public, the concern also rests in the notion of electoral integrity, that Americans are being fed misinformation through targeted efforts by foreign entities to mislead and potentially direct electoral outcomes to foreign-desired candidates. 2.1 Actors Approximately eight months prior to the election, it was revealed that hacking activities targeting the Democratic National Committee had occurred, resulting in the publication of 13
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) thousands of insider emails from the Clinton campaign (CNN, 2016). It was determined that the hacking attacks originated from Russian-backed groups associated with Russian intelligence (CNN, 2016). According to CIA reports, the purpose of the attacks was to influence the public into supporting President Trump over Secretary Clinton (CNN, 2016). In late 2017, it was also reported that Facebook removed thousands of advertisements posted between June 2015 and May 2017 linked to Russian accounts that were “geographically targeted” to specific electoral colleges throughout the campaign period (CNN, 2016). In 2017, following the release of reports confirming Russian interference in the 2016 Presidential election, the National Intelligence Council published a report outlining an assessment of what happened. The report specifically notes that Russia’s intention was to “…undermine faith in the U.S. democratic process, denigrate Secretary Clinton, and harm her electability…” (NIC, 2017, ii). They also wrote that this influence campaign took advantage of the effects of mass information disclosures and the impact they have on the global communication network through social media, mainstream media, and global perceptions of the U.S. government (NIC, 2017, 5). Based on the relative success of the 2016 electoral interference campaign, it is anticipated that Russia will apply lessons-learned to future operations “…against U.S. allies and their election processes” (NIC, 2017, iii). During U.S. Senate hearings on disinformation in 2017 a brief provided by Clint Watts, a senior fellow at the Center for Cyber and Homeland Security, highlights the largest area of weakness currently facing our security apparatus: “…the most important actions to diffuse Russia’s modern Active Measures actually come from outside the U.S. government – the private sector and civil society” (Watts, 2017, 7). He goes further writing that “[t]ailored news feeds from social media platforms have created 14
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) information bubbles where voters see only stories and opinions suiting their preferences and biases – ripe conditions for Russian disinformation campaigns (Watts, 2017, 7). A RAND report corroborates this read on the threat hypothesizing that the fluidity of the cyber environment will result in ever-more creative methods of manipulation, arguing that current laws surrounding shell corporations and not-for-profits are not required to disclose their sources of funding; future influence operations could see money being funneled “…to issue-oriented ‘social welfare’ groups that have divisive goals” (Courtney, 2018). Despite significant expert and public pushback on foreign interference, President Trump has only issued two executive orders on the subject. In September of 2018, the President signed the “Executive Order on Imposing Certain Sanctions in the Event of Foreign Interference in a United States Election”. The order explicitly states that “[a]lthough there has been no evidence of a foreign power altering the outcome or vote tabulation in any United States election, foreign powers have historically sought to exploit America’s free and open political system” (White House, 2018). The Order provides the process that will be undertaken regarding any potential threats identified by the White House. Consultations involving “the Attorney General and the Secretary of Homeland Security, in concert with the heads of any other appropriate agencies and, as appropriate, State and local officials…” will lead to a report “...to the President, the Secretary of State, the Secretary of the Treasury, and the Secretary of Defense…” providing a threat impact assessment laying the groundwork for the possible imposition of sanctions on either the individual or the foreign actor involved (White House, 2018). 15
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) While the executive order reads as a vague acknowledgement of the threat of foreign interference, this may be by design. It does not explicitly define foreign interference despite having defined instances covered by the National Intelligence Committee report, the Standing Senate Committee on Intelligence report, and the Department of Homeland Security. It is a recognition that there needs to be action and develops a process to produce a report into instances of interference, but ultimately leaves the responsibility for a formal response to the discretion of the President. Shortly after signing the foreign interference executive order, President Trump approved the Cybersecurity and Infrastructure Security Agency Act of 2018 (CISA) creating a cybersecurity directorate within the Department of Homeland Security (White House, 2018). According to the DHS website, CISA is responsible for advising on risks related to threats facing the U.S.’ critical infrastructure and serves as an assess-and-advise branch for national security (DHS, 2018). The U.S. response to foreign interference as of 2019 has been reactive in nature rather than proactive. Former Secretary Kirstjen Nielsen delivered remarks at the State of Homeland Security Address which clarified the direction needed to address the age of foreign interference. In her speech, she states “the cyber domain is a target, a weapon, and a threat vector—all at the same time” underpinning the complexity of addressing the challenges arising from a networked society (Nielsen, 2019). Her address notably recognizes that threat actors like Russia “…have continued to interfere in our public affairs and have attempted to sow division online among Americans on hot-button issues” demonstrating that the threat is evolving to destabilize at the social level rather than the traditional overt methods of attack (Nielsen, 2019). In this vein, she states that we need a “whole of society” approach rather than simply a whole of government approach to overcome 16
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) these threats (Nielsen, 2019). Boot and Bergmann of the Council on Foreign Relations suggest that government agencies like CISA share influence attempts with the public to ensure that the public is aware (Boot et al., 2019). Presidential Candidate Eric Swalwell (D) has proposed legislation requiring any candidates or campaigns to report opposition research-style information offered by a foreign power (Swalwell, 2018). Two additional Bills written by Senators across the political spectrum have also been introduced calling on sanctions for those countries found interfering and all-encompassing economic sanctions respectively (Boot et al., 2019). According to securitizing actors around the White House, i is not enough to legislate, investigate, and retaliate; governments need to be aware of the sectors of society that are being impacted to determine the appropriate course of action needed in each case. The White House has opted to enhance cyber assessment capacity but has provided little direction or resourcing to do so. The 2018-2020 Annual Performance Report for the Department of Homeland Security notes that “if federal cybersecurity is not effectively implemented, compliance of directives and understanding of how to leverage tools and services will not occur” (DHS, 2019, 18). The report also writes that “CISA… faces delays in the hiring process, which poses challenges and risks to planned staffing levels to support critical infrastructure goals” (DHS, 2019, 18). A 2018 Report from the U.S. Senate Committee on Foreign Relations wrote that it is essential to assert Presidential leadership and launch a national response to counter hybrid threats like foreign interference, but so far, the resourcing required to do so has been lacking (USFR, 2018, 154). 17
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) On September 10, 2019 President Trump extended the notice of emergency passed through executive order 13848 on foreign interference (White House, September 10, 2019). Despite this move, President Trump’s commentary and action surrounding foreign interference in the U.S. has been contradictory. Numerous advisors representing some of the highest levels of the intelligence community have been fired or resigned during the President’s term (Diehm et al., 2019). In July of 2016, then Presidential candidate Trump actively called on Russia to hack into servers to find the deleted emails from Presidential candidate Clinton (CNN, October 11, 2019). In June of 2019, President Trump confirmed in an interview that he would take opposition research or scandals from foreign actors if it was offered (Bruggeman, 2019). On October 3rd, 2019, during a media briefing at the White House, President Trump urged the Ukrainian government to investigate his opponent in the 2020 Presidential election (Friedman, 2019). Further, countless tweets questioning the process around investigating instances of foreign interference appear on President Trump’s twitter page, with the latest attempting to discredit the FBI inquiry into the request for Ukrainian interference in the 2020 election (Trump, 2019). 2.2 Audience The perceived meddling in the U.S. election has resulted in public and expert outcry to defend the sanctity of democratic elections. The notion that foreign actors interfered in the electoral process, and possibly used social media to influence individual voters by manipulating extremes and feeding them with what has now been dubbed “fake news” has sown distrust in democratic institutions. While the United States is perhaps the most pervasive example of foreign interference, lawmakers have yet to formally recognize and define it. At the baseline, 18
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) foreign interference in the U.S. rests at the public level since it targets social behaviours impacting democratic elections. To understand the personal connection to foreign interference, the identity assigned to it by the general public, it’s useful to account for what the public generally believes. A 2018 Pew Research Centre survey sought to quantify what it means to be a good American citizen. The survey interviewed 4,656 respondents across the United States and selected at random (Pew, 2018, 113). The results indicate that the top three qualities for being a good citizen are, from bottom to top, following the law, voting in elections, and paying taxes owed; the highest level of ‘very important’ responses fell to voting in elections (Pew, 2018, 5). Americans were also asked what democratic values they view as important. The top response was that the rights and freedoms of all people are respected (Pew, 2018, 23). A poll conducted by researchers from Stanford University and the University of Wisconsin surveyed approximately 3000 adults who were selected to resemble the distribution of the U.S. voting population (Tomz et al., 2019, 17). The purpose of the poll was to identify degrees of acceptance or rejection of foreign interference activities based on specific scenarios ranging from public endorsement, to spreading truth or lies about a candidate, giving money, or hacking (Tomz et al., 2019, 17). According to the results, 87% of respondents disapproved when a foreign country “…took concrete action to bolster its favoured candidate”; hacking and financing raised disapproval to between 86% and 91% (Tomz et al., 2019, 24). Regarding the dissemination of information about candidates, results showed an interesting trend; regardless of whether the information was true or not, individuals disapproved of any information sharing by foreign entities at a rate of 80% for truth and 86% for lies (Tomz et al., 2019, 24). The impact of foreign interference on the public is perhaps most clear in the results stemming from active 19
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) interference campaigns; 75% of individuals indicated distrust in election results and 51% indicated a drop in faith in democracy in the U.S. as a whole (Tomz et al., 2019, 30). Another poll conducted by the NORC Center for Public Affairs Research at the University of Chicago maps sought to map concerns surrounding electoral tampering, influence campaigns, and information security. The population surveyed consisted of 1,116 individuals of voting age and higher representative of the U.S. household population from across the country (NORC, 2019). The NORC poll identifies similar concerns as the Stanford poll with 63% of Americans concerned about the vulnerability of their future elections to foreign interference (NORC, 2019). While there are concerns surrounding the hard security of electoral infrastructure such as protecting against hacking and digital results tampering, 47% of respondents had “…significant concerns about foreign influence on how Americans think about candidates or on the candidates themselves during the 2020 election.” (NORC, 2019). The results of these polls, while only reflective of a small fraction of American society, can be condensed into one overarching theme – faith in the U.S. system of democratic government is essential to the American identity and any attack on that system is an attack on the people it represents. Direct attacks such as those on infrastructure, hacking into polling stations, and tampering with results are of significant concern. But there is an aspect that is being overlooked by lawmakers in terms of response. The trust that Americans have in their system of government is also being attacked. How do you categorize a threat actor that targets a qualitative idea like faith? How must lawmakers respond to threats against the way their public thinks and acts? Experts in the field of intelligence and foreign affairs have provided insights into the hard policy aspect of foreign interference, specifically that society is experiencing interference with the one area of politics 20
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) that ultimately decides how people are governed. Without trust in institutions, the very notion of good government is under threat. 2.3 Analysis President Trump’s discourse on foreign interference, while contradictory to the various legislative action his office has taken to date, provides the basis for the speech act. Much of the audience’s awareness of foreign interference and its impact on the referent object, democratic elections, has been driven by government officials and advanced by functional actors. Table 1 provides a breakdown of the materials used in the case study analysis of the United States. In the table, the sources contributing to the securitization process are categorized based on their role. SECURITIZATION SCENARIO MATRIX: UNITED STATES Referent Securitizing Actor Functional Actor Audience Object President Trump Media National Intelligence Committee RAND Corporation Senate Committee on Foreign Council on Foreign Relations Relations Democratic Voting Elections Public Department of Homeland NORC Centre for Public Security Affairs Research Congressional and Senate Stanford and Wisconsin Representatives University Table 1: Breakdown of case study subjects for the United States 21
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) In this scenario, the securitizing actors have been the President, the National Intelligence Council, the Senate Committee on Foreign Relations, the Department of Homeland Security, and the elected officials who have called for immediate legislative action, and who have laid out the consequences of continuing to ignore the existence of foreign interference. According to many of them, lack of action moving forward could irreparably damage public trust in the mechanisms of government and thus undermine the security and sovereignty of the nation (NIC, 2017, 5; Nielsen, 2019; USFR, 2018, 154). The intensity and scale upon which Russian bots had infiltrated and spread fake news were determined to be direct attacks on the stability of U.S. governmental institutions and were undertaken with the intent of manipulating the way the audience perceived their government (NIC, 2017, 2). According to Buzan, “…interventions by one state in the domestic affairs of another… define the category more usefully…”, meaning the threat posed to the United States is one against the political sector (Buzan, 1983, 77). Security experts, Senate committee reports, and various government departments have directed the Executive branch towards options to tackle foreign interference, especially in democratic processes. The contributions of these civic groups are essential to the construction of the security environment. “Since the state is a legal and political construct built on the concept of sovereignty over a defined territory and population, it achieves security by ensuring its continued sovereignty and territorial integrity” (Theiler, 2003, 250). Many of these inputs, specifically from those speaking on behalf of the state and Departments like Foreign Affairs and Homeland Security, have conformed with the grammar of security on the matter of foreign interference by referencing the threat, categorizing it as an emergency, and demanding action to counter the negative effects of ignoring it (Wilkinson, 2015, 35). The findings of the National Intelligence 22
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) Council indicate as much, noting that the U.S. electoral process is at risk of being targeted again in future elections (NIC, 2017, iii). Former Secretary Nielsen, one of the recent resignees under the Trump Administration, went as far as to call out foreign interference as one of the modern methods of “…weaponizing our own innovation against us” calling on a “whole of society approach” to combat it (Nielsen, 2019). This is the beginning of the securitization process, “…to identify a threat to the social and cultural survival of community and a strategy to ward off that threat…” (Theiler, 2010, 107). These statements have driven much of the action emerging from the White House. The formal findings of the bi-partisan committee reports and those of intelligence officials have suggested that we are in the after-math of a significant threat to our democratic institutions and thus need immediate action to prevent further meddling in future elections to preserve the integrity of the system. As a response from the United States government, President Trump imposed an emergency response for foreign interference by invoking the first executive order, removing the security action from the regular legislative process. The use of an identified emergency mechanism, as it is formally understood, amplifies the message being delivered to the audience for the issue it is securitizing, which factors into the interaction between the state and the populace (Newman, 2001, 250). Following the various pushes from the functional actors like the Department of Homeland Security, President Trump moved the issue “…out of the sphere of normal politics [and] into the realm of emergency politics… [to be] dealt with swiftly and without the normal (democratic) rules and regulations…” (Taureck, 2006, 54-55). According to media coverage which has included the thoughts and opinions of functional actors, the response to foreign interference has been wanting. This, in part, adds to the narrative being pushed in the 23
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) United States by functional and supporting securitizing actors (like the various government agencies) who have contributed to securitizing interference by projecting their positions to the audience, but may not have a final say on action; in terms of society’s security, “…people look to the state and count on the state… to generate and to maintain the social condition of safety” which in this case includes the security of public discourse, free speech, and political thought and debate (Jackson, 2006, 16). The Brookings institute went as far as calling out President Trump’s double standard, claiming that he is both threatening to punish foreign interference, as is outlined by his executive order that says the U.S. will punish it with sanctions, but also by simultaneously inviting it for opposition research on his political opponents (Wright, 2019). They call on the government to implement harsher deterrent measures or face further instances of interference in the U.S’ democratic processes (Wright, 2019). While the main securitizing actor, the President, has taken few steps to counter the threat, other government officials have made the point that more needs to be done and functional actors agree. An NPR report suggests that “…a U.S. election as a whole is almost impossible to hack — but an adversary doesn't need to affect the whole country. All it needs to do is affect small numbers of people in key places...” (Ewing, 2019). The threat is thus defined as one that has not only occurred but is likely to occur again. In this instance, the functional actors are attempting to shift the discourse surrounding the security issue, acting as the neck to the head of state, pivoting his view toward how they define the threat and what they think the consequences of inaction could be. What are the implications of this? In a democratic state, it is not uncommon for special interest groups and non-governmental organizations to press for the addition of policy issues to the political agenda. In this case however, what is typically the role of the state (identifying and 24
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) declaring action on a national security threat) is now being championed by the functional actors. Such a shift could indicate that the issue has been successfully securitized since the demands for immediate response are originating in the public sphere. The audience is receiving more information from the functional actors than the securitizing actors, and public opinion polls indicate that the message is resonating. There are further concerns that a soft response to a nuanced threat like foreign interference will give way to more extensive cyber-based manipulations and attacks (Bloomberg, 2018). Buzan makes this point in another of his writings on securitization theory, specifically that an “… excessively passive policy… raises the danger that threats will become too large to deal with except at great cost” (Buzan, 1983, 89). The risk inherent in underestimating foreign interference is that it could result in the breakdown and even destabilization of the very system that allows for the fundamental democratic value of free and fair elections. Waever suggests that this is an important aspect of justifying extraordinary measures; “…the relative advantages of security handling compared to non-securitized handling” (Waever, 2011, 473). There continue to be extensive discussions from the securitizing actors in bringing the issue of foreign interference out of obscurity and into the emergency zone to counteract the possibility of an overly complacent audience, especially since these actors have stressed the importance of civil sector responsibility in recognizing the threat (Hansen et al., 2009, 1161). Elections and the right to vote have been entrenched in liberal democratic countries. If citizens are losing trust in the electoral process, it undermines the legitimacy of government. 25
Stephanie Henderson SN: 5568888 GSPIA Major Research Project (Fall 2019) Democratic engagement is one of the main methods of ensuring a government is accountable to its country, which in turn guarantees the strength of the sovereign state. “[For] a state, sovereignty defines when a threat is existential, because if a state is no longer sovereign, it is no longer a state…” (Buzan et al., 1997, 242). One of the polls included herein noted that 75% of Americans are losing faith in the electoral process due to the potential of foreign interference. If this poll is indeed representative, it points to a larger security problem facing the securitizing actor, specifically the legitimacy of their leadership in the eyes of the public. According to the various polls that have been taken from the general public, awareness of the threat posed by foreign interference is increasing. In fact, many Americans have identified that voting and being an informed citizen is important, while also agreeing that action should be taken to protect institutional stability. Many respondents also consider any form of interference from external actors to be highly problematic. This signifies at the bare minimum an acceptance of the speech act; that foreign interference is a security problem and requires immediate and strong action. 3.0 Case Study: Canada Canada faces both interference and influence operations, but to date Canada’s lawmakers, the media, and the general public have been prioritizing electoral integrity and security. There have been few bills dealing explicitly with foreign interference, though public pressure and political posturing have led to broad interpretations of what that means. Furthermore, unlike its allies, Canada has yet to fully unpack specific threat actors acting within the bounds of foreign interference, relying instead on explaining what identified threat actors are known to do on a broad basis. 26
You can also read