{"id":50930,"date":"2019-10-01T06:00:43","date_gmt":"2019-09-30T20:00:43","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=50930"},"modified":"2019-10-01T06:14:49","modified_gmt":"2019-09-30T20:14:49","slug":"snarky-tweets-as-a-national-security-imperative","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/","title":{"rendered":"Snarky tweets as a national security imperative"},"content":{"rendered":"
<\/figure>\n

The \u2018one-tweet hacker\u2019 slipped through the fingers of law enforcement once more last week when the Australian Federal Police dropped its investigation<\/a> into the alleged hacking of Liberal candidate Jessica Whelan\u2019s Facebook account during the federal election campaign, after she failed to provide the referral needed for the investigation to proceed.<\/p>\n

This case is the latest in a troubling pattern of political figures attributing embarrassing social media activity to \u2018hackers\u2019, only to see law enforcement investigations either not proceed or fail to find any evidence of unauthorised access to the complainants\u2019 accounts when they do.<\/p>\n

When former defence minister Christopher Pyne\u2019s<\/a>\u00a0and Health Minister Greg Hunt\u2019s<\/a>\u00a0Twitter accounts were each caught favouriting a porn tweet, they blamed it on a hacker with the peculiar MO of breaching high-profile political accounts and using this extraordinary access to favourite a single embarrassing tweet. Australia\u2019s ambassador to the US, Joe Hockey<\/a>, did the same when his account liked a tweet criticising former PM Malcolm Turnbull. Even Prime Minister Scott Morrison claimed an \u2018unauthorised\u2019 person<\/a> accessed his account when it liked a tweet questioning China\u2019s human rights record while he was treasurer. After their initial claims, neither Morrison, Pyne nor Hockey proceeded with a formal referral to the AFP. Hunt did, but after investigation, the AFP found no evidence<\/a> that his account was hacked.<\/p>\n

I don\u2019t call out this trend just to be snarky.<\/p>\n

Foreign interference through cyber-enabled information operations is a real and serious threat facing Australia and other liberal democracies. The most high-profile example of this was Russia\u2019s weaponisation of information obtained through the hacking of Hillary Clinton\u2019s campaign and the Democratic National Committee in the lead-up to the 2016 US election. Since then, we\u2019ve seen a flurry of similar operations around the world. ASPI\u2019s Hacking democracies<\/em> report found that 20 countries<\/a> have experienced cyber-enabled foreign interference of electoral and democratic institutions since 2016. The most common form of interference wasn\u2019t direct tampering with election results but disinformation campaigns aimed at undermining candidates, increasing polarisation and reducing public trust in institutions that underpin our democracies.<\/p>\n

It\u2019s entirely plausible that a hostile foreign actor could seek to embarrass a political figure by hacking their social media accounts. But when politicians cry \u2018I\u2019ve been hacked!\u2019 in the wake of online embarrassments without giving the claim the gravity it deserves and fully engaging with law enforcement investigations, it undermines the ability of responsible actors to call out real incidents. It makes us more vulnerable to subsequent information operations by feeding \u2018truth decay<\/a>\u2019\u2014the public perception that it\u2019s impossible to establish the objective facts of such an incident.<\/p>\n

Preventing cyber-enabled information operations is challenging because they are cheap and easy to run<\/a> and are hard to detect in a timely manner. Responding to them is difficult, too, as it\u2019s hard to identify perpetrators with 100% certainty. The best protection we have against these attacks is healthy, robust democratic institutions that the public trusts. When functioning well, these institutions can act as a national immune system that can identify and alert the public to disinformation campaigns.<\/p>\n

A society in which the public trusts media organisations, political parties, electoral institutions, courts, law enforcement agencies and government is the best inoculation against foreign disinformation campaigns. Trusted democratic institutions are our \u2018magic weapons<\/a>\u2019.<\/p>\n

Unfortunately, trust in democracy and politics is at a low point in Australian history<\/a>. Only 41% of Australians are satisfied with the way democracy works, down from 86% in 2007. More than 60% of Australians believe the honesty and integrity of politicians are very low.<\/p>\n

Restoring public trust and confidence in our democratic institutions should be viewed as a national security imperative for liberal democracies.<\/p>\n

Policy reforms and institutional innovation are part of the solution to restoring this trust. The federal government should combat public perceptions of corruption by establishing a national integrity commission. We need to protect our independent media by ensuring they are free from intimidation and political interference. Our media can only be independent if they are appropriately funded. Ensuring that would mean looking seriously at the recommendations of the Australian Competition and Consumer Commission\u2019s digital platforms inquiry<\/a> and properly funding our public broadcasters.<\/p>\n

But the personal conduct of individual actors within our democratic institutions matters too. In an environment of declining public trust, people in our democratic institutions need to constantly reflect on how their conduct affects the health of the system. When politicians make claims of hacking that aren\u2019t validated by subsequent law enforcement investigations, their behaviour further erodes public trust in our democratic system.<\/p>\n

When political figures face incidents of online embarrassment, we should expect them to ensure that the potential for \u2018insider\u2019 responsibility is properly investigated before they make public allegations of \u2018hacking\u2019. Similarly, it should be a strong norm that when political figures make public claims of hacking, they fully cooperate with law enforcement.<\/p>\n

Sociologists will tell you that the best way to enforce a norm is through social sanction. The case of the \u2018one-tweet hacker\u2019 certainly attracted its share of snarky tweets<\/a>\u2014the 21st-century social sanction. Given the context, the mocking tweeters can reassure themselves that their tweets weren\u2019t just cathartic\u2014they were small contributions to strengthening our democratic resilience and national security.<\/p>\n","protected":false},"excerpt":{"rendered":"

The \u2018one-tweet hacker\u2019 slipped through the fingers of law enforcement once more last week when the Australian Federal Police dropped its investigation into the alleged hacking of Liberal candidate Jessica Whelan\u2019s Facebook account during the …<\/p>\n","protected":false},"author":401,"featured_media":50934,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[416,749,728,1279],"class_list":["post-50930","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australian-government","tag-cyber-espionage","tag-hacking","tag-twitter"],"acf":[],"yoast_head":"\nSnarky tweets as a national security imperative | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Snarky tweets as a national security imperative | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The \u2018one-tweet hacker\u2019 slipped through the fingers of law enforcement once more last week when the Australian Federal Police dropped its investigation into the alleged hacking of Liberal candidate Jessica Whelan\u2019s Facebook account during the ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-30T20:00:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-30T20:14:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/1138088_f565431f9d_c.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tim Watts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Watts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/1138088_f565431f9d_c.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/1138088_f565431f9d_c.jpg\",\"width\":800,\"height\":600},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/\",\"name\":\"Snarky tweets as a national security imperative | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/#primaryimage\"},\"datePublished\":\"2019-09-30T20:00:43+00:00\",\"dateModified\":\"2019-09-30T20:14:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/afb5fae625bf32a4de4b5325f81c0722\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Snarky tweets as a national security imperative\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/afb5fae625bf32a4de4b5325f81c0722\",\"name\":\"Tim Watts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f01ce095af685535c4ccf5ceecb1fd26?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f01ce095af685535c4ccf5ceecb1fd26?s=96&d=mm&r=g\",\"caption\":\"Tim Watts\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/tim-watts\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Snarky tweets as a national security imperative | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/","og_locale":"en_US","og_type":"article","og_title":"Snarky tweets as a national security imperative | The Strategist","og_description":"The \u2018one-tweet hacker\u2019 slipped through the fingers of law enforcement once more last week when the Australian Federal Police dropped its investigation into the alleged hacking of Liberal candidate Jessica Whelan\u2019s Facebook account during the ...","og_url":"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2019-09-30T20:00:43+00:00","article_modified_time":"2019-09-30T20:14:49+00:00","og_image":[{"width":800,"height":600,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/1138088_f565431f9d_c.jpg","type":"image\/jpeg"}],"author":"Tim Watts","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Tim Watts","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/1138088_f565431f9d_c.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/1138088_f565431f9d_c.jpg","width":800,"height":600},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/","url":"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/","name":"Snarky tweets as a national security imperative | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/#primaryimage"},"datePublished":"2019-09-30T20:00:43+00:00","dateModified":"2019-09-30T20:14:49+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/afb5fae625bf32a4de4b5325f81c0722"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/snarky-tweets-as-a-national-security-imperative\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Snarky tweets as a national security imperative"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/afb5fae625bf32a4de4b5325f81c0722","name":"Tim Watts","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f01ce095af685535c4ccf5ceecb1fd26?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f01ce095af685535c4ccf5ceecb1fd26?s=96&d=mm&r=g","caption":"Tim Watts"},"url":"https:\/\/www.aspistrategist.ru\/author\/tim-watts\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/50930"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/401"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=50930"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/50930\/revisions"}],"predecessor-version":[{"id":50938,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/50930\/revisions\/50938"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/50934"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=50930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=50930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=50930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}