copyright notice
link to the published version: IEEE Computer, March, 2020


accesses since May 31, 2021

NEW PERSPECTIVES ON (ANTI)SOCIAL MEDIA

Hal Berghel

Much has been written recently about the political problems caused by anti-social media. Here’s an account of two very different perspectives on the causes and consequences.


What do we make of the recent spate of criticism of the major social media monopolies like Google, Facebook, WhatsApp, Instagram, Twitter, TikTok and the like? Or, to put the matter differently, what is their overall social impact on our information society? Are these platforms legitimately improving the social mobility and inclusiveness of society, or are such claims proffered as thin veneers to conceal abusive monopolies who masquerade as servants of the public interest? These are important questions that are insufficiently addressed by the public and politicians, and only slightly better addressed by mainstream media. The reasons for this are manifold: enormous lobbying power of social media companies, interconnected interests of these companies and commercial media, technical barriers to journalist's understanding of the underlying platforms, unwillingness on the part of politicians to openly challenge the business models of powerful tech companies, and most importantly, the lack of sufficient political support for protecting the privacy of U.S. citizens.

There was no federal protection of personal privacy in the U.S. from its founding. This was by design - and the current economic and political power base of the country wants it to stay that way. If there were to be a single factor that ties together identity theft, credit card fraud, computer crimes, online trolling, phish scams and title fraud on the one hand with partisan political manipulation by gerrymandering, voter disenfranchisement and vote suppression (by caging, purging, vote nullification, dilution and disinformation streams, etc.) on the other, it is the absence of federal privacy protections for citizens. As I've written about these topics before [BERG1][BERG2]{BERG3][BERG4], we needn't go into them here. Suffice it to say that business and commercial interests have prevailed upon politicians to consistently support corporate interests (e.g., right to make money) over public interests (e.g., right to be left alone) in this regard. The Equifax hack and the Cambridge Analytica scandal are two sides of the same coin: they are both consequences of commercial and/or partisan interests profiting from the use of personal information without the knowledge, permission and regard of the people involved.

It is a mistake of the first order to attribute the outcomes of these two events (loss of personally identifiable information of half the adult population in the US to cybercriminals in the case of Equifax, and micro-targeting of Facebook users and “friends” by partisan political operatives in the case of Cambridge Analytica) to coincidence. These consequences were not accidents! These were entirely predictable outcomes of socially irresponsible uses of personal data – irresponsible use that is legal in the US. [SENATE] [WYLIE] There is a reason why commercial and partisan interests vigorously and uniformly oppose such notions as requiring opt-in for online services, net neutrality, data collection transparency, etc. These interests would have us believe that stealth blocking, content filtering, traffic shaping, protocol discrimination, etc. are tools that ISPs may use to enhance customer satisfaction with their networks. Taken together these concepts underscore the fact that citizen-consumers are first and foremost products of online platforms and only secondarily customers or users. Further, online platform businesses hold that these human products have no inherent rights that corporate interests are bound to recognize. We are in a new Lochner era where congress and the courts are comfortable with the seemingly unrestricted corporate use of citizen's personal information. As with the original Lochner era a century ago, the prevailing political and legal view sees subsume corporate rights under the Fourteenth Amendment's due process clause for corporate freedom of contract! This is new millennium neoliberalism at its finest.

This point is made most dramatically by studying the effects federal financial integrity legislation such as Sarbanes-Oxley (SOX). Motivated by the accounting scandals of Enron, WorldCom, and Tyco, Congress passed SOX to hold key executives of corporations personally liable for frauds taking place under their leadership. But only rarely do financial crime convictions result from Sarbanes-Oxley prosecutions. [SEYMOUR] It seems more likely that such control fraud convictions will result from state faithless servant prosecutions within the few states that have such laws. To illustrate, the first prosecution of a CEO under SOX was that of Richard Scrushy, CEO of HealthSouth, in 2003 led to an acquittal despite overwhelming evidence. [DOJ] [CRAWFORD] Scrushy's subsequent conviction and imprisonment was for bribery, conspiracy and mail fraud unrelated to the SOX prosecution.

The lack of corporate accountability is well documented when it comes to anti-social media as well as corporate fraud. The latter point has been well documented of late by two authors with very different perspectives.: venture capitalist Roger McNamee [MCNAMEE] and political communications researcher and university professor Kathleen Hall Jamieson [JAMIESON]. Approaching the problem from very different perspectives, their views are surprisingly congruent.

ZUCKING AMERICA

McNamee was an early investor in Facebook and while his technical understanding of the platform (and computing for that matter) may not intoxicate the broader computer science and engineering audience, his social commentary seems to be spot on (unusual for a venture capitalist from my experience). I'll pick a few nits to illustrate the deficiencies of his commentary. First, McNamee summarizes Metcalf's law as describing the geometric growth of the value of a network - Metcalf described it as quadratic growth. Second, he states that networking began around a single minicomputer, ignoring the significantly earlier mainframe contributions of IBM (RSCS/VNET), Network Systems' HYPERchannel, American Airlines SABRE reservation system, Control Data's Plato environment, etc. – all mainframe-centric. There are even some whoppers like “with the exception of Digital Equipment, all of the market leaders of the past still exist today.” When is the last time you saw computers by Control Data, Univac, General Electric, RCA, Burroughs, Sperry Univac, NCR and Honeywell advertised? While, the first half of the book is sprinkled with dozens of off-putting lapses of the pen, the last half of the book which focuses on the abuses of social media platforms offers some useful (if unorthodox) perspectives from a venture capitalist that is worthwhile even to a technical computing audience.

McNamee introduces the topic of social media by reference to the research in computer persuasion by Stanford behavioral scientist B.J. Fogg. [FOGG] This was an exceedingly good narrative strategy, for it is impossible to fully understand the success of social media (and the Cambridge Analytica scandal for that matter) without reading Fogg. From a scholarly perspective, Fogg's work falls somewhere within a triangle whose vertices are represented by Edward Bernays, Stanley Milgram and Ron Popeil. Fogg uses experimental psychology techniques to study how computing technology can be used persuasively. Of course there is a darker side to this research highlighted by our vertices: how computing technology can be misused persuasively. One example of that would be what I've called abuse-forming networks. [BERGAB]

However, beginning the analysis with Fogg was inspired for it lays bare the motivations behind social media platforms as such and in general. To quote McNamee

“…computing devices allow programmers to combine psychology and persuasion concepts … like propaganda with techniques from slot machines, like variable rewards, and tie them to the human social need for approval and validation in ways that few users can resist.” [MCNAMEE]

That is essentially the observation that binds Edward Bernays, Stanley Milgram and Ron Popeil. They were all masters of the practice of manipulating unsuspecting subjects. This is an underappreciated dimension of our human predicament. There are a lot of people who are interested in getting others to do things that they normally wouldn't be inclined to do – from applying painful electric shocks to innocent victims to getting women to smoke cigarettes to talking people into buying vegomatics and pocket fishermen. It's all about manipulation, and Fogg is an important contributor to the scholarship behind the manipulation of the unsuspecting by social media.

The payoffs for social media manipulation are much greater (toward both social good and bad) than were available before computer networks (e.g., direct mailing, print advertising, etc.). McNamee points out that some of the downsides include encouraging tribalism through preference and filter bubbles, legitimizing extremism, using anonymity to reduce the barriers to anti-social expression, de-sensitizing people to racist and anti-semitic rants, build and propagate conspiracy theories, delegitimize opposing views by inflammatory disinformation, etc. McNamee cautions that “if you are a bad actor and you want to manipulate people in a preference bubble, all you have to do is infiltrate the tribe, deploy the appropriate dog whistles, and you are good to go. That is what the Russians did with the U.S. presidential election in 2016 and what many are doing now.” [MCNAMEE] It is important to add that these techniques are not new to, but were exacerbated by, social media. The most successful tyrants and dictators in history were devotees to such techniques, but until recently were denied access to the technology platforms that brought the techniques to the current level of maturity and convenience. It should also be emphasized that the dynamics behind such manipulative strategies have been widely discussed in the scholarly literature for decades. Herman and Chomsky's seminal work, Manufacturing Consent, [HERMAN] and two of Jason Stanley's recent books provide a yeoman's understanding. [STAN1][STAN2] The problem is not that scholars don't understand the practice of mass manipulation, but rather that so much of the public chooses to remain willfully ignorant of it. There are just some scholarly topics that aren't amenable to YouTube, clickstreams, and 30-minute news cycles. Mass manipulation is one of them.

 

<<PULL QUOTE: There are just some scholarly topics that aren't amenable to YouTube, clickstreams, and 30-minute news cycles. Mass manipulation is one of them. >>

 

One of the deficiencies of Fogg's analysis is that it fails to adequately emphasize with the influence of cognitive biases on the ascription of credible sources. Tribalists are more likely to perceive information as credible when it accords with their own preconceptions (confirmation bias). Fogg tends to ascribe far too much to end-user gullibility [FOGG2], and not nearly enough to the psychological realities of rational deficits such as cognitive dissonance. [FESTINGER] McNamee reflects on the use of Fogg's toolkit to accomplish such manipulation thusly: “technology companies [devote] some of their best minds to exploiting the weaknesses in human psychology.” The only change I might make is to substitute “realities” for “weaknesses.” That caveat notwithstanding, McNamee seems to understand our present predicament quite well. McNamee and I divide mostly on the issue of motive. What McNamee doesn't recognize is that the business practices of Facebook and Google are closer to those of Enron and Theranos than they are to Hewlett-Packard and Microsoft. In my view, McNamee's attribution of honorable motives to social media companies like Facebook is both naïve and misplaced. It is not so much that the executives of these companies are immoral, but amoral. Considerations of truth, justice, fairness, diversity, rights to privacy, etc. do not appear on their compass cards. Facebook's motto was “move fast and break things” and not “proceed cautiously and be mindful of the rights of others.” It is worthwhile to reflect on the guiding principles of the social media companies by noticing the gap between these principles and the ACM Code of Ethics and Professional Conduct, especially the sections on doing no harm, respecting privacy, honoring confidentiality, and treating people fairly. [ACM] It is important to re-emphasize that social media participants are first and foremost products that can be monetized, and only secondarily customers, end-users and citizens. McNamee underscores that the Cambridge Analytica story shows that society must look at social media platforms in terms of the total cost of ownership – or, more accurately perhaps, the total cost of abuse. [BERGAB] Similar points are to be found in other recent books on anti-social media. [WYLIE][MARANTZ][VAID]

McNamee's significant contribution to the study of social media in general, and Facebook in particular, comes at the end of the book. The last two chapters consist of policy recommendations that are wellk thought through and worthy of consideration.

DIGITAL MERCERNARIES AND THEIR GASLIT NATIONS

The 2016 polls were right – at least in terms of predicting popular vote. E.g., the 538 prediction was a 4% popular vote lead for Clinton ( https://projects.fivethirtyeight.com/2016-election-forecast/ , https://electionprojection.com/latest-polls/presidential-polls.php , https://transition.fec.gov/pubrec/fe2016/federalelections2016.pdf ). The final result was a 2.1% popular vote advantage for Clinton ( https://docs.google.com/spreadsheets/d/133Eb4qQmOxNvtesw2hdVns073R68EZx4SfCnP4IGQf8/htmlview?sle=true#gid=19 ) , well within a reasonable margin of error. As is well documented that the 2016 election was one of five in the history of the United States (1824, 1876, 1888, 2000, 2016) where the winner of the popular vote was defeated. On balance, the 2016 polls accurately predicted what they purported to survey: popular opinion. What they did not do is accurately predict was the effects of digital mercernaries and gaslighting, and the subsequent effects on the electoral college outcome. For example, they did not see that the electoral vote would be determined by 75,000 votes in only three states – and that these voters would be the objects of sophisticated micro-targeting. This is the starting point of Kathleen Hall Jamieson's recent book, Cyber-War [JAMIESON] which elaborates on the problems that McNamee addresses though through the lens of a social scientist.

Whereas McNamee approached social media abuses from the business point of view, Jamieson sees it from the perspective of political communication. Put simply, McNamee emphasizes the uses of social media to control the political conversation, while Jamieson emphasizes the effects of social media on the body politic. Their positions are remarkably congruent given their different interests. Taken together they make a compelling case that the relationship between social media and the political conversation needs to be carefully studied by computing and social scientists.

In addition, 2016 revealed the potential of social mediators like Wikileaks as a political weapon as well as an information conduit became obvious. Based on its partisan involvement in the 2016 US presidential election, Wikileaks might be best viewed inter alia as an asymmetrical information disintermediator – i.e., an information source that receives, filters and distributes real source data that conforms to a particular agenda – in this case a partisan one. Jamieson persuasively argues that the Wikileaks dump of John Podesta's stolen emails shortly after the Access Hollywood tape release completely re-framed the political narrative two days before the second presidential debate. I know of no reputable scholar or journalist who feels that these two events were coincidental. This changed the narrative changed in two ways. First, it directed the attention away from Trump's indiscretions and toward the confidential, internal workings of Hillary Clinton's campaign – warts and all. This provided ammunition for Trump supporters who were in desperate search for a deflection point to distract attention away from the Access Hollywood tape release. But more importantly, as Jamieson shows, it targeted Wikileaks as the source of the Podesta leak in the mind of the public, when Russians were the actual source [ISICORN]. In terms of our new nomenclature, Wikileaks served as an asymmetrical information disintermediator between the Russian hackers who retrieved Podesta's emails and the public. Note that this distinction is critical to understanding of the event. Had the public and the Trump campaign been informed that the source of the emails were Russian agents, the partisan value of the information would have diminished. The commercial media may be legitimately faulted for failing to emphasizing this distinction. This was an example of the harmful effects of short form journalism. There was no I.F. Stone or George Seldes to carry the burden of investigative reporting to be found anywhere near this issue in real time.

In one sense, McNamee may be seen as looking at social media dystopia proactively while Jamieson is viewing it reactively. Taken together, they offer a rather complete overview of the digital gaslighting that we've witnessed over the past decade or so. For those of us involved in computing and networking technology and public policy, the questions we must address relate to how this manipulation works – both from the point of view of deployment (e.g., perception management, social engineering, micro-targeting on hot button issues) as well as the effect of nurturing sundry forms of tribalism (religious, racial, ethnic, ultra-nationalist, ideo-political, anti-immigrant, etc.). To study one of these dimensions without the other will preclude adequate understanding of the political abuse of anti-social media in a historical context. For example, the public manipulation that preceded genocides (e.g., Nazi, Hutu, Janjaweed, Khmer Rouge) seem to be tribal-inspired efforts not unlike those in use by today's social media cyber mercenaries.

Jamieson suggests that the 2016 US election disinformation campaigns proved two things: (1) disinformation is a powerful tool for engaging and energizing tribes, and (2) there is minimal political or legal penalty for such aggressive, offensive tactics (it may be worthwhile to consider my remarks about SOX in this regard). Consider that the successful prosecutions resulting from the recent Mueller investigation [MUELLER] were for such things as making false statements to the FBI, fraud, witness tampering, campaign finance laws, and lying to Congress – not for using social media campaigns to subvert a presidential election. Now that we have a fuller understanding of what happened in 2016, we should be asking ourselves what are the future hot button issues that will trigger the tribes and how we may prepare for the continued weaponization of social media – for the continued use of social media for disinformation campaigns is a foregone conclusion. GMOs, Global Warming, Racism, bigotry, white supremacy, anti-immigration, anti-liberal, and sundry other examples of fear mongering will continue to be useful hot button issues for disinformationalists? To re-purpose a phrase from Blaise Pascal, democracy demands a prepared mind.

I'll use the term lizard brain populism to refer to a socio-political-economic ecosystem that drives social media disinformation. It is important to recognize that the money behind both social media platforms and K-Street lobbyists have the same sources and motives. They are both grounded in public manipulation, and their business models are neither public-spirited nor citizen-centric. What is more, another concomitant effect of the disinformation (or propaganda) is what Alexi Yurchak calls hypernormalization - where the culture becomes so accustomed to the disinformation (aka fake news) that they're willing to accept any alternative as viable – no matter how absurd. [YURCHAK] In Jamieson's terms, “Activated cynicism depresses learning” ( https://www.youtube.com/watch?v=H1WW0yQOtuo ). We might think of hypernormalization as cultural social engineering.

To say that the targets of social media have gullibility in common is too simplistic. To paraphrase P.T. Barnam, there are different tranches of social media “suckers” born every minute. For example, in the case of the Cambridge Analytica scandal, there wasn't much overlap between those who fell for the “this is your digital life” app ruse and the victims of the subsequent microtargeting effort. The former might well be admonished for failure to read the app's (and Facebook's) licensing agreement, but this admonishment wouldn't apply to the victims of the subsequent political microtargeting. Each of these tranches merit separate study. And while the snarky among us might claim that the common theme is the lure of both groups to the shallow reaches of the gene pool, the fact is that each victim group is best be viewed as sociologically or psychologically distinct. The digital manipulators and abusers among us understand this quite well. It is the public – and perhaps a smattering computing professionals – that fail to adequately appreciate such distinctions. It is the responsibility of the informed of any stripe to educate the uninformed to mitigate against future abuses that result from confusion over the myth math of ideas flowing out of the social media platforms.

REFERENCES:

[BERG1] Berghel, Hal, Digital Politics 2016, Computer, Jan, 2016, pp. 75-79. ( https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7383164 )

[BERG2] Berghel, Hal, Equifax and the Latest Round of Identity Theft Roulette, Computer, Dec. 2017, pp. 72-76. ( https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8220474 )

[BERG3] Berghel, Hal, Malice Domestic: The Cambridge Analytica Dystopia, May, 2018, pp. 84-89. ( https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8364652 )

[BERG4] Berghel, Hal, Disinformatics: The Discipline behind Grand Deceptions, Computer, January, 2018, pp. 89-93 ( https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8268033 )

[SENATE] How Equifax Neglected Cybersecurity and Suffered a Devastating Data Breach, U.S. Senate Permanent Subcommittee on Investigations, Committee on Homeland Security and Government Affairs, 2018. ( https://www.hsgac.senate.gov/imo/media/doc/FINAL%20Equifax%20Report.pdf )

[WYLIE] Wylie, Christopher, Mindf*ck: Cambridge Analytica and the Plot to Break America, Random House, 2019.

[SEYMOUR] Seymour, Karen, Sarbanes-Oxley's lost promise: Why CEOs haven't been prosecuted, Reuters, July 27, 2012. ( http://blogs.reuters.com/alison-frankel/2012/07/27/sarbanes-oxleys-lost-promise-why-ceos-havent-been-prosecuted/ )

[DOJ] HEALTHSOUTH FOUNDER AND FORMER CEO RICHARD SCRUSHY CHARGED IN $2.7 BILLION ACCOUNTING FRAUD CONSPIRACY, Department of Justice release, November 4, 2003. ( https://www.justice.gov/archive/opa/pr/2003/November/03_crm_603.htm )

[CRAWFORD] Crawford, Krysten, Ed-HealthSouth CEO Scrushy walks, CNN Money, June 28, 2005. ( https://money.cnn.com/2005/06/28/news/newsmakers/scrushy_outcome/index.htm )

[MCNAMEE] McNamee, Roger, Zucked: Waking up to the Facebok Catastrophe, Penguin, 2019.

[JAMIESON] Jamieson, Kathleen Hall, Cyber-War: How Russian Hackers and Trolls Helped Elect a President, Oxford University Press, 2018.

[FOGG] Fogg, B.J., Persuasive Technologies (special issue on), Communications of the ACM, 42:5, May, 1999. ( https://cacm.acm.org/magazines/1999/5 )

[ACM] ACM Code fo Ethics and Professional Conduct, 2018. ( https://www.acm.org/code-of-ethics )

[BERGAB] Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media, Computer, April, 2018. Pp. 70-73. ( https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8352071 )

[HERMAN] Herman, Edward and Noam Chomsky, Manufacturing Consent: The Political Economy of the Mass Media, Pantheon, Reprint (2002).

[STAN1] Stanley, Jason, How Propaganda Works, Princeton Univ. Press (2016).

[STAN2] Stanley, Jason, How Fascism Works: The Politics of Us and Them, Random House (2018).

[FOGG2] Tseng, Shawn and B.J. Fogg, Credibility and Computing Technology, Communications of the ACM, 42:5, May, 1999, pp. 39-44. ( https://cacm.acm.org/magazines/1999/5/7905-credibility-and-computing-technology/fulltext )

[FESTINGER] Festinger, Leon, A Theory of Cognitive Dissonance, Stanford University Press, 1957.

[MARANTZ] Marantz, Andrew, Antisocial: Online Extremists, Techno-Utopians, and the Hijacking of the American Conversation, Viking, 2019.

[WYLIE] Wylie, Christopher, Mindf*ck: Cambridge Analytica and the Plot to Break America, Random House, 2019.

[VAID] Vaidhyanathan, Siva, Antisocial Media: How Facebook Disconnects Us and Undermines Democracy , Oxford University Press, 2018.

[ISICORN] Isikoff, Michael and David Corn, Russian Roulette: The Inside Story of Putin's War on America and the Election of Donald Trump , Twelve Publishing, 2018.

[MUELLER] The Mueller Report: The Final Report On The Investigation Into Russian Interference In The 2016 Presidential Election, independently published, 2019.

[YURCHAK] Yurchak, Alexei, Everything Was Forever, Until It Was No More: The Last Soviet Generation (In-Formation) , 2005.