I think it's very difficult to guard against that kind of attack.
Here's where the state of the art is now. Essentially it's a collaboration among security services, outside researchers, and companies to try to detect in advance the coordinated activity of disinformation operators. There are signals in the network if you know how to look for them, and they're developing tools and they're doing what they call red teaming, which is to put yourself in the perspective of a malignant actor who might try that Beyoncé trick. How would you go about doing that? If you can do it, what are the ways that could be countered?
If we can think of it in an imaginative red team exercise, you can be sure that our adversaries are thinking of it as well, and you build prophylactic defences against those things that you can imagine doing. It's a very Cold War war-gaming exercise, and that's what's going on right now in the cybersecurity space.
You're not going to be able to defend against all of these things. You're only going to be able to contain a certain percentage, so the second piece of this is resilience. You need to have a plan in place to react very rapidly when that time bomb is triggered and suddenly something happens that you weren't expecting. You need to be able to react fast to bring it down and to educate the public who were contacted by that account that they have been engaged by either an automated account with malignant intent or a foreign-operated influence campaign. Those rapid response techniques are also things we ought to be developing.