18.04.2015 Views

The Weaponization of Social Media

The Weaponization of Social Media

The Weaponization of Social Media

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

spying s<strong>of</strong>tware and ways to exploit and prevent activists’ use <strong>of</strong> social<br />

network media. In Egypt, for instance, internet access was shut down for<br />

several days by Mubarak’s regime. Later on, internet activists were harassed<br />

by the Egyptian security forces. 41<br />

In a world where conflicts are being dramatically re-shaped by the<br />

information revolution, and there is no neat polarity, the outcome <strong>of</strong><br />

contemporary conflicts will involve a struggle for the perceptions <strong>of</strong><br />

multiple strategic audiences who are un-aligned to either side. 42 In this<br />

struggle in the information environment, social network media facilitated<br />

by mobile devices linked to or being a part <strong>of</strong> the internet become very<br />

important. Being a part <strong>of</strong> the internet also makes it a cyber (war) issue.<br />

Whether organized violence has been applied or threatened remains a<br />

central distinction between military and non-military activity, though this is<br />

increasingly complicated by activities such as cyber-threats or operations. 43<br />

This is especially the case when these activities or operations to a larger and<br />

larger extent are being regarded as “military operations”.<br />

Efforts to shape worldwide political perceptions according to the actors’<br />

security interests are, nonetheless, a characteristic <strong>of</strong> contemporary conflict.<br />

<strong>The</strong> problem, though, is how to define when something is a conflict or war<br />

when it comes to taking the struggle to the cyber domain – in which social<br />

network media resides.<br />

THE CYBER WAR DEBATE<br />

Defining “cyber-warfare” is no trivial task and many definitions currently<br />

exist, <strong>of</strong>ten very broad in scope, making it difficult to determine what it in<br />

reality is and when a cyber-attack is actually happening. Also if it is part <strong>of</strong> a<br />

criminal activity, political activism or actual war-fighting, and if so, if it can<br />

be categorised as war. <strong>The</strong> use <strong>of</strong> the word “war” also muddies the waters.<br />

<strong>The</strong>re is therefore a need for separating cyber-crime, online vandalism,<br />

civil policy orientated ”hacktivism” from what actually constitutes the use<br />

<strong>of</strong> cyber for warfare purposes. 44 Even though much <strong>of</strong> the first mentioned<br />

activities can be elements <strong>of</strong> armed conflicts, they do not constitute the use<br />

<strong>of</strong> military force per say. To narrow the scope <strong>of</strong> what we are dealing with, it<br />

is important to define the concepts <strong>of</strong> “Cyber-Warfare” and “Cyber-Attack”<br />

before we start discussing the role <strong>of</strong> social network media in contemporary<br />

conflicts.<br />

27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!