The Weaponization of Social Media
The Weaponization of Social Media
The Weaponization of Social Media
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
spying s<strong>of</strong>tware and ways to exploit and prevent activists’ use <strong>of</strong> social<br />
network media. In Egypt, for instance, internet access was shut down for<br />
several days by Mubarak’s regime. Later on, internet activists were harassed<br />
by the Egyptian security forces. 41<br />
In a world where conflicts are being dramatically re-shaped by the<br />
information revolution, and there is no neat polarity, the outcome <strong>of</strong><br />
contemporary conflicts will involve a struggle for the perceptions <strong>of</strong><br />
multiple strategic audiences who are un-aligned to either side. 42 In this<br />
struggle in the information environment, social network media facilitated<br />
by mobile devices linked to or being a part <strong>of</strong> the internet become very<br />
important. Being a part <strong>of</strong> the internet also makes it a cyber (war) issue.<br />
Whether organized violence has been applied or threatened remains a<br />
central distinction between military and non-military activity, though this is<br />
increasingly complicated by activities such as cyber-threats or operations. 43<br />
This is especially the case when these activities or operations to a larger and<br />
larger extent are being regarded as “military operations”.<br />
Efforts to shape worldwide political perceptions according to the actors’<br />
security interests are, nonetheless, a characteristic <strong>of</strong> contemporary conflict.<br />
<strong>The</strong> problem, though, is how to define when something is a conflict or war<br />
when it comes to taking the struggle to the cyber domain – in which social<br />
network media resides.<br />
THE CYBER WAR DEBATE<br />
Defining “cyber-warfare” is no trivial task and many definitions currently<br />
exist, <strong>of</strong>ten very broad in scope, making it difficult to determine what it in<br />
reality is and when a cyber-attack is actually happening. Also if it is part <strong>of</strong> a<br />
criminal activity, political activism or actual war-fighting, and if so, if it can<br />
be categorised as war. <strong>The</strong> use <strong>of</strong> the word “war” also muddies the waters.<br />
<strong>The</strong>re is therefore a need for separating cyber-crime, online vandalism,<br />
civil policy orientated ”hacktivism” from what actually constitutes the use<br />
<strong>of</strong> cyber for warfare purposes. 44 Even though much <strong>of</strong> the first mentioned<br />
activities can be elements <strong>of</strong> armed conflicts, they do not constitute the use<br />
<strong>of</strong> military force per say. To narrow the scope <strong>of</strong> what we are dealing with, it<br />
is important to define the concepts <strong>of</strong> “Cyber-Warfare” and “Cyber-Attack”<br />
before we start discussing the role <strong>of</strong> social network media in contemporary<br />
conflicts.<br />
27