02.12.2015 Views

Strategic Communications and Social Media in the Russia Ukraine Conflict

CyberWarinPerspective_Lange_Svetoka_12

CyberWarinPerspective_Lange_Svetoka_12

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

to track <strong>the</strong> <strong>in</strong>itial source of <strong>in</strong>formation, verify its au<strong>the</strong>nticity, <strong>and</strong> separate fact<br />

from fiction.<br />

With <strong>the</strong> <strong>in</strong>creas<strong>in</strong>g popularity of social media platforms, <strong>the</strong> concept of social<br />

cyber attack is ga<strong>in</strong><strong>in</strong>g traction. 3 It allows for a low-cost, speedy way of manipulat<strong>in</strong>g<br />

society’s perceptions <strong>in</strong> order to cause disruptive behaviour <strong>in</strong> real life. The<br />

social cyber attacks observed dur<strong>in</strong>g <strong>the</strong> crisis <strong>in</strong> Ukra<strong>in</strong>e led to an assumption that<br />

at least part of <strong>the</strong>m were implemented <strong>in</strong> an organised way, as part of a larger <strong>in</strong>fluence<br />

strategy.<br />

3 Psychological Operations (PSYOPS) <strong>and</strong> <strong>Social</strong> <strong>Media</strong><br />

Psychological Operations (PSYOPS) is a military activity which is aimed at <strong>in</strong>fluenc<strong>in</strong>g<br />

<strong>the</strong> perceptions, attitudes <strong>and</strong> behaviours of target populations. The perception<br />

is usually affected by ei<strong>the</strong>r emotional appeals or rational arguments, correspond<strong>in</strong>g<br />

to <strong>the</strong> master narrative, <strong>and</strong> <strong>in</strong> social media, where one has to compete with a flood<br />

of <strong>in</strong>formation <strong>and</strong> large amounts of <strong>in</strong>formation noise, elements like surprise, cognitive<br />

dissonance, easily recognisable symbols or some eye-catch<strong>in</strong>g techniques are<br />

used <strong>in</strong> order to draw <strong>the</strong> audience <strong>in</strong>to <strong>the</strong> PSYOPS product.<br />

In PSYOPS <strong>the</strong> <strong>in</strong>fluence over a target group is often achieved by spread<strong>in</strong>g<br />

rumours. Those can be:<br />

• Hate rumours: exploit <strong>in</strong>gra<strong>in</strong>ed dislikes <strong>and</strong> prejudices<br />

of a target population.<br />

• Fear rumours: exploit a human tendency to believe <strong>the</strong> worst.<br />

• Hope rumours: exploit wishes for a favourable turn of events.<br />

Modern technology allows particularly easy exploitation of digital material <strong>in</strong><br />

order to produce falsified or ambiguous content which can be used for deception<br />

<strong>and</strong> manipulation. Textual messages (posts, status updates, comments) can also be<br />

crafted accord<strong>in</strong>g to <strong>the</strong> same pr<strong>in</strong>ciples.<br />

<strong>Social</strong> media provides fruitful soil for PSYOPS as it is largely a trust-based network<br />

s<strong>in</strong>ce it is formed on a networks of friends or like-m<strong>in</strong>ded group members.<br />

Hence <strong>the</strong> <strong>in</strong>formation com<strong>in</strong>g from an <strong>in</strong>dividual or group can be more trusted<br />

than that com<strong>in</strong>g from an official mass-media outlet or government communicators.<br />

This trust can be manipulated to achieve particular effects. It allows target<strong>in</strong>g<br />

of groups of people connected by certa<strong>in</strong> social ties which <strong>in</strong>creases <strong>the</strong> chance of<br />

<strong>the</strong> desired effect on perception <strong>and</strong> behaviour.<br />

It is also very easy to hide <strong>the</strong> real identity or orig<strong>in</strong>al source of <strong>in</strong>formation on<br />

social media as well as manipulate digital data such as imagery. Hence <strong>the</strong> concept<br />

3 Rebecca Goolsby. On Cybersecurity, Crowdsourc<strong>in</strong>g <strong>and</strong> <strong>Social</strong> Cyber-Attack. Wash<strong>in</strong>gton: Wilson Center. U.S. Office of Naval<br />

Research, 2013.<br />

105

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!