Psychological Warfare On Social Media

@Indian_Army Twitter ID 

The Indian Minister of State for Information and Broadcasting Rajyavardhan Rathore  was addressing a gathering at a function organised by Jammu and Kashmir People's Forum to mark 'Kargil Vijay Diwas' at the Constitution Club of India.

"The world is changing. First there was traditional war, then nuclear war, and then limited intensity war (like Kargil). But, today's threat is of cyber war and through that psychological warfare. And, this psychological war is the biggest war," he said.

"Recently a terorist was gunned down in Kashmir like many other terrorists have been killed...And, talking about this psychological warfare which is being waged in the realm of social media, what followed on Twitter after that terrorist was shot dead...

"There were 1,25,000 tweets on that terrorist, out of which only 49,000 were from India, 52,000 from unknown locations and 10,000 from Pakistan," he said.

Rathore lauded the sacrifices made by soldiers and officers of the Army in Kargil war of 1999, but cautioned that nature and realm of warfare has now assumed different proportions.

"Therefore, I say, our soldiers are there on the front, but it's not adequate. We need thousands of people who can play the role of a 'sainik on social media' and also become soldiers," he said.

Recalling his Army days, Rathore recalled his experiences of Kashmir where he once had to "assume the look" of a terrorist to kill terrorists.

"We had no official orders but we realised the situation that our uniform would invite different kind of reactions. So we decided to assume the looks of terrorists, grew beard and shot them down," he said.
"Also, to gather gather intelligence, we used to use pen sketches. Because we never used to get photos of the most 'shatir' (cunning) terrorists.

"But those who are 'showman atankwadi', they meet with the same fate...pamphlets are produced and then their photos are marked with a cross, like this 'do kauri' (worthless) terrorist (in Kashmir)," he said.

On Kargil anniversary, he paid homage to the soldiers and other men in uniform, who laid down their lives for the country.

"It was the first televised war and after our victory the US army came to learn mountain warfare from us," he said.  

Ein News: http://bit.ly/2bbyVYQ

 

« Enabling Computer Super Intelligence
Edward Snowden Proposes Smartphone Privacy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

CyberNet Albania

CyberNet Albania

Cybernet Albania has been providing IT support and services to small businesses since 2016. We strive to eliminate your IT issues before they cause downtime and impact your operations.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

Pionen

Pionen

Pionen are a specialist information security consultancy with excellent people and proven security delivery methodologies at its core.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.

Clutch Security

Clutch Security

Clutch Security are on a mission to secure all Non-Human Identities. Everywhere.