Psychological Warfare On Social Media

@Indian_Army Twitter ID 

The Indian Minister of State for Information and Broadcasting Rajyavardhan Rathore  was addressing a gathering at a function organised by Jammu and Kashmir People's Forum to mark 'Kargil Vijay Diwas' at the Constitution Club of India.

"The world is changing. First there was traditional war, then nuclear war, and then limited intensity war (like Kargil). But, today's threat is of cyber war and through that psychological warfare. And, this psychological war is the biggest war," he said.

"Recently a terorist was gunned down in Kashmir like many other terrorists have been killed...And, talking about this psychological warfare which is being waged in the realm of social media, what followed on Twitter after that terrorist was shot dead...

"There were 1,25,000 tweets on that terrorist, out of which only 49,000 were from India, 52,000 from unknown locations and 10,000 from Pakistan," he said.

Rathore lauded the sacrifices made by soldiers and officers of the Army in Kargil war of 1999, but cautioned that nature and realm of warfare has now assumed different proportions.

"Therefore, I say, our soldiers are there on the front, but it's not adequate. We need thousands of people who can play the role of a 'sainik on social media' and also become soldiers," he said.

Recalling his Army days, Rathore recalled his experiences of Kashmir where he once had to "assume the look" of a terrorist to kill terrorists.

"We had no official orders but we realised the situation that our uniform would invite different kind of reactions. So we decided to assume the looks of terrorists, grew beard and shot them down," he said.
"Also, to gather gather intelligence, we used to use pen sketches. Because we never used to get photos of the most 'shatir' (cunning) terrorists.

"But those who are 'showman atankwadi', they meet with the same fate...pamphlets are produced and then their photos are marked with a cross, like this 'do kauri' (worthless) terrorist (in Kashmir)," he said.

On Kargil anniversary, he paid homage to the soldiers and other men in uniform, who laid down their lives for the country.

"It was the first televised war and after our victory the US army came to learn mountain warfare from us," he said.  

Ein News: http://bit.ly/2bbyVYQ

 

« Enabling Computer Super Intelligence
Edward Snowden Proposes Smartphone Privacy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

Ingalls Information Security

Ingalls Information Security

Ingalls Information Security provides network security, monitoring and forensics.

Snyk

Snyk

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world.

Greenetics Solutions

Greenetics Solutions

Greenetics Solutions is a company focused on providing solutions for information security.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Capital Network Solutions

Capital Network Solutions

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.