Psychological Warfare On Social Media

@Indian_Army Twitter ID 

The Indian Minister of State for Information and Broadcasting Rajyavardhan Rathore  was addressing a gathering at a function organised by Jammu and Kashmir People's Forum to mark 'Kargil Vijay Diwas' at the Constitution Club of India.

"The world is changing. First there was traditional war, then nuclear war, and then limited intensity war (like Kargil). But, today's threat is of cyber war and through that psychological warfare. And, this psychological war is the biggest war," he said.

"Recently a terorist was gunned down in Kashmir like many other terrorists have been killed...And, talking about this psychological warfare which is being waged in the realm of social media, what followed on Twitter after that terrorist was shot dead...

"There were 1,25,000 tweets on that terrorist, out of which only 49,000 were from India, 52,000 from unknown locations and 10,000 from Pakistan," he said.

Rathore lauded the sacrifices made by soldiers and officers of the Army in Kargil war of 1999, but cautioned that nature and realm of warfare has now assumed different proportions.

"Therefore, I say, our soldiers are there on the front, but it's not adequate. We need thousands of people who can play the role of a 'sainik on social media' and also become soldiers," he said.

Recalling his Army days, Rathore recalled his experiences of Kashmir where he once had to "assume the look" of a terrorist to kill terrorists.

"We had no official orders but we realised the situation that our uniform would invite different kind of reactions. So we decided to assume the looks of terrorists, grew beard and shot them down," he said.
"Also, to gather gather intelligence, we used to use pen sketches. Because we never used to get photos of the most 'shatir' (cunning) terrorists.

"But those who are 'showman atankwadi', they meet with the same fate...pamphlets are produced and then their photos are marked with a cross, like this 'do kauri' (worthless) terrorist (in Kashmir)," he said.

On Kargil anniversary, he paid homage to the soldiers and other men in uniform, who laid down their lives for the country.

"It was the first televised war and after our victory the US army came to learn mountain warfare from us," he said.  

Ein News: http://bit.ly/2bbyVYQ

 

« Enabling Computer Super Intelligence
Edward Snowden Proposes Smartphone Privacy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Barracuda

Barracuda

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats.

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

Leadcomm

Leadcomm

Leadcomm is a Brazilian company focused on the distribution and integration of IT systems and security solutions for large companies.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

Cyber Security Forum Initiative (CSFI)

Cyber Security Forum Initiative (CSFI)

CSFI is a non-profit organization with a mission to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training.

CyberPion

CyberPion

Cyberpion’s groundbreaking platform enables security teams to identify and neutralize threats stemming from vulnerabilities within online assets throughout an enterprise’s ecosystem.

Swissbit

Swissbit

Swissbit AG is the leading European manufacturer of storage, security and embedded IoT solutions for demanding applications.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.