Social Media Has Been Weaponised

Many people now rely on social media platforms such as Facebook, Twitter, Snapchat, YouTube, and Instagram to find and connect with each other. Our growing love of social media is not just changing the way we communicate, it’s changing the way we do business, the way we are governed, and the way we live in society all at breakneck speed. The recent mob attack on the US Capitol shares a familiar pattern with the use of social media to recruit and organise extremists and has been used by ISIS and other terrorist groups.

 As social media is a relatively new technology, there's little research to establish the long-term consequences, good or bad, of its use.  However, multiple studies have also found a strong link between heavy social media and an increased risk for depression, anxiety, loneliness, self-harm, and even suicidal thoughts.

While there are benefits, it’s important to remember that social media can never be a replacement for real-world human connection. It requires in-person contact with others to trigger the hormones that alleviate stress and make you feel happier, healthier, and more positive. The latest figures show that there are 3.78 billion social media users worldwide in 2021, a five percent increase from a year ago. It is also 920 million more than the number of social users in 2017, which represents a whopping 32.2 percent jump in just five years. The average annual growth rate over this period is 7.2 percent. 

Social media has become a major part of numerous lives through countless websites and apps and people have been able to connect with others and share their thoughts, emotions and experiences. It’s been able to provide a source of entertainment and shopping, and many businesses have even found it useful for promotion and marketing.

At this point, social media has had such a huge impact on society that it seems like many people couldn’t live without it. 

Social media has also had a number of disadvantages that have affected our lives. This includes the result of major problems having to do with mental health issues, insecurities about one’s self, and addiction. Through the weaponisation of social media, the Internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, “Twitter wars” produce real world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. 

The result is that armed conflict, technology and and politics have blurred together and turned into a new kind of battle space that plays out on our smartphones.

The first wars in human history were fought with sticks and stones, but modern warfare is a high-tech battlefield where social media has emerged as a surprising effective weapon. From Russian hacking to influence the American election to online recruitment for terror groups such as ISIS, an array of players are using false news and bogus accounts to stoke fear, incite violence and manipulate outcomes.

During the Arab Spring, the power of social media to drive major political change burst onto the world stage. The promise of Twitter and Facebook to help democratically minded protesters share information, organise protests and ultimately free themselves from dictatorships looked almost unstoppable.  However, hoped for democratic gains across the Arab world have proved unsustainable and another aspect of the technology became prominent emerged. Within a few years, Isis was using the Internet to mobilise recruits, spread propaganda, and encourage attacks in the United States and elsewhere. 

Then there came an actual attack on the US conducted via social media itself, the spread of Russian disinformation as part of an effort to sway the 2016 American presidential electionMore recently been used to create and encourage the storming of the US Government buildings in Washington DC.

The important 2018 book LikeWar by Peter W. Singer and Emerson Brooking tackles the mind bending questions that arise when war goes online and the online world goes to war.  Probing into the darker and hidden aspects of the internet, the book outlines a new way of understanding and defending against the unprecedented threats of our networked world, in which  ISIS copies the Instagram tactics of Taylor Swift, Internet trolls shape elections in other countries and the governmnet of China uses a smartphone app to police the thoughts of 1.4 billion citizens. 

For a technology that’s designed to bring people closer together, spending too much time engaging with social media can actually make you feel more lonely and isolated.

World Economic Forum:   Wharton:      DefenseOne:      The Atlantic:    Oberlo:    HelpGuide:      Summit News

You Might Also Read: 

Social Media Has Gone Global:

 

« Airline Faces £800m Penalty For Customer Data Breach
Cyber Security Certifications - Online Exam »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

Salt Cybersecurity

Salt Cybersecurity

Salt Cybersecurity offer a four-pronged approach to information security that includes Custom Security Policy, Vulnerability Assessment, Threat Detection, and Security Awareness Training.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

Intigriti

Intigriti

Intigriti helps companies protect themselves from cybercrime. Our community of ethical hackers provides continuous, realistic security testing to protect our customer’s assets and brand.

Virtual Technologies Group (VTG)

Virtual Technologies Group (VTG)

Virtual Technologies Group is a single source, IT product and services provider for SMBs and IT departments, delivering reliable, cost-efficient service, maintenance and support solutions.

Ampcus Cyber

Ampcus Cyber

Ampcus Cyber specialize in providing comprehensive security solutions and services that are tailored to safeguard our clients' networks, infrastructure, and valuable assets.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

Airlock Digital

Airlock Digital

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.