Social Media Has Been Weaponised

Many people now rely on social media platforms such as Facebook, Twitter, Snapchat, YouTube, and Instagram to find and connect with each other. Our growing love of social media is not just changing the way we communicate, it’s changing the way we do business, the way we are governed, and the way we live in society all at breakneck speed. The recent mob attack on the US Capitol shares a familiar pattern with the use of social media to recruit and organise extremists and has been used by ISIS and other terrorist groups.

 As social media is a relatively new technology, there's little research to establish the long-term consequences, good or bad, of its use.  However, multiple studies have also found a strong link between heavy social media and an increased risk for depression, anxiety, loneliness, self-harm, and even suicidal thoughts.

While there are benefits, it’s important to remember that social media can never be a replacement for real-world human connection. It requires in-person contact with others to trigger the hormones that alleviate stress and make you feel happier, healthier, and more positive. The latest figures show that there are 3.78 billion social media users worldwide in 2021, a five percent increase from a year ago. It is also 920 million more than the number of social users in 2017, which represents a whopping 32.2 percent jump in just five years. The average annual growth rate over this period is 7.2 percent. 

Social media has become a major part of numerous lives through countless websites and apps and people have been able to connect with others and share their thoughts, emotions and experiences. It’s been able to provide a source of entertainment and shopping, and many businesses have even found it useful for promotion and marketing.

At this point, social media has had such a huge impact on society that it seems like many people couldn’t live without it. 

Social media has also had a number of disadvantages that have affected our lives. This includes the result of major problems having to do with mental health issues, insecurities about one’s self, and addiction. Through the weaponisation of social media, the Internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, “Twitter wars” produce real world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. 

The result is that armed conflict, technology and and politics have blurred together and turned into a new kind of battle space that plays out on our smartphones.

The first wars in human history were fought with sticks and stones, but modern warfare is a high-tech battlefield where social media has emerged as a surprising effective weapon. From Russian hacking to influence the American election to online recruitment for terror groups such as ISIS, an array of players are using false news and bogus accounts to stoke fear, incite violence and manipulate outcomes.

During the Arab Spring, the power of social media to drive major political change burst onto the world stage. The promise of Twitter and Facebook to help democratically minded protesters share information, organise protests and ultimately free themselves from dictatorships looked almost unstoppable.  However, hoped for democratic gains across the Arab world have proved unsustainable and another aspect of the technology became prominent emerged. Within a few years, Isis was using the Internet to mobilise recruits, spread propaganda, and encourage attacks in the United States and elsewhere. 

Then there came an actual attack on the US conducted via social media itself, the spread of Russian disinformation as part of an effort to sway the 2016 American presidential electionMore recently been used to create and encourage the storming of the US Government buildings in Washington DC.

The important 2018 book LikeWar by Peter W. Singer and Emerson Brooking tackles the mind bending questions that arise when war goes online and the online world goes to war.  Probing into the darker and hidden aspects of the internet, the book outlines a new way of understanding and defending against the unprecedented threats of our networked world, in which  ISIS copies the Instagram tactics of Taylor Swift, Internet trolls shape elections in other countries and the governmnet of China uses a smartphone app to police the thoughts of 1.4 billion citizens. 

For a technology that’s designed to bring people closer together, spending too much time engaging with social media can actually make you feel more lonely and isolated.

World Economic Forum:   Wharton:      DefenseOne:      The Atlantic:    Oberlo:    HelpGuide:      Summit News

You Might Also Read: 

Social Media Has Gone Global:

 

« Airline Faces £800m Penalty For Customer Data Breach
Cyber Security Certifications - Online Exam »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Rafael

Rafael

Rafael has more than 15 years of proven experience in the cyber arena providing solutions for national security as well as commercial applications.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

iFluids Engineering

iFluids Engineering

iFluids Engineering is a leading engineering consulting and risk management firm providing a full range of services including Cyber Security for Industrial Control Systems.

SpyCloud

SpyCloud

SpyCloud is a leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations.

Technology Law Alliance (TLA)

Technology Law Alliance (TLA)

Technology Law Alliance is a specialist IT law firm focussed on the fields of technology, outsourcing and e-commerce.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

Ergo

Ergo

Ergo is a world-class IT Partner of choice, leveraging the latest technology available in cloud, mobility, big data, analytics, and social media.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Alset Technologies

Alset Technologies

Alset Technologies provides DASH - a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

RightSec

RightSec

RightSec is an emerging market leader and solution provider for cybersecurity and digital resiliency. We provide end to end solutions to suit your specific business lifecycle.