Social Media Has Been Weaponised

Many people now rely on social media platforms such as Facebook, Twitter, Snapchat, YouTube, and Instagram to find and connect with each other. Our growing love of social media is not just changing the way we communicate, it’s changing the way we do business, the way we are governed, and the way we live in society all at breakneck speed. The recent mob attack on the US Capitol shares a familiar pattern with the use of social media to recruit and organise extremists and has been used by ISIS and other terrorist groups.

 As social media is a relatively new technology, there's little research to establish the long-term consequences, good or bad, of its use.  However, multiple studies have also found a strong link between heavy social media and an increased risk for depression, anxiety, loneliness, self-harm, and even suicidal thoughts.

While there are benefits, it’s important to remember that social media can never be a replacement for real-world human connection. It requires in-person contact with others to trigger the hormones that alleviate stress and make you feel happier, healthier, and more positive. The latest figures show that there are 3.78 billion social media users worldwide in 2021, a five percent increase from a year ago. It is also 920 million more than the number of social users in 2017, which represents a whopping 32.2 percent jump in just five years. The average annual growth rate over this period is 7.2 percent. 

Social media has become a major part of numerous lives through countless websites and apps and people have been able to connect with others and share their thoughts, emotions and experiences. It’s been able to provide a source of entertainment and shopping, and many businesses have even found it useful for promotion and marketing.

At this point, social media has had such a huge impact on society that it seems like many people couldn’t live without it. 

Social media has also had a number of disadvantages that have affected our lives. This includes the result of major problems having to do with mental health issues, insecurities about one’s self, and addiction. Through the weaponisation of social media, the Internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, “Twitter wars” produce real world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. 

The result is that armed conflict, technology and and politics have blurred together and turned into a new kind of battle space that plays out on our smartphones.

The first wars in human history were fought with sticks and stones, but modern warfare is a high-tech battlefield where social media has emerged as a surprising effective weapon. From Russian hacking to influence the American election to online recruitment for terror groups such as ISIS, an array of players are using false news and bogus accounts to stoke fear, incite violence and manipulate outcomes.

During the Arab Spring, the power of social media to drive major political change burst onto the world stage. The promise of Twitter and Facebook to help democratically minded protesters share information, organise protests and ultimately free themselves from dictatorships looked almost unstoppable.  However, hoped for democratic gains across the Arab world have proved unsustainable and another aspect of the technology became prominent emerged. Within a few years, Isis was using the Internet to mobilise recruits, spread propaganda, and encourage attacks in the United States and elsewhere. 

Then there came an actual attack on the US conducted via social media itself, the spread of Russian disinformation as part of an effort to sway the 2016 American presidential electionMore recently been used to create and encourage the storming of the US Government buildings in Washington DC.

The important 2018 book LikeWar by Peter W. Singer and Emerson Brooking tackles the mind bending questions that arise when war goes online and the online world goes to war.  Probing into the darker and hidden aspects of the internet, the book outlines a new way of understanding and defending against the unprecedented threats of our networked world, in which  ISIS copies the Instagram tactics of Taylor Swift, Internet trolls shape elections in other countries and the governmnet of China uses a smartphone app to police the thoughts of 1.4 billion citizens. 

For a technology that’s designed to bring people closer together, spending too much time engaging with social media can actually make you feel more lonely and isolated.

World Economic Forum:   Wharton:      DefenseOne:      The Atlantic:    Oberlo:    HelpGuide:      Summit News

You Might Also Read: 

Social Media Has Gone Global:

 

« Airline Faces £800m Penalty For Customer Data Breach
Cyber Security Certifications - Online Exam »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

IQ4 - Cybersecurity Workforce Alliance (CWA)

IQ4 - Cybersecurity Workforce Alliance (CWA)

Cybersecurity Workforce Alliance, a division of iQ4, is an organization comprised of a diverse range of professionals dedicated to the development of the cybersecurity workforce.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Psybersafe

Psybersafe

Psybersafe is a hands-on, behaviour-changing training system that keeps your people and your business cyber safe.

Information Technology Solutions (ITS)

Information Technology Solutions (ITS)

Information Technology Solutions is a single source provider for managing and securing mission-critical IT services.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

Association of Azerbaijani Cyber Security Organizations (AKTA)

Association of Azerbaijani Cyber Security Organizations (AKTA)

The Association of Azerbaijani Cyber Security Organizations (AKTA) is a non-commercial organization aimed at strengthening the country's cybersecurity system.

Merlin Ventures

Merlin Ventures

Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential.