The Weaponization Of Social Media

In their new book, Like War: he Weaponization of Social Media two leading US  academic theorists on modern warafre, Peter Singer and Emerson  T Brooking, explore how ISIS copies the Instagram tactics of Taylor Swift, a former World of Warcraft addict foils war crimes thousands of miles away, internet trolls shape elections, and China uses a smartphone app to police the thoughts of 1.4 billion citizens. 

What can be kept secret in a world of networks? Does social media expose the truth or bury it? And what role do ordinary people now play in international conflicts?

Although the book is titled Like War, it isn’t so much about warfare as about how social media is affecting society broadly: how we consume information, why social media is so addictive, how it has been capitalized on by social movements, celebrities, politicians, terrorists, and states.

It’s worth reading for the history of the Internet alone, which bounces along as vignettes about individuals that personalise the story (they clearly apply the elements of effective social media they identify: narrative, emotion, authenticity, community, and inundation). And there’s so much interesting they offer: Who knew that the Congress only funded the telegraph by six votes cast over spending the money on hypnotism, or that one-fifth of runners in the Mexico City marathon cheated, that the first political campaign to feature bots was Scott Brown’s Massachusetts senate race, or that the Israeli Defense Forces pace their strikes by Twitter commentary!

But Brooking and Singer make an outsized claim that social media has changed the dynamics of conflict, the interplay of nations, and the entire global system. They argue that the Internet “changed history forever,” “war and politics have never been so intertwined,” that “winning these online battles doesn’t just win the web, but wins the world,” and that social media has “decisively reshaped the modern world.” 

The book is a valuable primer on where social media came from and how its currently being used. It also has some useful suggestions for taming its effects. But Like War doesn’t come anywhere near proving its outsized claims

Singer and Brooking are great guides to technology and alert to the challenges of translating techno-speak into accessible language and comparisons. They name check all the lexicon, so readers become familiar with crowdsourcing, presentism, throttling, web bridges, digital wildfires, emotional contagion, netwar, flame wars, hacktivists, engineering-first mentality, content moderators, and neural networks.

The writing barrels along and uses imaginative images, like comparing the Islamic State’s metastasization to “a demonic McDonald’s” opening franchises. I loved the visual description that the group’s social media “took on the power of an invisible artillery bombardment, its thousands of messages spiraling out in front of the advancing force.” 

Their literary references are elegant, quoting Marc Bloch’s description of the shocked collapse of French morale in 1940 from Strange Defeat.  I was pleased to see Marie von Clausewitz credited for her contributions to On War (and would have been even more so if they’d cited Vanya Eftimova Bellinger’s path breaking book on the topic). 

There was also some less admirable prose: “Taylor Swift’s Instagram comments fell with the power of precision air strikes,” or “a handful of tech CEOs stood at the controls of this reality-shaping machine, but they hadn’t been working those controls properly.”

Regardless, while Brooking and Singer do an excellent job of conveying the immediacy of social media, its speed, reach, and reinforcement of existing beliefs, they didn’t engage the issue of persistence. Do social media impressions durably frame beliefs? If they only reinforce existing prejudices, then what has changed? 

They discuss the effect of familiarity, but I would have liked to see them connect their exploration of technologies more fully to behavioral psychology, where these problems are already well understood. 

In Thinking Fast and Slow, Daniel Kahnemann alerts us to the danger of simple repetition that social media makes possible at scale: “a reliable way to make people believe in falsehoods is frequent repetition, because familiarity is not easily distinguished from truth.”  Maybe self-selection on information is what we should fear most about social media. But even there, it would have been interesting to have Brooking and Singer explore how social media is distinguishable in this regard from the fracturing of the general media landscape of television and talk radio, which also permits self-selection and reinforcement, or even the Internet before the rise of social media

Their examples show just how fast internet use has become ubiquitous, in 1994, television anchors couldn’t make sense of a web address. Their description of the Internet as “a globe-spanning community vaster and more diverse than anything before it, yet governed by a handful of Silicon Valley oligarchs,” is, funnily enough, an example of presentism. 

The developers of the Internet were scholars and civil servants. And if the algorithm lords of Silicon Valley are rich and willfully ignorant of the socio-political effects of their inventions, they are not beyond the reach of law and regulation. It just hasn’t caught up to them yet, in part because the rest of us haven’t been careful and informed enough to ensure it.

But the reckoning is coming. We’re still in the early stages of the revolution, mid-stream in understanding, which makes it extraordinarily hard to judge the magnitude of what we’re experiencing. 

But the dramatic increase in seriousness of questioning social media leaders were subjected to by Congress in the five short months between Mark Zuckerberg’s April testimony and his deputy Sheryl Sandberg’s in September shows that progress to understand and perhaps defang social media’s most dangerous effects is occurring. 

Journalists and prosecutors doing the forensics on Russian influence in the presidential election are likely to educate us all further.  Brooking and Singer have written an accessible primer that I hope will be widely read as our society thinks through how to capitalise on the advantages social media provides while curtailing some of its dangers.

In that regard, the book did not address regulatory efforts already underway. It acknowledges “mounting legal and political pressure,” and urges that “companies must proactively consider the political, social, and moral ramifications of their services,” but curiously ignores those levers in its recommendations for taming social media. In particular, it makes no mention of the European Union’s data protection and privacy measures, the first big effort to contain US social media. 

The authors conclude with the insight that “the more confused and nonlinear war gets, the more participatory it becomes.” 

The morality of ‘no to targeting, but yes to repression,” is likely the just first step in the humanities education of these Masters of the Universe. Wouldn’t it be marvelous if the self-righteousness of Silicon Valley turns out to be our salvation from their inventions?

Singer and Brooking fall far short of proving that social media have either changed the fundamental nature of war or upended the entire global system. In fact, they offer the condemnatory evidence again their claim themselves, writing that “Carl von Clausewitz was born a couple of centuries before the Internet, but he would have implicitly understood almost everything it is doing to conflict today.”

If Clausewitz would recognise it, it hasn’t changed the nature of war. War remains an extension of politics. This book is a valuable guide to the innovative weapon of social media, but doesn’t clear the bar of proving we’re in a new kind of war.

OODA Loop:             

P.W. Singer and Emerson T. Brooking: LikeWar: The Weaponization of Social Media

You Might Also Read:

Will Russian Hackers Affect This Year's US Election?

 

« US Offers Its Cyber Secrets To NATO
How Cyber Attackers Stole £2.26m From Tesco Bank Customers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

VMworld

VMworld

VMworld is a global conference for virtualization and cloud computing, including associated security issues.

DigiCert

DigiCert

DigiCert is the only provider of enterprise-grade SSL, IoT and PKI solutions. Our certificates are trusted everywhere, millions of times every day, by companies across the globe.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

Quantum Security Solutions (QSec)

Quantum Security Solutions (QSec)

QSec is an innovative information security consultancy based in Ghana. We can provide your organisation with information security products and services that assure against information risk.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Multipoint Group

Multipoint Group

Multipoint is an information security and protection solutions company operating in the South EMEA region through value-added distribution channels.

BBS Technology

BBS Technology

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide.

Superna

Superna

Superna is the global leader in data security and cyberstorage solutions for unstructured data, both on-prem and in the hybrid multi-cloud.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

Cyex

Cyex

Cyex helps people to become cyber wise. We enable our clients to find, track and improve cyber awareness in one place.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.