The Weaponization Of Social Media

In their new book, Like War: he Weaponization of Social Media two leading US  academic theorists on modern warafre, Peter Singer and Emerson  T Brooking, explore how ISIS copies the Instagram tactics of Taylor Swift, a former World of Warcraft addict foils war crimes thousands of miles away, internet trolls shape elections, and China uses a smartphone app to police the thoughts of 1.4 billion citizens. 

What can be kept secret in a world of networks? Does social media expose the truth or bury it? And what role do ordinary people now play in international conflicts?

Although the book is titled Like War, it isn’t so much about warfare as about how social media is affecting society broadly: how we consume information, why social media is so addictive, how it has been capitalized on by social movements, celebrities, politicians, terrorists, and states.

It’s worth reading for the history of the Internet alone, which bounces along as vignettes about individuals that personalise the story (they clearly apply the elements of effective social media they identify: narrative, emotion, authenticity, community, and inundation). And there’s so much interesting they offer: Who knew that the Congress only funded the telegraph by six votes cast over spending the money on hypnotism, or that one-fifth of runners in the Mexico City marathon cheated, that the first political campaign to feature bots was Scott Brown’s Massachusetts senate race, or that the Israeli Defense Forces pace their strikes by Twitter commentary!

But Brooking and Singer make an outsized claim that social media has changed the dynamics of conflict, the interplay of nations, and the entire global system. They argue that the Internet “changed history forever,” “war and politics have never been so intertwined,” that “winning these online battles doesn’t just win the web, but wins the world,” and that social media has “decisively reshaped the modern world.” 

The book is a valuable primer on where social media came from and how its currently being used. It also has some useful suggestions for taming its effects. But Like War doesn’t come anywhere near proving its outsized claims

Singer and Brooking are great guides to technology and alert to the challenges of translating techno-speak into accessible language and comparisons. They name check all the lexicon, so readers become familiar with crowdsourcing, presentism, throttling, web bridges, digital wildfires, emotional contagion, netwar, flame wars, hacktivists, engineering-first mentality, content moderators, and neural networks.

The writing barrels along and uses imaginative images, like comparing the Islamic State’s metastasization to “a demonic McDonald’s” opening franchises. I loved the visual description that the group’s social media “took on the power of an invisible artillery bombardment, its thousands of messages spiraling out in front of the advancing force.” 

Their literary references are elegant, quoting Marc Bloch’s description of the shocked collapse of French morale in 1940 from Strange Defeat.  I was pleased to see Marie von Clausewitz credited for her contributions to On War (and would have been even more so if they’d cited Vanya Eftimova Bellinger’s path breaking book on the topic). 

There was also some less admirable prose: “Taylor Swift’s Instagram comments fell with the power of precision air strikes,” or “a handful of tech CEOs stood at the controls of this reality-shaping machine, but they hadn’t been working those controls properly.”

Regardless, while Brooking and Singer do an excellent job of conveying the immediacy of social media, its speed, reach, and reinforcement of existing beliefs, they didn’t engage the issue of persistence. Do social media impressions durably frame beliefs? If they only reinforce existing prejudices, then what has changed? 

They discuss the effect of familiarity, but I would have liked to see them connect their exploration of technologies more fully to behavioral psychology, where these problems are already well understood. 

In Thinking Fast and Slow, Daniel Kahnemann alerts us to the danger of simple repetition that social media makes possible at scale: “a reliable way to make people believe in falsehoods is frequent repetition, because familiarity is not easily distinguished from truth.”  Maybe self-selection on information is what we should fear most about social media. But even there, it would have been interesting to have Brooking and Singer explore how social media is distinguishable in this regard from the fracturing of the general media landscape of television and talk radio, which also permits self-selection and reinforcement, or even the Internet before the rise of social media

Their examples show just how fast internet use has become ubiquitous, in 1994, television anchors couldn’t make sense of a web address. Their description of the Internet as “a globe-spanning community vaster and more diverse than anything before it, yet governed by a handful of Silicon Valley oligarchs,” is, funnily enough, an example of presentism. 

The developers of the Internet were scholars and civil servants. And if the algorithm lords of Silicon Valley are rich and willfully ignorant of the socio-political effects of their inventions, they are not beyond the reach of law and regulation. It just hasn’t caught up to them yet, in part because the rest of us haven’t been careful and informed enough to ensure it.

But the reckoning is coming. We’re still in the early stages of the revolution, mid-stream in understanding, which makes it extraordinarily hard to judge the magnitude of what we’re experiencing. 

But the dramatic increase in seriousness of questioning social media leaders were subjected to by Congress in the five short months between Mark Zuckerberg’s April testimony and his deputy Sheryl Sandberg’s in September shows that progress to understand and perhaps defang social media’s most dangerous effects is occurring. 

Journalists and prosecutors doing the forensics on Russian influence in the presidential election are likely to educate us all further.  Brooking and Singer have written an accessible primer that I hope will be widely read as our society thinks through how to capitalise on the advantages social media provides while curtailing some of its dangers.

In that regard, the book did not address regulatory efforts already underway. It acknowledges “mounting legal and political pressure,” and urges that “companies must proactively consider the political, social, and moral ramifications of their services,” but curiously ignores those levers in its recommendations for taming social media. In particular, it makes no mention of the European Union’s data protection and privacy measures, the first big effort to contain US social media. 

The authors conclude with the insight that “the more confused and nonlinear war gets, the more participatory it becomes.” 

The morality of ‘no to targeting, but yes to repression,” is likely the just first step in the humanities education of these Masters of the Universe. Wouldn’t it be marvelous if the self-righteousness of Silicon Valley turns out to be our salvation from their inventions?

Singer and Brooking fall far short of proving that social media have either changed the fundamental nature of war or upended the entire global system. In fact, they offer the condemnatory evidence again their claim themselves, writing that “Carl von Clausewitz was born a couple of centuries before the Internet, but he would have implicitly understood almost everything it is doing to conflict today.”

If Clausewitz would recognise it, it hasn’t changed the nature of war. War remains an extension of politics. This book is a valuable guide to the innovative weapon of social media, but doesn’t clear the bar of proving we’re in a new kind of war.

OODA Loop:             

P.W. Singer and Emerson T. Brooking: LikeWar: The Weaponization of Social Media

You Might Also Read:

Will Russian Hackers Affect This Year's US Election?

 

« US Offers Its Cyber Secrets To NATO
How Cyber Attackers Stole £2.26m From Tesco Bank Customers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

Yelbridges

Yelbridges

Yelbridges offer high quality IT security & risk management services to mitigate business risks.

Recruit.net

Recruit.net

Recruit.net allows job seekers to instantly find millions of jobs from thousands of web sites with a single search.

Blu Venture Investors (BVI)

Blu Venture Investors (BVI)

Blu Venture Investors is a venture capital firm that supports early stage companies with a focus on technology in diverse domains including cybersecurity, IoT, defense and homeland security.

Grayshift

Grayshift

Grayshift is the leading provider of mobile device digital forensics, specializing in lawful access and extraction.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Start Left® Security

Start Left® Security

Great security culture doesn't just happen; you ENGINEER it.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.