The Weaponization Of Social Media

In their new book, Like War: he Weaponization of Social Media two leading US  academic theorists on modern warafre, Peter Singer and Emerson  T Brooking, explore how ISIS copies the Instagram tactics of Taylor Swift, a former World of Warcraft addict foils war crimes thousands of miles away, internet trolls shape elections, and China uses a smartphone app to police the thoughts of 1.4 billion citizens. 

What can be kept secret in a world of networks? Does social media expose the truth or bury it? And what role do ordinary people now play in international conflicts?

Although the book is titled Like War, it isn’t so much about warfare as about how social media is affecting society broadly: how we consume information, why social media is so addictive, how it has been capitalized on by social movements, celebrities, politicians, terrorists, and states.

It’s worth reading for the history of the Internet alone, which bounces along as vignettes about individuals that personalise the story (they clearly apply the elements of effective social media they identify: narrative, emotion, authenticity, community, and inundation). And there’s so much interesting they offer: Who knew that the Congress only funded the telegraph by six votes cast over spending the money on hypnotism, or that one-fifth of runners in the Mexico City marathon cheated, that the first political campaign to feature bots was Scott Brown’s Massachusetts senate race, or that the Israeli Defense Forces pace their strikes by Twitter commentary!

But Brooking and Singer make an outsized claim that social media has changed the dynamics of conflict, the interplay of nations, and the entire global system. They argue that the Internet “changed history forever,” “war and politics have never been so intertwined,” that “winning these online battles doesn’t just win the web, but wins the world,” and that social media has “decisively reshaped the modern world.” 

The book is a valuable primer on where social media came from and how its currently being used. It also has some useful suggestions for taming its effects. But Like War doesn’t come anywhere near proving its outsized claims

Singer and Brooking are great guides to technology and alert to the challenges of translating techno-speak into accessible language and comparisons. They name check all the lexicon, so readers become familiar with crowdsourcing, presentism, throttling, web bridges, digital wildfires, emotional contagion, netwar, flame wars, hacktivists, engineering-first mentality, content moderators, and neural networks.

The writing barrels along and uses imaginative images, like comparing the Islamic State’s metastasization to “a demonic McDonald’s” opening franchises. I loved the visual description that the group’s social media “took on the power of an invisible artillery bombardment, its thousands of messages spiraling out in front of the advancing force.” 

Their literary references are elegant, quoting Marc Bloch’s description of the shocked collapse of French morale in 1940 from Strange Defeat.  I was pleased to see Marie von Clausewitz credited for her contributions to On War (and would have been even more so if they’d cited Vanya Eftimova Bellinger’s path breaking book on the topic). 

There was also some less admirable prose: “Taylor Swift’s Instagram comments fell with the power of precision air strikes,” or “a handful of tech CEOs stood at the controls of this reality-shaping machine, but they hadn’t been working those controls properly.”

Regardless, while Brooking and Singer do an excellent job of conveying the immediacy of social media, its speed, reach, and reinforcement of existing beliefs, they didn’t engage the issue of persistence. Do social media impressions durably frame beliefs? If they only reinforce existing prejudices, then what has changed? 

They discuss the effect of familiarity, but I would have liked to see them connect their exploration of technologies more fully to behavioral psychology, where these problems are already well understood. 

In Thinking Fast and Slow, Daniel Kahnemann alerts us to the danger of simple repetition that social media makes possible at scale: “a reliable way to make people believe in falsehoods is frequent repetition, because familiarity is not easily distinguished from truth.”  Maybe self-selection on information is what we should fear most about social media. But even there, it would have been interesting to have Brooking and Singer explore how social media is distinguishable in this regard from the fracturing of the general media landscape of television and talk radio, which also permits self-selection and reinforcement, or even the Internet before the rise of social media

Their examples show just how fast internet use has become ubiquitous, in 1994, television anchors couldn’t make sense of a web address. Their description of the Internet as “a globe-spanning community vaster and more diverse than anything before it, yet governed by a handful of Silicon Valley oligarchs,” is, funnily enough, an example of presentism. 

The developers of the Internet were scholars and civil servants. And if the algorithm lords of Silicon Valley are rich and willfully ignorant of the socio-political effects of their inventions, they are not beyond the reach of law and regulation. It just hasn’t caught up to them yet, in part because the rest of us haven’t been careful and informed enough to ensure it.

But the reckoning is coming. We’re still in the early stages of the revolution, mid-stream in understanding, which makes it extraordinarily hard to judge the magnitude of what we’re experiencing. 

But the dramatic increase in seriousness of questioning social media leaders were subjected to by Congress in the five short months between Mark Zuckerberg’s April testimony and his deputy Sheryl Sandberg’s in September shows that progress to understand and perhaps defang social media’s most dangerous effects is occurring. 

Journalists and prosecutors doing the forensics on Russian influence in the presidential election are likely to educate us all further.  Brooking and Singer have written an accessible primer that I hope will be widely read as our society thinks through how to capitalise on the advantages social media provides while curtailing some of its dangers.

In that regard, the book did not address regulatory efforts already underway. It acknowledges “mounting legal and political pressure,” and urges that “companies must proactively consider the political, social, and moral ramifications of their services,” but curiously ignores those levers in its recommendations for taming social media. In particular, it makes no mention of the European Union’s data protection and privacy measures, the first big effort to contain US social media. 

The authors conclude with the insight that “the more confused and nonlinear war gets, the more participatory it becomes.” 

The morality of ‘no to targeting, but yes to repression,” is likely the just first step in the humanities education of these Masters of the Universe. Wouldn’t it be marvelous if the self-righteousness of Silicon Valley turns out to be our salvation from their inventions?

Singer and Brooking fall far short of proving that social media have either changed the fundamental nature of war or upended the entire global system. In fact, they offer the condemnatory evidence again their claim themselves, writing that “Carl von Clausewitz was born a couple of centuries before the Internet, but he would have implicitly understood almost everything it is doing to conflict today.”

If Clausewitz would recognise it, it hasn’t changed the nature of war. War remains an extension of politics. This book is a valuable guide to the innovative weapon of social media, but doesn’t clear the bar of proving we’re in a new kind of war.

OODA Loop:             

P.W. Singer and Emerson T. Brooking: LikeWar: The Weaponization of Social Media

You Might Also Read:

Will Russian Hackers Affect This Year's US Election?

 

« US Offers Its Cyber Secrets To NATO
How Cyber Attackers Stole £2.26m From Tesco Bank Customers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

InterGuard

InterGuard

As the pioneer for Unified Insider Threat Prevention and productivity monitoring tools, InterGuard offers on premise and SaaS-based services that are easily available and affordable.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

Gravitee

Gravitee

Gravitee helps organizations manage and secure their entire API lifecycle with solutions for API design, management, security, productization, real-time observability, and more.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security

M6iT Consulting

M6iT Consulting

M6iT Consulting is an industry-leading solution partner managing the IT requirements for a full range of companies.

3DOT Solutions

3DOT Solutions

3DOT Solutions is an established UK cybersecurity consultancy focused on delivering end-to-end cyber security solutions for private and public sector customers.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.