National Security Threat by Externally Manipulated Social Media

National Security Threat by Externally Manipulated Social Media

National Security Threat by Externally Manipulated Social Media

National Security Threat by Externally Manipulated Social Media

by

Ambassador Soltanieh

President of the Vienna International Institute for Middle East Studies

(VIIMES)

 

Abstract

On the eve of realization of 4th Industrial Revolution, with magnificent technological achievement on IT, facilitating fast and easy communications and interactions among fellow citizens and with other nations, the terrorists and war mongers are continuously misusing IT in social media to create civil war and human catastrophe.

We all are used to repeat that interference in internal affairs of other countries is in full contravention with international law. Nowadays, we are witnessing the misuse of social media apparatus; the uncontrolled, somehow invisible interference into the privacy of each individual, bypassing family supervision and ties, combating cultural and virtual values of the society, violating all legal norms.

Attracting the youth by opening a new horizon under illusions, with high expectations which could not be met, extremism and violence are institutionalized in their mindset.

No wonder that the terrorist group ISIS, so called Daesh, recruited over 40 000 young men from many countries, including Europe, killing innocent people, almost all Muslims, mainly in the Middle East, in the name of Islam. One can easily find out the names of the creators and supporters of such terrorist groups, specifically Al-Qaida and ISIS, who themselves have proudly confessed such a crime against humanity.

In a nutshell, we are facing a new unprecedented dangerous phenomenon, threatening national security and international security at large, which requires new crisis management strategy and approach.

 

 

Introduction

The twenty-first century will be a period in which a range of new institutions, moral systems, and practices will begin their first tentative emergence. The first half of the twenty-first century will be marked by intense social conflict globally. All of this frames the international struggles of the twenty-first century.[1]

Computing culture is also, by definition, barbaric. The essence of barbarism is the reduction of culture to a simple, driving force that will tolerate no diversion or competition. The way the computer is designed, the manner in which it is programmed, and the way it has evolved represent a powerful reductionist force. It constitutes not reason contemplating its complexity, but reason reducing itself to its simplest expression and justifying itself through practical achievement.

The computer represents both a radical departure from previous technology and a new way of looking at reason. The purpose of a computer is the manipulation of quantitative data, that is, numbers. As a machine that manipulates data, it is a unique technology. But since it reduces all information – music, film, and the written word – to a number, it is also a unique way of looking at reason. The same computer could be manipulated to give the output that the designer and user wish so.

The advancement on Information Technology, IT, including social media could contribute to the public knowledge and awareness, speedy interactions leading for socio-economic developments. At the same time, it could be mis-used and threaten social infrastructure and national security of any state. It has a dual use nature; it is a double-edged sword.

We are facing a list of new security holistic information threats: Information warfare, information operations, information dominance, propaganda, disinformation, political warfare, media warfare, cyber warfare, hacktivism, cyber-terrorism.

Normally, cyber-attacks against “critical infrastructure” are labelled as a matter of serious concern. In 2016, at the CICA Conference in Madrid I thoroughly elaborated that the attacks against nuclear facilities, with potential transboundary release of radioactivity, are more dangerous than others. A small side note: I have the honor to be the proponent of the IAEA Resolution 533 in 1990, on “prohibition of any armed attack and even threat of attack against nuclear facilities”. I was then proponent of the same in the 2010 NPT Review Conference, which was adopted by consensus.

Today, on 29 November 2022, at this International CICA Conference in Bratislava, I want to elucidate the dangers of a misuse of social media in cyberspace, as it is targeting the very foundation of societies, the identity, national security, and the sovereignty of States – these are no less an urgent and serious matter of top urgency, which requires instant collective action.

Information Warfare (IW) is usually defined as “a targeted effort to undercut and neutralise the enemy’s command and control system for the purpose of protecting and coordinating the activities of the command-and-control system of friendly forces”. Such general strategy includes a panoply of measures, including espionage, undermining the enemy’s information, preventing the enemy from accessing information, and spreading propaganda and disinformation to demoralise or manipulate the opponent and the public.

Academic and intelligence experts are of the view that the first function of information dominance, “perception management”, shapes the information space and is an organising principle of policy and the application of power in the international arena. Perception management involves “actions to convey and/or deny selected information and indicators to foreign audiences to influence their emotions, motives and objective reasoning. It also enables “intelligence systems and leaders at all levels to influence official estimates, ultimately resulting in foreign behaviours and official actions favourable to the originator’s objectives. This takes place concurrently in both international politics and conflict situations, and involves both “truth- telling” and “truth-corrupting” over a wide range of areas by jointly combining soft power (e.g. political power, economic power, public affairs, public diplomacy) and physical elements, whether actively or as a deterrent (e.g. psyops, deception, covert actions, deterrent capabilities).[2]

In short, cyber warfare is a subset of IW and falls under Computer Network Operations. It aims to disrupt or destroy the enemy’s information and communications systems, while also preventing the adversary from inflicting similar damage. In contrast, hacktivism is a form of irregular disruption in cyberspace, which is conducted by individuals or groups to advance their political agendas. The increase in capabilities at both state and non-state level has created real vulnerabilities for established powers and added more complexity to the already complex state of international affairs.

Geopolitics is not simply a pretentious way of saying “international relations”, it is a method for thinking about the world and forecasting what will happen down the road. It applies the concept of the invisible hand to the behaviour of nations and other international actors. In this context I am reviewing recent developments, specifically in the Middle East, which show that social media is used as a tool for interfere in internal affairs, threatening national security and even regional security. It has also confronted the social and cultural values of a nation.

 

Issues involving Cybersecurity for Social Media

Social media has brought various benefits and simultaneously has posed serious cybersecurity concerns. It also acts as a vulnerable platform to be exploited by hackers. Some issues associated are pointed out below.

  • Privacy of Data: Users share their personal information on social media, which can cause privacy breaches. It can also sometimes cause personal data loss or instigate hackers to leverage the same for malicious reasons. For example, a user’s information can be viewed by everyone if the user’s default setting is public.
  • Data Mining: We all leave a data trail behind on the internet. When someone creates a new social media account and provides details such as date of birth, name, location, and personal habits, and without our knowledge, all these data are leveraged and shared with 3rd parties for targeted advertising. It can cause security concerns as a third-party may collect real-time updates on the user’s location.
  • Virus and Malware Attacks: Malware and viruses quite often find a way into the computer system through annoying ads. Once gaining access to the network, the attacker steals confidential data or causes complete disruption to the computer system. This often causes the loss of all kinds of data – personal, professional, financial, etc.
  • Issues involving the use of 3rd Party Applications: Most applications nowadays ask permission from users to access personal information such as contacts, pictures, and current geographic location before installing, and some of these applications which are running in the background might download malware on the user’s phone or smart devices without their knowledge.
  • Legal Issues:There are legal risks associated with the use of social media, like posting offensive content towards any individual, community, or country. Often, legal actions can be and are taken when such offensive posts are made and uploaded by any individual or organization.

 

Risks & Challenges

As the number of users accessing social platforms is increasing day by day, so are the risks.

  • Identity Theft: As millions share their personal information to get registered on one or more social media platforms, this data becomes vulnerable as hackers and identity thieves use this information to reset passwords, apply for loans, or other malicious objectives.
  • Romance Scams: A romance scam is a fraudulent scheme in which a swindler pretends romantic interest in a target, establishes a relationship, and then attempts to get money or sensitive information from the target under pretences.
  • Whistle-blowers: People are often impulsive on social media; they show their vexation with their colleagues or bosses without thinking. They may deliberately reveal sensitive data in their posts, which can cause significant damage to the reputation of the organization.
  • Cyber Stalking: It refers to harassment over the internet. Cybers attackers harass victims on social media by sending unpleasant and lewd messages. They morph photos of victims and circulate them on social media, alleging rumours making the victim’s life unbearable.
  • Cyber Bullying: It refers to bullying through the digital medium. It can take place on social media, gaming, and messaging platforms. It is aimed at scaring, shaming, or annoying the targeted victim.
  • Cyber Terrorism: Nowadays, social media is also used to facilitate terrorism-related activities. It can support, promote, engage, and spread terrorism propaganda like incitement to terrorism, recruitment, radicalizing training, and planning of terrorist attacks.

 

Social Media; Constructive & Destructive Option

The evolution of social media has created a new paradigm of communication and interaction. It has become a part of our social life that helps us connect to friends, family, colleagues, or others. We have witnessed how the advent of social media platforms like Facebook, Twitter, and WhatsApp brought a revolutionary change in how we use the internet for personal and professional purposes. Even though there are security settings on social media platforms, people with mischievous intentions still find a way to gain access to sensitive personal information. So, we must understand social media cyber security, which directly impacts our use of social media networks. The social media may gradually destroy the identity of a civilized nation if not duly controlled. The delegacy is how to control without jeopardizing the legitimate right of citizens to free access to internet for daily life and constructive social interactions. There is a need for 3-stage management, before, during and after a social crisis.

When the mindset of a youth is already shaped by a terrorist group or enemy’s extremism network, it is too late to jump in to lead, guide or prevent violence by those youth. Preventive phase is essential.

However, as easily witnessed, cyber space is turned into a virtual and somehow invisible world cup, where some players could freely play, without observance of rule of law, referee, yellow- red cards, accountability, punitive actions – total anarchy.

As a matter of fact, there is a serious shortcoming in international legally binding instruments for supervision and control of social media.

One could list the following as the main threats to national security, degree gravity varies depending on geopolitical situation of each country: Armed conflict, terrorism, organized crime, economic instability, poverty, energy vulnerability, flow of migrants and refugees, weapons of mass destruction, espionage, cyber-attack, in addition to natural disasters. Undoubtedly the cyber-attack and the new form of hybrid war, by misusing the cyberspace via social media is the most complicated and dangerous one.

The targets of the social media are every individual who could have access to mobile phone connected to internet, an elementary school child or an old citizen.

Generally, the user of mobile phones, psychologically trusts the majority of news even fake ones, as long as it is on his/her phone! Seldom one spends time to verify the validity of the source of information, and if the news is an urgent one, he/she will immediately pass on to his friends, thus in a matter of minutes a fake news, including the ones threatening national security will be distributed to thousands, if not millions.

 

I commend the organizers since the venue of this conference, the Academy of Police Force, is an appropriate place to carefully elaborate the issue. The police forces are in the middle of the battlefield, responsible to restore security, but in most cases are handicapped, blamed by both sides, thus they are the victim.

There are several examples in the Middle East, specifically after the so called Arab Spring. A critical review of the tragedy in Syria and other countries, demonstrates that social media, being manipulated from outside, brought people to the streets, then anonymous terrorist shooting, then blames by adversary social media on different groups in the same society or government, augmenting the fire, hatred among fellow citizens, then civil war.

In a nutshell: a legitimate democratic critique and demand by citizens will turn into civil war and total destruction of a country, not by traditional military interventions with boots on the ground, but by social media, manipulated by an enemy.

I recall the color revolutions, imposed on some countries in the EU, have been duplicated in the Middle East; they started under the pretext of “enhancing democracy”, but with an additional terrorist dimension; mainly the ISIS, so called Daesh, led to the most brutal massacre against innocent nations of the Middle East. Such crimes against humanity openly happened with maximum application of “social media”, with procrastination of the civilized world, the proponent of human rights, and the United Nations and other international organizations.

 

Crisis management in this case, specifically by law enforcement and police force, entrusted by their own people to protect their security, is very difficult since the perpetrators and criminals are not physically present but operate from their own country. They remotely deceive mostly the youth via social media, guide them even to how to kill their own people.

The present experts might agree that with the present international legal deficiency, it is not easy to track down the servers and to take the broadcasting networks to court. This threat is much more dangerous than cyber-attacks against an infrastructure of a city, since this one targets the infrastructure of the very foundation of a society.

 

I recall the constitution of International Telecommunication Union (ITU) which emphasizes on, “…telecommunication for the preservation of peace and the economic and social development of all States”. The use of IT and AI for violence against other countries is in full contravention of letter and spirit of this constitution.[3]

 

Let’s have a short review of the cultural dimension which the IT could have impact on.

Analysing the phenomenon of terrorism from a symbolic perspective, we must bear in mind that it is not a struggle between communism and capitalism, or between socialism and democracy, but between distorted perceptions about Islam and democracy.[4]

Bitter experience of last three decades shows that Salafist ideology promotes violence as a method of spreading jihad worldwide, based on their ill minded thesis of “Muslim supremacy” which in fact aims at distorting the peaceful image of Islam. The executors of such jihadist violence come not only from a specific terrorist organization but also from many organizations and affiliated networks outside the Islamic world. This multifaceted characteristic is crucial to understand the new phenomenon regarding the rise of militants and their supporters mostly from outside Muslim countries.

Though some countries in the Western world are creators of and harbouring extremists and terrorist, but their citizens are also victims. The evolution of the profile of these “new” lonely subjects is that of an individual, or a small group of individuals grown up, educated and lived in a Western country, with no significant engagement in Muslim religious practices. However, at one point, this subject starts a process of radicalization promoted by certain organized groups, imposing their own distinct “brand” of Islam, then developing their own ideological local claims as legitimate. Any terrorist attack is considered illegitimate from the main Islamic ideological perspective! But under the guise of defending Islam from foreign threats, the radicalized youth influenced by an adapted and distorted ideological perspective, becomes an easy prey for a terrorist group. The effective tool for such dangerous acts is the new phenomenon, “Social Media”. Thousands of youths born and grown up in the EU were recruited by ISIS, joined ISIS in battlefield, massacred thousands of innocent people in Syria and Iraq, then are returning back home!

I recall that in 2014, the UN Security Council Resolution No. 2178 defined “foreign terrorist fighters” as “who travel or attempt to travel to a state other than their states of residence or nationality, for the purpose of the perpetration, planning, or preparation of, or participation in, terrorist acts or the providing or receiving of terrorist training”.

As a matter of fact, nowadays, the operators of IT terrorist networks do not need to travel, for example to the Middle East, they simply provoked youth for extremism and violence in their own country, via social media, while sitting in their safe haven, specifically in Europe. Therefore, the above definition by the UNSC Resolution 2178 is incomplete and obsolete.

As effective crisis management, it is necessary to enhance security culture in such a way that the trusting relationship between citizens is not jeopardized by increased threat awareness and the public, law enforcement agencies and police work together for the same cause.

 

Cyberspace has engulfed all aspects of life. Consequently, the uninterrupted, unobstructed, and secure availability of cyberspace constitutes a prerequisite to the efficient performance of practically all sectors of society.

I recall that the European Union Agency for Network and Information Security, identified the following main trends in the cyber threat landscape:[5]

  • Complexity of attacks and sophistication of malicious actions in cyberspace continue to increase.
  • Malicious infrastructures continue their transformation towards multipurpose configurable functions including anonymization, encryption and detection evasion.
  • Monetization of cybercrime is becoming the main motive of threat agents in particular cyber-criminals. They take advantage of anonymity offered by the use of digital currencies.
  • State-sponsored actors are one of the most omnipresent malicious agents in cyberspace. They are a top concern of commercial and governmental defenders.

I my opinion they have to be updated.

 

Crisis Management of a Social Media Crisis:

Social Media Crisis is a very complicated equation with various delicate parameters with technical, security, cultural, and social dimensions.

The authorities of the state under attack, specifically its law enforcement – entrusted by people and constitution to protect national security as well as individual security – face a serious challenge. While they have to disconnect the internet in order to prevent further escalation, they may be forced not to do so since it shall disrupt daily life.  At the same time in order to investigate the foreign perpetrators by identifying the source of connections, they have to somehow enter the domain of communication privacy of the citizens.

The trustful relation of people and state is crucial to neutralize the foreign social media attack, first not to trust fake news, second to report to Cyber Police the suspicious accounts which are launching media attack for social unrest.

The social media such as WhatsApp, Telegram, Facebook, Tweeter, has been misused by extremists, with negligence of the accountability by such media. There is evidence that some satellite TV channels have provoked social violence, with absolute silence / negligence of the host country.

 

Concluding Remarks:

While Information Technology (IT) and the social media are integral part of 21st century living, but it is a matter of serious concern that social media is continuously misused against peace and stability of different countries specifically developing countries.

Social media has become a prime target for cybercrime. All organizations should take appropriate measures to be cyber-safe, and users, too, should protect their personal information to avoid any misuse. Cyberspace is becoming a significant area for crimes, so there is a need for comprehensive collaboration among nations to work together and combat these social network crimes and social media cyber-attacks, which are a continuously gowning menace.

The use of social media for violence and extremism is a crime, and if used by foreign entities or other countries it is Transnational Organized Crime (TOC).

Therefore, such crisis management requires internal and external intensive measures, including preventive ones, as well as actions during the crisis.[6]

 

Concrete Recommendations:

  • I recommend the police forces exchange information on lessons learned in order to decrease social media violence in each country, which will surely have speedy regional and global security effects, due to advanced IT and AI. If the cooperation among law enforcements, particularly Cyber Police, in different countries including EU and Middle East is enhanced, then “Threat” will turn into “Opportunity” for peace and prosperity.
  • It is highly recommended that renowned related Think-Tanks invest on urgent research by scientists, legal and security experts, for comprehensive review of all dimensions of “Impacts of Social Media on National and International Security” and give feasible recommendations on prevention of such threats and on the accountancy for perpetrators.
  • UNODC has to consider this issue in the context of the United Nations Convention against Transnational Organized Crime.
  • The thoughtful practical proposals may pave the way to commence an international negotiation under the auspices of the United Nations, possibly under its specialized agency ITU or even the Conference of Disarmament (CD), for a convention on “Protection against security threat by social media misusing Cyberspace.”

 

= = = = =

[1] THE NEXT 100 YEARS. A FOREAST FOR THE 21ST CENTURY by George Friedman. Doubleday New York, London, Toronto, Sydney, Auckland.

[2] A New of Information War, Dr. Tarek Chehrkaoui, TRT Research Report, 2018.

 

[3] Constitution of ITU:  https://www.itu.int/council/pd/constitution.html

[4] Individual Terrorism as a Response to the Distorted Phenomenon of Cultural Identity. Claudio A. Payá-Santos (1), Juan José Delgado-Morán (1) and Pablo Andrés Mazurier (2). 1= from Antonio de Nebrija University, Madrid, Spain, 2= from Scuola Superiore Sant’Anna, Pisa, Italy.

[5] European Cybersecurity: Future Challenges from a Human Rights Perspective. By Luis A. García Segura

[6] https://www.jigsawacademy.com/blogs/cyber-security/social-media-cyber-security/

 

SHARE

You can Share this page with others

Share on facebook
Share on twitter
Share on linkedin
Share on reddit
Share on telegram
Share on whatsapp
Share on email
Share on print
How can we help you?
internship

"*" indicates required fields

DD slash MM slash YYYY

Education

Current Address*

Registration Form

"*" indicates required fields

terms

SUBSCRIBE
Subscribe to our newsletter

DONATE NOW

Your financial contribution is appreciated in advance

AMOUNTS (€)(Required)

Or send money to this Paypal account:

president@viimes.org

NOTE >The VIIMES is a non-profit independent Think-Tank based in Vienna, whose ultimate goal is to promote dialogue among the Middle Eastern Nations. Your donation would undoubtedly contribute to our common cause for peace and prosperity in the region and is highly appreciated in advance.

President of the VIIMES

Ambassador Soltanieh

Born on 1st October 1950, Ambassador Ali Asghar Soltanieh as nuclear scientist and multilateral diplomat has been active as participant/guest speaker in over 200 international and regional conferences, specifically on international security, WMD Non- proliferation and Disarmament since 1982.
He has served two times as the Resident Representative to the IAEA (1982-87; 2006-2013). During the first mission to the IAEA, he was simultaneously the Chief Negotiator and Head of Delegation to the United Nations Conference on Promotion of International Cooperation on Peaceful Uses of Nuclear Energy (PUNE). He has been fully involved in the NPT conferences since 1982.
He served as Ambassador to the United Nations and other International Organizations in Geneva (1999-2002) & Vienna (2006-2013).
While serving as DPR in Geneva (1999-2002), he was the Chief Negotiator on the Protocol of Biological Weapons Convention as well as delegate to the Conference of Disarmament (CD).

Phone:

+43 (1) 346-0237

Email:

president@viimes.org