Social Media Has Been Weaponised

Many people now rely on social media platforms such as Facebook, Twitter, Snapchat, YouTube, and Instagram to find and connect with each other. Our growing love of social media is not just changing the way we communicate, it’s changing the way we do business, the way we are governed, and the way we live in society all at breakneck speed. The recent mob attack on the US Capitol shares a familiar pattern with the use of social media to recruit and organise extremists and has been used by ISIS and other terrorist groups.

 As social media is a relatively new technology, there's little research to establish the long-term consequences, good or bad, of its use.  However, multiple studies have also found a strong link between heavy social media and an increased risk for depression, anxiety, loneliness, self-harm, and even suicidal thoughts.

While there are benefits, it’s important to remember that social media can never be a replacement for real-world human connection. It requires in-person contact with others to trigger the hormones that alleviate stress and make you feel happier, healthier, and more positive. The latest figures show that there are 3.78 billion social media users worldwide in 2021, a five percent increase from a year ago. It is also 920 million more than the number of social users in 2017, which represents a whopping 32.2 percent jump in just five years. The average annual growth rate over this period is 7.2 percent. 

Social media has become a major part of numerous lives through countless websites and apps and people have been able to connect with others and share their thoughts, emotions and experiences. It’s been able to provide a source of entertainment and shopping, and many businesses have even found it useful for promotion and marketing.

At this point, social media has had such a huge impact on society that it seems like many people couldn’t live without it. 

Social media has also had a number of disadvantages that have affected our lives. This includes the result of major problems having to do with mental health issues, insecurities about one’s self, and addiction. Through the weaponisation of social media, the Internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, “Twitter wars” produce real world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. 

The result is that armed conflict, technology and and politics have blurred together and turned into a new kind of battle space that plays out on our smartphones.

The first wars in human history were fought with sticks and stones, but modern warfare is a high-tech battlefield where social media has emerged as a surprising effective weapon. From Russian hacking to influence the American election to online recruitment for terror groups such as ISIS, an array of players are using false news and bogus accounts to stoke fear, incite violence and manipulate outcomes.

During the Arab Spring, the power of social media to drive major political change burst onto the world stage. The promise of Twitter and Facebook to help democratically minded protesters share information, organise protests and ultimately free themselves from dictatorships looked almost unstoppable.  However, hoped for democratic gains across the Arab world have proved unsustainable and another aspect of the technology became prominent emerged. Within a few years, Isis was using the Internet to mobilise recruits, spread propaganda, and encourage attacks in the United States and elsewhere. 

Then there came an actual attack on the US conducted via social media itself, the spread of Russian disinformation as part of an effort to sway the 2016 American presidential electionMore recently been used to create and encourage the storming of the US Government buildings in Washington DC.

The important 2018 book LikeWar by Peter W. Singer and Emerson Brooking tackles the mind bending questions that arise when war goes online and the online world goes to war.  Probing into the darker and hidden aspects of the internet, the book outlines a new way of understanding and defending against the unprecedented threats of our networked world, in which  ISIS copies the Instagram tactics of Taylor Swift, Internet trolls shape elections in other countries and the governmnet of China uses a smartphone app to police the thoughts of 1.4 billion citizens. 

For a technology that’s designed to bring people closer together, spending too much time engaging with social media can actually make you feel more lonely and isolated.

World Economic Forum:   Wharton:      DefenseOne:      The Atlantic:    Oberlo:    HelpGuide:      Summit News

You Might Also Read: 

Social Media Has Gone Global:

 

« Airline Faces £800m Penalty For Customer Data Breach
Cyber Security Certifications - Online Exam »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

GigaOm

GigaOm

GigaOm's mission is to provide enterprises with information and analysis to help them make better decisions about technology.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

Cytenna

Cytenna

Cytenna Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

IMC2 brings together resources to carry out ambitious, innovative and multidisciplinary projects in the field of cybersecurity and cyber resilience.

MARS Suite

MARS Suite

MARS Suite is your all-in-one solution for cyber protection & compliance. Cybersecurity and risk management is what we do best. And we’re making it simple and easy.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.

Bytium

Bytium

Bytium provides top-tier IT services and solutions designed to empower everyone, from individuals to global corporations. Specializing in cybersecurity and proactive IT management.

Clutch Security

Clutch Security

Clutch Security are on a mission to secure all Non-Human Identities. Everywhere.

CyberE71

CyberE71

CyberE71 is an ambitious initiative serving as an umbrella for the UAE’s cybersecurity innovation ecosystem.