Skip to main content
Top

2020 | OriginalPaper | Chapter

The Dark Side of Interconnectivity: Social Media as a Cyber–Weapon?

Author : Sofia Martins Geraldes

Published in: Social Media and the Armed Forces

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Traditional wisdom understands weapons as tools that cause or have the potential to cause damage or harm, whereas cyber-weapons relate to the use of computer code that causes or has the potential to cause damage or harm. Both conceptions understand damage and harm as inherently physical. While the rise of social networks creates new opportunities for strategic communications in the armed forces, it also facilitates hostile activities, such as psychological operations, with the potential to cause damage beyond the physical domain, thus challenging the traditional understanding of weapons. This contribution investigates the potential of social media to be used as a cyber-weapon, arguing that Russia used social media as a cyber-weapon in the conflict with Ukraine. The analysis demonstrates that Russia’s use of social media caused damage to Ukraine, which consequently contributed to the reform of the security and defence sector in Ukraine.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
See, for example, Fried and Polyakova (2018).
 
2
This study does not seek to provide a deterministic point of view on technology, but rather to challenge traditional conceptions of war, namely regarding what counts as a weapon and what kind of harm a weapon could cause to be considered as one.
 
3
For a detailed understanding of this securitisation process see, for example, Hansen and Nissenbaum (2009).
 
4
For a better understanding see, for example, Boyte (2017).
 
5
Stuxnet is a malicious computer worm, that targets SCADA (supervisory control and data acquisition systems) and, although neither the USA nor Israel openly admitted its use, it is believed that their use of Stuxnet was responsible for causing damage to the nuclear programme of Iran. For a better understanding see, for example, Lindsay (2013).
 
6
For a better understanding see, for example, Eilstrup-Sangiovanni (2018).
 
7
In this context, targeting means to direct a disinformation campaign at a specific person or group (Roose 2018).
 
8
This research does not aim to deepen the understanding of the underlying dynamics of the conflict, but to demonstrate the role of social media in it as a cyber-weapon.
 
9
Social media was also used by the Ukrainian Armed Forces, government, and civil society to spread information or gain advantage (Herrick 2016). Nevertheless, we focus on the use of these platforms by Russia, considering its implications and role as a game changer in the paradigm of the information warfare landscape (Giles n.d; Herrick 2016; Lange-Ionatamishvili and Svetoka 2015).
 
10
Although evidence demonstrates that Russia used both traditional and social media to mutually reinforce the narrative and address younger and older generations (Blank 2017; Lange-Ionatamishvili and Svetoka 2015), the goal of this chapter is to focus on the social media side, considering the novelty and challenges brought by these digital platforms.
 
11
Russian psychological operations aimed at shaping different audiences: Ukrainians, Russians, and international audiences (Blank 2017). However, the goal of this chapter is to focus on Ukrainian perceptions, namely of the Ukrainian Armed Forces.
 
12
The focus on these operations relates to the fact that, in the approach to Russian information aggression, psychological operations are at the core of Ukrainian strategy.
 
13
For a better understanding of the concept ‘active measures’ see, for example, Giles (2016); Ajir and Vailliant (2018).
 
14
Euromaidan was a wave of civilian protests that began in November 2013 in Ukraine, sparked by the decision of the Ukrainian government to suspend the signing of the Association Agreement with the European Union in order to build a stronger partnership with Russia and the Eurasian Economic Union.
 
15
In this context, a troll is a person who uses social media to sow chaos and discord.
 
16
In this context, a bot is an automated account.
 
17
In this context, social engineering refers to the manipulation and exploitation of human cognitive biases in order to exert influence (Willemo 2019).
 
18
In this context, impersonation refers to the act of pretending to be another person, organisation, newspaper or website for the purpose of manipulation (Willemo 2019).
 
Literature
go back to reference Ajir M, Vailliant B (2018) Russian information warfare: implications for deterrence theory. Strat Stud Q 12(3):70–89 Ajir M, Vailliant B (2018) Russian information warfare: implications for deterrence theory. Strat Stud Q 12(3):70–89
go back to reference Blank S (2017) Cyber war and information war à la Russe. In: Perkovich G, Levite AE (eds) Understanding cyber conflict: 14 analogies. Georgetown University Press, Washington, DC, pp 81–98 Blank S (2017) Cyber war and information war à la Russe. In: Perkovich G, Levite AE (eds) Understanding cyber conflict: 14 analogies. Georgetown University Press, Washington, DC, pp 81–98
go back to reference Bousquet A, Grove J, Shah N (2017) Becoming weapon: an opening call to arms. Crit Stud Secur 5(1):1–8CrossRef Bousquet A, Grove J, Shah N (2017) Becoming weapon: an opening call to arms. Crit Stud Secur 5(1):1–8CrossRef
go back to reference Boyte KJ (2017) A comparative analysis of the cyberattacks against Estonia, the United States, and Ukraine: exemplifying the evolution of internet-supported warfare. Int J Cyber Warfare Terror 7(2):54–69CrossRef Boyte KJ (2017) A comparative analysis of the cyberattacks against Estonia, the United States, and Ukraine: exemplifying the evolution of internet-supported warfare. Int J Cyber Warfare Terror 7(2):54–69CrossRef
go back to reference Danyk Y, Maliarchuk T, Briggs C (2017) Hybrid war: high-tech, information and cyber conflicts. Connect Q J 16(2):5–24CrossRef Danyk Y, Maliarchuk T, Briggs C (2017) Hybrid war: high-tech, information and cyber conflicts. Connect Q J 16(2):5–24CrossRef
go back to reference Eilstrup-Sangiovanni M (2018) Why the world needs an international cyberwar convention. Philos Technol 31:379–407CrossRef Eilstrup-Sangiovanni M (2018) Why the world needs an international cyberwar convention. Philos Technol 31:379–407CrossRef
go back to reference Eriksson J, Giacomello G (2006) The information revolution, security, and international relations: (IR) relevant theory? Int Polit Sci Rev 27(3):221–244CrossRef Eriksson J, Giacomello G (2006) The information revolution, security, and international relations: (IR) relevant theory? Int Polit Sci Rev 27(3):221–244CrossRef
go back to reference Fried D and Polyakova A (2018) Democratic defense against disinformation. Atlantic Council Fried D and Polyakova A (2018) Democratic defense against disinformation. Atlantic Council
go back to reference Golan O, Ben-Ari E (2018) Armed forces, cyberspace, and global images: the official website of the Israeli defense forces 2007-2015. Armed Forces Soc 44(2):280–300CrossRef Golan O, Ben-Ari E (2018) Armed forces, cyberspace, and global images: the official website of the Israeli defense forces 2007-2015. Armed Forces Soc 44(2):280–300CrossRef
go back to reference Hansen L, Nissenbaum H (2009) Digital disaster, cyber security, and the Copenhagen school. Int Stud Q 53:1155–1175CrossRef Hansen L, Nissenbaum H (2009) Digital disaster, cyber security, and the Copenhagen school. Int Stud Q 53:1155–1175CrossRef
go back to reference Hellman M, Olsson E-K, Wagnsson C (2016) EU armed forces’ use of social media in areas of deployment. Media Commun 4(1):51–62CrossRef Hellman M, Olsson E-K, Wagnsson C (2016) EU armed forces’ use of social media in areas of deployment. Media Commun 4(1):51–62CrossRef
go back to reference Jankowski NW (2018) Researching fake news: a selective examination of empirical studies. Javnost Public 25(1–2):248–255CrossRef Jankowski NW (2018) Researching fake news: a selective examination of empirical studies. Javnost Public 25(1–2):248–255CrossRef
go back to reference Kalpokas I (2017) Information warfare on social media: a brand management perspective. Baltic J Law Polit 10:35–62CrossRef Kalpokas I (2017) Information warfare on social media: a brand management perspective. Baltic J Law Polit 10:35–62CrossRef
go back to reference Lange-Ionatamishvili E, Svetoka S (2015) Strategic communications and social media in the Russia Ukraine conflict. In: Geers K (ed) Cyber war in perspective: Russian aggression against Ukraine. NATO CCD COE Publications, Tallin, pp 103–111 Lange-Ionatamishvili E, Svetoka S (2015) Strategic communications and social media in the Russia Ukraine conflict. In: Geers K (ed) Cyber war in perspective: Russian aggression against Ukraine. NATO CCD COE Publications, Tallin, pp 103–111
go back to reference Libicki MC (2017) The convergence of information warfare. Strat Stud Q 11(1):49–55 Libicki MC (2017) The convergence of information warfare. Strat Stud Q 11(1):49–55
go back to reference Lindsay JR (2013) Stuxnet and the limits of cyber warfare. Secur Stud 22:365–404CrossRef Lindsay JR (2013) Stuxnet and the limits of cyber warfare. Secur Stud 22:365–404CrossRef
go back to reference Maness RC, Valeriano B (2015) The impact of cyber conflict on international interactions. Armed Forces Soc 42(2):1–23 Maness RC, Valeriano B (2015) The impact of cyber conflict on international interactions. Armed Forces Soc 42(2):1–23
go back to reference Meiches B (2017) Weapons, desire, and the making of war. Crit Stud Secur 5(1):1–19CrossRef Meiches B (2017) Weapons, desire, and the making of war. Crit Stud Secur 5(1):1–19CrossRef
go back to reference Mejias UA, Vokuev NE (2017) Disinformation and the media: the case of Russia and Ukraine. Media Cult Soc 39(7):1027–1042CrossRef Mejias UA, Vokuev NE (2017) Disinformation and the media: the case of Russia and Ukraine. Media Cult Soc 39(7):1027–1042CrossRef
go back to reference Mirrlees T (2015) The Canadian Armed Forces “YouTube war”: a cross-border military-social media complex. Glob Media J 8(1):71–93 Mirrlees T (2015) The Canadian Armed Forces “YouTube war”: a cross-border military-social media complex. Glob Media J 8(1):71–93
go back to reference Mölder H, Sazonov V (2018) Information warfare as the Hobbesian concept of modern times – the principles, techniques, and tools of Russian information operations in the Donbass. J Slavic Mil Stud 31(3):308–328CrossRef Mölder H, Sazonov V (2018) Information warfare as the Hobbesian concept of modern times – the principles, techniques, and tools of Russian information operations in the Donbass. J Slavic Mil Stud 31(3):308–328CrossRef
go back to reference Müür K, Mölder H, Sazonov V, Pruulmann-Vengerfeldt P (2016) Russian information operations against the Ukrainian state and Defence Forces: April–December 2014 in online news. J Baltic Secur 2(1):28–71CrossRef Müür K, Mölder H, Sazonov V, Pruulmann-Vengerfeldt P (2016) Russian information operations against the Ukrainian state and Defence Forces: April–December 2014 in online news. J Baltic Secur 2(1):28–71CrossRef
go back to reference Olsson E-K, Deverell E, Wagnsson C, Hellman M (2016) EU armed forces and social media: convergence or divergence? Def Stud 16(2):97–117CrossRef Olsson E-K, Deverell E, Wagnsson C, Hellman M (2016) EU armed forces and social media: convergence or divergence? Def Stud 16(2):97–117CrossRef
go back to reference Prier J (2017) Commanding the trend: social media as information warfare. Strat Stud Q 11(4):50–85 Prier J (2017) Commanding the trend: social media as information warfare. Strat Stud Q 11(4):50–85
go back to reference Roozenbeek J, van der Linder S (2018) The fake news game: actively inoculating against the risk of misinformation. J Risk Res 22(5):1–11 Roozenbeek J, van der Linder S (2018) The fake news game: actively inoculating against the risk of misinformation. J Risk Res 22(5):1–11
go back to reference Ryan M, Thompson M (2017) Social media in the military: opportunities, perils and a safe middle path. In: Watola DJ, Macintyre A (eds) Technology and leadership: international perspectives. Canadian Defence Academy Press, Ontario, pp 217–225 Ryan M, Thompson M (2017) Social media in the military: opportunities, perils and a safe middle path. In: Watola DJ, Macintyre A (eds) Technology and leadership: international perspectives. Canadian Defence Academy Press, Ontario, pp 217–225
go back to reference Sazonov V, Müür K, Kopõtin I (2017) Methods and tools of Russian information operations used against Ukrainian armed forces: the assessments of Ukrainian experts. ENDC Occas Pap 6:52–66 Sazonov V, Müür K, Kopõtin I (2017) Methods and tools of Russian information operations used against Ukrainian armed forces: the assessments of Ukrainian experts. ENDC Occas Pap 6:52–66
go back to reference Valeriano B, Maness RC (2018) International relations theory and cyber security: threats, conflicts, and ethics in an emergent domain. In: Brown C, Eckersley R (eds) The Oxford handbook of international political theory. Oxford University Press, Oxford, pp 259–272 Valeriano B, Maness RC (2018) International relations theory and cyber security: threats, conflicts, and ethics in an emergent domain. In: Brown C, Eckersley R (eds) The Oxford handbook of international political theory. Oxford University Press, Oxford, pp 259–272
go back to reference van der Meer S (2015) Enhancing international cyber security: a key role for diplomacy. Secur Hum Rights 26:193–205CrossRef van der Meer S (2015) Enhancing international cyber security: a key role for diplomacy. Secur Hum Rights 26:193–205CrossRef
go back to reference Zeitzoff T (2017) How social media is changing conflict. J Confl Resolut 61(9):1970–1991CrossRef Zeitzoff T (2017) How social media is changing conflict. J Confl Resolut 61(9):1970–1991CrossRef
Metadata
Title
The Dark Side of Interconnectivity: Social Media as a Cyber–Weapon?
Author
Sofia Martins Geraldes
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-47511-6_11