Report |
Social Media as a Tool of Hybrid Warfare
View Abstract
The development of information technology has changed the nature of conflicts by creating an additional layer of complexity to traditional battle spaces. Nearly global access to the virtual environment has created numerous opportunities to conduct battles online affecting events in both the physical domain, such as computer systems, and in the cognitive domain of people’s attitudes and beliefs. Recently we have witnessed how both states and non-state actors use hybrid approaches to pursue their political and military aims, skilfully combining military operations with cyber-attacks, diplomatic and/or economic pressure, and information (propaganda) campaigns. Over the past decade, social media has rapidly grown into one of the main channels of communication used today. Virtual communication platforms have become an integral part of warfare strategy. The recent conflicts in Libya, Syria, and Ukraine have demonstrated that social media is widely used to coordinate actions, collect information, and, most importantly, to influence the beliefs and attitudes of target audiences, even mobilise them for action. Given this state of affairs, the NATO Strategic Communications Centre of Excellence (NATO StratCom COE) was tasked with looking into how state and non-state actors leverage social media as a tool for conflict and hybrid warfare strategies. The following topics will be addressed in the report:
• What is the role of social media in hybrid warfare? How is it ‘weaponised’?
• What techniques and tactics do state and non-state actors employ to support their political and military aims using social media? What effects can they achieve?
• What can NATO and its member nations do to identify and counter the malicious use of social media?
We hope that this paper will serve as a comprehensive introduction and useful educational material for anyone interested in understanding the complexity of today’s information environment, and specifically the techniques of influence used in the digital space. The report summarises the conclusions of research commissioned by the StratCom COE—Internet trolling as hybrid warfare tool: the case of Latvia by the Latvian Institute of International Affairs (LIIA) in cooperation with Riga Stradiņš University,1 Social influence in Russia-Ukraine-conflictrelated communication in social media by a team of Polish researchers,2 Network of terror: how Daesh uses adaptive social networks to spread its message by Joseph Shaheen, US State Department Fellow at the StratCom COE, as well as discussions from the seminars and conferences conducted by the COE over the course of 2015.
|
2016 |
Svetloka, S., Reynolds, A., Curika, L. |
View
Publisher
|
VOX-Pol Blog |
Social Media and the Rise of the Islamic State in 2014
View Abstract
|
2015 |
Galvin, J. |
View
Publisher
|
Report |
Social Media and Terrorist Financing: What are the Vulnerabilities and How Could Public and Private Sectors Collaborate Better?
View Abstract
• Social media companies should recognise the political importance of counterterrorist financing (CTF) by explicitly reflecting the priorities of the UN Security Council and the Financial Action Task Force (FATF) in their policies, strategies and transparency reports.
• Furthermore, social media companies identified as being at high risk of exploitation should update their terms of service and community standards to explicitly reference and outlaw terrorist financing (consistent with universally applicable international law and standards such as those of the FATF) and actions that contravene related UN Security Council resolutions and sanctions.
• Social media companies should clearly demonstrate that they understand and apply appropriate sanctions designations; at the same time, policymakers should ensure that sanctions designations include, where possible, information such as email addresses, IP addresses and social media handles that can support sanctions implementation by social media companies. The more granular the information provided by governments on designated entities, the more efficiently the private sector can comply with sanctions designations.
• Social media companies should more tightly control functionality to ensure that raising terrorist funding through social media videos, such as big-brand advertising and Super Chat payments, is disabled.
• Researchers and policymakers should avoid generalisations and make a clear distinction between forms of social media and the various terrorist-financing vulnerabilities that they pose, recognising the different types of platforms available, and the varied ways in which terrorist financiers could abuse them.
• Policymakers should encourage both inter-agency and cross-border collaboration on the threat of using social media for terrorist financing, ensuring that agencies involved are equipped with necessary social media investigative capabilities.
• International law enforcement agencies such as Interpol and Europol should facilitate the development of new investigation and prosecution standard operating procedures for engaging with operators of servers and cloud services based in overseas jurisdictions to ensure that necessary evidence can be gathered in a timely fashion. This would also encourage an internationally harmonised approach to using social media as financial intelligence.
• Policymakers should encourage the building of new, and leveraging of existing, public–private partnerships to ensure social media company CTF efforts are informed and effective.
|
2019 |
Keatinge, T. and Keen, F. |
View
Publisher
|
Journal Article |
Social media and terrorism discourse: the Islamic State’s (IS) social media discursive content and practices
View Abstract
The paper maintains the complementary nature of technological practice and discursive content in the process of meaning-making in digital jihadist discourse. The study shows that digital practices of strategic sharing, distribution and campaigns to re-upload textual materials are made possible by exploiting SMC communicative affordances. As for the analysis of discursive content, the paper focuses on YouTube and highlights strategic patterns and covert references in an IS-produced flagship video. It illustrates how IS discourse constructs its envisaged in-group/outgroup by (re-)symbolising current events within historical, political and ideological conflict scenarios, i.e. the incessant resistance and legitimacy of forces of virtue vs evil. By foregrounding symbolic references to military outgroup actors, IS legitimises its own violence and projects a powerful self-identity against a (perceived) global hegemony. The paper shows how the combination of a technologically savvy operation and a resistant, anti-hegemonic narrative, embedded in a strategically framed symbolism of Islam, may resonate with global (quasi)-diasporic digital consumers.
|
2020 |
KhosraviNik, M. and Amer, M. |
View
Publisher
|
Chapter |
Social Media and Situation Awareness during Terrorist Attacks: Recommendations for Crisis Communication
View Abstract
This chapter summarises the findings of a case study on social media activity during the 22 July 2011 terrorist attacks in Norway. Based on these findings and on theories and previous research on the role of social media in situation awareness (SA) configuration during crisis situations, the chapter offers seven recommendations for key communicators in official crisis management and response institutions, journalistic institutions, NGOs and others: (1) acknowledge social media as important and master monitoring and management of features across social media; (2) synchronise communication and establish a standard operating procedure (SOP); (3) establish and make known a joint social media emergency account; (4) participate, interact and take the lead; (5) be aware of non-hashtagged content; (6) implement verification tools and practices and (7) engage with and learn from celebrities. Book edited by Harald Hornmoen and Klas Backholm
|
2018 |
Steensen S., Frey E., Hornmoen H., Ottosen R., Konow-Lund T. M., |
View
Publisher
|
Journal Article |
Social Media and Radicalization: An Affordance Approach for Cross-Platform Comparison
View Abstract
To accentuate which platform characteristics particularly foster radicalization and extremist dynamics, this contribution investigates the affordances of social media as delineated in contemporary literature, conducting a platform comparison encompassing Telegram, WhatsApp, and X (formerly Twitter). Based on a scoping review, 17 affordances identified from studies researching radicalization dynamics on social media were extracted and categorized. The most frequently mentioned affordances—anonymity, visibility, and collectivity—were then further analyzed concerning their contribution to radicalization and the radicalization potential of these specific platforms. The platform-comparative affordance discussion shows that, although, in principle each of the three compared platforms can foster an environment conducive to radicalization depending on user intention and usage context, the specific characteristics of each platform necessitate a nuanced consideration. On one hand, it is imperative to discern affordances differentially along various dimensions when assessing their implications (e.g., internal vs. external visibility). On the other hand, it is beneficial to consider which affordances emerge from the actualization of other affordances. For instance, collectivity can result from the interplay of several affordances, such as interactivity and anonymity, and can be referred to as a meta-affordance. Furthermore, the analysis shows that platform branding and self-presentation not only affect platform architecture and affordances but also shape users’ perceptions of the platform, thereby influencing the actualization of affordances. This was particularly noted in the literature for Telegram and increasingly for X. Specific assertions, nevertheless, are hindered by the conceptual diffusion of the affordance approach and a lack of empirical analyses directly and systematically examining platform affordances in conjunction with radicalization dynamics.
|
2024 |
Schulze, H., Greipl, S., Hohner, J. and Rieger, D. |
View
Publisher
|