‘Disturbing Potential’: Military Operations in Social Media Domain
DOI:
https://doi.org/10.12797/Politeja.14.2017.50.08Keywords:
social media, psychological operations, information operations, terrorism, social networks, military operationsAbstract
The author of the article pursues several vignettes drafted in the course of the military and academic discussions, related to the social media. Initial section of the publication is dedicated to the social sphere of the human nature. The reasons and motives inspiring people to create networks are investigated. The subsequent part provides a description of currently available social media platforms. The tools, their utility and basic characteristics are examined. Such summary is used as a framework to build few conclusions on the potential risks and opportunities, offered by virtual networks for the security community. Findings are consequently confronted with existing doctrines. Some structural assumptions are drafted within this section, in order to provide a conceptual point of reference for further research. The author than continues with selected case studies of the social media military application. The article is concluded by a few reflections encapsulating the role of non-kinetic, social media embedded warfare in the contemporary conflicts.
Downloads
PlumX Metrics of this article
References
Bazley L., “Combating Jihadists and Free Speech: How the U.S. Military Is Using Fake Online Profiles to Spread Propaganda”, Daily Mail, 18 March 2011, at <http://www.dailymail.co.uk/news/article-1367535/U-S-military-using-fake-online-profiles-spread-propaganda.html>.
Google Scholar
Burnore N., Social Media Applications for Unconventional Warfare, U.S. Army Command and General Staff College thesis, Fort Leavenworth 2013.
Google Scholar
Calha J.M., “Hybrid Warfare: NATO’s New Strategic Challenge?”, NATO Defense and Security Committee Report, at <http://www.nato-pa.int/default.asp?SHORTCUT=3778>.
Google Scholar
Castells M., Communication Power, Oxford 2013.
DOI: https://doi.org/10.4000/books.editionsmsh.10551
Google Scholar
Chaffey D., “Global Social Media Research Summary 2017”, Smart Insights, 17 April 2017, at <http://www.smartinsights.com/social-media-marketing/social-media-strategy/new-global-social-media-research/>.
Google Scholar
Darczewska J., The Anatomy of Russian Information Warfare. The Crimean Operation, a Case Study, at <https://www.osw.waw.pl/sites/default/files/the_anatomy_of_russian_information_warfare.pdf>.
Google Scholar
David G.J., McKeldin T.R., Ideas as Weapons. Influence and Perception in Modern Warfare, Washington 2009.
Google Scholar
De Cuia Ch., IS (Islamic State) and the West: The Role of Social Media, at <http://tesi.eprints.luiss.it/15151/1/070502.pdf>.
Google Scholar
Duncan K.A., Assessing the Use of Social Media in Revolutionary Environment, Naval Postgraduate School thesis, Monterey, Calif. 2013, at <http://calhoun.nps.edu/bitstream/handle/10945/34660/13Jun_Duncan_Kirk.pdf?sequence=1>.
Google Scholar
Elkjer Nissen T., “Social Media, Strategic Narratives and Stratcom”, The Three Swords Magazine, no. 28 (2005), at <http://www.jwc.nato.int/images/stories/threeswords/SOCIAL_MEDIA_STRATCOM.pdf>.
Google Scholar
Elkjer Nissen T., #TheWeaponizationofSocialMedia. @Characteristics_of_Contemporary_Conflicts, Copenhagen 2016.
Google Scholar
European Commission, Social Media Guidelines for all Staff, at <http://ec.europa.eu/ipg/docs/guidelines_social_media_en.pdf>.
Google Scholar
Farwell J.P., “The Media Strategy of ISIS”, Survival – Global Politics and Strategy, vol. 56, no. 6 (2014), at <https://doi.org/10.1080/00396338.2014.985436>.
DOI: https://doi.org/10.1080/00396338.2014.985436
Google Scholar
Fielding N., Cobain I., “Revealed: US Spy Operation that Manipulates Social Media”, The Guardian, 17 March 2011, at <https://www.theguardian.com/technology/2011/mar/17/us-spy-operation-social-networks>.
Google Scholar
Geers K. (ed.), Cyber War in Perspective. Russian Aggression against Ukraine, Tallinn 2015.
Google Scholar
Gladding R.S., McQuade S.P., Cyber-Enabled Unconventional Warfare: The Convergence of Cyberspace, Social Mobilization, and Special Warfare, Naval Postgraduate School thesis, Monterey, Calif. 2015, at <http://calhoun.nps.edu/bitstream/handle/10945/47951/15Dec_Gladding_McQuade.pdf?sequence=1&isAllowed=y>.
Google Scholar
Global Justice Information Sharing Initiative, Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities. Guidance and Recommendations, February 2013, at <https://it.ojp.gov/documents/d/Developing%20a%20Policy%20on%20the%20Use%20of%20Social%20Media%20in%20Intelligence%20and%20Inves……pdf>.
Google Scholar
Handel M.I., Clausewitz and Modern Strategy, Abingdon 2004.
Google Scholar
“Internet Trolling as a Tool of Hybrid Warfare: The Case of Latvia”, NATO Strategic Communications Centre of Excellence, at <http://www.stratcomcoe.org/internet-trolling-hybrid-warfare-tool-case-latvia-0>.
Google Scholar
“Irregular Warfare: a SOF Perspective”, Center for Army Lessons Learned Newsletter, no. 11-34 (June 2011).
Google Scholar
Kaplan A.M., Haenlein M., “Users of the World, Unite! The Challenges and Opportunities of Social Media”, Business Horizons, vol. 53, no. 1 (2010), at <https://doi.org/10.1016/j.bushor.2009.09.003>.
DOI: https://doi.org/10.1016/j.bushor.2009.09.003
Google Scholar
Klausen J., “Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq”, Studies in Conflict & Terrorism, vol. 38, no. 1 (2015), at <https://doi.org/10.1080/1057610X.2014.974948>.
DOI: https://doi.org/10.1080/1057610X.2014.974948
Google Scholar
Kumar S. et al., An Army of Me: Sockpuppets in Online Discussion Communities, at <https://cs.stanford.edu/people/jure/pubs/sockpuppets-www17.pdf>.
Google Scholar
Larson E.V. et al., Foundations of Effective Influence Operations: A Framework for Enhancing Army Capabilities, at <http://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG654.pdf>.
DOI: https://doi.org/10.1037/e596982009-001
Google Scholar
Lewis J.A., “Cyber War: Definitions, Deterrence and Foreign Policy (2015)”, Center for Strategic and International Studies, 30 September 2017, at <https://www.csis.org/analysis/cyber-war-definitions-deterrence-and-foreign-policy>.
Google Scholar
Lucas E., Pomeranzev P., “Information War Techniques and Counter-strategies to Russian Propaganda in Central and Eastern Europe”, CEPA, 2 August 2016, at <http://cepa.org/reports/winning-the-Information-War>.
Google Scholar
Madhani A., “Cleric al-Awlaki Dubbed ‘bin Laden of the Internet’”, USA Today, 25 August 2010, at <https://usatoday30.usatoday.com/news/nation/2010-08-25-1A_Awlaki25_CV_N.htm>.
Google Scholar
Maxwell D.S., “Do We Really Understand Unconventional Warfare”, Small Wars Journal, 23 October 2014, at <http://smallwarsjournal.com/jrnl/art/do-we-really-understand-unconventional-warfare>.
Google Scholar
Metz S., Johnson II D.V., Asymmetry and US Military Strategy: Definition, Background and Strategic Concepts, Collingdale 2001.
DOI: https://doi.org/10.21236/ADA392257
Google Scholar
Mintz A.P. (ed.), Web of Deceit. Misinformation and Manipulation in the Age of Social Media, Medford 2012.
Google Scholar
NATO Standarization Agency, Allied Joint Publication 01: Allied Joint Doctrine (2010), at <https://www.gov.uk/government/publications/ajp-01-d-allied-joint-doctrine>.
Google Scholar
NATO Standarization Agency, Allied Joint Publication 3.10: Information Operations (2009), at <https://info.publicintelligence.net/NATO-IO.pdf>.
Google Scholar
NATO Standarization Agency, Allied Joint Publication 3.5: Special Operations, Mons 2013.
Google Scholar
NATO Standarization Agency, Allied Publication AAP6: NATO Glossary of Terms and Definitions (2014), at <http://wcnjk.wp.mil.pl/plik/file/N_20130808_AAP6PL.pdf>.
Google Scholar
NATO Supreme Headquarters Allied Powers Europe, Allied Command Operations Directive AD 95-3, Mons 2013.
Google Scholar
Niekerk B. van, Maharaj M., “Social Media and Information Conflict”, International Journal of Communication, vol. 7 (2013).
Google Scholar
Pomerantsev P., Weiss M., The Menace of Unreality: How the Kremlin Weaponizes Information, Culture and Money, Institute of Modern Russia, at <http://www.interpretermag.com/wp-content/uploads/2014/11/The_Menace_of_Unreality_Final.pdf>.
Google Scholar
Porshe III I.R. et al., Redefining Information Warfare Boundaries for an Army in a Wireless World, Santa Monica 2013.
Google Scholar
Seddon M., “Documents Show How Russia’s Troll Army Hit America”, BuzzFeed, 2 June 2014, at <https://www.buzzfeed.com/maxseddon/documents-show-how-russias-troll-army-hit-america?utm_term=.gsJl9nKJy#.guPKP1jlr>.
Google Scholar
Shaheen J., “Social Media Warfare: Findings from a Daesh Analysis, Network Simulation, and Future Direction”, APAN Community, 20 December 2016, at <https://community.apan.org/wg/oekn/m/mediagallery/179849>.
Google Scholar
Simon Wiesenthal Center, “Digital Terrorism and Hate Project Report 2016”, at <http://digitalhate.net/inicio.php>.
Google Scholar
Simon Wiesenthal Center, “Understand Simon Wiesenthal Center’s Mission”, at <http://www.wiesenthal.com/site/pp.asp?c=lsKWLbPJLnF&b=4441471>.
Google Scholar
“Social Constructivism”, Berkeley Graduate Student Instructor Teaching & Resource Center, at <http://gsi.berkeley.edu/gsi-guide-contents/learning-theory-research/social-constructivism/>.
Google Scholar
Svetoka S., Reynolds A., Curika L., Social Media as a Tool of Hybrid Warfare, Riga 2016.
Google Scholar
US Air Force LeMay Center for Doctrine, Air Force Doctrine Document 3-2: Irregular Warfare, at <https://fas.org/irp/doddir/usaf/afdd3-2.pdf>.
Google Scholar
US Armed Forces Joint Staff, Joint Publication 3-13: Information Operations, at <http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf>.
Google Scholar
US Armed Forces Joint Staff, Joint Terminology for Cyberspace Operations, at <http://www.nsci-va.org/CyberReferenceLib/2010-11-joint%20Terminology%20for%20Cyberspace%20Operations.pdf>.
Google Scholar
US Department of the Army, Field Manual 3-05: Army Special Operations Forces Unconventional Operations, at <https://fas.org/irp/doddir/army/fm3-05-130.pdf>.
Google Scholar
Voss B., “Governments Shop for the Latest Internet Weapons”, Minyaville, 28 August 2012, at <http://www.minyanville.com/business-news/politics-and-regulation/articles/internet-weapons-cyberspace-social-media/8/28/2012/id/43548?page=full>.
Google Scholar
Weiman G., New Terrorism and New Media, Wilson Center, at <https://www.wilsoncenter.org/sites/default/files/STIP_140501_new_terrorism_F.pdf>.
Google Scholar
West L.J., “#jihad: Understanding Social Media as a Weapon”, Security Challenges, vol. 12, no. 2 (2016).
Google Scholar
Winterfled S., Andress J., The Basics of Cyber Warfare. Understanding the Fundamentals of Cyber Warfare in Theory and Practice, Waltham 2013.
DOI: https://doi.org/10.1016/B978-0-12-416672-1.00001-5
Google Scholar
Zetter K., “Security Manual Reveals the OPSEC Advice ISIS Gives Recruits”, Wired, 19 November 2015, at <https://www.wired.com/2015/11/isis-opsec-encryption-manuals-reveal-terrorist-group-security-protocols/>.
Google Scholar
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.