Social Media A New Military Battleground

Social Media Warfare

As an increasing number of militaries worldwide use social media to recruit soldiers, gather intelligence, spread propaganda and even communicate with their own and other military groups, the broad spectrum of social media has been identified as the newest international military battleground. And as the battle intensifies, more countries join in.

Earlier this year the British army created its own special force of what The Guardian called “Facebook warriors,” and Sky News called “Twitter troops” responsible for “non-lethal warfare.” Known as the new 77th Brigade, the original 77th having used unorthodox tactics in Burma during World War II while fighting the Japanese. It is based in Berkshire and comprises reservists and regulars with journalistic skills who are social media savvy.

The Israeli military are pioneers of using social media going back as far as 2008 during its war on Gaza. It is believed to be active on 30 social media platforms, including Facebook, Twitter, Instagram and YouTube, and operates in six different languages. This way, the Israeli army says, it can engage with an audience it wouldn’t reach any other way.

military-social-media

The Islamic State, ISIS continues to use social media hugely successfully to recruit fighters internationally and increase its propaganda efforts.

And the US Defense Advanced Research Project Administration (DARPA) agency, which commissions advanced research for the Department of Defense and creates “breakthrough technologies” for national security, has included Kickstarter and Pinterest in its studies.

The Role of Social Media in Defence and Military Sectors

While the military might not be considered the easiest “sell” on social media, the use by military organizations, armed forces, and defense contractors of social media across the board is growing exponentially. The “enemy” of conventional military groups, including ISIS, has also harnessed its power and is exploiting its possibilities on a daily basis. ISIS, and other extremist groups, use social media to spread their brand or image, and are succeeding on a global scale at a rate most would call alarming.

In November, the fifth annual Social Media Within The Defence And Military Sector will be held in London, to explore developments within the social media arena as it relates to the defense and military industry.

Motivation behind the conference is that all industries have been forced to both acknowledge and embrace social media, and evolve with it to “survive in this new age of digitization” that has revolutionized the world and all its sectors.

Asking the question, “who is winning?” the conference will cover all aspects relating to social media, including:

  • Cyber security
  • Extremist and cybercriminal threats
  • Strategy communication
  • Recruitment and propaganda
  • Intelligence
  • Data sensitivity and management
  • Ethics
  • Creating effective content
  • Public

There will be discussions that focus on the impact of social media on military operations that will be led by industry experts, as well as a spotlight session on law enforcement that will look at counter terrorism, policing and the impact social media has had on “civil liberties.” Case studies will include the Ukraine crisis and how it has changed the “face” of social media.

There will also be two half-day workshops prior to the conference:

1. Building and Managing Social Media Communities
2. Social Media: Content Creation & Delivery In the Military

Speakers have been sourced worldwide and include military experts and social media professionals from the UK, US, Canada, Italy, the Netherlands, and Norway.

By Penny Swift

Byod.png
Disaster Recovery Plan.png
Data Fallout.png
The Sticky Note.png
Dinesh Varadharajan
The Future with Automation Many entrepreneurs believe digital technologies will transform the way their companies work. By 2022, the worldwide hyper-automation technology market is expected to be worth $596.6 billion. And by 2055, almost half ...
James Corbishly
Teams Sprawl in the Remote Workspace As working from home has become the new everyday norm, with more employers embracing the remote-work model as a new and likely permanent fixture of the employment world, there ...
Gary Bernstein
Secure Remote Authentication When employees are working remotely, they need to be able to access company resources and applications just as if they were in the office. This means that remote authentication needs to be ...
Rajesh Khanna
Implement Hyperautomation to Scale Automation Programs by 3X Most Digital Service Providers (DSPs) struggle to accelerate their path to Hyperautomation due to the complex processes with legacy systems and applications. Although Robotic Process Automation (RPA) plays a ...
David Dymko
Working with virtual machines and or Kubernetes A conversation with David Dymko, Director of Engineering for Cloud Native Development at Vultr.com If you work with virtual machines and or Kubernetes, and if you have some ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.