Social Media

Bulls, Bears, and Trolls: Social Media Influence Operations and Financial Market Risk

Bulls, Bears, and Trolls: Social Media Influence Operations and Financial Market Risk

Financial markets present unique and evolving risks as states compete through the economic and information instruments of power. States have proven their ability and interest in manipulating both financial and political markets, and amplified through social media. While there are limited military options for response to these challenges, financial and economic markets present an unusual battlefield as states attempt to gain influence on the geopolitical stage.

#Reviewing The Hype Machine

#Reviewing The Hype Machine

Aral’s seminal book provides two fundamental arguments: first, social media promised and still promises economic, political, and social uplift for people; it can also cause perils, such as external election influence, financial manipulation, privacy issues, spreading of fake news, and so forth. The author also argues that left unchecked, social media can bring disharmony and destruction to a country's economic, political, and social structures. Therefore, he opines that to fully utilise the potential of social media platforms and avoid their drawbacks, there needs to be a rigorous scientific understanding of social media and knowledge of its nuances to eradicate the unscientific hysteria around social media.

Why We Tweet: General Officer Use of Social Media to Engage, Influence, and Lead

Why We Tweet: General Officer Use of Social Media to Engage, Influence, and Lead

For military institutions, social media is a mature tool that must move beyond the discretionary and into the realm of business as usual. In the absence of face-to-face interaction, social media is one of the most powerful ways for leaders to pass information, broadly convey intent, and for all of us to communicate, interact and foster professional sharing and discourse and build their capacity to influence.

A Different Kind of Truth: #Reviewing LikeWar

A Different Kind of Truth: #Reviewing LikeWar

Despite its shortcomings, this captivating book has far-reaching implications for our future and an urgent message for national security leaders and elected officials. America in 2019 is a place where the value of agreed-upon truth holds fading relevance. Claims on Twitter that have long been conclusively defeated by objective research are often met with the respect generally accustomed to scientific principles. Spending a few hours poking around social media, one may find the Orwellian idea that two plus two can be made to equal five if enough people believe it. This embrace of deceit serves as a present danger for not only the United States but for the world.

Targeting Our Blind Spot of Trust: Five Impossibilities of Liberal Democracy in a Dangerous Digital Age

Targeting Our Blind Spot of Trust: Five Impossibilities of Liberal Democracy in a Dangerous Digital Age

An axiom of political theory is that any stable and sustainable polity must be able to express and renew a cultural and political form with broad legitimacy among its constituent communities. Already impoverished by market fundamentalism, this capacity is further endangered in the digital age by its attack on the cognitive conditions critical to the reproduction of historical memory.

Controlling the Narrative: How Political Warfare Can Influence Policy

Controlling the Narrative: How Political Warfare Can Influence Policy

Political warfare and a geopolitical actor’s pursuit of political dominance is not new. The Soviet Union’s success during the Vietnam era showcases the importance of political warfare as the KGB was able to sow distrust and promote anti-war sentiment in the United States. In today’s digital age, social media is a powerful and potentially a dangerous weapon that can erode trust within society and its government. I do not suggest that political warfare acts as the backbone in projecting power or influence abroad.

The Unrealized Value of Open Source Intelligence for Irregular Warfare

The Unrealized Value of Open Source Intelligence for Irregular Warfare

As adversaries become more technologically savvy, the United States and its allies must become more adept at leveraging these trends. Open source intelligence, especially when coupled with rapidly improving big data analysis tools, which can comb through data sets that were previously too complex to derive meaningful results, has the potential to offset this growing problem, providing intelligence on enemy forces, partners, and key populations.

Social Engineering as a Threat to Societies: The Cambridge Analytica Case

Social Engineering as a Threat to Societies: The Cambridge Analytica Case

The key to counteracting social engineering is awareness since social engineers are targeting our lack of cognition, our ignorance, and our fundamental biases. In a cybersecurity context, it’s not as easy to mitigate social engineering as it is to mitigate software and hardware threats. On the software side, we can purchase intrusion detection systems, firewalls, antivirus programs, and other solutions to maintain perimeter security. Attackers will certainly break through at one point or another, but strong cybersecurity products and techniques are readily available. When it comes to social engineering, we can’t just attach a software program to ourselves or our employees to remain secure.

For Every Action There is an Information Reaction: How Exercises Need to Adapt in a Digital Age

For Every Action There is an Information Reaction: How Exercises Need to Adapt in a Digital Age

Ultimately, the best defense in information warfare is resilience—the ability to critically assess a dynamic information environment where everything is not always what it seems and manage the identified risks to ensure mission success. In a military context, this could include adapting basic and advanced levels of training to include fostering a deeper understanding for how information warfare is changing the nature of conflict, and how every service member’s actions can and will be used against them in a digital age.

The Strategic Communication Ricochet: Planning Ahead for Greater Resiliency

The Strategic Communication Ricochet: Planning Ahead for Greater Resiliency

In a hyper-connected world, one can no longer just put messaging out there. Once a message is pushed out, control of it is lost, and an adversary can and will subvert and shatter it into myriad distortions that ricochet back and hurt the sender. Likewise, any actions on the ground contradicting the messaging, will also be used to attack the sender aiming to erode public faith at home by exploiting hypocrisy, creating ambiguity and, ideally, disrupting decision-making.

How Russia Weaponized Social Media in Crimea

How Russia Weaponized Social Media in Crimea

Russia showed the world the effectiveness of social media as a weapon system in the cyber domain. By leveraging the population against one another, it successfully took ground from another sovereign nation without the employment of massed conventional forces. Future conflicts will involve civilian populations as connected, or more connected, as those in Crimea, and the employment of social media will be essential to shaping the narrative of U.S. Army operations. As the Russian government proved, through proper timing, messaging, and population targeting, social media has the potential to manipulate the outcome of a conflict and win a complex engagement.

Exercise Hamel 2016: A Case Study in the Military Use of Social Media

Exercise Hamel 2016: A Case Study in the Military Use of Social Media

This article describes how a multi-disciplinary team from the Australian Army integrated a communications plan into the design and execution of Exercise Hamel in 2016. We examine issues such as planning for public affairs and social media to be supporting elements of the exercise; workforce design; execution of a social media campaign, including tracking and adaptation; and finally, the results. Notably, this article also makes a contribution to emerging research regarding the role of new and social media as part of an integrated military public affairs strategy.     

Why Should Military Leaders Use Social Media?

Why Should Military Leaders Use Social Media?

How can military leaders institutionalise their use of social media for the variety of ‘raise, train, sustain’ functions that are executed on a daily basis?  This is not to say that military organisations don’t have a social media presence; they do.  In the Australian context, the Army Facebook page has a following nearly ten times the size of the regular Army.  The Twitter feed, while having a smaller presence, at least has established a foothold for the Army in the Twittersphere. But presence is not the same as an institution fully exploiting the potential of social media.