Weaponizing Connectivity: The Role of Social Media and Cyberspace in Modern Subversion

Authors

  • Daphne Damons none

DOI:

https://doi.org/10.34190/eccws.24.1.3450

Keywords:

subversion, cyber operations, countermeasures, conflict short of war

Abstract

The proliferation of social media has revolutionized modern warfare, transformed the nature of conflict and redefined the rules of engagement (Arquilla & Ronfeldt, 1993). The rapid evolution of social media platforms, with their speed and anonymity, has created complex tools with far-reaching impacts on global security and stability (Kaplan & Haenlein, 2010). The threat landscape has evolved significantly, shifting from traditional warfare to cyber operations short of war, which have significant implications for state power and global security. Thus, the traditional notion of warfare has undergone significant transformation with the advent of cyber operations and social media. As noted by Valeriano and Maness (2015). “Cyber warfare is a new and evolving form of conflict that is changing the way states interact with each other”. Cyber operations short of war refer to the use of cyber-attacks, propaganda, and disinformation to influence the actions of other states or non-state actors without resorting to conventional military force.  Hence, nations can exert their influence and act without resorting to conventional military force. This new reality has given rise to a theater of hybrid threats, which demands innovative strategies for counteraction (Giannopoulos, G., et al 2020). This article examines the weaponization of connectivity, exploring how social media platforms and cyberspace are being leveraged as tools of modern subversion. Drawing on existing literature (Gladwell, 2010; Morozov, 2011) and recent global events, this research investigates how state and non-state actors are exploiting social media to further their strategic interests (Loader & Mercea, 2011) as well as providing a framework for countermeasures making use of examples. The implications of these actions for global security and stability are also examined (Nye, 2011). By shedding light on this underexplored topic, this article aims to contribute to a deeper understanding of how roll connectivity is weaponized to use social media and cyberspace in modern subversion.

Downloads

Published

2025-06-25