Professional Documents
Culture Documents
The content:
Introduction ....3 A literature review .........6 The battles for a story: Israeli case of state-network cooperation for advocacy purpose...16 Russian-Georgian war: hacktivism, network collaboration and states role. ....22 Moldova: The offline consequences of online cooperation........31 Conclusion.36 References,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...42
Introduction.
On
January
20
I
was
standing
at
the
National
Mall
with
millions
of
Americans
and
foreigners
who
decided
to
see
the
Inauguration
of
44th
president
of
the
United
States
with
their
own
eyes.
However,
the
most
significant
impression
was
not
made
by
the
inauguration
itself,
but
by
the
crowd.
Despite
the
huge
number
of
people
it
was
extremely
well
organized.
On
my
way
to
the
Mall,
and
back,
every
several
minutes
I
received
a
text
message
on
my
phone
that
indicated,
according
to
my
location,
where
I
should
go
and
what
the
restrictions
were.
The
event
was
unique
not
only
due
to
the
huge
crowd
that
it
gathered
but
also
because
it
served
as
an
example
that
information
technologies
can
make
a
significant
contribution
for
crowd
management.
In
the
case
of
inauguration,
Information
Communication
Technologies
(ICT)
have
mitigated
the
risk
of
chaos
that
can
be
caused
by
two
million
of
people
that
gathered
in
a
same
place.
However,
one
might
ask
if
crowd
management
technologies
are
only
a
solution
for
security
problems
or
also
are
a
part
of
a
new
problem.
According
to
the
Websters
dictionary
crowd
is
a
large
number
of
things
close
together
and
a
great
body
of
people.
The
Internet
created
the
greatest
crowd
in
the
human
history.
First,
it
is
a
great
body
of
people
(1,596,270,108
people,
according
to
the
recent
statistics1).
Secondly,
they
are
sharing
the
same
space
which
makes
people
as
nodes
in
one
global
network
that
provides
an
option
for
immediate
connection
with
one
another.
Therefore,
1
http://www.internetworldstats.com/stats.htm
we can claim that they are close together. Certainly, the actual number of crowd, as nodes accessible to each other, is lower than 1.6 billion. However, the ICT provides an ability to expand the global crowd on permanent basis and make the interaction with its members (nodes) more convenient. The same dictionary says that mob - implies a disorderly crowd with the potential for
violence. According to this definition the disorder is the main threat from the crowd. However, I would like to argue that order makes the crowd even more dangerous than the feared disorder. The organizational potential and capabilities of new information technologies should be among the main concerns of those who are responsible for the U.S. and the global security. The main argument of this paper is that the emergence of the online crowd and new technologies to its management create a new asymmetrical threat. This threat is especially significant since the engagement of non-combatants crowd can be used by state and non-state actors. The threat is relevant for online reality, as well as for offline the physical domain of our life, while actually these two spaces are interconnected. In this paper I will address three main issues: the ICT methods for mob management the effect of mob management: for what purposes it might be used and how online reality provide new opportunities not only for crowd management but also for crowd impact within the offline activities particular role of state actors in the mob management
To address these three issues the paper will present a brief literature review and analysis of three case studies of online crowd management: 1. Israeli online advocacy effort during January 2009 operation in the Gaza strip(online dimension): The case study will describe crowds management as a mechanism for agenda setting and framing (promoting pro-Israeli content and balancing the media coverage narrative). 2. Activities of Russian hackers during Russian-Georgian war: a method of violating online content (preventing access /replacement / erasing) based on crowd management and networks members cooperation (online dimension). 3. Moldova's Twitter revolution: case study will focus on offline effect of online crowd management. In addition, it will deal with the gap between the abilities of the ICT crowd management to organize/trigger an offline protest and lack of ability to command/control it within offline reality. The case studies will be followed by a short discussion and conclusions.
A
literature
review:
Conflicts
and
role
of
information
technologies:
In
his
book
entitled
Information
and
American
democracy:
technology
in
the
evolution
of
political
power
Bruce
Bimber
claims
that
the
cost
of
communication
is
the
major
factor
in
shaping
the
political
reality.
He
focuses
on
the
ability
of
political
entrepreneurs
to
overcome
resource
barriers
by
using
comparatively
inexpensive
information
technology2.
According
to
Bimber
a
change
in
a
cost
means
a
change
in
information
regime
which
is
reflected
in
different
set
of
political
elites
and
institutions.
In
the
past
only
the
wealthy
could
afford
to
build
organizations
and
manage
flow
of
information.
However,
today,
due
to
decreases
in
cost
of
communication,
the
new
elite
are
those
who
know
how
to
operate
in
the
highly
fluid,
networked
world
of
new
information
technology.
The
consequences
of
these
changes
are
debatable.
Howard
Rheingold
presents
an
optimistic
point
of
view
and
emphasizes
the
democratization
impact
of
the
new
communication
technologies
and
ability
of
the
mob
to
bring
positive
change.
Rheingold
defined
the
new
social
phenomenon
Smart
mob
-
a
form
of
self-structuring
social
organization
through
technology- mediated,
intelligent,
emergent
behavior"3.
According
to
Rheingold
social
networks
provide
2
Bimber B, Information and American democracy: technology in the evolution of political power, Cambridge University Press, 2003, p.5. 3 Rheingold H., Smart Mobs: The Next Social Revolution, Basic Books, 2003.
option
of
new
forms
of
human
cooperation.
People
who
do
not
know
each
other
are
consolidating
around
same
goal
during
very
short
period
of
time
and
working
together
to
achieve
it.
One
of
the
most
famous
examples
of
smart
mob
impact
is
the
Orange
revolution
in
Ukraine.
In
a
very
short
period
of
time
thousands
of
people
in
different
locations
who
did
not
know
each
other
joined
protest
against
government
that
lead
to
political
upheaval.
It
happened
owing
to
effective
usage
of
SMS
and
the
Internet
social
networks.
However,
there
are
many
researches
who
do
not
share
Rheingolds
optimistic
position.
The
critics
emphasize
the
ambivalent
nature
of
information
technologies.
It
can
contribute
to
democratization
as
well
as
be
an
instrument
of
control
in
the
hand
of
a
totalitarian
state4.
It
can
help
promote
peace
or
be
an
instrument
in
promoting
war.
It
can
provide
new
strategies
for
security
as
well
as
create
new
vulnerabilities.
The
classical
example
of
the
latter
is
a
problem
of
cyber
security.
New
information
technologies
can
be
used
to
commit
various
crimes
ranging
from
stealing
money
and
information
to
causing
damage
to
critical
infrastructures.
It
might
be
done
by
a
small
group
of
people
or
one
person,
the
fact
that
make
it
an
asymmetrical
threat.
However,
according
to
some
experts
the
danger
of
cyber
threat
is
exaggerated5.
Furthermore,
some
states,
like
Russia,
are
using
the
cyber
security
threat
as
an
excuse
to
increase
control
over
the
cyberspace.
Myth
of
cyber
threat
is
manipulated
by
authorities.
The
idea
that
the
most
dangerous
thing
is
penetration
to
our
informational
systems
by
foreign
country
is
based
on
perceptions
that
were
4
First time this topic was developed in a book Open networks, closed regimes: the impact of the Internet on authoritarian rule by Shanthi Kalathil and Taylor C. Boas, Carnegie Endowment, 2003.
5
Lewis J., Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats, Center for Strategic and International Studies , December 2002
relevant during the cold war, but not today, - says a Russian well-known information security expert Andrey Soldatov6. Soldatov defines the information policy of the Russian government as a defense against shadows. According to Soldatov the real asymmetrical threats that caused by ICT are different. He argues that radicals can use ICT for communication and organization of their activities, as well as for the propaganda purposes7. Understanding of this threat demands analysis of the role of information within conflicts. E. Schattschneider in a book Semisovereign people explains that nature of conflict depends on the degree of audience involvement. The outcome of all conflict is determined by the scope of its contagion. The number of people involved in any conflict determines what happens; every change in the number of participants, every increase or reduction in the number of participants, affect the result. writes the researcher8. Using as a an example Madisons Federalist 10, Schattschneider explains that ideas of controlling /limiting the scope of conflict and preventing from audience to be involved in conflict were the fulcrum in creating the U.S. as a stable federal state. The new informational technologies eliminate the ability of state to control the conflict. It works as a mechanism of conflict socialization. Furthermore, the social networks and other web platforms not only involve people in conflicts by the fact of exposure to the information about the conflict. To some extent they also make for a very easy
6 7
., : , " " 4 2006, I have no intent to minimize the danger. There is no doubt that cyber security is a significant problem and real threat that increase with the increasing role of the internet in our daily live. 8 Schattschneider E. E,.The Semisovereign People: A Realist's View of Democracy in America, Harcourt Brace College Publishers, 1975.
transformation from conflicts spectator to its participant, since the social networks suggest not only information, but also a participation options. The consequences of ability to expand the range of conflict by using ICT and the threat that is posed by new organizational abilities were described in the John Arquillas and David Ronfeldts Netwar concept (1996). Through netwar, numerous dispersed small groups, using the latest communications technologies could act conjointly across great distances., - write the authors of Netwat concept9. Arquilla and Ronfeldt describe the main patterns of activities of networks members within the netwar. The first is swarming - a seemingly amorphous, but deliberately structured, coordinated, strategic way to strike from all directions at a particular point or points.10 The authors explain that the overall aim of swarming is sustainable pulsing swarm networks must be able to coalesce rapidly and stealthily on a target, then dissever and redisperse, immediately ready to recombine for a new pulse.11 The second pattern of the netwarriors actions is not violent. It is a joint effort to win the battle of the story. Soldatov considers it as a threat of propaganda caused by new ICT abilities. But the propaganda in this case is not just a matter of convincing who are the good guys and who are the bad, it is a method for conflict socialization and attracting the audience to become a part of your network, to take a side within the conflict by joining it. The propaganda in this case is primarily an instrument of network expanding and building the social
Arquilla J. & D. Ronfeldt, The Advent of Netwar (Revisited) in Arquilla J. & D. Ronfeldt (Eds.) Networks and netwars : The future of terror, crime, and militancy, Rand, 2001. 10 Ibid. 11 Ibid.
10
capital - group of people that share the common understanding of developing story and common network identity. The evolution of network: conflicts and mobile technologies. The question of networks structure and its cooperation mechanism is crucial for understanding of netwars. According to Arquilla and Ronfeldt, despite the fact that networks might not have a hierarchical and clear leadership structure, the efficiency of networks is based upon the strong social ties and ability to communicate through secured channels. The Netwar concept derives from Manuel Castell's approach that describes networks are spreading and gaining strength as a distinct form of organization.12 At the same time Arquilla and Ronfeldt reject the Francis Fukuyamas understanding of network not as a type of formal organization, but as social capital 13 However, the recent technological developments should trigger a reconsideration of the assumption regarding the nature of network in the Netwars concept. The wide proliferation of mobile phones and handheld devices cause an emergence of what Yochai Benkler calls the "networked public sphere14. The new information environment is characterized by both the potential for many-to-many communications (instead of just one-to-one or one-to-many), and
12
Arquilla J. & D. Ronfeldt, What Next for Networks and Netwars, in Arquilla J. & D. Ronfeldt (Eds.) Networks and netwars : The future of terror, crime, and militancy, Rand, 2001. 13 Ibid. 14 Goldstein J. and J. Rotich, Digitally Networked Technology in Kenyas 20072008 Post-Election Crisis, Berkman Center Research Publication, September 2008.
11
the near elimination of the cost of communication.15 In the new society every holder of the mobile device is a node that might be connected at any time. The network in this case is not the organized structure of interaction but the field of potential interactions that might emerge depending on a context. In other words the network is not an organization, but infrastructure for communication. The increasing convergence of computers and handle devices (e.g., Iphone) only contributes to this tendency. Joshua Goldstein and Juliana Rotich analyzed the post-election violence in Kenya as a case study for an emergence of conflict in networked public sphere. They describe a phenomenon of viral hatred and claim that mass SMS tools are remarkably useful for organizing explicit, systematic, and publicly organized campaign of mob violence16. On the other hand, the authors express hope that voices of moderation can make themselves heard by the usage of mobile phones.17 The most comprehensive study of this issue was conducted by Patrick Meier, from the Tufts University. In his doctorate research Meier shows that an increase in cell-phone availability increases the likelihood (at least as perceived by the public) that the government might be overthrown by violent means18. The author of NetEffect Foreign Policy Blog Evgeny Morozov defines the mobile and virtual based threat as a rise of networked protest
15 16
Ibid. Goldstein J. and J. Rotich, Digitally Networked Technology in Kenyas 20072008 Post-Election Crisis, Berkman Center Research Publication, September 2008. 17 Ibid. 18 Ibid.
12
phenomenon
based
on
thousands
of
"freelance
radicals"
who
outnumber
professional
(organizational
based)
anti-globalists.19
To
conclude,
emergence
of
networked
public
sphere,
based
on
mobile
phones,
should
strengthen
the
unorganized
mob
factor
in
Netwars
dynamics.
The
new
phenomenon
might
be
described
as
an
emergence
of
situational
conflict
identity,
based
on
networked
infrastructure
which
functions
as
an
enabler
of
fast
and
effective
socialization
of
conflict
in
local
and
global
dimensions.
Global
consequences:
ICT
and
complexity.
The
network
based
socialization
of
conflicts
is
escalated
by
the
fragmentation
and
an
increase
in
a
number
of
conflicts
and
conflict
identities.
The
phenomenon
might
be
called
a
long
tail
of
identities
as
a
paraphrase
of
a
long
tail
economic
concept
by
Chris
Anderson.20
Anderson
claims
that
the
Internet
changed
the
dynamics
of
demand
since
it
provided
an
option
for
easy
search
of
low
demanded
goods.
Despite
the
fact
that
the
demand
is
low,
the
total
number
of
low
demanded
goods
is
higher
than
the
number
of
popular
goods,
and
therefore
the
economic
gain
from
the
tails
of
demands
normal
distribution
(the
low
demanded
goods)
might
be
higher
than
the
center
of
the
distribution
graph
(the
popular
goods).
The
same
situation
can
be
witnessed
with
groups.
The
small
groups
could
not
exist
in
the
past
since
their
potential
members
couldnt
find
each
other
due
to
a
lack
of
communication
and
an
obstacle
of
distance.
Currently
members
of
any
minority
group
can
find
each
other
through
the
Internet.
Therefore,
19 20
Morozov E., The Alternative's alternative, openDemocracy, December 29,2008 Anderson, C., The Long Tail", Wired, October 2004.
13
the total number of people who belong to small groups may overcome the number of those who belong to big ones21. Furthermore internet and social networks trigger development of local identity based groups. For instance, Globe claims that the increase of local identities factor based on ICT can contribute to fragmentation process in the territory of former Soviet Union and increase the threat of collapse of Russia as a federal state.22 This argument works well if we recall the previously discussed Madisons claim in the Federalist 10. The socialization of conflict, fragmentation of identities and low cost of communication cause a significant increase in a degree of worlds complexity. It means a decrease in stability and a difficulty in forecasting any relation between cause and its effect. Moreover, it means that even a minor factor can cause a major effect. This situation is summarized by a developer of the self organization theory and a Nobel Prize Laureate Ilya Prigozhin: Especially in this time of globalization and the network revolution, behavior at the individual level is the key factor in shaping the evolution of the entire human species. Just a few particles can alter the macroscopic organization in nature.23 The state-networks cooperation
21
The difference is that in the case of identities every person can share several identities and be a part of several groups. However in this particular case we are talking about conflict oriented identities that tend to be dominant due to their offensive orientation.
22 Goble P., Window on Eurasia: Will the Internet Integrate the Russian Federation or Tear It Apart?
23
14
According to Arquilla and Ronfeldt, most of the networks are stateless. However, extremists have a significant advantage in using networks. Ariel Cohen from the Heritage Foundation claims that the problem of new information technologies is that radicals adopt ICT faster than the state actors who are supposed to oppose the extremists. In addition, democratic states have a significant number of restrictions for usage of ICT, especially when dealing with the involvement of citizens in conflicts. According to Bimber, network's leaders are the new elites within the new information regime. If the state does not want to lose the control, it should adopt its structure, institutions and the method of governance to the new information reality. Manuel Castells shares the same point. He writes: The increasing inability of nation-states to confront and manage the processes of globalization of the issues that are the object of their governance leads to ad hoc forms of global governance and, ultimately, to a new form of state. Nation-states in spite of the multidimensional crisis do not disappear; they transform themselves to adapt to the new context.24" But what is the meaning of these transformations in regard to the threat posed by networks as tools of conflicts socialization (expanding the range of conflict among wide audience) and organization of mob based collective action? Does it mean that a state learns to mobilize and manage the mob? What are the methods of management and mobilization, and especially which states have an advantage in development if these techniques? We may
24
Castells M., "The New Public Sphere: Global Civil Society, Communication Networks, and Global Governance", 2008
15
assume
that
the
lack
of
balance
in
adaptation
may
appear
not
only
between
states
and
non- state
entities,
but
also
among
more
and
less
democratic
states.
Today
we
are
witnessing
an
emergence
of
military
and
security
state
doctrines
that
make
an
effort
to
apply
the
network
approach
and
incorporate
the
factor
of
non-combatants
mobilization,
engagement
and
management
of
civic
actors
as
a
part
of
warfare.
The
well
known
Chinese
concept
of
Unrestricted
warfare
presents
a
model
that
include
usage
of
non- combatants,
a
civil
population,
as
a
part
of
warfare
managed
by
the
state.
The
U.S.
concept
of
Hybrid
threats
as
is
defined
by
Frank
G.
Hoffman
also
addresses
this
issue:
Hybrid
threats
incorporate
a
range
of
different
modes
of
warfare
including
conventional
capabilities,
irregular
tactics
and
formations,
terrorist
acts
(including
indiscriminate
violence
and
coercion),
and
criminal
disorder.
Hybrid
wars
can
be
also
be
multinodalconducted
by
both
states
and
a
variety
of
non-state
actors.
These
multimodal/multinodal
activities
can
be
con- ducted
by
separate
units
or
even
by
the
same
unit
but
are
generally
operationally
and
tactically
directed
and
coordinated
within
the
main
battlespace
to
achieve
synergistic
effects
in
the
phys- ical
and
psychological
dimensions
of
conflict.
The
effects
can
be
gained
at
all
levels
of
war.25
In
the
following
case
studies
I
would
like
to
analyze
the
networked
socialization
of
conflicts
and
network
coordination
as
an
optional
element
of
hybrid
warfare
managed
by
state
actors
as
well
as
to
try
to
describe
patterns
of
state-network
cooperation
and
their
possible
impact.
25
Hoffman F. G., Hybrid Threats: Reconceptualizing the Evolving Character of Modern Conflict, Strategic Forum, April 2009
16
The battles for the story: Israeli case of state-network cooperation for advocacy purpose.26 Israeli attempts to explain its policy to international community has a long history, namely since the establishment of the state. It is a permanent effort that intensifies during major military operations due to sharp criticisms from the international public opinion. This advocacy policy by the Israeli government is defined by a special term: hasbara or explanation policy. The Second Lebanon War (Summer 2006) was the first major conflict in Israeli history in which the new media technologies, social networks, and user generated content played significant role in painting the image of the war. However, the online pro and anti-Israeli activities were rather chaotic and unmanaged by state actors. After two weeks of war the head of the Knesset committee for Science and Technology, Zvulun Orlev, conducted a special discussion on the issue of the Internet and a struggle for Israeli Image. He asked the Israeli
26
The case study based on research that was conducted by me during and following the operation in Gaza strip, and it was presented to the faculty of the School of Media and Public Affairs, GW. It is important to mention, that the author of this paper worked at the Asper Institute for New Media Diplomacy, which activities are a major part of the case study. The sources of information for this case study include personal experience and interviews that were conducted by the author with his colleagues.
17
Internet
users
and
private
corporations
to
join
the
action
against
anti
Israeli
PR
actions
and
called
it
the
virtual
call-up
paper27.
Among
the
participants
of
discussion
was
Eran
Reshef,
the
CEO
of
Collactive,
a
company
for
development
of
social
media
management
platforms.
During
the
days
of
war
Reshef
released
a
Giyus
(recruitment
in
Hebrew)
Megaphone
desktop
tool,
a
special
application
for
the
management
of
community
of
users
who
are
interested
in
contributing
to
an
Israeli
advocacy
effort28.
It
provided
an
option
for
organization
of
collective
coordinated
one-time
action
of
users
by
sending
an
action
alert
to
all
members
of
the
Giyus
network
(those
who
downloaded
the
application).
Since
the
visibility
of
content
on
some
of
major
international
news
sites,
as
well
as
on
social
media
platforms
(e.g.
Youtube)
depends
on
the
rate
of
consumption
of
a
particular
item,
the
one-time
collective
visit
contributed
to
visibility
of
pro- Israel
content
and
optimized
its
place
in
search
engines.
The
tool
also
suggested
a
simplification
options
for
different
pro-Israeli
action
(e.g.
sending
protests
for
anti-Israel
policy
to
the
U.N.
officials).
The
activity
of
Giyus
community
was
rather
successful.
At
the
end
of
war
the
Giyus
social
network
has
included
almost
30000
members.
The
role
of
new
media
and
social
networks
during
the
second
Lebanon
war,
as
well
as
a
success
of
Giyus
convinced
the
Israeli
officials
including
the
Ministry
of
Foreign
Affairs
(MFA)
to
start
thinking
about
the
development
of
strategies
for
new
media
field.
The
first
mission
on
the
agenda
was
providing
a
pro
Israeli
content
within
different
Web
platforms.
However,
in
the
reality
of
information
overload,
the
most
complicated
mission
was
not
creating
content,
but
its
28
27
www.giyus.org
18
promotion and distribution. It could be done only by the engagement of a wide web audience. Giyus was a good model for this kind of action, but its impact was very limited (only 30000 members) comparing to potential influence of social networks like Facebook. Using the social networks potential of hundreds thousands people worldwide for promoting pro-Israeli information demanded a concept for management, or at least building an impact, at the social networks sphere. The MFA started to work on this concept. At the same time the concept of the situation room for new media and social networks management was developed at the Asper Institute for New Media diplomacy, a part of the Communication school at the Interdisciplinary Center in Herzliya (IDC). The idea behind this initiative was that promoting content is more important than creating the content, while within the new information reality making a content visible demands a collective and well organized action (if it is a consumption-based promotion or viral distribution). On December 27, 2008 Israel launched a military campaign in Gaza strip, codenamed Operation Cast Lead. The first days of Israeli air strikes caused a significant number of victims on the Palestinian side, including a lot of civilians. Obviously it created a significant image problem for Israel and a wave of international protests that demanded from Israel to cease fire. At the beginning of the conflict a U.S. based pro-Israel advocacy organization Stand with us together with the IDC Communication School established three situation rooms for coordinating online networked activities. At the same time a special website Helpuswin.org was uploaded to the Internet. Both initiatives were actually online and offline platforms for network
19
management. The main missions of the situation rooms, which were also reflected at the website, included: 1. Content monitoring in the overload information reality (discovering the pro-Israeli items to promote and anti-Israeli items to react). 2. Development/ expanding of pro-Israeli networks within global social networks platforms (creating pro-Israeli groups). Developing of relations and coordination with Diaspora online networks (Israelis out of the country or emigrants inside Israel). 3. Pro-Israeli Content distribution/ promotion through Social networks, Search optimization, Social Bookmarking on a Web 2.0 sites, like Youtube, and within traditional online media platforms. 4. Balancing the discourse: sending pro-Israeli Internet users to respond to pro Palestinian content/ comments in traditional media comments, forums, polls. 5. Development and translation of content for promoting within foreign social networks. 6. Assistance and advice to pro-Israeli activists (e.g. providing talking points). 7. Development of technological tools for advocacy purposes (e.g. Kassam count - a Facebook application that automatically updated the Facebook users status with a number of exploded Kassam rockets). To summarize the situation rooms coordinated not only the timing and goals of activities, but also expanded their range for different platforms and different language segments of the Web, made participation more user-friendly (simplification) and provided technical assistance for content promoting.
20
However, the most interesting component of the Israeli New Media and social networking strategy was the model of cooperation and a division of responsibilities between state and non-state actors. It was almost the first time when the government uploaded its content (primarily video footage) to the Web 2.0 platform (e.g. opening a special MFA and IDF channel on Youtube, blogs). It made the content to more promoting friendly. However, the state had no capabilities to build network cooperation for content promotion and take on itself the mission of networks leadership. This task was taken by non-government advocacy organizations (e.g. Stand with Us) and academic institutions (e.g. IDC). Both have a young motivated activists and students as available and qualified force for this kind of tasks. In addition to situation rooms, the IDC has organized several offline briefings to instruct the potential network leaders (primarily the student body) how to build cooperation on Web. The situation rooms were unofficially affiliated and worked with some degree of coordination with the Israeli MFA. In addition to providing promoting-friendly content the government also supplied guidelines for online activities (e.g. sharing talking points). The last element of the cooperation model is members of social networks, nodes of networked sphere, who contributed their time and effort to promoting and distributing the pro-Israeli content under the guidance of the networks leaders. To conclude, first we might see here an emergence of state non-state actors networked sphere cooperation model as a response to situation when the goal might be achieved only by cooperation and networked coordinated actions. Second, the activity was not based on the existing networks (organizations), but on socialization of conflict by ICT and an
21
emergence of conflict engagement of non-combatants. It should be mentioned that the Palestinian side also tried to use social networks managements strategies including creation of special platforms, sending an instructions for promoting content, organized commenting and creating a special advocacy applications (e.g. automatic Facebook status How many Palestinians were killed today as a response to Kassam count application). There is no specific research on this issue, but some facts and statistics support a hypothesis that the number of pro-Israeli and pro-Palestinian engaged members of social networks was pretty equal. The Palestinian side had an advantage of a very big community of the Arab world. The Israeli side had an advantage of aggressive management and conflict socialization strategies that made a percent of active members to higher than among the pro Palestinian community. Additional explanation is that digital divide at the Arab world is more significant than in Israel and other places with most of Israeli supporters (e.g. U.S., Canada). Despite the collective mode of action, the effect of the social networks management was limited. The balancing effect was significant. It caused an equal representation of Palestinian and Israeli sides on many content platforms. However, in my opinion the main role of these activities was shaping the pro-Israel network identity in global dimension. Despite the lack of organizational structure, participation in this kind of activity might be seen as a part of building social capital of state supporters and training of coordinated activity that might be required again in a further conflict. It should be mentioned also that in the Israeli case, coordinated activity took place also on hacktivist field (e.g. providing software for contribution a computer for Botnet). However,
22
promoting
and
distribution
of
content
as
a
part
of
agenda
setting
and
framing
strategies
were
much
more
significant
in
the
Israeli
case
than
any
hackers
activity.
The
latter
is
more
about
attacking
content
than
promoting
it.
The
next
case
study
based
on
Russian-Georgian
war
looks
on
a
model
of
state-network
cooperation
as
a
method
of
content
attacking.
Russian-Georgian
war:
hacktivism/cyberpatriotism,
network
collaboration
and
states
role.
The
August
2008
five-days
war
between
Russia
in
Georgia
raised
a
lot
of
discussion
not
only
about
the
relationship
between
the
Kremlin
and
the
West,
but
also
the
cyber
threat
posed
by
Russians.
Dozens
of
Georgian
and
Russian
sites
including
major
government
offices
and
news
agencies
were
attacked.
In
some
cases
the
web
sites
were
not
only
blocked
but
their
content
was
changed
or
even
erased.
However
the
major
instrument
of
cyber
activities
were
Distributed
Denial
of
Service
(DDoS)
attacks,
when
botnets
bombard
web
sites
with
fake
visits.
I
am
not
going
to
discuss
here
the
targets
and
the
effect
of
these
attacks
and
only
mention
that
high
visibility
of
attacks
does
not
always
mean
high
efficiency.
The
impact
of
visibility
itself
is
also
debatable
since
one
may
claim
that
attacking
symbolical
and
informational
platforms
has
a
crucial
role
within
information
warfare29.
However,
the
main
purpose
of
this
case
study
is
to
analyze
the
network
cooperation
patterns
of
Russian
hacktivists
and
the
role
of
state
in
the
inspiration/encouragement
of
these
activities.
The
analysis
based
on
monitoring
the
discourse
in
Russian
hackers
forums
during
the
Russian-Georgian
war,
and
interview
with
hackers
from
the
Russian
media
(they
were
framed
29
For instance, from point of view of 4th generation warfare approach by W. Lind (2004)
23
by Russian media as patriots and heroes). It should be mentioned that the main cooperation occurred within IRC (Internet Relay Chats) platform that on the one hand was more secured than forums, and on the other hand provided an option for immediate live collaboration. User X: Go and read what are they writing, bastards. I cant do them alone. Help me to finish these bastards. User Y: We did it. They are finished (from Hacker.ru forum). This is an example of a typical conversation from a hackers forum. The targets sharing is a crucial part of cooperation. Similar to an Israeli case when promoting a content requires collective activity, the efficiency of hackers activity, especially if it deals with DDoS, depends on a collective action or/and mutual assistance. There are two different possible reasons why user X cannot achieve his goal alone: he is not qualified enough to do it or he cant do it alone since collective activity is required: The site of Georgian ministry of Defense is still alive. We should finish it!, - says one of the users. I have found the back door to hack them!!!, - says another forum member. This kind of invitation that may help to express the pattern of cooperation on the metaphorical level one of the users suggests to others to follow him into the opened door. Another example is a hacker who looks for other hackers from Uzbekistan and other former Soviet republics. He does it since the access to Georgian domain .ge from Runet was blocked by Georgia authorities. The attack is international. There are a lot of Russian immigrants dispersed within the former Soviet Union (and not only) who identify themselves with Russia and therefore want to participate the anti Georgian cyber activity. We can also see live monitoring
24
of the status of Georgian sites: Our blockade worked only three minutes. Bastards, they are monitoring our activity. I am not aware of the establishment of any situation rooms for management, as it was done in the Israeli case, however similar to Israeli experience we could witness creation of a special platforms for cooperation from both sides: www.stopgeorgia.ru (from the Russian side) and www.stoprussia.ge/ www.stop-russian-terror.org (from the Georgian side). It has improved coordination and made participation easier for those who are not members of hackers community and were looking for visible opportunity to join hacktivists activity. These platforms, as well as forums, also serve as a place for discussion of ideological justification for attacks. A woman with a nick Dany writes: Shutting down Georgian sites cannot bring us victory. But its also important, since Americans together with Saakashvili have declared information war against us and it has been waged by Western media. They are doing it by claims about Russian aggression against peaceful Georgia that just tried to restore law on its territory. Tell me what is it if not an information war? Our guys that hacked Georgian sites are really great. We have been attacked and we are just defending ourselves in cyberspace. The entire world should know that we will not shut up and smoke at the corner, when we have been attacked. All aggression against Russia will get the appropriate answer. This interaction inspires others to become a part of emergence of situational conflict identity.
25
Similar
to
the
Giyus
case
we
can
see
also
a
usage
of
software
as
a
part
of
cooperation.
I
am
uploading
hack
software,
for
those
who
want
to
join
the
attack
on
Georgian
sites,
-
write
one
of
the
hackers.
He
gives
a
link
for
downloading
the
software
and
instructions
on
how
to
use
it
for
attacks
against
Georgian
targets.
The
software
has
two
functions.
First,
it
is
simplified
for
those
who
dont
have
enough
skills.
Second,
it
is
synchronized,
since
everyone
who
downloads
the
software
becomes
by
definition
a
part
of
the
same
network/botnet.
The
voluntary
joining
of
botnet
(it
was
also
used
in
Israeli-Palestinian
case)
has
another
interesting
side.
It
is
not
sharing
an
experience
or
cooperation,
but
sharing
resources.
We
know
this
mode
of
cooperation
from
the
world
of
science
as
grid
projects.
For
instance,
Internet
users
are
asked
to
contribute
their
computers
to
research
of
cancer
or
universe.
Donate
the
time
your
computer
is
turned
on,
but
is
idle,
to
projects
that
benefit
humanity!,
-
says
the
world
community
Grid
web
site30.
Botnets
also
use
the
private
computers
resource
but
(usually)
without
the
permission
of
their
owners.
The
offer
to
join
botnet
for
cyber
attacks
purposes
might
be
considered
as
creation
of
war-grid,
contribution
of
private
non-combatants
resources
for
warfare.
It
is
a
good
option
for
those
who
lack
any
hackers
skill
but
want
to
take
a
part
in
the
warfare.
So
far
we
have
seen
some
similar
patterns
comparing
to
Israeli
case
as
coordination
of
collective
actions,
simplification,
establishment
of
a
special
online
platforms
etc.
However,
the
second
question
is
if
it
is
self-organized
action
or
there
is
some
degree
of
cooperation
with
the
government.
The
answer
should
differentiate
between
direct
and
indirect
activities.
30
http://www.worldcommunitygrid.org/
26
The most indirect activities are creating an atmosphere that shapes a motivation among a wide non-combatant population to participate the warfare. The 24-hours media coverage by major Russian TV channels with the emphasis on atrocities made by Georgians and cruelty of Georgian soldiers who kill thousands of innocent Ossetians caused a significant rise of patriotism. I think that among participants of these forum there are no people who can take Kalashnikov, put on military uniform and go fight in South Ossetia, - writes one of Russian Internet users and explains that hacking is the only way he can help his country. The wave of patriotism is kind of energy wave that cant find an exit. The hacktivism provides the most convenient option for realization of patriotic intents without any physical effort, without even leaving your room. The Russian media plays a crucial role in total socialization of conflict and shaping situational conflict identity that is translated to networks of people who want to participate in the warfare. In addition, the media creates a feeling that cyber attacks are a legitimate mean of protest since it is an action against the cruel enemy. Now you have a 'license to kill' from the state, - writes on the forum one of the Russian hackers (according to the 274 chapter of Russian criminal law, DDoS attack may cause a punishment till 4 years in jail, but this chapter is almost never used by Russian courts). However, there is another relatively more direct way to engage the hackers community. It could be done by establishing points of contact between those who have a capability for network leadership and state officials. The search for this kind of government vs. network- leaders linkage gives interesting results.
27
On
August
8th
a
group
of
leaders
of
five
Russian
major
youth
movements
published
a
statement:
About
a
military
aggression
in
Ossetiya:
Georgian
army,
armed
and
trained
by
Americans,
kills
our
fellows.
Actually,
the
Georgian
puppet
government
is
only
instrument
of
the
American
aggression
against
Russia
and
Russian
citizens.
We,
leaders
of
Russian
youth
organizations,
appeal
to
our
activists
in
all
regions
of
Russia,
to
all
Russias
youth:
We
declare
information
war
against
the
regime
of
Saakashvili.
It
will
be
managed
on
any
information
platform.
We
should
demonstrate
our
solidarity
against
the
American-Georgian
propaganda
based
on
double
standards.31
Two
days
later
the
Russian
parliament
organized
a
special
meeting
for
leaders
of
Russian
youth.
The
purpose
of
the
meeting
was
a
discussion
about
possible
actions
during
the
war
in
South
Ossetia.
Among
the
discussed
issues
were
creating
bank
of
English
speakers,
writing
texts
in
English
and
distributing
it
among
the
Western
media.
The
forum
also
discussed
the
necessity
of
western
media
monitoring
and
participating
in
Western
internet
based
polls
about
the
war
(e.g.
CNN
polls).
According
to
the
Russian
sources
the
strategy
was
very
effective.
For
instance,
92
percent
(aprox.
329
thousand
people)
voted
in
favor
of
Russian
position
in
the
CNN
poll
which
asked
who
is
responsible
for
the
war.32
The
mob,
especially
when
it
is
a
smart
mob,
is
a
very
powerful
mechanism.
But
sometimes
the
mob
should
be
advised
what
path
to
choose
to
express
their
emotions.
In
any
activity
31 32
http://www.nashi.su/news/25672 : , 8.8.08
28
someone has to guide and provide ideas. Someone has to open the thread about Georgia on the hackers forums. Someone has to take the first initiative and advise what instruments to chose. Usually the following dynamic resembles a snowball. The five youth movements who signed the declaration are affiliated and sponsored by Kremlin and have under their control a big networks of Russian youth (young people is usually the group that have the best Internet skills). We may assume that some of the network's cooperation activities for hacktivism purposes were managed by leaders of groups who were inspired/ guided by the Russian officials. Actually, the past history gives us some indication for state-hackers networks cooperation. In 2002 the pro-Chechen website Kavkaz center was hacked by a group of students who called themselves The Siberian network brigade. Following this action the local branch of FSB (a former KGB) distributed a press-release stating that the hackers action is not against the law and what the Tomsks programmers have done should be considered as declaration of citizens position and worth respect.33 Andrey Soldatov, Russian cyber security expert, published in 2007 a special investigation that provides evidence that Russian authorities were looking for cooperation with a group of hackers to shut down the sites of radicals.34 Soldatov adds that attacks against Western media might also be considered as a civic position since the Russian Doctrine of Information Security (signed by Putin in 2000) considers the Western information
33
., : , Agentura.Ru, 34 Ibid.
29
agencies as a threat for freedom of Russian media and independence of Russian spiritual, economical and political life35. There is evidence suggesting that Nashi (a major Russian youth movement) activists participated in organization of hackers attacks. Sergei Markov, a member of Russian Duma said within a Russia-U.S. videoconference (March 2009) that one of his assistants had planned and implemented the hackers attack against Estonia36. The Markovs assistant is Konstantin Goloskokov, a "commissar" in the youth group Nashi. Following the Markovs talk Goloskov gave an interview to several Western and Russian media: "We did not do anything illegal. We just visited the various internet sites, over and over, and they stopped working - told Goloskov to Financial times37. He denied that he and his associates were acting on the orders of the Russian government. According to Goloskov the action is legal since it has not used any malicious software or botnet. The result was achieved only by collective coordinated visiting of the Estonian websites at the same time. The network leadership included seven people who were interacting by ICQ and e-mail. They created a situational network of several hundred people from Russia, Ukraine, Hungary, and the Czech Republic. Goloskov also said that similar, but improved methods were used against Georgia, while he emphasized that it was used for
35
, : -89, 2004
36 37
., ", , " , 05.03.2009 Clover C., Kremlin-backed group behind Estonia cyber blitz, Financial Times, March 11 2009.
30
providing information about Russia for international audience (a goal that similar to the Israeli case)38. According to Estonian sources at least 20000 computers participated in attacks against the Estonian Web sites. A security expert from Kaspersky Lab says that Goloskovs version is not credible, and the effect could not be achieved without botnets activation.39 Therefore, the statements by Markov and Goloskov and hackers interview should be approached with a high degree of skepticism. To some extent it is an attempt to gain some PR points among the Russian audience and portray themselves as high tech warriors. However, we also should remember, that cooperation might occur not only between common users, but professional hackers that make it to much more effective (e.g. if anyone controls his own botnet). The recent report by Canadian SecDev group that was presented at the InforwarCon 2009 in Maryland tries to clarify the question of responsibility by suggesting 3 different versions40. The first Deliberated, planned action by Russian authorities is considered as unlikely since there is no indication that such capabilities exist with state institutions. The second, Encouraged action is considered as possible since a denial of access is a part of the political culture in the CIS and security forces have deferred prosecution of known cyber criminals. The third version named as Storm in cyberspace and considered as a probable given past precedent and strong indication of self-organization by pro-Russian groups.
38 39
31
Unlike the Israeli case, where we could see clear evidences for State-network cooperation, the role of the Russian government in cyber attacks against Georgia is debatable. But what is clear is that the Russian-Georgian war included a very wide engagement of civil population in warfare that was based on emergent cooperation and collective action efforts that were mediated by technology. The traditional electronic media controlled by the government made a significant contribution to socialization of conflict and creation of motivation to participate in the warfare. In addition, even if the government were not dealing with guiding network leaders directly, we have enough strong evidences that the ideas of engagement of social networks within state actions is widely discussed by the Russian political establishment. Therefore, in my opinion, we should not be surprised if in the future the state will call for its citizens to Give your computer to homeland as a part of creation of a war grid that will be used against a new enemy or encourage them to participate by themselves. Another difference between the Israeli and the Russian case is a goal of cooperation. If in the Israeli case it was used primarily to promote pro Israeli content, in Russian case the activity focused primarily on attacking the adversarys content. However, in both cases, the activity contributed to shaping a conflict identity and training of collective action and collaboration, on the basis of networked sphere without any organizational structure. Both cases might be considered as what Soldatov calls cyberpatriotism. In addition, in both cases the engagement had a global dimension and included Diasporas in other countries. Therefore we might expect that the same pattern of cyberpatriotic activities will take place again at the time of further conflicts and could be expected to be even more effective.
32
MOLDOVA:
The
offline
consequences
of
online
cooperation.
So
far
we
have
seen
two
cases
of
collective
behavior
in
the
virtual
reality.
However,
the
original
Rheingolds
idea
of
Smart
Mob
is
talking
about
the
collective
offline
behavior.
In
particular
Rheingold
mentions
the
political
protest
in
Philippines.
I
was
ousted
by
a
coup
dtext,
-said
president
Estrada
after
losing
power
to
a
Smart
Mob
during
the
2001
elections.
The
same
pattern
could
be
witnessed
during
the
Orange
revolution
in
Ukraine.
However,
both
cases
approach
the
Smart
Mob
as
a
positive
phenomenon.
I
would
like
to
claim
that
the
Smart
Mob
could
be
a
threat
to
security
and
put
in
doubt
the
ability
of
mob
being
smart,
even
if
its
action
is
to
some
extent
coordinated.
The
Moldovan
Twitter
revolution41
does
not
present
a
clear
case
of
state-network
relationship.
However,
it
is
a
good
opportunity
to
examine
what
the
optional
offline
effect
of
networked
cooperation
is.
We
can
witness
the
same
patterns
of
collective
action
that
we
have
seen
in
the
Israeli
and
the
Russian
case
studies.
However
in
this
case,
the
mobile
handheld
devices
had
a
significant
role
as
a
network's
nodes
that
expand
the
size
of
a
networked
sphere,
as
well
as
a
tool
of
digitalization
(coverage)
of
reality
within
social
media.
Following
the
victory
of
a
communist
party
group,
Moldovan
democrats
decided
to
organize
a
Flash
Mob
protest
in
the
center
of
Chisinau.
"Six
people,
10
minutes
of
brain
storming
and
decision
making.
A
few
hours
for
distribution
of
information
on
networks,
Facebook,
blogs,
SMS
and
e-mails,
described
the
process
in
her
blog
a
leader
of
41
The name Twitter revolution was given by the Western media. However today is clear that Twitter had a very marginal role in the Moldovan events. There are only 70 Moldovan accounts at the Twiitersphere.
33
'ThinkMoldova'
movement
Natalya
Morar42.
The
Russian
social
networks
Odnoklassniki.ru
and
Vkontakte.ru
as
well
as
some
local
Internet
forums
played
a
major
role
in
distribution.
As
a
result,
about
15,000
people
gathered
at
the
central
square
of
Moldovan
capital
chanting
I
am
not
a
communist.
The
first
evening
of
protest
was
peaceful.
However,
next
morning
the
crowd
went
out
of
control.
It
destroyed
the
building
of
parliament
and
presidency.
The
police
did
almost
nothing
to
stop
the
riots
and
the
Moldovan
capital
turned
into
a
place
of
complete
anarchy.
Three
interesting
phenomenon
should
be
mentioned.
Firstly,
the
mobile
networks
as
well
as
the
Internet
connection
failed
during
the
events.
The
opposition
claimed
that
it
was
the
attempt
of
the
government
to
stop
the
online
cooperation
behind
the
offline
protest.
The
officials
said
that
the
networks
were
just
overloaded
due
to
the
high
rate
of
activity.
In
any
case
the
failure
of
networks
as
a
result
of
the
online
triggered
action
is
pointing
a
link
between
online
cooperation
and
offline
activity.
Secondly,
the
event
characterized
by
unprecedented
Web
2.0
coverage.
Most
people
who
took
a
part
in
the
protest
had
photo
and
video
cameras.
Some
of
the
information
was
uploaded
immediately
to
the
Web
2.0
social
media
platforms
such
as
Youtube,
Flickr,
and
Livejournal.
In
some
cases
web-cameras
were
used
for
live
broadcasting
of
the
events.
The
immediate
publishing
of
Web
2.0
content
has
a
significant
effect
on
socialization
of
conflict.
The
live
flow
of
user
generated
content
attracted
wider
and
wider
audience,
and
also
provided
an
option
to
interact
with
the
content's
creators.
It
should
be
mentioned,
that
this
process
was
happening
42
. ! Natmorar LJ 2009-04-07
34
on both sides of the barricades, since a major part of the content (especially on Russian social media platforms) framed the protest as a criminal activity. To conclude this point, live user generated content can be approached as another mechanism of real time engagement of the networks members. The networks create a content that in turn expands the network. Thirdly, the emerging networks define themselves by tags. In the Moldovan case it was a pman tag at the Twitter. At the Greece riots case it was griots tag. However the main question that is raised by Moldovan events deals with the role of social networks in the organization of offline protests. We could see that the networks can trigger the protest and initiate it. However, the networks themselves cannot necessarily control it and prevent the transformation from a peaceful to a violent action. The events in Chisinau demonstrate how fast the smart mob can become a wild and violent mob. There is a significant gap between the ability of information technologies to facilitate an action and its ability to manage the action during a finite period of time. This gap presents a significant security threat. Natalia Morar rejected the allegations about her responsibility for the violence. She wrote in her blog that she had nothing to do with this disaster and none of the activists in her group took part in the riots. But even so, lost control of the protest became a major failure of opposition and empowered the communist government. Some experts said that the opposition was correct in identification of a big frustration in Moldovan networked public sphere as a significant protest resource, but made a mistake by assuming that it might control it. Other experts claim that we should not exaggerate the role of technology in Moldovan events and
35
look for additional explanations (e.g. a provocation by the government). Nevertheless, the events should serve as a warning for emergence of a security threat that is posed by a gap between online networked coordination as a strategy for organization of offline activity and the lack of ability to use technologies to manage the organized offline action. Evgeny Morozov claims that spontaneous networked protest became a global phenomenon and it might be seen as a threat of networked anarchy.43 He mentions French riots of 2005, when teenagers blogs urged people to burn the cops, the 2006 riots in Budapest and 2008 riots in Greece. In the Moldovan case we can see the tendency to make the protest network global. The Twitter in this case was not a tool to organize a protest inside Moldova, but to socialize the conflict worldwide by raising international awareness. A Moldovan Diaspora played a major role by keeping a story alive via Twitter, as an example of remote participation in the protest. The fact that the events were named as Twitter revolution is a proof for the success of this strategy. It brings us back to the two previous case studies Israeli and Russian. Morozov writes: Just imagine if someone has leveraged all the buzz about events in Moldova by asking those people to lend their idle computer power for a DDOS attack on the entire cyber infrastructure of Romania, which the Moldovan government thinks played a role in the riots. In this scenario, the protests themselves are just a prelude to a much bigger distributed global protest that may be exponentially bigger than events taking place in the square.44
43 44
Morozov E. Rioters of the world unite, The Economist, Dec 18th 2008 Morozov E., More analysis of Twitter's role in Moldova, The New ForeignPolicy.com, 04/07/2009
36
Today
we
have
a
problem
with
separating
online
and
offline
protests.
Even
if
there
is
no
evidence
of
the
state-network
link
in
the
Molodvan
case,
it
might
be
a
model
for
the
future.
The
unrestricted
and
hybrid
warfare
concepts
show
that
the
idea
of
including
non-combatants
as
a
force
in
warfare
emerges
in
state
actor
minds.
Its
impact
cannot
be
limited
to
battle
for
the
story
or
shutting
down
some
governments
web
sites.
The
deadly
potential
effect
of
this
scenario
might
be
demonstrated
by
recent
Russian
statistics.
According
to
the
Russian
security
officials
around
40
people
were
killed
in
Moscow
area
at
the
so
called
criminal
flash
mobs.45
It
is
especially
common
for
hate
crimes
by
Russian
radical
nationalists.
Following
networked
distribution
of
message
with
a
detailed
instructions,
people,
who
dont
know
each
other
gather
at
meeting
points
for
one
matter
to
commit
a
crime,
-
says
an
expert
of
Russian
Ministry
of
Interior
Igor
Sundiev.
According
to
Sundiev,
the
Flash
Mob
participators
agree
to
kill
the
first
non-Russian
that
they
see
and
run
away.
That
is
what
they
actually
do.
According
to
the
Russian
sources,
networked
crimes
based
on
usage
of
information
technologies
become
more
common
in
Russia.
Since
its
a
collective
crime
by
people
who
dont
know
each
other,
finding
the
murderers
is
very
difficult
explains
Sundiev.
Conclusions:
The
three
case
studies
discussed
here
present
different
kind
of
online
social
network
based
cooperation
activities:
The
Israeli
battle
for
a
story,
the
Russian
online
offensive
hacktivist
activities,
and
the
Moldovan
offline
protests
with
actual
impact
in
physical
domain.
45
. . 15 2009, Interfax.ru
37
However the case studies share a number of common denominators and it should be perceived as different elements of the same process. The emergence of networked public sphere creates a framework for new dynamic of conflict socialization. The process of expanding conflicts range is not managed through organized networks, but creates the networks of those who share the same situational conflict identity. In this context the main role of any battle for the story is not competing with the rival opinion, but engagement of more potential supporters. The process has to be managed through open non-secured channel since it aims to reach a wide audience, and not members of particular organization. It is a mistake to believe that there are competent networked organizations, as Netwar concept claims. Facebook and other platforms are networks, but not an organization. It is a framework for the emergence of situational conflict networks. Swarming is primarily not a method of attack, but method of networks self organization and self creation based on sharing same conflict identity. It is a chaotic process since any person can adopt various conflict identities in various contexts. The situational networks have a short life, but there is a process of learning and gaining an experience that makes any new network to become more effective. The globalization on the one hand and fragmentation on the other hand remove any borders from socialization of conflicts, makes the socialization process worldwide and increase
38
the lack of stability. The story of Natalia Morar can be a good evidence for Prigogines claim that in the complexity environment one can start a chain that will cause a global effect. The three case studies also exhibit the same pattern of cooperation and network management. It includes the same coordination strategies (establishing online and offline platforms for management), simplification and technological assistance. The online collaboration makes the engagement more probable since participation in the conflict becomes easier, and today anyone can do it without leaving own apartment. The online participation in conflict is not only easier, but also does not pose any danger for those who decide to take a part in it, since their home is secured environment. The question of networkstate cooperation is the most difficult. In the Israeli case we have seen a model that is based on division of responsibilities between state, non state actors, and the networked society. The Russian case is complicated since, unlike in the Israeli case, we cannot see any direct involvement that is disclosed. However, it shows a significant role of traditional media as a socialization of conflict actor. It shapes information environment that triggers development of conflict identity and motivates network collaboration. The involvement of non-combatants as a decisive factor in warfare becomes today a part of a discussion within military doctrine concepts as hybrid warfare. This involvement might be considered as a principle change in the nature of warfare, provider of RMA capabilities, since any person (besides young children) becomes potential fighter. We start to see that the security experts think about this factor as threat, as well as something that should be considered as a
39
part of security strategy (Hybrid warfare)46. However, as I have argued, the concept of Smart Mob as an instrument of influence is problematic. The gap between engagement and management is still significant, while the words smart and mob might be considered as oxymoron. Therefore the threat is not only the intent to use non-combatants as a part of warfare, but also to lose the control over the engaged networks. The balance between states and networks is very fragile. Arquilla and Ronfeldt write that some networks may be agents of a state, but others may try to turn states into their agents.47 The further the role of the Internet increases in our lives, the more its degree of complexity grows, , the higher the risk that a situation when the global socialization of conflict process will engage more and more people in more and more tangible ways. As consequence clash of situational conflict networks may go out of states control. This reality of clash of networks becomes more probable due to the fact that in the Internet there is no distances between members of different networks and it causes a situation of permanent friction, that might be transferred to physical offline domain. Consequently, I would like to conclude that the increase in involvement of non combatants in warfare that becomes possible due to the development of ICT should be addressed as a significant security threat.
46 47
40
Dealing
with
this
challenge
certainly
requires
the
states
to
abandon
the
hierarchical
mode
of
action
and
adopt
the
network
approach.
It
take
networks
to
fight
networks,
-
writes
Arquilla
and
Ronfeldt.48
The
task
is
more
difficult
in
the
case
of
situational
networks.
One
of
the
options
is
just
limiting
the
network's
infrastructure
and
restricting
the
networked
public
sphere.
That
is
what
China
does
when
it
blocks
more
than
250,000
western
websites,
limiting
the
scope
of
search
engines
and
monitoring
online
surfing
of
every
user.
The
big
brother
approach
is
certainly
problematic
for
democratic
countries
as
the
U.S.
The
answer
might
be
divided
to
two
parts.
First,
is
monitoring
of
online
activity.
The
task
is
complicated
since
you
have
to
be
a
part
of
network
to
monitor
its
content.
In
addition,
in
the
reality
of
overload
of
information
a
monitoring
of
interactive
spheres
is
very
difficult,
especially
since
the
source
of
the
problem
might
be
one
particular
node
of
the
network.
An
active
participation
in
network
is
also
suggesting
some
methods
of
impact
by
network
management
(for
instance
creating
artificial
provocative
targets
for
cyber
attacks
that
will
attract
most
of
hackers
of
adversarys
network).
However,
the
most
effective
methods
might
be
found
not
on
the
field
of
confronting
networks
but
supporting
a
creation
of
friendly
ones.
The
good
news
is
that
the
good
guys
are
usually
the
majority.
The
bad
news
is
the
they
tend
to
be
more
passive
comparing
to
the
bad
guys.
Providing
a
story
that
can
shape
around
its
narrative
a
situational
network
with
positive
attitude
might
be
a
part
of
the
solution.
Training
of
network
leaders
may
provide
another
part
of
the
answer.
In
November
2008,
the
State
Department
made
a
conference
for
The
Alliance
of
48
Arquilla J. & D. Ronfeldt, Challenges for U.S. Policy and Organization, The Advent of Netwar, Rand 1996
41
Youth Movements, group of networks leaders from all over the world, and published a field manual Creating Grassroots Movements for Change49 that should guide people who are interested in organizing networks for democratization and fighting terror. There are certainly good examples of these kinds of activities and democratization/ anti radicalization campaigns that were leaded by Smart Mobs (the famous recent example is the Facebook based protest One million against FARC). However, there are three problems with this approach. First, the networks that matter are situational networks and therefore it is more difficult to support their emergence. Second, when you guide and support network leadership, you can never know for what purposes it will be used. Third, creating anti networks only contribute to polarization, and declared involvement of state only help to trigger and manage engagement from the opposite side. The Russian-Georgian war is a good example for it. The Russian narrative claimed that the cyber attacks is a response for information war that was declared by the U.S. The new information technologies provide numerous challenges and opportunities. Addressing both by science and innovation policy should be based not only on providing particular answers for these challenges and leverage of opportunities, but awareness of the possible impacts and attitudes. The goal of this paper was to contribute to understanding of the ICT within the security context, as a decisive factor in shaping both the field of global conflict, as well as the field of global cooperation.
49
http://info.howcast.com/youthmovements/fieldmanual
42
References. Anderson, C., The Long Tail", Wired, October 2004. Arquilla J. & D. Ronfeldt, The Advent of Netwar (Revisited) in Arquilla J. & D. Ronfeldt (Eds.) Networks and netwars : The future of terror, crime, and militancy, Rand, 2001. Arquilla J. & D. Ronfeldt, What Next for Networks and Netwars, in Arquilla J. & D. Ronfeldt (Eds.) Networks and netwars : The future of terror, crime, and militancy, Rand, 2001. Arquilla J. & D. Ronfeldt, Challenges for U.S. Policy and Organization, The Advent of Netwar, Rand 1996, http://www.rand.org/publications/MR/MR789/MR789.ch5.pdf Bimber B, Information and American democracy: technology in the evolution of political power, Cambridge University Press, 2003.
43
Castells M., "The New Public Sphere: Global Civil Society, Communication Networks, and Global Governance," in Geoffrey Cowan and Nicholas J. Cull (Eds.), The Annals: Public Diplomacy in a Changing World, 2008, Volume 616, No. 1 pp. 78-93. Clover C., Kremlin-backed group behind Estonia cyber blitz, Financial Times, March 11 2009. http://www.ft.com/cms/s/0/57536d5a-0ddc-11de-8ea3-0000779fd2ac.html?nclick_check=1 Creating Grassroots Movements for Change: A Field Manual, Alliance of Youth Movements, December 2008, http://info.howcast.com/youthmovements/fieldmanual Goble P., Window on Eurasia: Will the Internet Integrate the Russian Federation or Tear It Apart? http://windowoneurasia.blogspot.com/2009/04/window-on-eurasia-will-internet.html Goldstein J. and J. Rotich, Digitally Networked Technology in Kenyas 20072008 Post-Election Crisis, Berkman Center Research Publication, September 2008. http://cyber.law.harvard.edu/node/4703 Hoffman F. G., Hybrid Threats: Reconceptualizing the Evolving Character of Modern Conflict, Strategic Forum, April 2009. Kalathil S. and T. C. Boas Open networks, closed regimes: the impact of the Internet on authoritarian rule, Carnegie Endowment, 2003. Lewis J., Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats, Center for Strategic and International Studies , December 2002, http://www.csis.org/tech/0211_lewis.pdf Lind W. S., Understanding Fourth Generation War, AntiWar.com, January 15, 2004, http://www.antiwar.com/lind/index.php?articleid=1702 Morozov E., Moldova's Twitter Revolution, The New ForeignPolicy.com, 04/07/2009. http://neteffect.foreignpolicy.com/posts/2009/04/07/moldovas_twitter_revolution Morozov E. Rioters of the world unite, The Economist, Dec 18th 2008 http://www.economist.com/world/international/displaystory.cfm?story_id=12815678 Morozov E., The Alternative's alternative, openDemocracy, December 29,2008 http://www.opendemocracy.net/article/email/the-alternatives-alternative Morozov E., More analysis of Twitter's role in Moldova, The New ForeignPolicy.com, 04/07/2009
44
http://neteffect.foreignpolicy.com/posts/2009/04/07/more_analysis_of_twitters_role_in_mold ova Prigogine I., Is Future Given? World Scientific Publishing Company, 2003. Rheingold H., Smart Mobs: The Next Social Revolution, Basic Books,2003. Schattschneider E. E,.The Semisovereign People: A Realist's View of Democracy in America, Harcourt Brace College Publishers, 1975. . 2007 , , 06/03/2009, http://www.rian.ru/politics/20090306/164087966.html ., ", , " , 05.03.2009 http://www.echo.msk.ru/blog/n_asadova/576689-echo/ . , , 07.04.2009, http://lenta.ru/articles/2009/04/08/moldblogs/ , : -89, 2004 : , 8.8.08 http://www.nashi.su/news/25672 ., : , " " 4 2006, http://www.agentura.ru/press/about/jointprojects/bigpolitics/cyberterrorism/ ., : , Agentura.Ru, : , 14-15 2007 . http://www.agentura.ru/equipment/psih/info/conferencepole/soldatov/ , , , http://svpressa.ru/issue/news.php?id=5696 ., . , Damian LJ, http://damian.livejournal.com/515909.html . ! Natmorar LJ 2009-04-07 http://natmorar.livejournal.com/36886.html
45
., , . 2006. 7. C. 1821 http://www.i-r-p.ru/page/stream-exchange/index-6700.html . , , 05.09.08, http://www.nr2.ru/kiev/194700.html . . 15 2009, Interfax.ru http://www.interfax.ru/society/txt.asp?id=74551 ,YNET , , : " 8 " http://www.ynet.co.il/articles/0,7340,L-3281689,00.html