Professional Documents
Culture Documents
Citations:
-- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and
Conditions of the license agreement available at
https://heinonline.org/HOL/License
-- The search text of this PDF is generated from uncorrected OCR text.
-- To obtain permission to use this article beyond the scope of your license, please use:
Copyright Information
CYBER TROOPING ACTIVITIES ON SOCIAL MEDIA AND ITS IMPACT ON ELECTIONS
IN INDIA
Our Constitution makers envisaged a free society to these activities. This calls for strict action to be
where people have access to information and are able taken by the government to curb iyber trooping
to freely express their opinion. This is the activities by enactment of laws in this respect.
* The authors are fifth year and fourth year law students at Chanakya National Law University, Patna respectively.
1 Dinesh Trivedi, M.P. and Others v. Union of India, (1997) 4 SCC 306.
2 Mohinder Singh Gill v. Chief Election Commissioner A.I.R. 1978, S.C 851.
3 Association for Democratic Reforms & Anr. Vs Union of India, A.I.R. 2001 Delhi 126, 2000 (57) DRJ 82.
37
only when the people have access to true and platforms.'Approximately, one-fourth of the
them to make informed choices. However, in actively use WhatsApp and about one-
the wake of rise in number of internet users, twentieth of the voters are active on Twitter.'
there has been widespread dissemination of With such a massive voting population
false information or misinformation to which within its grasp,'these platforms can be easily
more and more people are getting exposed used to influence at least forty per cent of the
each day. voters of the country who have almost no
Since, there is no law to keep a check on Political parties use techniques and tools like
content posted on these social media messaging, valance10 , trolling", etc. to spread
to our democracy that needs to be addressed opinion," which have been collectively
at the latest. termed as cyber trooping activities. These
4 Hunt Allcott and Matthew Gentzkow, Social Media 9 Philip E. Agre & Marc Rotenberg, Technology and
and Fake News in the 2016 Election, 31 Journal of Privacy: The New Landscape, 11 Harvard Journal of Law
Economic Perspectives, 211, 236 (2017). & Technology, 871, 876-879 (1998).
5 Arushi Chopra, Number Of Internet Users In India Could 10 Yosra Akrimi & Romdhane Khemakhem, What
Cross 450 Million By June: Report, LiveMint (Mar. 2, Drive Consumers to Spread the Word in Social Media?, 212
2017), Journal of Marketing Research & Case Studies, 1, 1-14
https://www.livemint.com/Industry/QWzIOYEsfQ (2012).
JknXhC3HiuVI/Number-of-Internet-users-in-India- 1 Samantha Bradshaw & Philip N. Howard, Troops,
could-cross-450-million-by.html. Trolls and Troublemakers: A Global Inventory of Organized
6 Neena Talwar Kanungo, India's Digital Poll Battle: SocialMedia Manipulation, (Computational Propaganda
Political Parties and Social Media in the 16th Lok Sabha Research Project, University of Oxford, Working
Elections, 3 SAGE Journals, 212, 226 (2015). Paper No. 2017.12).
7 W. Glynn Mangold & David J. Faulds, Social Media: 12 Meeyoung Cha, H. Haddadi, F. Benevenuto & K.
The New Hybrid Element Of The Promotion Mix, 52, Gummadi, Measuring User Influence In Twitter: The Million
Business Horizons, 357, 362 (2009). FollowerFallay , ICWSM (2010).
8 Laura Kalman, Law, Politics, And The 13 Guide to Russia's PresidentialElection on 4 March 2012,
New Deal(s),
108 Yale L.J., 2165, 2189 (1999). Moscow Times, (Dec. 15, 2011),
https://fas.org/sgp/crs/row/R42407.pdf.
38
general elections of 2014' 4and 2019,15 US schemes that could aid and empower the
involved wide scale use of social media by elections in free and fair manner.
media houses came to the fore to report this Before proceeding to the question of how
comparing the same with the global scenario. Cyber Trooping Activities1 8 comprise of the
An attempt has been made to assess the use of different kinds of strategies, tools and
cyber trooping activities, as recorded in assess and manipulate public opinion." Some
different elections and to present a picture of of these techniques and tools that have been
severe repercussions that our democracy will prominently used for election campaigning in
have to suffer if this practice continues to recent times have been discussed below:
Further, the paper also suggests different online commentators, who are either hired by
measures that the government should take to political parties or are independent but
curb these unfair practices, which involves a strongly inclined towards any political party
comprehensive scheme of amending the or have connections with any party. 20 These
existing legislations, enacting new legislations commentators engage the social media users
14 supra Note 6 at 220. And The Use Of Twitter. 17 The Journal of Legislative
15 2019 Lok Sabha Elections, Biggest Ever Test Of Social Studies, 86, 97 (2014).
Media Role In Polls, The Hindu (Dec. 20, 2018), 18 Agre & Rotenberg, Supra note 9 at 873.
https://www.thehindu.com/news/national/2019- 19 Supra note 15.
lok-sabha-elections-biggest-ever-test-of-social-media- 20 Neill Fitzpatrick, Media Manipulation 2.0: The Impact
role-in-polls/article25790529.ece. of Social Media on News, Competition, and Accuracy, 4
16 supra Note 4 at 232. Athens Journal of Mass Media and Communications,
17 Nigel Jackson & Darren Lilleker, Microblogging, 45, 51 (2018).
Constituency Service And Impression Management: UK MPs
39
political issue and observe their reactions and Political Parties hire people to create and
directing the conversation in favour of the disseminate junk news and campaign crafted
political party they are working for. The information by employing these strategies.
commentators usually follow either a pro- These groups of people who engage in such
active approach, where they start the activities are known as 'Cyber Troops'. These
conversation applauding the steps taken by troops carry out their activities through social
the political party they support, and media accounts which are of three types:
criticizing the opposition parties or a neutral automatic, human and hybrid or cyborg
dissemination of hateful memes and other share content favourable to the party they are
content on the internet by one party to troll controlled and managed by. These are by far
their opposition parties. 22 Usually, this is the the most preferred and popular means of
particular communities which form the The activities of these bots have been seen to
minorities are targeted to silence their voice. drown real information in the face of
There have been instances of many state- disinformation spread by them. And, in some
opposition or journalists. 2 3
21 Bruce Schneier, WUhy Anonymous Data Sometimes Isn't, Research Paper, (Jun. 22, 2020, 7:18 PM),
Wired, (Dec. 12, 2017), https://dash.harvard.edu/bitstream/handle/1/3375
https://www.wired.com/2007/12/why-anonymous- 9251/2017-08_electionReport_0.pdf.
data-sometimes-isnt/. 25 Todd C. Helmus, Elizabeth Bodine-Baron, Andrew
22 Kate Crawford and Jason Schultz, Big DataAnd Due Radin, Madeline Magnuson, Joshua Mendelsohn,
Process: TowardsA Framework To Redress Predictive Privacy William Marcellino, Andriy Bega & Zev Winkelman,
Harms, 55 Boston College Law Review, 93, 117 (2014). Russian Propagandaon Social Media, Russian Social Media
23 Natasha Singer & Charles Duhigg, Tracking Voters' Influence:Understanding Russian Propaganda in Eastern
Clicks Online to Tg to Sway Them, N. Y. Times, (Oct. 27, Europe, (May 12, 2020, 4:31 PM),
2012), https://www.rand.org/content/dam/rand/pubs/res
https://www.nytimes.com/2012/10/28/us/politics/ earchreports/RR2200/RR2237/RANDRR2237.p
tracking-clicks-online-to-try-to-sway-voters.html. df.
24 Robert Faris, Hal Roberts, Bruce Etling, Nikki 26 Gillian Bolsover & Philip Howard, Chinese
Bourassa, Ethan Zuckerman &Yochai Benkler, Media Computational Propaganda: Automation, Algorithms And
Structure & Partisanship, Partisanship, Propaganda, The Manipulation Of Information About Chinese Politics On
&
Disinformation Online Media & the 2016 U.S. Presidential Twitter And Weibo, 18 (2), Information,
Election, Berkman Klein Center for Internet & Society Communication & Society, 1, 93 (2018).
40
Ecuador, 27 Sewden,2 8 and Armenia," these political parties for all to see. But, political
bots have been successful in taking down parties have also been found to engage in,
consisting of elements of both automated to specifically target people who are likely to
compromising with the automatic mass 2014 Lok Sabha election can rightly be said
social media, trolling or demeaning rival platforms that had a massive influence on
27 Daniel Riofrio, Qasim Raza, Anacaren Ruiz, Adnan 2020, 9:20 PM),
Bashir, Erin Sosebee & Jed Crandall, Bot Analysis, https://warwick.ac.uk/fac/arts/english/currentstude
Tracking Elections: Our Expeience During The Presidential nts /undergraduate/modules / fictionnownarrativeme
Elections In Ecuador (May 27, 2020, 5:04 PM), diaandtheoryinthe2lstcentury/manifestly_haraway_--
https://arxiv.org/pdf/ 1807.06147.pdf.
28 Johan Fernquist, Lisa Kaati, Nazar Akrami, Katie _a_cyborgmanifesto_science_technologyand_socia
Cohen, Ralph Schroeder, Bots and the Swedish Election: list-feminism_in_the_....pdf.
A Study ofAutomated Accounts on Twitter, (May 29, 2020, 31 Sreeram Gopalkrishnan, The Trump Campaign
8:52 PM) Computational Propaganda Challenge for the Indian
https://www.foi.se/download/18.6b6fc4521690ffa2 ParliamentayElections 2019, 9 Media Watch Journal, 79,
022169/ 1550764502501/Political-bots- 79-88, (2018).
Swedish_election_FOI-S--5937--SE.pdf. 32 Id.
29 Supra Note 22 at 102. 33 M. Kosinskia, D. Stillwella & T. Graepelb, Private
30Donna J. Haraway, Sdence,Technology, And Sodalist TraitsAnd Attributes Are PredictableFrom DigitalRecords
-
Feminism In The Late Twentieth Century, A Cyborg Of Human Behavior, 110 The Psychometrics Centre,
Manifesto, University of Minnesota Press, (May 19, University of Cambridge, PNAS, 846, 862, (2013).
41
public opinion. Then, only 20 crores people supporting their political campaign. The
had access to internet but, in 2019 almost 56 recent Twitter purge of fake accounts, where
crores people have access to social media, Prime Minister Mr. Narendra Modi lost
which is nearly half of the entire population 300,000 followers and Congress chief Rahul
of India, making social media an even bigger Gandhi lost 17,000, speaks of how
game changer in the 2019 general election. 34 widespread bot activity is among India's
operation grows, they are paid more Reports claim BJP to be the pioneer of social
remuneration.36 These form cyber troops as media campaigning and the massive landslide
has been described earlier and are tasked with victory of BJP in both 2014 and 2019 Lok
the responsibility of making fake social media Sabha Elections holds testimony to the fact.40
accounts and managing them. These BJP has been repeatedly accused of engaging
accounts could be of the nature of human, in large scale internet trolling and fake photo
automatic or cyborg accounts but automatic forwards. However, recent studies show that
accounts using robotic system known as, almost all of the political parties employ
'political bots' are more common. A study cyber trooping methods to twist public
conducted by Twitter 37 showed that political opinion in their favour. Whether it be state
parties use bots to boost their follower or general elections, there is no dearth of
42
different political actors which can easily be to gain possible insights into ways to curb
found on these social media platforms. These such activities.44 Similarly, Facebook also set
platforms have become the centre stage of up monitoring bodies to keep a check on
available on such sites, which makes it easier, Cyber Trooping, as such has not been
economical and convenient for the political recognized as a separate offence under any
parties to engage in cyber trooping activities law in India. However, different provisions
and political parties nowadays have been of the IT Act,46 IT Rules, 47 IPC 4 and
include:
All this has brought the social media giants
under severe criticism, mindful of which Fake Accounts on Social Media Platforms:
some of these companies have taken steps to As per Section 66D 51 of the IT Act, no
curb this rising menace.42 For instance, person shall create or use fake accounts with
WhatsApp had limited the number of mala fide intent on social media platforms.
forward messages to five chats in an effort to Any person acting in contravention of this
prevent mass forwards from instigating provision shall be liable to be punished under
43
this provision as well as for the offence of protection of data. As per these Rules,
51 The Indian Penal Code,1860, § 415, No.45, Acts of Workshop on Mining Social Media, (July 30, 2009),
Parliament, 1860 (India). https://pdfs. semanticscholar.org/6e8f/50acc402343
52 The Information Technology Act, 2000, § 43, 1a76e518f4f37ff02e89c7714.pdf
56
No.21, Acts of Parliament, 2000 (India) L. Tang, X. Wang, and H. Liu. UncoveringGroups Via
53 H. Lauw, J. C. Shafer, R. Agrawal, and A. Ntoulas. Heterogeneous Interaction Analysis at Ninth IEEE
Homophily In The DigitalWorld:A IivejournalCase Study. International Conference on Data Mining, (Dec. 06-
Internet Computing, IEEE Internet Computing, Mar.- 09, 2009),
Apr. 2010, at 15 -23. http://www.public.asu.edu/-huanliu/papers/icdm0
54 S. Kumar, N. Agarwal, M. Lim, and H. Liu. Mapping 9t.pdf
Sodo-cultural Dynamics In Indonesian Blogosphere at 57 The Information Technology (Reasonable Security
Proceedings Of The Third International Conference Practices and Procedures and Sensitive Personal Data
On Computational Cultural Dynamics, (Dec. 07-09, or Information) Rules, (2000).
2009), 58 The Information Technology (Reasonable Security
https://www.aaai.org/ocs/index.php/ICCCD/ICC Practices and Procedures and Sensitive Personal Data
CD09/paper/viewFile/1019/3317/. or Information) Rules, Section 2(1) (i), (2000).
55J. Ritterman, M. Osborne, and E. Klein. Using 59 The Information Technology (Reasonable Security
Prediction Markets And Twitter To Predict Swine Flu Practices and Procedures and Sensitive Personal Data
Pandemic at Proceedings of the 1st International or Information) Rules, Section 2(1) (i), (2000).
44
of such information.6 0 Further, Rule 761 might arise from time to time which the
provides that any such information if being legislature might have failed to address in any
transferred has to be with the consent of the enactment or rules.66 This autonomy vested
person providing the information.62 with the Commission is necessary in view of
with election beginning from the date on The Commission also has the power to frame
which he has been nominated to the date on rules for the regular conduct of elections 68
which the results are declared." and issue guidelines known as Model Code of
President of India. 65 Article 324 of the period", i.e., no appearance by any of the
Constitution of India reposes ECI with the candidates on any form of media outlets
authority to take all steps necessary for the before the particular constituency goes for
smooth conduct of free and fair elections. It polls. All the major social media platforms:
has the power to issue directions as per its Facebook, Twitter, Google, WhatsApp and
discretion to deal with contingencies that SnapChat were to publish only pre-certified
60 EY, Building A Better Working World, PersonalData 64 Representation of People's Act, 1951, § 77, Acts of
Protection Bill-201 8, Parliament, 1951 (India)
https://www.ey.com/Publication/vwLUAssets/ey- 65 INDIA CONST. art. 324.
personal-data-protection-bill-2018/%24File/ey- 66 Association for Democratic Reforms & Anr. Vs
personal-data-protection-bill-2018.pdf ( last visited Union of India, A.I.R. 2001 Delhi 126, 2000 (57) DRJ
May 23, 2019). 82.
61 The Information Technology (Reasonable Security 67 Id.
Practices and Procedures and Sensitive Personal Data 68 Representation of People's Act, 1951, § 169, Acts of
or Information) Rules, Section 2(1) (i), (2000). Parliament, 1951 (India).
62
Jordi Soria-Comas and Josep Domingo-Ferrer, Big 69 Model Code & PoliticalAd Rules Will Apply To Social
Data Privacy: Challenges to Privacy Principles and Models, 1 Media Too, The Economic Times, (Mar. 11, 2019),
J. Data Sci. Eng., 21, 24 (2016). //economictimes.indiatimes.com/articleshow/68350
63 Representation of People's Act, 1951, § 77, No. 43, 634.cms?utm_source=contentofinterest&utm_mediu
Acts of Parliament, 1951 (India) m=text&utm_campaign=cppst.
45
political advertisements and to report the the primary cause behind it which is
the EC. The electronic and radio indirect means. Parties usually hire other
were to be vetted by district and state-level corporations for such activities that makes it
media certification and monitoring difficult to trace and prove that a certain
committees. These committees were also political party was behind it. We need a
required to have social media expert on stricter legal regime which is at pace with
70 Model Code & Political Ad Rules Will Appy To Social 72 Andrew Keane Woods, Against DataExceptionalism,
Media Too, The Economic Times, (Mar. 11, 2019), 68 Stan. L. Rev. 729, 737 (2016).
//economictimes.indiatimes.com/articleshow/68350 73 Sunil Abraham, If An Indian Party Acted Like
46
reported to taking information from (DPA) is also to be set up under the Bill to
Cambridge Analytica and also entering into supervise and regulate data fiduciaries. 77
Though, Indian law provides protection for only decides liability of body corporate in
personal information but its definition is case of misuse of data which are directly
vague and does not include data collected of collected through the user. Large volumes of
activities of people on these sites. This issue data is collected from social media users from
has been dealt comprehensively in Data their various activities on social media which
Protection Bill, 2018.75 The Bill intends to includes both personal as well as non-
regulate the processing of personal data of personal information, which are then mined
individuals (data principals) by government to produce relevant information.78 This
and private entities (data fiduciaries) transaction of data at various stages and
incorporated in India and abroad. Consent of stockpiling through various direct and
individuals is required for any sort of indirect sources leaves no room for the
the interest of national security, for legal subjective harm which is identified as a
proceedings, medical emergencies or for situation where there has not been any
journalistic purpose.7 6 The Bill also requires a tangible loss to the individual but the same is
territory of India and certain critical personal and generation of personal information as
data to be stored solely within the country. A meta-data, becomes the real question.79
47
processes have been described as being VII. PROVISIONS REGULATING THE
'
technologies by Internet Giants such as
emphasised upon the fact that "not only the
Facebook, Google and Twitter, make use of
matters of intimate concerns, having looming shades
loopholes in the existing legal framework, to
of reasonableexpectation ofprivagy should be brought
escape liability as intermediaries, for
about within this sphere". Data protection
influencing elections. The recent cases of UK
regimes should be intended at protecting the
Brexit Referendum and Presidential elections
identity of the individuals, in its entirety. The
in the USA in 2016 are stark examples.8 4
facts, details and opinions bearing a relation
However, different countries have tried to
to the identity of the individual or
enact legislations and policies to curb this
constructive in mapping the behavioural
practice.
profile of the same, should be brought about
information. 82 All sorts of information like the Organisation for Security and
opinions and assessments, which might lead European Union, and the Council of Europe
to the person being identified or reasonably have been charged with the responsibility of
identifiable shall be included within personal ensuring level-playing field for candidates.
data, irrespective of the same being direct or Candidates are required to abide by the
indirect. 83
48
Venice Commission 85 Rules regarding Advertising Standards Authority, leaving it
UK has an advertising code which prohibits defined in varying ways in different countries
political advertising from being broadcasted but the aspects covered under the same
on TV, to avoid giving an advantage to better remain identical more or less and fail to cover
financed parties. However, non-broadcast the data that are not directly collected from
media are not covered by this Code and users, data relating to behavior, activities of
therefore not subject to regulation by the users that can help identify them. The EU
49
includes both types of information which organizations to notify the authorities and
form the identity of an individual as well as their customers in case of 'eligible data
the information which might be non- breach'. In New Zealand the country's
personal but could make him identifiable. Privacy Act98 controls how 'agencies' collect,
"The EU's General Data Protection Regime use, disclose, store and give access to
cases of non- compliances, all businesses India is a welfare state and Part 1V of the
company's annual turnover.94The legislation court of law, the government is however held
further requires businesses to clearly inform accountable for its actions by way of
all their customers about the entire process elections where people express their
of data collection and its purpose. 95 mandate. This is why free and fair election
New Zealand and Australia also have laws for to control information and by controlling
92 Article 29 Data Protection Working Party, Opinion 95 Commission Regulation 2751/90 of Sept. 4, 2016,
4/2007 on the Concept of Personal Data, European Rules For The Protection Of Personal Data Inside
Commission, Eur. Parl. Deb. 01248/07/EN WP 136. And Outside The EU, annex, 2016 0.J. (L 264) 37, 38.
9 Regulation (EU) 2016/679 Of The European 96 The Protection of Personal Information Act, 2013,
Parliament And Of The Council of Apr 27, 2016, On § 13, Acts of Parliament, 2013 (South Africa)
The Protection Of Natural Persons With Regard To 97 The Protection of Personal Information Act, 2013,
The Processing Of Personal Data And On The Free § 14, 15, Acts of Parliament, 2013 (South Africa)
Movement Of Such Data and Repealing Directive 98 The Privacy Act, 1993, No. 28, Acts of Parliament,
95/46/EC. 1993 (New Zealand).
94 supra Note 92.
50
information, the parties can be assured of is fake or false being shared with the intent to
these matters. This will also reduce the Further, ECI needs to be given more powers
matters and encourage more reporting of regarding the conduct of political parties and
these activities as well as filing of cases not merely during the time of elections. The
have been taken to keep a check on these Furthermore, the legislature must take steps
activities like requirement of political parties to define personal information and it must
to submit their social media account details, include all such information that enable
however these steps are far from sufficient. identification of individuals to keep a check
Permanent censor boards are required to be on sharing of data by big companies (social
set up to keep a check on the content being media giants and data warehousing agencies)
shared on social media whether the content to political parties who use this data for
51
micro-targeting of advertisements to
52