UPSC MainsGENERAL-STUDIES-PAPER-III201612 Marks200 Words
Q18.

Use of Internet and social media by non-state actors for subversive activities is a major security concern. How have these been misused in the recent past? Suggest effective guidelines to curb the above threat.

How to Approach

This question requires a nuanced understanding of how non-state actors exploit internet and social media for subversive activities, coupled with practical suggestions for mitigation. The answer should begin by defining 'subversive activities' in this context. It should then detail recent instances of misuse, categorizing them for clarity (e.g., radicalization, disinformation, funding). Finally, it needs to propose guidelines, balancing security concerns with freedom of expression, and incorporating technological and legal aspects. A structure of Introduction, Types of Misuse, Guidelines, and Conclusion is recommended.

Model Answer

0 min read

Introduction

The proliferation of internet and social media platforms has revolutionized communication, but simultaneously presented new avenues for non-state actors to engage in subversive activities. These activities, ranging from spreading propaganda and inciting violence to recruiting members and funding terrorism, pose a significant threat to national security and social harmony. The ease of anonymity, rapid dissemination of information, and global reach of these platforms make them particularly attractive to malicious actors. Recent events, including the use of social media to coordinate attacks and spread disinformation during elections, underscore the urgency of addressing this challenge. The challenge lies in effectively countering these threats without infringing upon fundamental rights like freedom of speech and expression.

Misuse of Internet and Social Media by Non-State Actors

Non-state actors have increasingly leveraged the internet and social media for various subversive purposes. These can be broadly categorized as follows:

  • Radicalization and Recruitment: Platforms like Telegram, Facebook, and Twitter have been used to disseminate extremist ideologies, radicalize individuals, and recruit them into terrorist organizations. ISIS, for example, extensively used social media for propaganda and recruitment, particularly during the peak of its territorial control.
  • Disinformation and Propaganda: The spread of false or misleading information, often through coordinated campaigns, aims to manipulate public opinion, incite hatred, and undermine trust in institutions. The 2019-2020 Delhi riots witnessed the widespread circulation of disinformation on social media, exacerbating tensions.
  • Funding and Logistics: Cryptocurrencies and online payment platforms are utilized to raise funds for subversive activities, bypassing traditional financial controls. Social media is also used to coordinate logistics and communication among operatives.
  • Cyberattacks and Data Breaches: Non-state actors employ cyberattacks to disrupt critical infrastructure, steal sensitive data, and spread malware. Ransomware attacks, often originating from organized cybercrime groups, have targeted hospitals, government agencies, and businesses.
  • Incitement to Violence: Social media platforms are used to incite violence, promote communal disharmony, and encourage unlawful assembly. The use of hate speech and inflammatory content can have real-world consequences.

Recent Examples of Misuse

  • Pulwama Attack (2019): Social media was used to glorify the perpetrators of the attack and incite further violence.
  • Jammu & Kashmir (Post Article 370 Abrogation, 2019): Pakistani propaganda machinery utilized social media to spread misinformation and create unrest in the region.
  • Farmers’ Protest (2020-21): Disinformation campaigns, including the involvement of foreign entities, were alleged to have been spread through social media to fuel the protests.
  • Ukraine-Russia Conflict (2022-Present): Extensive use of social media for propaganda, disinformation, and psychological warfare by both sides.

Effective Guidelines to Curb the Threat

Addressing this threat requires a multi-pronged approach encompassing legal frameworks, technological solutions, and international cooperation:

  • Strengthening Legal Frameworks: The Information Technology Act, 2000, needs to be amended to address emerging challenges like encrypted communication and the spread of disinformation. Specific provisions for tackling online radicalization and terrorist financing should be incorporated.
  • Enhanced Cybersecurity Measures: Investing in robust cybersecurity infrastructure to protect critical infrastructure and prevent cyberattacks. Promoting cybersecurity awareness among citizens and organizations.
  • Collaboration with Social Media Platforms: Establishing clear guidelines for social media platforms to proactively identify and remove harmful content, while respecting freedom of expression. Mandating transparency in content moderation policies.
  • Artificial Intelligence (AI) and Machine Learning (ML): Utilizing AI and ML technologies to detect and flag suspicious activity, identify disinformation campaigns, and monitor online radicalization.
  • Digital Literacy Programs: Educating citizens about the risks of online disinformation and promoting critical thinking skills.
  • International Cooperation: Sharing intelligence and best practices with other countries to combat transnational threats. Collaborating on efforts to disrupt terrorist networks and dismantle online propaganda channels.
  • Regulation of Cryptocurrency: Implementing stricter regulations on cryptocurrencies to prevent their use for illicit financing.

A dedicated Cyber Security Coordination Committee, involving representatives from intelligence agencies, law enforcement, and social media platforms, could be established to ensure effective coordination and response.

Conclusion

The misuse of internet and social media by non-state actors presents a complex and evolving security challenge. A comprehensive strategy that combines legal reforms, technological innovation, international cooperation, and public awareness is crucial to mitigate this threat. Balancing security concerns with the protection of fundamental rights remains paramount. Continuous monitoring, adaptation, and proactive measures are essential to stay ahead of malicious actors and safeguard national security in the digital age.

Answer Length

This is a comprehensive model answer for learning purposes and may exceed the word limit. In the exam, always adhere to the prescribed word count.

Additional Resources

Key Definitions

Subversive Activities
Activities undertaken to undermine or overthrow a government or established system, often involving clandestine operations and the spread of dissenting ideologies.
Deepfake
Synthetic media in which a person in an existing image or video is replaced with someone else's likeness. Deepfakes can be used to spread disinformation and damage reputations.

Key Statistics

As of 2023, India has over 770 million internet users, making it the second-largest internet market globally.

Source: Statista (as of knowledge cutoff - 2024)

Reportedly, India accounts for approximately 18% of global cybercrime victims (2022).

Source: Norton Cyber Safety Insights Report (as of knowledge cutoff - 2024)

Examples

Sri Lanka Easter Bombings (2019)

ISIS utilized social media platforms to claim responsibility for the attacks and spread propaganda, demonstrating the group’s ability to leverage online platforms for recruitment and radicalization.

Frequently Asked Questions

How can freedom of speech be protected while curbing online radicalization?

A nuanced approach is required, focusing on removing content that directly incites violence or promotes terrorism, while protecting legitimate expression of opinions, even if controversial. Transparency in content moderation policies and judicial oversight are crucial.

Topics Covered

SecurityTechnologyGovernanceInternetSocial MediaCyber SecuritySubversive Activities