{"id":24864,"date":"2024-02-02T04:54:44","date_gmt":"2024-02-02T04:54:44","guid":{"rendered":"https:\/\/edukemy.com\/blog\/?p=24864"},"modified":"2024-02-02T04:54:47","modified_gmt":"2024-02-02T04:54:47","slug":"use-of-internet-and-social-media-by-non-state-actors-for-subversive-activities-is-a-major-security-concern-how-have-these-been-misused-in-the-recent-past-suggest-effective-guidelines-to-curb-the-abo","status":"publish","type":"post","link":"https:\/\/edukemy.com\/blog\/use-of-internet-and-social-media-by-non-state-actors-for-subversive-activities-is-a-major-security-concern-how-have-these-been-misused-in-the-recent-past-suggest-effective-guidelines-to-curb-the-abo\/","title":{"rendered":"Use of internet and social media by non-state actors for subversive activities is a major security concern. How have these been misused in the recent past? Suggest effective guidelines to curb the above threat. (250 Words 15 Marks)"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-gs-advance-and-mentorship-program-ampcsat?utm_source=Blog&amp;utm_medium=Link&amp;utm_campaign=GS+Advanced\" target=\"_blank\" rel=\"noreferrer noopener\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1280\" height=\"300\" src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8.png\" alt=\"\" class=\"wp-image-43397\" srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8-585x137.png 585w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure><\/div>\n\n\n<p>The proliferation of the internet and social media platforms has undeniably transformed the global landscape, enabling unprecedented connectivity and information dissemination. However, this technological advancement has also presented an alarming security concern, as non-state actors increasingly exploit these tools for subversive activities. In the recent past, numerous instances have illustrated the misuse of the Internet and social media by such entities. Cybercriminals, extremist groups, and hostile entities have leveraged these platforms to spread propaganda, coordinate illicit activities, and even recruit individuals for nefarious purposes. The ease of anonymity, rapid dissemination of information, and the ability to manipulate public opinion make these channels particularly attractive for those seeking to undermine national security. To effectively counter this threat, comprehensive guidelines must be implemented. First and foremost, robust cybersecurity measures should be established to safeguard critical infrastructure and sensitive information. Governments should collaborate with tech companies to enhance platform monitoring and content moderation capabilities. Additionally, public awareness campaigns should educate users about the risks associated with online activities and promote responsible online behavior. International cooperation is essential to address the cross-border nature of these threats, fostering information sharing and joint efforts to combat cyber threats. By integrating these guidelines, nations can collectively mitigate the misuse of the internet and social media by non-state actors, safeguarding global security in the digital age.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>Tag: <\/strong>Challenges to internal security through communication network, role of media and social networking sites in internal security challenges.\u00a0\u00a0<\/p><\/blockquote>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<label for=\"ez-toc-cssicon-toggle-item-6a00bea224c4d\" class=\"ez-toc-cssicon-toggle-label\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-6a00bea224c4d\"  \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/edukemy.com\/blog\/use-of-internet-and-social-media-by-non-state-actors-for-subversive-activities-is-a-major-security-concern-how-have-these-been-misused-in-the-recent-past-suggest-effective-guidelines-to-curb-the-abo\/#Decoding_the_Question\" title=\"Decoding the Question:&nbsp;&nbsp;&nbsp;\">Decoding the Question:&nbsp;&nbsp;&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/edukemy.com\/blog\/use-of-internet-and-social-media-by-non-state-actors-for-subversive-activities-is-a-major-security-concern-how-have-these-been-misused-in-the-recent-past-suggest-effective-guidelines-to-curb-the-abo\/#Answer\" title=\"Answer:&nbsp;\">Answer:&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/edukemy.com\/blog\/use-of-internet-and-social-media-by-non-state-actors-for-subversive-activities-is-a-major-security-concern-how-have-these-been-misused-in-the-recent-past-suggest-effective-guidelines-to-curb-the-abo\/#Recent_examples_showing_vulnerabilities_of_internet\" title=\"Recent examples showing vulnerabilities of internet:&nbsp;&nbsp;\">Recent examples showing vulnerabilities of internet:&nbsp;&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/edukemy.com\/blog\/use-of-internet-and-social-media-by-non-state-actors-for-subversive-activities-is-a-major-security-concern-how-have-these-been-misused-in-the-recent-past-suggest-effective-guidelines-to-curb-the-abo\/#Suggestions_to_reduce_vulnerability_and_threat\" title=\"Suggestions to reduce vulnerability and threat:&nbsp;&nbsp;&nbsp;\">Suggestions to reduce vulnerability and threat:&nbsp;&nbsp;&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/edukemy.com\/blog\/use-of-internet-and-social-media-by-non-state-actors-for-subversive-activities-is-a-major-security-concern-how-have-these-been-misused-in-the-recent-past-suggest-effective-guidelines-to-curb-the-abo\/#In_case_you_still_have_your_doubts_contact_us_on_9811333901\" title=\"In case you still have your doubts, contact us on 9811333901.&nbsp;\">In case you still have your doubts, contact us on 9811333901.&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/edukemy.com\/blog\/use-of-internet-and-social-media-by-non-state-actors-for-subversive-activities-is-a-major-security-concern-how-have-these-been-misused-in-the-recent-past-suggest-effective-guidelines-to-curb-the-abo\/#Visit_our_YouTube_Channel_%E2%80%93_here\" title=\"Visit our YouTube Channel &#8211;&nbsp;here\">Visit our YouTube Channel &#8211;&nbsp;here<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Decoding_the_Question\"><\/span><strong>Decoding the Question:&nbsp;<\/strong>&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>In the Intro, try to write about Internet and Social Media.<\/strong>\u00a0\u00a0<\/li><li><strong>In Body,<\/strong>\u00a0\u00a0<\/li><li><strong>Discuss with examples recent vulnerabilities.\u00a0<\/strong>\u00a0\u00a0<\/li><li><strong>Write about steps needed to be taken to counter this menace.\u00a0<\/strong>\u00a0\u00a0<\/li><li><strong>Try to conclude answer with some suggestions.<\/strong>\u00a0\u00a0<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Answer\"><\/span><strong>Answer:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The Internet and social media provide both a tool and platform for people, institutions, and governments to connect and collaborate. However, such ability of bringing together is also being harnessed by unscrupulous non-state actors in pursuing their propaganda.The use of internet and social media has become a powerful tool in the hand of non-state actors such as terrorist organizations.&nbsp;<\/p>\n\n\n\n<p>Use of the Internet by terrorist organizations such as <strong>ISIS in recruiting youth<\/strong> all around the world has become a reality. Cyber warfare is gaining importance due to the increasing density of the internet. The <strong>Stuxnet<\/strong> virus affected half of the world targeting Iran nuclear facilities.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Recent_examples_showing_vulnerabilities_of_internet\"><\/span><strong>Recent examples showing vulnerabilities of internet:<\/strong>&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Use of the Internet by Daesh: <\/strong>Daesh has been using Internet to spread its propaganda using platforms such as\u202ftwitter, YouTube\u202fetc. Daesh has successfully attracted youth from various countries for their recruitment purpose. For example, several youth from India travelled to Syria for being recruited in militia.\u00a0\u00a0\u00a0<\/li><li><strong>Radicalisation of youth:<\/strong>\u202fPropaganda to recruit into terror groups like AQIS, LeT, terrorist groups etc. in J&amp;K have been intercepted by intelligence agencies. These social media sites are created on fake names and tracing them has become a tedious task.\u00a0\u00a0<\/li><li><strong>Financial Security Breach:<\/strong>\u202fRecently, details of\u202f32 lakhs Debit cards\u202fwere compromised by use of sophisticated hacks. Many organized crime groups and sympathizers of terrorist organizations are involved in stealing individual financial information.\u00a0\u00a0<\/li><li><strong>Bot army attack:<\/strong>\u202fAn army of 100,000 bots was used to make a hostile attack termed \u201cDenial of Service\u201d on servers of Dyn, a European organization. These types of attacks are carried out by hostile neighbors or even terrorist organizations.\u00a0\u00a0<\/li><li><strong>Fake news over sensitive issues:\u202f<\/strong>Agitations by patidars in Gujarat, Jats in Haryana\u202fhad seen widespread use of Internet, often playing rumours and fake news to arouse popular sentiments. Such events only compel the administration to affect Internet shutdown temporarily.\u00a0\u00a0<\/li><li><strong>Hacking of private accounts: <\/strong>Unethical hackers have in past hacked\u202fprivate social media accounts of famous personalities\u202fas well as common people to harass them. Even, they have been used to spread misinformation and hate triggering chaos.\u00a0\u00a0\u00a0<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Suggestions_to_reduce_vulnerability_and_threat\"><\/span><strong>Suggestions to reduce vulnerability and threat:&nbsp;<\/strong>&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>India recently appointed the first <strong>Chief Information Security Officer (CISO).<\/strong> It will help India in developing the vision and policy to fight cybercrime and manage cyber security more effectively.\u00a0<\/li><li>The creation of the <strong>National Cyber Security Agency (NCSA)<\/strong> would improve India\u2019s resilience and defense system.\u00a0<\/li><li>Monitoring of content on the internet by intelligence agencies such as Intelligence Bureau, and RAW can prevent any attempt to radicalize youths.\u00a0<\/li><li><strong>National Cyber Security Policy 2013<\/strong> aims at protection of information infrastructure in cyberspace, reducing vulnerabilities. A National and sectoral 24\u00d77 mechanism has been envisaged to deal with cyber threats through National Critical Information Infrastructure Protection Centre (NCIIPC)\u00a0<\/li><li><strong>Computer Emergency Response Team (CERT-In) <\/strong>has been designated to act as Nodal agency for coordination of crisis management efforts.\u00a0<\/li><\/ul>\n\n\n\n<p>The Internet and social media are the greatest technological innovation bringing people together. However, they also expose unaware and unguarded users to the anonymous unscrupulous elements seeking to gain from them. This is especially true of Indians, who lag behind considerably in digital literacy. On top of it, large socio-economic-cultural diversity and disparity in the country make them easy targets of the propaganda of miscreants. It is high time, India adopted sincere steps ensuring safe and secure cyberspace for all.\u00a0\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Essay\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/UPSC-Essay-Course-1280\u00d7300-1-3.svg\" alt=\"\" class=\"wp-image-42688 lazyload\" width=\"781\" height=\"182\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 781px; --smush-placeholder-aspect-ratio: 781\/182;\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"In_case_you_still_have_your_doubts_contact_us_on_9811333901\"><\/span><strong>In case you still have your doubts, contact us on 9811333901.<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>For UPSC Prelims Resources,&nbsp;<a href=\"https:\/\/edukemy.com\/upsc-cse-prelims-resource-centre\" target=\"_blank\" rel=\"noreferrer noopener\">Click here<\/a><\/p>\n\n\n\n<p>For Daily Updates and Study Material:<\/p>\n\n\n\n<p>Join our Telegram Channel &#8211;&nbsp;<a href=\"https:\/\/t.me\/WithEdukemy4IAS\" target=\"_blank\" rel=\"noreferrer noopener\">Edukemy for IAS<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>1. Learn through Videos &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3vOD8sU\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>2. Be Exam Ready by Practicing Daily MCQs &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3Q9z2nF\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>3. Daily Newsletter &#8211; Get all your Current Affairs Covered &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3bE2y5J\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>4. Mains Answer Writing Practice &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3mZuVxl\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Visit_our_YouTube_Channel_%E2%80%93_here\"><\/span>Visit our YouTube Channel &#8211;&nbsp;<a href=\"https:\/\/www.youtube.com\/@ShabbirsEduKemyforIAS\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><span class=\"ez-toc-section-end\"><\/span><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>The proliferation of the internet and social media platforms has undeniably transformed the global landscape, enabling unprecedented connectivity and information dissemination. <\/p>\n","protected":false},"author":17,"featured_media":24865,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[1524],"tags":[177,1653,142,232,145,140],"class_list":["post-24864","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-upsc-mains-solved-paper-gs-3","tag-general-studies-3","tag-internet","tag-previous_year_questions","tag-upsc","tag-upsc-mains-question-paper","tag-upsc_preparation_strategy"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/24864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/comments?post=24864"}],"version-history":[{"count":1,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/24864\/revisions"}],"predecessor-version":[{"id":24866,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/24864\/revisions\/24866"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media\/24865"}],"wp:attachment":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media?parent=24864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/categories?post=24864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/tags?post=24864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}