Internet as a method of trolling offensive intelligence operations in cyberspace

  • Dragan Ž Đurđević Academy of National Security, Belgrade
  • Miroslav D Stevanović Academy of National Security, Belgrade

Abstract


Summary: The paper analyzes internet trolling as an operational intelligence activity, and the challanges it poses for national security, in aim to assess the possible strategic protection of national cyberspace. This problem arises with regard that collecting data through automated programs eliminates guarantees of ethical grounds for their gathering, in terms of clear reason, integrity of motives, proportionality of methods and the relevant authority. The basic thesis is that intelligence gathering on the Internet may be used against the basic values of states.

Functionally, trolling is, due to characteristics of the targets, conducive for collecting strategic information related to the individual and collective attitudes and their contextualization; or the economic entities and critical infrastructure of national crisis management system, as well as for the influence on the political decisions. Also, because of the network properties, it is suitable for identifying, locating potential sources of information and gaining their cooperation on the basis of motivation to support the objectives. The tasks of cyber data collection include psychological profiling, imposing attitudes, conducting secret surveillance on a massive scale and interception of communications. Internet trolling enables an access to primary data on the territory of other states, and thus suitable for secret and covert "installation" in the online community; for organized attack to infiltrate the government systems; for military and political interests; and for sabotaging various national infrastructure, communication and other systems.

Structurally, the use of trolling as a mean of collecting data stems from the military development, today applied within the doctrine of "Full Dimension Operations“. It is conducted in organized manner, with legend and rules of secrecy, so the trolls are agents of authorised agencies. Intelligence systems, like the „Five Eyes“ (US, GB, Australia, Canada and New Zealand, FVEY) have software tools, available IP addresses and networks of computers which run programs difficult to identify (botnet), which allows them to troll undetected.

The methods and tasks reveald through structural and functional analysis enable the induction of threats and challenges for national security of other states.

The principal challenges are the consequence of automatized methods, and democratic in nature. The primary risk for national security is the fact that it involves secret and organized efforts by other states to influence public opinion and dehumanization. Another is due to the fact that agencies of some countries have a capacity to secretly monitor communications in the cyberspace of other countries. Intelligence trolling can have an online operation against a certain state as an immediate goal, like misinformation and disinformation, creatiing humnint networks, or cyber attacks on critical infrastructure. With an aim to master the Internet, the FVEY agencies are trying to invade every possible system on the global net, searching to gain access to further systems.

The strategic protection of national security in cyberspace requires a multi-dimensional approach, within the framework of the national security strategy. It must include science and research of the cyber space and social networks, as the preconditions; education for the use of the Internet at all levels, quality education and public information systems, in sense of prevention; and the criminalization of fraudulent messages and training of the judiciary for prosecution, in terms of repression.

Keywords: internet trolling, secret internet operations, mastering the Internet, online targets, internet sabotage, full-spectrum operations.

Author Biographies

Dragan Ž Đurđević, Academy of National Security, Belgrade
Dragan Djurdjevic, PhD,  assistant professor at the Academy of National Security  in  the scientific field of security. Scientific-research and professional work are focused on organized crime through the prism of money laundering and misuse of information technologies, with special emphasis on the context of the security of information systems.
Miroslav D Stevanović, Academy of National Security, Belgrade
Miroslav Stevanovic, PhD,  assistant professor at the Academy of National Security, Belgrade.

References

American Psychiatric Association, Diagnostic and Statistical Manual of Mental Disorders, 5th edition, 2013.

Arquilla, John; Ronfeldt, David, Cyberwar is Coming!, Comparative Strategy, 12:2/1993, pp. 21-23.

Ar-Raqib, Akil; Roche, Edward Mozley, Virtual Worlds Real Terrorism, Den Haag: Aardworf Publications, 2009, p. 167.

Assange, Julian, When Google Met WikiLeaks, New York/London: OR Books, 2014, p. 213.

Bartlett, Jamie, The Dark Net: Inside the Digital Underworld, New York/London: Melville House, 2015, p. 123.

Bigo, Didier et al., National Programmes for Mass Surveillance of Personal Data in EU Member States and Their Compatibility with EU Law, Brussels: European Parliament, 2013, pp. 14-15, dostupno na: http://goo.gl/BVSGn0 (12.02.2016).

Blum, William, America's Deadliest Export: Democracy: The Truth About U.S. Foreign Policy and Everything Else, London/New York: Zed Books, 2014.

Bishop, Jonathan, Examining the Concepts, Issues, and Implications of Internet Trolling, Hershey: IGI Global, 2013, pp. 151, 154; takođe, Kuntsman, Adi; Stein, Rebecca, Digital Militarism: Israel's Occupation in the Social Media Age, Stanford: Stanford University Press, 2015.

Bishop, Jonathan, Psychological and Social Implications Surrounding Internet and Gaming Addiction, Hershey: IGI Global, 2015, p. 209.

Bossler, Ana, Metadata Analytics, Law, and Future of the Internet, in: The Future Internet: Alternative Visions, Jenifer Winter, Ryota Ono (eds.), Cham: Springer, 2015, p. 143.

Corn, David, Pentagon Trolls the Net, The Nation, 262/1996, p. 21.

Coxall, Malcolm, Civil Disobedience: A Practical Guide, 2015, p. 531.

Dandoulaki, Miranda; Halkia, Matina, Social Media (Web 2.0) and Crisis Information: Case Study Gaza 2008-09, in: Examining the Concepts, Issues, and Implications of Internet Trolling, Jonathan, Bishop (ed.), Hershey: IGI Global, 2013, p. 147.

Autori, 2015.

Dunn Cavelty, Myriam, Cyber-Security and Threat Politics: US Efforts to Secure the Information Age, New York: Routledge, 2008, p. 73.

Ganser, Daniele, NATO's Secret Armies: Operation GLADIO and Terrorism in Western Europe, New York/London: Frank Cass, 2005, pp. 253-255.

Great Britain Parliament: House of Commons: Home Affairs Committee, Undercover Policing: Interim Report, Thirteenth Report of Session 2012-13, London: The Stationary Office, 2013, p. 2.

Greenwald, Glenn, Hacking online polls, and other ways British spy agencies seek to control the Internet, The Intercept, 14.07.2014, dostupno na: https://goo.gl/EfYdDY (14.02.2016).

Hench, John, Books as Weapons: Propaganda, Publishing, and the Battle for Global Markets in the Era of World War II, Ithaca/London: Cornell University Press, 2010, pp. 185-190.

Hopia, Henna, Dawn of the Drones: Europe's Security Response to the Cyber Age, Brussels: Wilfried Martens Centre for European Studies, 2015, pp. 35, 51.

Lee, Newton, Facebook Nation: Total Information Awareness, 2nd Edition, New York: Springer, 2014, p. 360.

Massing, Michael, Our Own Thought Police, in: What Orwell Didn't Know: Propaganda and the New Face of American Politics, Szántó, András (ed.), New York: PublicAffairs, 2007, pp. 174, 181.

Minghetti, Marco, Collaborative Intelligence: Towards the Social Organization, Newcastle: Cambridge Scholars, 2014, p. 33.

Morozov, Evgeny, To Save Everything, Click Here: The Folly of Technological Solutionism, New York: PublicAffairs, 2013, p. 130.

Omand, David, Understanding Digital Intelligence: A British View, in: National Security and Counterintelligence in the Era of Cyber Espionage, de Silva, Eugenie (ed.), Hershey: IGI Global, 2015, pp. 113-115.

Phillips, Whitney, This Is Why We Can't Have Nice Things: Mapping the Relationship Between Online Trolling and Mainstream Culture, Cambridge/London: MIT Press, 2015, p. 164.

Rainer, Kelly; Cegielski, Casey, Introduction to Information Systems: Enabling and Transforming Business, 3rd Edition, New Jersey: Wiley, 2010, p. 98.

Reagle, Joseph, Reading the Comments: Likers, Haters, and Manipulators at the Bottom of the Web, Cambridge/London: MIT Press, 2015, p. 52.

Samaha, Joel, Criminal Law, 12th edition, Boston: Cengage Learning, 2015, p. 475.

Schell, Orville, Follies of Orthodoxy, in: What Orwell Didn't Know: Propaganda and the New Face of American Politics, Szántó, András (ed.), PublicAffairs, 2007, p. xxii.

Shorer-Zeltser, Marina;Ben-Israel, Galit Margarit, Developing Discourse and Tools for Alternative Vontent to Prevent Terror, in: National Security and Counterintelligence in the Era of Cyber Espionage, de Silva, Eugenie (ed.), Hershey: IGI Global, 2016, pp. 102-122.

Snow, Nancy, Propaganda Inc.: Selling America's Culture to the World, 3rd Edition, New York: Seven Stories Press, 2010, pp.78, 100, 114.

Wallace, Patricia, The Psychology of the Internet, Cambridge: Cambridge University Press, 2015, p. 202.

Wiles, Jack et al., Low Tech Hacking: Street Smarts for Security Professionals, Waltham: Elsevier, 2012, p. 150.

Wisnewski, Jeremy, WikiLeaks and Whistleblowing: Privacy and Consent in an Age of Digital Survaillance, in: Ethics and the Future of Spying: Technology, National Security and Technology, National Security and Intelligence Collection, Galliott, Jai; Reed, Warren (eds.), New York/London: Routledge, 2016, p. 27.

Wray, Stefan, On Electronic Civil Disobedience, 1998 Socialist Scholars Conference Panel on Electronic Civil Disobedience, New York, 20-22 March 1998, dostupno na: http://goo.gl/puEui1 (11.02.2016).

Published
2017/11/17
Section
History of Policing