Al Mayadeen English

  • Ar
  • Es
  • x
Al Mayadeen English

Slogan

  • News
    • Politics
    • Economy
    • Sports
    • Arts&Culture
    • Health
    • Miscellaneous
    • Technology
    • Environment
  • Articles
    • Opinion
    • Analysis
    • Blog
    • Features
  • Videos
    • NewsFeed
    • Video Features
    • Explainers
    • TV
    • Digital Series
  • Infographs
  • In Pictures
  • • LIVE
News
  • Politics
  • Economy
  • Sports
  • Arts&Culture
  • Health
  • Miscellaneous
  • Technology
  • Environment
Articles
  • Opinion
  • Analysis
  • Blog
  • Features
Videos
  • NewsFeed
  • Video Features
  • Explainers
  • TV
  • Digital Series
Infographs
In Pictures
  • Africa
  • Asia
  • Asia-Pacific
  • Europe
  • Latin America
  • MENA
  • Palestine
  • US & Canada
BREAKING
Information Minister in Pakistani-administered Kashmir: Five civilians killed and at least 29 others injured in shelling across the border with India
Israeli Army Radio's diplomatic correspondent quoted a senior Israeli official as saying: So he [Trump] decided to cut off contact. That might still change, but that’s the situation right now
Israeli Army Radio's diplomatic correspondent quoted a senior Israeli official as saying: Trump’s circle told him [Dermer] that Netanyahu was manipulating him, and there’s nothing Trump hates more than being portrayed as someone being played
Senior Palestinian official to Al Mayadeen: Meetings between the Israelis, Egyptians, and Qataris are all centered around the Israeli proposal, which does not guarantee an end to the war [on Gaza]
Senior Palestinian official to Al Mayadeen: “Israel” is threatening to expand the ground offensive if Hamas rejects the proposal
Senior Palestinian official to Al Mayadeen: Hamas rejects the Israeli proposal, viewing it as failing to guarantee an end to the war
Senior Palestinian official to Al Mayadeen: “Israel” is sticking to its proposal, and insists there is no alternative offer on the table for negotiation
Senior Palestinian official to Al Mayadeen: The meetings between the Israelis and the Egyptians and Qataris all revolve around the Israeli proposal
The administration was clearly looking for an off-ramp for this campaign against Ansar Allah, NBC News reports, citing US official
Trump's operation against Ansar Allah cost more than $1 billion, NBC News reports, citing US official

Internet, cybercrime, and politics

  • Vladislav B. Sotirovic Vladislav B. Sotirovic
  • Source: Al Mayadeen English
  • 25 Feb 2024 23:57
  • 2 Shares
13 Min Read

When Cold War 2.0 started, the Great Powers started to adopt smart weapons to fight conventional wars, weapons that utilize new information and communication technologies like the Internet or cyberspace.

  • x
  • Internet, cybercrime, and politics
    Cybercrime can be a foremost threat to individuals, industry, or/and political organizations (Illustrated by Hady Dbouk; Al Mayadeen English)

Future war “may see attacks via computer viruses, worms, logic bombs, and trojan horses rather than bullets, bombs, and missiles."

[Steven Metz, Armed Conflict in the 21st Century: The Information Revolution and Post-Modern Warfare, Carlisle, PA: Strategic Studies Institute, 2000, xiii]. 

The facilities of the Internet in politics

The Internet or the WWW (World Wide Web) became massively widespread around the globe in the late 1980s or more precisely since 1989 – the same year when the Berlin Wall collapsed and, therefore, enabled the Cold War 1.0 to enter the final stage of its end. That is why both of these historical events mark the start of the Turbo-Globalization Era in all spheres from economy to culture, in addition to politics.[1] With the growing importance of the Internet, it is quite understandable that it is becoming an arena of political and ideological rivalry with necessary growing implications concerning national security issues.[2]

The spread of mass media via the Internet followed by communications within the framework of cyber-space[3] enables more people, even in remote corners of the globe, to be informed (or misinformed) about world affairs, to form (or accept) opinions about certain events, and to be involved in politics in ways that some 35 years ago have been unimaginable. Today, even poor peasants in many parts of the world have access to the Internet which provides information and gives both government and anti-government groups a new way to struggle for their ideas, ideologies, and programs in order to indoctrinate the public. 

The Internet has already become the focal instrument of all in facilitating the exchange of different viewpoints, dissemination of information, fake news or propaganda, movement of electronic money, and finally the coordination of activities for the obvious reason that it is inexpensive and easily accessible. Bloggers with their weblogs are influencing the mass of people across the globe by transmitting both information and disinformation and opinion on the Internet.[4] After the end of Cold War 1.0, a new Cold War 2.0 started, in which the Great Powers started to adopt smart weapons to fight conventional wars, weapons that utilize new information and communication technologies like the Internet or cyberspace. A new type of warfare emerged – cyber warfare.[5] 

In terms of politics, the focal impact of the Internet can be summarized into four basic points:

1.     The real technical possibility of the Internet is to increase and improve the transparency of the government by free access to online content, official documents, and all kinds of governmental reports and viewpoints on different issues and problems.

2.     The ability of the Internet to increase the politically relevant set of information of both natures: factual and nonfactual.

3.     It has the power to organize and speed up the coordination of different interest groups, extremist groups, and the so-called civil society beyond something that was known before as traditional political areas and barriers. 

4.     The creation of new forms of criminal activities known as cybercrime, cyber-terrorism, or cyber-security problems.

In relation to the first point regarding the potential to increase transparency, governments, NGOs, and different institutions in global governance (such as the UN) have created several millions of web pages. These pages serve to provide political information in the form of official reports, viewpoints, comments, contact forms, and strategy rationalizations. Many governments established increasing targets for the maximum proportion of their communication with the citizens via the Internet.

Related News

Palestinians in Gaza are taking to Instagram to show their plight to the world

Nevertheless, if we are speaking about information flows, the Internet is offering for sure a cheap and easy platform for many types of populist movements, parties, or organizations seeking to indoctrinate and attract a possible voting audience at the elections.[6] One such very successful example, as a matter of illustration, was the US Democrats in the presidential election of Barack Obama in 2008. 

The facility of the Internet allows for greater communication of identity politics like for instance, those witnessed during the British referendum to leave the EU – Brexit.[7] However, another facility that the Internet offers in practice is the spreading of propaganda[8] by extremist persons or organizations for different purposes. One of such most blatant examples of misusing Internet facilities for the very political and/or ideological purposes is used by different radical groups for recruitment strategies. 

The Internet, in general, and social media, in particular, also provide powerful platforms for the greater dissemination of so-called fake news. The prevalence of uncorroborated news on social media platforms often stems from the popularity of views generated online, rather than from traditional independent channels of verification. Many experts would argue that both the promotion of fake news and targeted viewer profiling on the Internet (particularly on Twitter) had tremendously participated in the election of Donald Trump for US President in November 2016.  

One of the crucial power features of cyberspace is that it poses real challenges to governments as the Internet facilitates mobilization and coordination by professionals, freedom fighters, insurgents, criminals, and terrorists of all kinds. A good example of the use of the Internet against authoritarian regimes is the case of WikiLeaks in April 2010 when a video showed a US helicopter in Baghdad killing a dozen Iraqis including two journalists who appeared on the net.   

Cybercrime  

Cybercrime, in essence, refers to traditional types of crimes that just migrated to cyberspace (the Internet), such as money laundering or sexual exploitation. However, cybercrime also includes internet-specific criminal activities like illegal access to electronic information, trade, national or political secrets, and finally the creation and spread of dangerous computer viruses which can impose political or national-security harmfulness. 

Cybercrime committed by individuals or state-sponsored cyberattacks undoubtedly poses serious threats to the international community in general or a particular part of it for the very reason that they were originally designed to degrade, deny, or even destroy information residents in computers or to compromise computers themselves. Such activities of cyberattacks or cyber-terrorism are committed with the ultimate task of inflicting disruption, destruction, or human loss.     

Cybercrime can be a foremost threat to individuals, industry, or/and political organizations. However, in political terms, cybercrime can question the proper function of the state and its political system if the latter persistently fails to control such criminal activity or if it suffers breakdowns in cybersecurity. 

One of the very specific types of cybercrime is cyber-terrorism. It basically refers to the (mis)use of Internet facilities by different organizations to promote terrorist propaganda and activities. Terrorist groups can use the Internet as a domain to commit cyberattacks by, for example, targeting networks or computers that belong to the governmental, public, or military infrastructures. The most notorious cyber program used in cybercrimes so far is the so-called trojan horse – a program in which a code is inserted into a program or data so that it can take control of a computer with the intent to damage it. However, an additional danger can be posed by computer trap doors or back doors – deliberate holes in computer programs that are used to gain unauthorized access to a computer or a computer network for the reasons of spying or/and causing destruction of the computer system.[9]

Moreover, the Internet can be (mis)used to perpetrate acts of terror that produce physical or mental damage, but, in extreme cases, cyber-terrorists can incur individual criminal responsibility under international criminal law where their conduct is understood as supporting war crime, aggression, crimes against humanity, or genocide. In war terminology, cyberwar is the use of a system of information for the purpose of exploiting, disrupting, or destroying an enemy’s military or civilian computer networks with the ultimate aim of disrupting those systems and the tasks they perform.[10] Cyberwar is war in cyberspace that is already a new fifth military domain after land, sea, air, and space. 

The legal measures against cybercrime

During the last two decades, cybercrimes of all types have been increasingly understood to be war-like attacks on states and their infrastructure and, therefore, are regulated mostly by the international legal framework relating to the use of force or, in the case committed at the time of war (armed conflict), by international humanitarian law. 

All countries, or groups of countries, which are considered to belong to the Great Powers’ bloc implemented certain legal and practical measures to counter cybercrimes on their authorized territory. One of the examples is the Council of Europe, which adopted the Convention on Cyber-crime in 2001 and 2004, which established a common criminal policy among the member states by both adopting an appropriate legislative framework and encouraging transnational cooperation on the global level in the practice of beating cybercrime in all spheres, including politics. If we can speak in more precise legal terms, according to the legal framework of the European Council concerning beating cybercrime, the member states should criminalize illegal access and illegal interference, and at the same time, they should cooperate by all possible legal and practical means in their examination and prosecution policies.[11]   

It is a clear decision by the UN that such cyber-activities are undermining the global or regional peace process and security and, therefore, the organization called all its member states to prohibit incitement to commit terrorism, take as possible as active measures for the prevention of incitement, and deny safe haven to persons or group of persons who are guilty of incitement. Nevertheless, it is clear that any kind of adopted cybersecurity measure must comply with the protection of international standards of human rights like the freedom of speech and association or the right to privacy. 

As a matter of fact, within the legal framework of international agreements aimed at the suppression of terrorism in general, and more particularly on the Internet, states are subject to many international legal obligations that require their struggle against cyber-terrorism within the Internet space that they control. It is, for instance, the case of the UNSC, which adopted several resolutions by which all the UN member states are required to act against terrorist activities within their borders, including cyber-terrorism.

References:

[1] Michael Meyer, The Year that Changed the World: The Untold Story Behind the Fall of the Berlin Wall, New York: Scribner, 2009; Brian McCullough, How the Internet happened: From Netscape to the iPhone, New York−London: Liveright Publishing Corporation, 2018. 
[2] See more in [John Erikkson, Giampiero Giacomello, “The Information Revolution, Security, and International Relations: (IR) Relevant Theory?”, International Political Science Review, 27/3, 2006, 221−224].
[3] Cyber-space is the “electronic medium of computer networks in which online communication takes place” [Richard W. Mansbach, Kirsten L. Taylor, Introduction to Global Politics, Second Edition, London−New York: Routledge Taylor & Francis Group, 2012, 575].
[4] Daniel W. Drezner, Henry Farrell, “Web of Influence”, Foreign Policy, 145, 2004, 32−40.
[5] About cyber-war, see more in [Richard A. Clarke, Robert Knake, Cyber War, New York: HarperCollins, 2010]. This book gives a picture of cyber-war and its capabilities which afford potential enemies.
[6] See, for instance [Pipa Norris, Ronald Inglehart, Cultural Backlash: Trump, Brexit, and Authoritarian Populism, Cambridge, UK: Cambridge University Press, 2019].
[7] Brexit is the abbreviated term by the British, meaning literary shorthand for the British leaving the European Union. Brexit refers to the debates in the direct connections with the June 23, 2016 referendum for the UK to exit the EU. The Brexit referendum became a debate between two camps in the UK – those for the British leaving the EU vs. those for the British standing in the EU. About the Brexit issue, see more in [Harold D. Clarke, Matthew Goodwin, Paul Whiteley, Brexit: Why Britain Voted to Leave the European Union, Cambridge, UK: Cambridge University Press, 2017].
[8] The term propaganda historically originated in an office of the Roman Catholic Church in the Vatican charged with the propagation of the (Roman Catholic) faith – de propaganda fide. The term propaganda entered common usage in the 1930s in order to describe at that time the authoritarian regimes to achieve total subordination of knowledge to the policy of the state. Based on the politics of different kinds of authoritarian and totalitarian political regimes in Europe to develop legitimacy and social control by the centralized governmental institutions, propaganda soon came to be directed toward the populations of other states (usually the neighbors), provoking reactions from the other states. Therefore, for instance, the UK established the Ministry of Information. Such ministries employed print, radio, film, graphic art, and the oral word in order to justify the official policy of their governments (the White Propaganda) but at the same time to beat the enemy’s propaganda (the Black Propaganda). Propaganda was quite important in international relations during the Cold War 1.0, especially via radio stations like Radio Free Europe or Voice of America which have been propagating the official values of the Western political liberal democracy and market economy. Today, Western political propaganda either via the Internet or other technical means is mainly directed against Russia and China in the forms of (extreme) Russophobia and Sinophobia. See more about propaganda in [Jason Stanley, How Propaganda Works, Princeton, US−Oxford, UK: Princeton University Press, 2015].      
[9] See in more detail in [Jonathan Kirshner (ed.), Globalization and National Security, New York: Routledge, 2006].
[10] Richard W. Mansbach, Kirsten L. Taylor, Introduction to Global Politics, Second Edition, London−New York: Routledge Taylor & Francis Group, 2012, 575.
[11] See more in [Robert W. Taylor, et al, Cyber Crime and Cyber Terrorism, Pearson, 2018].

The opinions mentioned in this article do not necessarily reflect the opinion of Al mayadeen, but rather express the opinion of its writer exclusively.
  • Internet
  • cyber crimes
  • cyberwarfare
  • politics
  • Cybersecurity
  • Cyber Attack
  • cyberattack
Vladislav B. Sotirovic

Vladislav B. Sotirovic

Historian, political analyst, and a research fellow at the Center for Geostrategic Studies in Belgrade, Serbia.

Most Read

All
Throughout Operation Prosperity Guardian, current and former US military and intelligence officials expressed disquiet at the enormous “cost offset” involved in battling Ansar Allah. (Al Mayadeen English; Illustrated by Zeinab El-Hajj)

Ansar Allah triumphant: US facing Red Sea defeat again

  • Opinion
  • 3 May 2025
While Salams is intended to be for Muslims seeking marriage, the other companies owned by Match Group are seen as encouraging casual relationships like OK Cupid and Tinder. (Al Mayadeen English; Illustrated by Zeinab el-Hajj)

Selling Muslim marriage app Salams to the Zionist pornography complex

  • Opinion
  • 27 Apr 2025
"Israel" appears to be the only place in the world where there are actual demonstrations defending rapists as national heroes precisely because of their crimes. (Al Mayadeen English; Illustrated by Batoul Chamas)

'Israeli pride' - Celebrating rape in the Zionist entity

  • Opinion
  • 4 May 2025
Why the Israelis cannot win in Gaza or Yemen

Why the Israelis cannot win in Gaza or Yemen

  • Opinion
  • 7 May 2025

Coverage

All
The Ummah's Martyrs

More from this writer

All
In principle, there are five focal factors on which the soft power of the state authority directly depends within the framework of the international, transnational, and supranational institutions. (Al Mayadeen English; Illustrated by Arwa Makki)

Soft power: factors and resources in International Relations

Islamic democracy and a democratic Islamic polity

Islamic democracy and a democratic Islamic polity

On (Western Model of) Democracy and its Crucial Problems Like Democratic Deficit

On (Western Model of) Democracy and its Crucial Problems Like Democratic Deficit

In all of those West European overseas colonies like in Africa, there was an extremely shared assumption that the local “natives” were racially inferior compared to the white European colonists. (Al Mayadeen English; Illustrated by Arwa Makki)

On West European politics of race and racism: A short historical overview

Al Mayadeen English

Al Mayadeen is an Arab Independent Media Satellite Channel.

All Rights Reserved

  • x
  • Privacy Policy
  • About Us
  • Contact Us
  • Authors
Android
iOS