by Ana C. Rold
While the United States has endured as a world leader in traditional warfare for well over a century, the global battlefield today has shifted decisively in the digital realm. With countries like Russia, Iran, and even North Korea showing signs of extremely sophisticated digital maneuvers capable of infiltrating other countries’ databases, influencing foreign elections, and even altering physical systems such as hard drives and power grids, large-scale digital are already occurring in real-time.
Russia’s meddling in the 2016 U.S. presidential elections has been one of the most recent and enduring examples of how foreign actors can use cyber attacks to influence even the largest political landscapes, with U.S. intelligence officials directly citing President Vladimir Putin and Russian intelligence services as having hacked the Democratic National Committee in order to leak the emails responsible for harming Hillary Clinton’s electability. Similarly, Russia’s attempt at socially engineering American voters to favor Donald Trump through the buying and promoting of politically-motivated ads on social media—which were estimated to have reached as many as 126 million Americans on Facebook, as well as countless others on platforms like Twitter and YouTube—has brought social media companies under intense scrutiny. While discussions around how to prevent these sort of large-scale digital attacks are being brought to the forefront of political and social decision-making, little has been done to successfully prevent further forms of infiltration.
In addition to foreign actors’ ability to sway political opinion through the use of digital platforms, sophisticated algorithms are also being created that possess the ability to physically alter the world we live in. One of the most alarming examples of this type of hacking is an algorithm known as Stuxnet, a sophisticated computer worm first discovered in 2010 that was created to exploit Windows computers’ zero-day vulnerabilities in order to spread itself rapidly throughout computer systems and target centrifuges used to produce uranium—a computer bug that, if successful, has the ability to shut down or adversely affect nuclear weapons and reactors. Similarly, last year’s WannaCry ransomware worm saw to it that those with infected Windows computers—which included high-level organizations such as Great Britain’s National Health Service—would find important files on their PC’s hard drive encrypted, with a message demanding $300 in Bitcoin to decrypt the files. With the ability of hackers to infiltrate the real world through the digital realm becoming all too common, it is only a matter of time before bigger systems like power grids and communication systems become vulnerable and all-too-accessible in times of conflict.
Because of the speed at which technology enables cyber bugs such as Stuxnet and WannaCry to evolve, it can be extremely difficult for policy makers and government officials to keep up with the ever-changing nature of digital warfare. The first step towards defending against any potential digital threats may be in the hands of organizations and individuals themselves. With nearly every person in the world connected to the Internet in some form, it is crucial that individuals become more familiar with the different forms of cyber attacks and the tools already available to them to defend against such attacks. Two-factor authentication, for example, can be used to help secure personal email accounts against phishing—and while many email hosting services have put such safeguards in place, many of their users have opted out from this important feature. It is vital that something akin to a shared lexicon, for example, be created to assist individuals in understanding difficult technological terms associated with digital security, as well as a more general understanding of the true importance of security in the digital age.
Similarly at the organizational level, simple tasks such as securing one’s hardware with a complicated password, encrypting and backing up data on a regular basis, and investing in cyber security insurance are basic necessities to securing one’s data against cyber threats. More importantly, the creation of a security-focused workplace culture through the education of staff on the dangers of using unsecured networks, unsecured websites and password sharing can help both companies and the individuals who work for them better secure company-related and personal data. Ultimately, until more attention is paid on these sorts of basic safeguards, sensitive user and company data—as well as government data—will remain vulnerable to cyber attacks and foreign actors will continue to pose a real threat in the digital landscape.
As countries continue to experience conflict on the ground, cyber attacks and other forms of digital warfare have ultimately created a much more ambiguous worldwide landscape and disrupted the traditional balance of power between nation-states. With technology continuing to advance at an unprecedented rate, the complicated nature of conflict between countries and other actors only stands to become more convoluted. However, by focusing more on understanding the many shapes and sizes cyber threats come in as well as how to better defend against such threats, individuals can better prepare themselves for any potential dangers they may experience online or in the workplace. As the government and other top-level organizations continue to come up with solutions that can safeguard against bigger digital attacks, citizens can rest assured that in times of war, the digital front will remain secure from foreign influencers.
About the author: Ana C. Rold is Founder and CEO of Diplomatic Courier, a Global Affairs Media Network. She teaches political science courses at Northeastern University and is the Host of The World in 2050–A Forum About Our Future. To engage with her on this article follow her on Twitter @ACRold.
The Role of Women in Deradicalization Efforts
The presence of violent extremist groups has become an increasingly pressing issue around the globe, and although there is a growing number of women involved in these groups, there is a lack of research and resources dedicated to women in deradicalization efforts and countering violent extremism (CVE). Programs to rehabilitate participants in violent extremist groups and preemptive efforts to thwart involvement are designed by men, for men. As women are joining radical groups at an unprecedented rate, and even returning to these groups after rehabilitation, this calls for immediate attention and action.
The Georgetown Institute for Women, Peace and Security (GIWPS) published a policy briefearlier this year that outlines findings about women in deradicalization and rehabilitation. Recent studies have found that 20% of Western recruits to the Islamic State (IS) are women, and female suicide bombers for Boko Haram have increased substantially. Further, the EU Terrorism Situation and Trend Report found that the number of women arrested for violent extremist participation rose to 25% in 2016, a 7% increase from the prior year.
A major roadblock for deradicalization efforts is the misconception about why women join terrorist groups. Although horrific stories of girls and women being kidnapped and forced into extremist groups, or women being coerced by husbands to join are very real, research has proven that women join these groups for a variety of complex reasons. Just like men, women may join radical groups due to family ties, economic or social opportunity, or religious ideology, amongst other reasons. Despite research to support this, the narrative of women being victims of coercion persists “While men’s agency is assumed”, according to GIWPS, “women are infantilized or sexualized.” Consequently, “This can lead to more lenient sentencing, inadequate rehabilitation programming, and perhaps even let dangerous actors slip through the cracks.”
In spite of challenges, there have been some efforts to create deradicalization programs that include women. Last year, the United Nations Development Programme (UNDP) in Nigeriaand the Center for Democracy and Development brought together women in Maiduguri, Nigeria to share ideas about countering radical ideology in their community. In an area where Boko Haram has terrorized civilians for the last decade, this workshop aimed to empower women to create lasting solutions. One of the participants of the workshop, Mariam Ngileruma, expressed the importance of education. “What if the women were educated, and then allowed to educate their own children?” Ngileruma asked.
“Socialization starts at home and when you educate women, you educate the whole.”
Along with education, job training is essential for women to be rehabilitated. GIWPS reported that employment opportunities for women after serving prison sentences are three times worse than their male counterparts, mainly because job training programs are inadequate, ineffective, or even nonexistent for women. Because some women join extremist groups due to lack of economic opportunity or access to social services, if they are not given better opportunities after incarceration or rehabilitation, they are more likely to return to their radical groups.
Above all, bringing women to the forefront of deradicalization efforts will be the most effective solution to counteracting female involvement in violent extremism and ensuring proper rehabilitation. According to GIWPS, “Identifying, empowering, and consulting credible women leaders is a crucial part of creating sustainable deradicalization and rehabilitation programs that address individual and community needs.” This can be accomplished in a variety of ways—through empowering mothers to educate their children, supporting women in religious and political positions, and encouraging women to engage in a dialogue with their community. The participation of women in violent extremism is not something that we can let slip through the cracks. As these women face unique challenges in the process of deradicalization and rehabilitation, we need to support and encourage solutions made by women, for women.
No comments:
Post a Comment