Categories
Blog

Role of Social Media in a Democracy

Social Media has for long been considered the fourth pillar of democracy owing to its potential to not just report what is happening around the world but to build a public opinion about the ongoing issues. The term ‘democracy’ implies the participation of people. Media facilitates this participation.

The emergence of social media, however, has changed the way in which people now participate in democracy. Compared to traditional media, social media has a larger reach, is easily accessible, enables mass participation and provides instant updates. These factors have led to a situation where people rely more on social media than their traditional counterparts, to become aware of their surroundings and participate in discussions- political, economic, or otherwise, which in turn strengthens democracy. However, social media does not have only positive implications on democracy. On the flip side of the coin, it has been misused a number of times, often becoming the antithesis of democracy. The following headings discuss the role played by social media in a democratic setup, both positive and negative.

Learn more about Social Media with Enhelion’s Law firm certified Online Course! 

Election Campaigning

Free and fair elections are undoubtedly one of the most important elements of modern democracy, and election campaigning forms very much a part of it. Political campaigning is not limited to physical rallies and posters. Social media has entered the realm of campaigning and is extensively being used by various political leaders as well as political parties to communicate their agendas to the general public. The ubiquitous nature of the Internet allows the leaders and political parties to simultaneously communicate with the voters across regions.

Social media is used for political campaigning through commercials, blogs, tweets etc. using social networking sites like WhatsApp, Facebook, Twitter, to announce a candidate running for the election, organize physical campaigning, recruit supporters and volunteers, seek funds, mobilize voters, share the party’s election manifesto and the candidate’s message to the general public, among other things.

The ex-President of the United States of America, Barack Obama, is famous for effectively harnessing the potential of social media as his campaign strategy in the 2008 Presidential Campaign. Since young voters rely more on social media compared to conventional media, social media was used to establish a contemporary voter-politician relationship between Barack Obama and the voters. Regular voting reminders were sent on Twitter, and Facebook was used as a platform to interact with people. As a result, President Obama maintained a significant lead in both Facebook likes and Twitter followers over his rival Governor Romney during his election campaign. The significant difference in the response on social media was translated into the historic win of Barack Obama as the first Africa-American President of the United States of America.[1]

Learn more about Social Media with Enhelion’s Law firm certified Online Course! 

The field of social media campaigning has not been left unexplored by Indian politicians and political parties. Launched in 2012, the Aam Aadmi Party (AAP) ran its political agenda through social media and emerged victorious in Delhi Assembly polls. AAP used social media platforms like Twitter, Facebook and YouTube to interact with voters, share their election manifesto and raise funds, thus, keeping the election expense within the limit. Indian media reported that Arvind Kejriwal, the founder of AAP had admitted to adopting the strategies used by Barack Obama in 2008.[2]

Furthermore, in the 2019 general elections in India, there were around 15 million voters who were aged between 18 to 19 years. In light of these statistics and the interest of youngsters in social media platforms, various political parties adopted full-fledged social media campaigns to communicate with the large audience of voters, which in turn helped the parties to save their money, time and resources. Social media political campaigning has benefits other than saving the time and resources of the political party. Politicians are able to gauge their communication by viewing direct responses to their social media campaigning on Facebook, Twitter or Instagram.

Learn more about Social Media with Enhelion’s Law firm certified Online Course! 

Taking into account the potential of social media campaigning in the 2019 elections, the Internet and Mobile Association of India (IAMAI), in consultation with the Election Commission of India (ECI) had developed a set of ‘Voluntary Code of Ethics’[3] to be adopted by various social media platforms to ensure free, fair and ethical use of social media in order to maintain the integrity of the electoral process. By virtue of this Code, the social media platforms were required to develop a notification mechanism for violations of section 126[4] of the Representation of Peoples Act, 1951.[5]

Although the potential of social media has been used to a great extent by various political parties for election campaigning, however, it is imperative to understand that social media platforms sometimes go overboard for political purposes. In the 2020 Presidential election in the United States, there were numerous reports of Facebook posting ads of Donald Trump, violating its own pre-election policies wherein it had announced that it would stop accepting new political ads after 27th October and would indefinitely ban all political ads after the polls close. However, on the first day of the moratorium, several ads appeared on the platform which was later taken down after being flagged.[6] Furthermore, social media political campaigning also has another drawback. After social media has been used for campaigning to the maximum extent possible, politicians use it as a one-way communication tool, rarely engaging in discussions with the citizens. This continues after they have been elected; they use social media to inform the people of their constituencies about different policies, rather than engaging in discussions with them.

Political Discussions

A healthy democratic setup gives utmost importance to public participation as the government is “of the people, for the people and by the people[7]. Public participation can best be achieved by expressing one’s political views and discussing them with others. Efficient democratic deliberation assumes citizens as equal participants where opposing points of view are not only accepted but encouraged, and the main goal is to achieve a rationally motivated consensus.

From the point of view of political involvement, social media has taken the power of political messaging from the mass media model and firmly placed it into the peer-to-peer, public dialogue. It provides an environment where the ‘aam aadmi’ of a country is able to freely express his political opinions and expectations, with the use of his phone/device. Earlier, only those individuals could be a part of political discussions who read newspapers, watched news channels or discussed politics at the nukkad of the village. However, the tech-savvy nature of social media campaigning effectively makes the youth a part of political discussion as well. They take time to analyse and discuss political issues. Such discussions also influence administrative decision making.

Learn more about Social Media with Enhelion’s Law firm certified Online Course! 

One of the examples of healthy political discussion is the 2015 #SOTU,[8] which enabled Twitter users to react to the topics covered by Barack Obama in the State of the Union address. There were around 2.6 million tweets in this context.

However, social media has the potential to be misused to manipulate individuals. It should always be kept in mind that “computer technologies should be used to serve the interests of the people and not corporate elites, to inform and enlighten individuals rather than to manipulate them, to articulate their own experiences and interests, and to promote democratic debate and diversity, allowing a full range of voices and ideas to become part of the cyberdemocracy of the future.”[9]

Cyber Governance

Social media also plays a vital role in cyber governance i.e. the use of information and communication technologies to support governance. Taking the example of India, various Ministries and the Ministers of the respective Ministries have their official social media handles which they use to perform their functions. These social media handles, on one hand, help the citizen to easily let the concerned Minister/Ministry know about the grievances faced by him, and on the other hand, help the concerned Minister/Ministry to respond and resolve the grievance raised.

The peculiar feature of cyber governance is the element of time and resources used to raise concerns. Earlier, citizens had to write formal letters to the concerned Minister/Ministry and wait for days for a response. This traditional system becomes futile if the situation requires urgent intervention. Therefore, social media has become a boon for cyber governance.

Learn more about Social Media with Enhelion’s Law firm certified Online Course! 

The micro-blogging site Twitter was extensively used by late Sushma Swaraj, ex-Minister of External Affairs, to resolve the issues faced by Indian citizens trapped abroad. She rescued 168 Indians trapped in Iraq by acting on a video that was tweeted to her, and helped a number of other individuals, Indians as well as foreigners, to return to their homeland.[10]

Facilitator of political change in Arab nations

Social media platforms have also been used to accelerate revolutions in many Arab countries.

During 2010-11, a number of campaigns of civil resistance and street demonstrations took place in Tunisia. These efforts led to the ousting of President Zine El Abidine Ben Ali. During this process, social media played a positive role by spreading awareness among people, helping people to organize themselves using Facebook and clearing the clouds of misinformation by sharing photos and videos.[11]

Social media also played a key role in ending the 30 years long misrule by President Hosni Mubarak of the National Democratic Party in Egypt. It all started with a photograph being posted on Facebook. The photograph depicted a young man named Khaled Mohamed Saeed who was brutally beaten to death by the Egyptian police. This prompted an agitated Ghomin to start a Facebook page named ‘Saeed’ to highlight the scenario in Egypt. The number of followers of this Facebook page increased from 300 to 25,000 in just three months. The online expression of distress of the regime of President Mubarak spread to the streets of Egypt wherein the historic Tahrir Square in Cairo was filled with protestors shouting ‘We are all Khaled Saeed’. As a result, President Mubarak was forced to resign and dissolve his party.[12]

2.6. As a tool of manipulation  

Social media has also been used to manipulate the political choices of voters. This has a detrimental effect on the democratic setup of a country, where manipulation does not find a place.

The 2016 United States Presidential election was at the central stage of the allegations of the use of social media to manipulate elections. Facebook admitted that Russian Groups Company bought $100,000 worth of ads with the purpose of spreading disinformation and propaganda.[13] Furthermore, Cambridge Analytica, a political consulting firm, found itself in deep trouble over the United States 2016 Presential Elections involving Presidential candidate Donald Trump. It was found that it used deceptive means to gain access to data of about 87 million Facebook users, without their consent or knowledge. It was alleged that the firm got hold of such data through researcher Aleksandr Kogan, a Russian American who worked at the University of Cambridge. He built a Facebook app, which was actually a personality quiz. Around 2,70,000 people were paid to take this quiz, under the shadow of research. However, the catch was that the quiz was designed to access the Facebook data of the people taking the quiz, as well as the data of the people who they are friends with. The data included personal information on where users lived and what pages they liked, which in turn helped Cambridge Analytica to build psychological profiles of the quiz takers that analysed characteristics and personality traits. This kind of information was later used to tailor political messaging for Donald Trump’s presidential campaign.[14]

The attempts of manipulation directly go against individual autonomy as well as privacy enjoyed by the individuals.

As a Tool of Repression

Social media has been used to propagate one’s ideas and opinions. However, this platform has also been used by different organizations to propagate communal, racist and sociological tensions. Taking into account the possibility of exploitation of social media by such organizations, the Information Technology Act, 2000 contains a provision[15] which allows the Central Government to block public access to information on social media, on certain grounds namely in the interest of sovereignty and integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above. These grounds are identical to the grounds mentioned under Article 19(2), based on which freedom of speech and expression can be curtailed by the government.

Learn more about Social Media with Enhelion’s Law firm certified Online Course! 

Since the power to block public access to information on the Internet and social media sites violate the freedom of speech and expression enjoyed by the citizens of India, such power should be used cautiously by the government. However, in recent times, the Central Government has overused this power to suppress genuine political discussion on social media. Some examples include the government’s order to Twitter to block certain tweets and accounts pertaining to farmer’s protests, anti-CAA protests as well as those criticizing the handling of the COVID-19 pandemic by the government[16]. These blocking orders highlight the misuse of power by the Government to curb political criticism, which is detrimental for the largest democracy in the world.

Conclusion 

The advent of social media has taken democracy a step further by firstly, facilitating public discussions on important issues, whether political, religious, social or economic, secondly, providing a greater reach to election campaigning with minimal time and resources, thirdly, ensuring that the grievances of individuals reach the concerned authorities in time, and lastly, facilitating and accelerating political revolutions in countries. However, the use of social media in democracy has a flip side as well, which is highlighted by its use in manipulating the opinions of individuals and suppressing the voices of people raising genuine concerns on the social media platforms.

Therefore, though social media has vast potential to uphold and propagate democratic principles, however, it should only be used in a bona fide manner to further lawful political interests. Furthermore, social media, in absence of a privacy and data protection regime in a country, is highly susceptible to exploitation by organizations who manipulate the psychology of individuals by using the data of social media users, without their consent, or even knowledge.

Learn more about Social Media with Enhelion’s Law firm certified Online Course! 

[1] Jennifer Aaker & Victoria Chang, Obama and the Power of Social Media and Technology, STANFORD BUSINESS (Feb. 28, 2021, 9:20 PM), https://www.gsb.stanford.edu/faculty-research/case-studies/obama-power-social-media-technology.

[2] Sevathi Ninan, Learning media strategy from AAP, LIVE MINT (Apr. 28, 2021, 9:30 PM), https://www.livemint.com/Opinion/HwHIPVrpDJC2Ax0TcTv03N/Learning-media-strategy-from-AAP.html.

[3]PIB,https://pib.gov.in/PressReleaseIframePage.aspx?PRID=1586297#:~:text=Internet%20%26%20Mobile%20Association%20of%20India,bye%20elections%20being%20held%20simultaneously (last visited Apr. 26, 2021).

[4] Prohibition of public meetings during period of forty-eight hours ending with hour fixed for conclusion of poll.

[5] Jinala Sanghvi, Role of social media in Indian politics, LEGAL DESIRE (Apr. 28, 2021, 9:36 PM),  https://legaldesire.com/role-of-social-media-in-indian-politics/.

[6] Abhishek Singh, Democracy in times of social media, THE INDIAN EXPRESS (Apr. 25, 2021, 3:43 PM), https://indianexpress.com/article/opinion/democracy-in-times-of-social-media-6910382/

[7] Richard A. Epstein, Direct Democracy: Government of the people, by the people, and for the people, 34 HARVARD LAW JOURNAL AND PUBLIC POLICY 819, (2011), https://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=2260&context=journal_articles.

[8] TWITTER, http://twitter.github.io/interactive/sotu2015/#p1, (last visited Apr. 26, 2021).

[9] Fenton & Barassi, Alternative media and social networking sites: The politics of individuation and political participation, 14(3) THE COMMUNICATION REVIEW 179-196, (2011).

[10] Ten times when Sushma Swaraj won the internet with her Twitter outreach as Foreign Minister, LIVE MINT (Apr. 29, 2021, 2:20 PM), https://www.livemint.com/news/india/ten-times-when-sushma-swaraj-won-the-internet-with-her-twitter-outreach-as-eam-1565121014539.html.

[11] How Social Media Accelerated Tunisia’s Revolution: An Inside View, HUFFPOST (Apr. 28, 2021, 2:10 PM), https://www.huffpost.com/entry/how-social-media-accelera_b_821497.

[12] Serajul I. Bhuiyan, Social media and its effectiveness in the political reform movement in Egypt, 1(1) MIDDLE EAST MEDIA EDUCATOR 14, (2011), https://ro.uow.edu.au/cgi/viewcontent.cgi?article=1002&context=meme.

[13] Scott Shane & Vindu Goel, Fake Russian Facebook accounts bought $100,000 in Political ads’ THE NY TIMES (Apr. 27, 2021, 9:30 PM), https://www.nytimes.com/2017/09/06/technology/facebook-russian-political-ads.html.

[14] Nicolas Confessore, Cambridge Analytica and Facebook: The scandal and the fallout so far, THE NY TIMES (Apr. 27, 2021, 9:36 PM), https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html.

[15] The Information Technology Act, 2000, s. 69A.

[16] Pranav dixit, Twitter is blocking tweets that criticize how the Indian government has handled the pandemic, BUZZFEED NEWS (May 5, 2021, 11:13 AM), https://www.buzzfeednews.com/article/pranavdixit/twitter-blocking-tweets-india.

Categories
Blog

The interplay between cyber forensics and threat to cyber security in digital spaces like Clouds

More and more businesses organizations are becoming dependent on technology, and most of the data and information is being stored online. The development of storage technologies and computing resources, which are reasonably priced, provide more storage on demand, and are ubiquitously located, became inevitable. Cloud computing is the product of such technological development. In simple terms, cloud computing services provide resources (like a computer, storage, network, etc.) to organizations on a lease and on-demand basis. It helps various organizations to increase affordability and availability. Owing to the potential cloud computing services hold, various enterprises- large, medium and small, as well as individuals, have stepped up and made use of these services to the maximum extent possible. [1] However, increased reliance on the Internet also has a dark side, i.e. cyber security concerns.

Cloud computing services are peculiar in the following ways-

  1. It provides on-demand self-service, i.e. users can avail and manage the resources automatically;
  2. It provides ubiquitous network access, which helps in delivering the resources to heterogeneous users located in different parts of the world;
  3. It provides the option to scale up and down the resources based on the user’s needs. This feature had proved to be very helpful in times of COVID-19 when on the one hand, few users scaled up the resources owing to the increased dependence on technology and work from home measures, and on the other hand, few others (primarily small entities) scaled down the resources because of lack of financial capability to afford the same;
  4. It provides a pay-as-you-go service, i.e. the users spend based on consumption. 

Learn about Information Security, Privacy and Data Protection with Enhelion’s Online Law firm certified Course! 

There is no doubt that cloud computing will enable further technological changes in the future. However, increased reliance on the Internet also has a dark side, i.e. cyber security concerns. Cloud computing has various issues, like privacy and security concerns. Since most of the data is stored in the cloud, any breach into the network implies firstly, breach of cyber security measures and secondly, jeopardizing the privacy of the individuals whose data is stored. Data breaches resulting from cloud misconfiguration led to a loss of nearly $3.18 trillion to businesses in 2019. [2] Furthermore, increased reliance on technology and cloud services during the COVID-19 pandemic also increased reliance on technology and cloud services has privacy and security implications attached to it. 

Cloud computing services are also often victims of malware infections. Distributed Denial of Service (DDoS) attack is the most common threat wherein a large volume of traffic is sent to a web-based application, leading to the crashing of servers. Botnets are also emerging as one of the most severe threats to cloud security as they provide a distributed platform for major illegal activities in the cloud.

Learn about Information Security, Privacy and Data Protection with Enhelion’s Online Law firm certified Course! 

Insecure Application user interfaces (APIs) also pose a cybersecurity challenge. APIs are the primary tools that enable interaction with cloud storage systems. Generally, they are used by the staff of an entity that uses cloud services and the staff of the cloud service provider. It is pertinent to note that many APIs are still vulnerable, which gives the cloud service provider an undue level of access to the data. For example, in March 2021, we found that Facebook stored the passwords of its users in plain text instead of encrypted text, which could be read by any staff within the organization. [3]

Cyber forensic tools can be used to address the challenge of cyber security posed by the use of cloud computing services. Cyber forensics help identify the offender, procure the required evidence and prosecute him. However, the use of cyber forensics in cloud computing services per se poses several challenges[4] owing to the nature of these services. 

Learn about Information Security, Privacy and Data Protection with Enhelion’s Online Law firm certified Course! 

Firstly, traditional cyber forensics methodology requires turning off the device and making an image of the hard drives. However, this methodology is not a viable option in the present time as entities are entirely dependent on cloud computing services, which act as their servers. Since cloud computing is not something that can be turned off by switching off the device, the traditional cyber forensics methodology becomes futile in the case of cloud computing. 

Secondly, cyber forensics uses the provenance technique to trace life changes and data transformation. However, such technology becomes futile in cloud computing, where the infrastructure is very complex to trace the originator of the data, the person who modified it and when it was modified. 

Learn about Information Security, Privacy and Data Protection with Enhelion’s Online Law firm certified Course! 

Thirdly, since the ‘cloud’ in ‘cloud computing’ signifies cyberspace, it is believed that the data in the cloud is stored in cyberspace. However, the providers of cloud computing services locate their services in various physical locations. Therefore, to procure electronic evidence, it becomes challenging to access such data due to its geographic distribution and the subsequent necessity of complying with the legal requirement of such jurisdictions. 

Fourthly, specific file systems used in the cloud could be redesigned, customized or specifically created to cater to the users’ needs. Traditional cyber forensics methodologies fail to retrieve data from such files as their structure is unknown to anyone other than the cloud computing providers. 

Learn about Information Security, Privacy and Data Protection with Enhelion’s Online Law firm certified Course! 

Lastly, since cloud computing services hold an enormous amount of data, it becomes difficult to retrieve a particular data without carrying out a mass data analysis using data mining technology. Such technology is not a part of the traditional cyber forensics methodologies. 

Therefore, the architecture and model of cloud computing makes it more complex to retrieve evidence using traditional cyber forensic tools. In such a situation, the development of newer devices to cater to the specific challenges posed by cloud computing becomes a necessity. 

  [1] Julian Jang, Surya Nepal & Y Jay Guo, Cybersecurity threats in cloud computing, 1(1) Australian Journal of Telecommunications and the Digital Economy 4.2., (2013). 

[2] Hashedout, https://www.thesslstore.com/blog/cloud-security-5-serious-emerging-cloud-computing-threats-to-avoid/ (last visited May 8, 2021). 

[3] the Tech Republic, https://www.techrepublic.com/article/facebook-data-privacy-scandal-a-cheat-sheet/ (last visited May 8, 2021).

[4] Pedro Ramos Brandao, Computer forensics in Cloud Computing Systems, 1(1) BirEx 71, (2019). 

Categories
Blog

Defamation in Cyberspace

By Aishwarya Ganesan

In the era of the Cyber World, the Internet provides Individuals an equal opportunity to access data/ information; and with the high usage of technology, misuse of the cyberspace amplified. As the uses and applications of the technology develop, understanding of the technology grows.

With the growth in the extensive usage of social media, cyberspace has provided Individuals around the globe a wide platform to express their views. But should this electronic media be an arena to disrepute anyone?

ELEMENTS OF DEFAMATION

  • Plaintiff to prove publication of the defamatory statement, and that it refers to the Plaintiff
  • Prove that the Statement is defamatory
  • The said statement must be false and untrue and must be made with malicious intent

 

However if the statement is true and is made in Good faith and in Public interest, it fails from being a defamatory statement.

The Indian Penal Code solely talks of defamation.

Section 499 IPC: Whoever, by words either spoken or intended to be read, or by signs or by visible representations, makes or publishes any imputation concerning any person intending to harm, or knowing or having reason to believe that such imputation will harm, the reputation of such person, is said, except in the cases hereinafter expected, to defame that person. Explanation 2.— It may amount to defamation to make an imputation concerning a company or an association or collection of persons as such.

Section 500 lays down the punishment in such cases:

Whoever defames another shall be punished with simple imprisonment for a term, which may extend to two years, or with fine, or with both.

Can a company be held responsible for its employees’ actions? The test that determines this is whether the actions were suited to the benefits of the company, the employee would be held vicariously liable if he were promoting his own interests. India is not yet a signatory to the Council of Europe’s Convention on Cyber Crime, formulated by the EU, globally; around 43 nations have signed this treaty addressing the issues of cross-border terrorism.

Asia’s first cyber Defamation case was filed in India, in the case of SMC Numatics Ltd. v. Jogesh Kwatra. Defamatory e-mails were said to be sent by the defendant to the top management of SMC Numatics, who has, since been retrained from communicating with the Plaintiff. This order of the Delhi High Court holds extensive significance since it was the first time an Indian Court recognised the issue of Cyber defamation, and took action against it.

Section 66A of the IT Act, 2000: If any person sends by means of a computer resource or a communication any content which is grossly offensive or has a menacing character or which is not true but is sent to create nuisance, annoyance, criminal intimidation, hatred or ill will etc shall be imprisoned for an imprisonment term which may be up to two years combined with a fine. This section has been struck down; however a few other sections have been amended and added to curb issues relating to Cyber Defamation.

Section 68(A) has been proposed for providing modes and methods for encryption for secure use of the electronic medium. This principle has been proposed for safer usage of the electronic medium. Section 69, has been amended to take care of the concerns of the Ministry of Home Affairs regarding the safety, sovereignty and integrity of India and further preventing stimulation to the commission of any cognizable offence. This provision relates to the authority/power to issue instructions for interception or monitoring or decryption of any information through any computer resource, which stands rightfully amended.

Section 67 of the Act is amended to diminish the term of imprisonment for publishing or transmitting obscene material in electronic form to three years from five years and there is an increase in the fine thereof from Indian Rupees 100,000 (approximately USD 2000) to Indian Rupees 500,000 (approximately USD 10,000). A series of new sections have been inserted as Sections 67 A to 67C. While Sections 67 A and B insert penal provisions with respect of offenses of publishing or broadcasting of material containing sexually explicit act and child pornography in electronic form, section 67C deals with the obligation of an intermediary to preserve and retain such information as may be specified for such duration and in such manner and format as the central government may prescribe.

Today appreciation of the need for legislation and what is required in terms of its structure and content has changed