7.1 When tech is weaponized

From cyber-warfare and the dark web to the use of artificial intelligence (AI) in autonomous weapons and hacking, the misuse of digital technologies threatens people and communities – often without our knowing.

Cyber-warfare involves using digital tools to attack critical infrastructure and systems, disrupt communication, and undermine peace and security. The dark web is a hidden part of the internet, inaccessible to conventional search engines. It can provide a platform for illicit activities like drug dealing and human trafficking. Hacking can be used to steal sensitive information. Autonomous weapons are changing the face of war. On an individual level, cyberbullying and online harassment can have serious effects on your wellbeing. The rise of powerful AI makes these risks all the more real, and creates new opportunities to turn digital tools into weapons.

In this session, we will look at how the web, artificial intelligence and digital devices can used for harm and destruction and what steps we can take to protect ourselves from the weaponization of digital resources.


Keywords


Outcomes

After this session you will be able to:

  • Describe some examples of the weaponization of digital resources and how this relates to digital justice.
  • Use new insights to advocate for increased accountability and transparency from governments and corporations to counter malicious use of digital tools and platforms.
  • Educate others in your organization and networks about the risks covered in this lesson.

Definitions

Cyber War


Cyber war is the use of digital technologies to launch attacks on computer systems, networks, and infrastructure with the intent to cause disruption, damage, or destruction. It can include a range of tactics, including hacking, malware deployment, and denial-of-service attacks, often carried out by state or non-state actors for political, economic, or military purposes. A notable example took place in 2010 with the Stuxnet computer worm (a type of malicious software that can replicate on its own) used to target nuclear energy sites in Iran. (Source: IEEE Spectrum. The IEEE is a global professional organization dedicated to advancing technology and establishing standards in engineering.)

Dark Web


The dark web is a hidden part of the internet. It is not indexed by traditional search engines and can only be accessed with special software. You may have heard of the dark web for its connection to activities like drug trafficking, weapons trading, and cybercrime. Due to its anonymity and security features it’s difficult for law enforcement agencies to monitor and regulate. While some uses of the dark web are legal, it is often where stolen data, weapons, and counterfeit currency and documents are sold. (Source: Norton, a leading cybersecurity company, known for its widely-used antivirus software.)

Autonomous Weapons


Autonomous weapons, also known as lethal autonomous weapons systems (LAWS), are weapons that use artificial intelligence to independently select and engage targets without human intervention. These weapons are being developed in dozens of countries around the world. They are the subject of fierce debate, with many civil society organizations joining forces to call for a United Nations treaty banning them. The Campaign to Stop Killer Robots warns that LAWS can reduce people to data points, lower the threshold for war, remove humans from important decision making, and expose people to deadly, unpredictable risks. (Source: The Campaign to Stop Killer Robots, an international coalition of more than 250 member organizations advocating for a treaty on autonomous weapons.)

Hacking


Hacking is unauthorized access, manipulation, or exploitation of computer systems, networks, or digital devices. It can be benign exploration or malicious attacks aimed at stealing data, disrupting services, or causing damage. Hackers may exploit vulnerabilities in software or hardware; they may also use malware to gain access to sensitive information or control over systems. Anonymous is a famous disruptive hacking group. They have declared cyberwar against a variety of hate groups, political institutions, media outlets, and championed causes in the name of justice. They have attacked the Ku Klux Klan, ISIS, child pornography, and the Pentagon. Anonymous has been responsible for a number of attacks against Russia following the 2022 invasion of Ukraine: they hacked RT (a Russian state-controlled international news television network) and the website of the Defence Ministry; they leaked emails, hacked into Russian TV channels, and showed uncensored footage from the war in Ukraine. (Source: NordVPN, a privately owned Lithuanian VPN service.)

Cyber Bullying


Cyberbullying is a form of online harassment and intimidation that involves using digital technologies such as social media, messaging apps, or email to target and harass individuals. It can include sending threatening messages, spreading rumors, or posting humiliating content about other people. Cyberbullying can have serious consequences for the health and wellbeing of its victims. Research across 44 countries shows that cyberbulling among youth is on the rise, with around one out of six school-aged children reporting being bullied online. (Source: World Health Organization, an agency of the United Nations.)


Onward

All right, now you have the basics on the weaponization of digital resources. The next step takes you a little further, introducing some expert content and insightful case studies from around the world.