Introduction
In the 21st century, the battlefield has expanded beyond physical domains to encompass the very fabric of information. While traditional warfare relied on military might and territorial conquest, contemporary geopolitics witnesses the insidious rise of information as a potent weapon. The weaponisation of information, a multifaceted strategy, involves the deliberate manipulation and dissemination of true or false information to achieve strategic objectives. Information itself can be used to subdue the enemy without fighting.
Russian military leader General Valery Gerasimov, Chief of the General Staff, for instance, stressed the significance of non-kinetic actions, particularly information campaigns, in contemporary conflict. In 2017, Gerasimov suggested that future wars might rely solely on these non-kinetic methods, indicating an even greater role for influence through information. According to General Vladimir Slipchenko, Vice President of the Russian Academy of Military Sciences in 1998, information possesses the power of weaponry, similar to missiles, bombs, and torpedoes.
This phenomenon, often termed “information warfare,” encompasses a range of tactics, from spreading disinformation and propaganda to cyberattacks targeting critical infrastructure. It undermines trust, erodes social cohesion, and destabilises political systems, posing a significant threat to global security. The digital revolution has amplified the reach and impact of information warfare. The internet and social media platforms, while fostering connectivity, have also become fertile grounds for the rapid dissemination of manipulated content. State and non-state actors alike exploit these platforms to spread propaganda, incite discord, and influence public opinion. The speed and scale of information dissemination in the digital age make it challenging to discern truth from falsehood, creating a climate of uncertainty and distrust.
This article delves into the intricacies of information weaponisation in geopolitics, exploring its mechanisms, impacts, and potential countermeasures.
Mechanisms of Information Weaponisation
Information weaponisation employs a variety of tactics, often in combination, to achieve its objectives. One prominent method is the dissemination of disinformation—intentionally false or misleading information designed to deceive. This can take the form of fabricated news stories, manipulated images and videos (deepfakes), and targeted propaganda campaigns. Disinformation aims to sow confusion, undermine trust in institutions, and manipulate public opinion.
For instance, days before the 2024 polls in Ghana, several audio and video content purported to be secret recordings of conversations held by the presidential candidates of the two main political parties, John Mahama and Dr. Mahamudu Bawumia, emerged online. The audios suggested that in private conversations, both candidates had incited their followers to engage in violent acts and contribute to ongoing chieftaincy and ethnic conflicts. One of the audios, in particular, faked a conversation between John Mahama and an electoral officer about rigging elections in the stronghold of the incumbent government. Another TikTok audio allegedly featured Dr. Mahamudu Bawumia calling Ghanaians weak-minded and urging his supporters to convince voters with more promises (Fact Check Ghana, 2024).
Another crucial tactic is the use of cyberattacks to disrupt critical infrastructure and steal sensitive information. These attacks can target government agencies, financial institutions, and energy grids, causing widespread disruption and economic damage. Cyber espionage—the clandestine acquisition of sensitive information—is also a key component of information warfare. State-sponsored hackers may target intellectual property, classified documents, and personal data to gain strategic advantage. The Stuxnet worm, a sophisticated computer virus believed to be developed by the US and Israel, targeted Iran’s nuclear facilities, demonstrating the destructive potential of cyberattacks (Langner, 2011).
A typical example of a cyber-attack is a data breach, an event in which unauthorised individuals access sensitive or confidential information. Over the years, there have been growing concerns over data breaches in Ghana. According to SurfShark, Ghana was ranked ninth among the ten African countries with the most data breaches in 2024. The country recorded a 997% breach increase in the first quarter of 2024 compared to the fourth quarter of 2023, resulting in a total of 1.2 million breaches. Ghana has experienced over four million breaches since 2004 and is ranked 92nd globally among countries with the most data breaches (Toptech, 2024).
Algorithms are also used as a tactic. Cathy O’Neil, in her book Weapons of Math Destruction, frequently likens the algorithms organisations use to collect personal data to weapons of mass destruction. Similar to a nuclear bomb, these “weapons of math destruction” misuse mathematical formulas to create widespread harm (O’Neil, 2016). These algorithms, which rely on large amounts of data, often contain human biases. As a result, they can be damaging by exploiting people, such as through specific political advertisements, or by unfairly treating them negatively, such as automatically denying opportunities based on gender, ethnicity, or socioeconomic status.
By introducing the concept of “Weapons of Math Destruction,” O’Neil emphasises the significant potential for harm these mathematical tools pose to individuals and society. She argues that they affect important aspects of everyday life, interfere with political processes and democracy, and worsen existing social inequalities.
AI and the media have also been used as mediums to spread false news. The Ghana Fact-checking Coalition found that nearly 90% of the false claims they investigated originated on social media. They specifically identified X, Facebook, and WhatsApp as the primary platforms for the dissemination of this misinformation.
Apart from fake news involving political activities, there is also a growing connection between cyber threats and political processes, such as the reported cyber-attack targeting the electronic transmission system of Ghana’s Electoral Commission (EC) during the 2016 elections. This incident is believed to have compelled the EC to rely solely on the manual method of transmitting election results.
Propaganda remains a classic tool of information weaponisation. While traditional propaganda relied on mass media like radio and television, contemporary propaganda leverages social media and online platforms to reach targeted audiences. Algorithms and data analytics enable the dissemination of tailored messages, amplifying their impact. State-sponsored media outlets and troll farms often engage in coordinated propaganda campaigns, spreading narratives that align with their strategic objectives. The use of bots and automated accounts further amplifies the reach of propaganda, creating the illusion of widespread support.
Impacts on Geopolitics
The weaponisation of information has profound implications for geopolitics. It erodes trust in democratic institutions, undermines electoral processes, and exacerbates social divisions. Disinformation campaigns can manipulate public opinion, influence policy decisions, and destabilise political systems. The spread of false narratives can incite violence and fuel social unrest, as seen in the Rohingya crisis, where online disinformation contributed to ethnic cleansing (Mozur, 2018).
Information warfare also impacts international relations. It can escalate tensions between states, erode trust in diplomatic channels, and undermine international cooperation. Cyber-attacks can disrupt critical infrastructure, cause economic damage, and compromise national security. The use of disinformation to manipulate public opinion can also undermine international efforts to address global challenges such as climate change and pandemics. The COVID-19 pandemic saw a massive spread of misinformation regarding the virus’s origins and treatments, causing severe damage to global health initiatives.
The weaponisation of information also affects the concept of sovereignty. Traditionally, sovereignty was defined in terms of territorial control. However, in the digital age, states face challenges to their sovereignty in the information domain. Foreign actors can manipulate information flows, influence public opinion, and disrupt critical infrastructure without physically crossing borders. This erosion of informational sovereignty poses a significant challenge to national security.
Countermeasures and Challenges
Addressing the weaponisation of information requires a multifaceted approach involving governments, technology companies, civil society organisations, and individuals. Governments need to invest in cybersecurity infrastructure, develop legal frameworks to combat disinformation, and promote media literacy. Technology companies have a responsibility to address the spread of disinformation on their platforms by implementing content moderation policies, fact-checking initiatives, and algorithmic transparency.
Civil society organisations play a crucial role in monitoring and debunking disinformation, promoting media literacy, and advocating for transparency. Fact-checking organisations such as Ghana Fact, Dubawa, and Fact Check Ghana play a vital role in debunking false narratives. Educational institutions need to incorporate media literacy into their curricula, equipping individuals with the skills to critically evaluate information.
However, implementing effective countermeasures faces significant challenges. Balancing freedom of expression with the need to combat disinformation is a complex issue. Overly restrictive measures could stifle legitimate speech and undermine democratic values. The rapid evolution of technology also makes it challenging to keep pace with the tactics of information warfare. Developing effective countermeasures requires ongoing research, collaboration, and adaptation.
The Future of Information Warfare
The weaponisation of information is likely to become increasingly sophisticated and pervasive in the future. Advancements in artificial intelligence (AI) and deep learning will enable the creation of more realistic deepfakes and automated disinformation campaigns. The proliferation of internet-connected devices will expand the attack surface for cyberattacks. The use of social media and online platforms will continue to be a key vector for information warfare.
Addressing this evolving threat requires a proactive and collaborative approach. Governments, technology companies, civil society organisations, and individuals need to work together to develop effective countermeasures. International cooperation is also essential to address the transnational nature of information warfare. Building resilience against disinformation and promoting media literacy are crucial steps in safeguarding democratic institutions and fostering global security.
Conclusion
The weaponisation of information in geopolitics represents a significant threat to global security. It undermines trust, erodes social cohesion, and destabilises political systems. The digital revolution has amplified the reach and impact of information warfare, making it challenging to discern truth from falsehood. Addressing this challenge requires a multifaceted approach involving governments, technology companies, civil society organisations, and individuals. By investing in cybersecurity, promoting media literacy, and fostering international cooperation, we can build resilience against the weaponisation of information and safeguard democratic values. The future of geopolitics will be shaped by our ability to navigate the complex challenges of the information age.
References
- O’Neils C. (2016, Sept 6). Weapons of Math Destruction: How Big Data Increases Inequality and threatens Democrcy. www.blinklist.com
- Langner, R. (2011). Stuxnet: dissecting a cyberweapon. IEEE security & privacy, 9(3), 49-51.
- Mozur, P. (2018, October 15). A genocide incited on Facebook, with posts from Myanmar’s military. The New York Times.
- Fact Check Ghana. (2024, Dec 5). www.fact-checkghana.com
- Anewuoh, J. (2024 Oct 16). Data Breaches in Ghana & Africa. www.toptechgh.com