Challenges of the cyber age

well-intentioned social media companies may be, they generate an explosion of information which may not be factual

The writer is a retired lieutenant general of the Pakistan Army and a former federal secretary. He has also served as chairman of the Pakistan Ordnance Factories Board

The phenomenal mushrooming of electronic platforms and digital companies based on internet services are a dominant feature of the modern world. These ‘platforms’ such as Facebook, Twitter and Google have become the pathways to build social relations and express views especially for the younger generation. It is not surprising that their impact on the global economy has increased manifold as they play a major role in influencing world stock markets and global commodity prices. These developments have contributed enormously to bringing the world closer and improve our understanding of the universe. But in many respects these have been equally disruptive.

A classic case is the way the use of these platforms poses a challenge to democracies worldwide. However, well-intentioned the social media companies may be, they have generated an explosion of information which at times may not be factual. This has given rise to confusion, invaded privacy of individuals and deprived states of their monopoly of information. In certain cases even threatening national security seriously. Their business model is based on obtaining detailed information about individuals and making it available to persons, groups, politicians and governments that may well use it for useful purposes like promoting business, doing welfare work or advancing their political programmes. Alternatively, it could be used to subvert states, compromise individuals or advertently hack accounts or peer into sensitive or secret information. These revolutionary technological developments are thus a two-edged weapon for it can serve humanity or could be disruptive. This phenomenon of dual use of technology is not unique and is true in other cases as well as we have witnessed over the years. Take for example nuclear energy, it is used for producing electricity, propelling nuclear submarines or applied in the medical field for treatment of cancer patients and certain specific diseases. On the contrary, its energy when used as a weapon could be most destructive that could destroy the world.

Similarly, in communication technologies an app on the smart phone could track movements of individuals or vehicles. Indeed these could be a blessing for a mountaineer climbing the Everest or K-2 or for your car to be protected against theft. But it could equally be a menace if it started acting as a big brother and tracking movements and invading one’s privacy. Or if it is being used to develop a mass of information about your daily activities that is sold to advertising companies and business houses so that they target the right consumers.

Another major challenge that social media networks are facing is how to differentiate between genuine and fake news. Although, on their own and especially after the US Senate took up this matter with Facebook management they have taken several steps and employed dedicated teams to monitor and remove fake content as early as possible. Despite these earnest steps there are limits to the extent that fake news can be removed.

By acquiring a sea of information about individuals as related to their personal habits and other pertinent data through normal channels or by hacking mega commercial companies social media networks are becoming powerful monopolistic entities that are able to influence policies and even challenge the state.

Those involved in cybercrime collect public records and databases like domicile, date of birth, etc, and where necessary use search engines to advance their ill-motivated projects.


On the other side, there are school students so adaptable to modern technologies that there have been cases when for fun or with serious intent, they penetrated electronically-protected defence establishments making a mockery of the sophisticated defences. Another area of abuse is the hacking of bank accounts and credit cards. Banks and financial institutions are taking several measures to further tighten electronic security of their transactions and it seems to be a perpetual challenge. There have been cases where millions of dollars have been transferred in fake accounts compelling banks to take further preventive measures.

There is also the question of ensuring that immoral and indecent material is blocked. The major challenge is how to prevent its access to young children who now are a major user of the internet. Internet companies should provide certain provisions whereby their access is regulated. To guard against cybercrimes it becomes necessary for the government to develop greater awareness among the public on these matters. Unfortunately, in Pakistan there has been little effort made in this direction. The irony is whereas technology has clearly contributed to making our lives more interesting and meaningful, it has introduced these major problems. In essence, the great challenge of the present cyber age is how to balance between requirements of society’s right to security as against free access to information. And the dilemma as to whom and as to what extent information should be controlled at the private or public level. Moreover, what is offensive material to some is perfectly normal for the other. This particularly is relevant in issues related to religion and politics. Regrettably, in the West, ridiculing religion is not considered a crime.

In Pakistan, the government recently considered it advisable to block news about civil society protests and movements that were critical of their policies or damaging their reputation. This by international standards is certainly misuse of the system and against the norms of democracy.

In any case, internet users have become savvy and they find many ways of circumventing these barriers.

The European Union has adopted a legislation governing the conduct and operation of social networks that seems to be working satisfactorily. It is likely that the US may introduce similar legislation. The EU model with suitable modifications could be a guide for other Asian and Muslim nations, including Pakistan, to adopt. Indeed parliament is the appropriate forum for reforms in this sector as former Senate chairman Raza Rabbani has recommended. They would need the support of IT experts to guide them in improving the present legislation to cope with these emerging threats.

Published in The Express Tribune, December 19th, 2018.

Load Next Story