Security Threats in Indian Cyberspace by Social Media and Cyberhoaxes

This study examines the proliferation of hoaxes and hate speech through websites and social media in India. Such provocative content utilizes sectarian issues to attack its creators' political opponents. This study finds that hate has been politicized and have been commodified, both for economic and political interests, in Indian cyberspace. There has been a transformation from freedom of speech to freedom to hate, particularly on social networks. This proliferation of hoaxes, as a means of furthering specific political interests, may potentially threaten national security and stability. To overcome the threat posed by cyberhoaxes, the state, industry, and society must take an active role in protecting cyberspace.


I. INTRODUCTION
Hoaxes and fake news have become common in India, particularly on the social media. This was not the first time spread in India. For example, during the Prime ministerial election deliberately provocative fake news and emphasized issues to attack political opponents. have occurred in the United States, Germany, France, and Malaysia, where accurate news mixed with gossip and hate speech rapidly spread through social media. @ IJTSRD | Available Online @ www.ijtsrd.com | Volume -2 | Issue -4 | May-Jun 2018 This study examines the proliferation of hoaxes and social media in . Such provocative content utilizes sectarian issues to attack its creators' political opponents. This study finds that hate has been politicized and hoaxes have been commodified, both for economic and cyberspace. There has been a transformation from freedom of speech to freedom to hate, particularly on social media networks. This proliferation of hoaxes, as a means of thering specific political interests, may potentially threaten national security and stability. To overcome the threat posed by cyberhoaxes, the state, industry, and society must take an active role in protecting

III. THE PRODUCTION AND DISSEMINATION OF HOAXES IN INDIA
The Cyberhoaxes perpetrated by the five websites investigated in this researcher utilize a similar modus operandi. Desiring to criticize the government in power, the website administrators use cyberspace to voice their aspirations, holding that social media and microblogs do not offer them sufficient space to promote their interests. Visibility is a central aspect of public.
The desire for visibility and attention, not only from those being criticized but also from others, underlay administrators' decision to create websites where they began producing hoaxes. These websites lack clear information on their founders, and their "About Us" pages appear perfunctory or even deceptive. Information on these websites' organizational structures and addresses are often not included.
At their core, these hoax websites rely on the journalistic products of the mainstream media. In selecting specific issues, they observe mainstream media coverage. Issues with the potential for controversy and support the administrators' own interests (or can be used to attack their opponents) are identified and selected. The issues they select are modified by administrators using one or more of the techniques discussed below. First, facts may be exaggerated with fiction, particularly that which can be mobilized to promote tribal, religious, and racial tensions and hatred. Second, the substance of the story may remain unchanged, but be given a provocative and bombastic headline. Third, the main points of the coverage may be maintained, but presented in clear, direct, and provocative language. Fourth, the titles of photographs or illustrations may be changed to make them more provocative. Fifth, photographs or illustrations of incidents unrelated to that being covered may be used to suggest a connection and thereby provoke readers.
Aside from modifying coverage from the mainstream media, the administrators of these websites may also cover statements and opinions from politicians and commentators who share their vision. To do so, the administrators cultivate relations and friendships with such politicians and commentators, who are frequently opposed to existing government policy. Furthermore, these politicians and commentators are used as references or given space to voice their (antigovernment) opinions on the websites.
The fake news and hate speech produced by these websites are not journalistic products that follow the accuracy and accountability standards of the profession. However, the website administrators do not care that their content violates journalistic principles.

IV. PRODUCTION OF UNCERTAINTY: POLITICAL SYMBOLISM AND MISINFORMATION
As economic and political commodities, hoaxes represent an exchange of deceptive and inflammatory symbols. the use of such symbols in a political context is an element of political symbolism The proliferation of symbols, including their use and misuse, is intended to manipulate political discourse and public opinion, According to Edelman, symbols have taken an increasingly important role in politics. Political influence and power is no longer based on material and objective facts, but the mobilization of symbols. For example, political symbolism is rampant in political campaigns. argue that political practices in the digital media ecosystem emphasize the exploiting of various symbols for mass mobilization and manipulation.
In the practice of hoaxing, linguistic symbols (both verbal and visual) are used to construct certain views of the issues discussed. identifies two different types of symbols used in political practice symbolism: referential symbols and condensation symbols. Referential systems are those related to objective elements of certain situations and objects. These symbols are frequently used to legitimize specific political views and guide the masses towards a specific and shared understanding of a situation or object, such as statistics or budgets. Meanwhile, condensational symbols are those that create certain emotions and subjective reactions to a situation or object. Such symbols are capable of shaping people's imagination of a desired world, one quite different from the real world. It is such condensational symbols that are mobilized by cyberhoaxes in Indonesia. Nonetheless, according to Edelman, both types of symbols can be used to manipulate public discourse and public opinion about certain issues. This is onesided, intended to justify specific ideas and logics.
In cyberspace, political symbolism promotes specific simplified narratives and framings of certain situations and objects. The new media, which enables the consumption of information (and distraction), contributes importantly to this symbolization process. This can be seen, for example, in the use of clickbait, in which symbols (images) in cyberspace serve are provided as "keys" to exploring issues and problems. Through clickbait, overly simplified logics are brought into the digital ecosystem. The (over)simplification of narratives is common in new media, and consequently very few media users seek detailed information or seriously investigate the events and processes reported. Spaces for discussion and reflection disappear as access is accelerated. Events and processes are framed as nothing but headlines.

V. COMBATTING AND PREVENTING CYBERHOAXES
The production and dissemination of cyberhoaxes and hate speech are part of the politics of threat and designed by certain actors to promote certain interests. Hoaxes, as with cyber threats in general, are not material, nor do they cause direct physical harm to humans. Nonetheless, they have serious social effects. In other words, the cyberhoaxes that have become increasingly widespread in India have the potential to threaten national stability.
To combat cyberhoaxes, three different parties must work together: the state, market, and civil society. They must collaborate to address various strategic issues that threaten cybersecurity (in particular), as well as national security and stability in general. In the context of national authority, specific legal products must be prepared to provide stricter judicative sanctions. To provide cybersecurity in India, particularly against cyberhoaxes, it is possible to apply this latter concept, for example by regulating domain ownership and setting fines for platform providers. Furthermore, it is important to increase the capacity of the State's cyber troops.
As such, the Indian government must act to change those regulations it has enacted. The Indian government must transform the regulations applicable to the media platforms used to make hoaxes go viral. Thus far, India has not provided for any fines for them, relying solely on blocking mechanisms-even though forcing platforms such as Facebook and Google to pay large fines if they fail to remove fake news, hate speech, and hoaxes may serve to limit their spread on social media.

CONCLUSION
The creation and dissemination of cyberhoaxes in India is a deliberate practice intended to promote certain motives and interests. It is perpetrated by actors who seek to spread deceit and hate in the digital ecosystem. The proliferation of hoaxes in cyberspace indicates a shift from freedom of speech (facilitated by new media platforms) into freedom to hate, which is used to attack those opposed to them. The websites in this study use similar production patterns. To draw public attention, they mobilize rumors and tribal, religious, and racial sentiments. To popularize their websites, hoaxers use social media and networks to spread fake news and hate speech. The proliferation of hoaxes and hate speech in cyberspace threaten national security and stability.