Publishing Disclaimer: In all of its publications and products, NCO Journal presents professional information. However, the views expressed therein are those of the authors and are not necessarily those of the Army University, the Department of the US Army, or any other agency of the US Government.

The Digital Domain of Leadership

By Staff Sgt. Oren Hammerquist

2nd Cavalry Regiment, Rose Barracks, Germany

May 23, 2018

Download the PDF

The digital domain of leadership

Here is a question which is sure to start an argument: Should you "friend" your Soldiers on social media?

While some may say yes while others vehemently no, a more complicated question is how should leaders deal with social networking in the Army. Social networking has changed our world, and Army leaders owe it to Soldiers to guide the way social networking is changing the force. The pitfalls and benefits of the internet mean noncommissioned officers should actively monitor their Soldiers' digital presence.

The Army Criminal Investigation Division reportedly receives hundreds of reports of Soldiers caught in online fraud claims ranging from fake Soldiers asking for money, to probes for sensitive information, to sextortion (threat to release embarrassing images unless the subject pays or performs favors).1

The majority of those joining the military today cannot recall when the internet did not exist, but we as humans do not have the instincts to function in an online world.2 Many find out the hard way that the internet's perceived anonymity, which contributes to much online misconduct,3 is false security.

Going Viral

We cannot predict when a careless or thoughtless (and often ignorant) statement will go "viral, after which replies often progress from friendly jokes and good-natured teasing to anger and hate in reaction to even the most innocuous statements. A tweeted joke giving the age of the Earth as 2,014 years old gained 16,000 retweets in 24 hours, some of which told the original poster to "kill yourself."4 A joke regarding Pearl Harbor survivors during a Carson Daly interview quickly escalated to direct, personal attacks on the interviewee.5

Military examples are sadly numerous. In 2014, U.S. Marines burning bodies and posing with a skeleton set off a controversy.6 Photos of more than a dozen Airmen, including at least one senior NCO, posing with a casket sparked outrage in 2011.7 Though clearly unprofessional conduct, consider the disproportionate anger in response to a video of two Marines throwing a puppy from a cliff in 2007.8 One of the most surprising is perhaps Pfc. Tariqka Sheffrey's posting. Sheffrey posted a photo of herself "hiding, so I don't have to salute the 1700 flag".9 This sparked outrage, not only from "expert" journalists on military customs and the Uniform Code of Military Justice but also the public. Within a day, agitators downloaded her image and created several Twitter accounts in her name where they posted increasingly anti-US sentiments.10 NCOs and leaders should recognize and understand how each of these stories gained equal if not greater publicity than various scandals giving the military a proverbial "black eye" during the wars in Iraq and Afghanistan.

Improved search algorithms can be a threat to military operations as illustrated by the Justine Sacco incident. This journalist posted a racially insensitive comment (intended as a joke) about AIDS before an African trip and then turned her phone off.11 At the halfway point of her flight, the internet began giving her flight number and arrival time to anyone searching for Justine Sacco.12 By the time her plane landed, more than 20 million people had seen the "hashtag" #hasjustinelandedyet, and the number of views at the end of 24 hours topped 60 million.13 This incident also turned dark as photos of her family circulated and her nephews began getting rape threats via telephone.14 Imagine how harmful this level of information could prove to a military operation.

Things You Would Not Say In Public

Perceived anonymity and lack of censorship raise concerns involving radicalization of potential insider threats and the proliferation of socially unacceptable beliefs. The internet often echoes rather than causes radicalization, fetishism, racism, or any twisted need a human can conceive because it allows for instant and seemingly benign contact with like-minded persons.15 One example is Maj. Nadal Hasan, who used email to contact radical cleric Anwar al-Awlaki, months before committing the Fort Hood shootings.16

The internet acts as an echo chamber for more than radicalization. Data analysis shows a shocking, unprecedented spike in internet searches containing the "N-word" in November 2008, coinciding with President Obama's election.17 The day after the election, roughly one percent of searches for "Obama" also contained either the "N-word" or "KKK."18 Presumably, the searchers would not make similar statements publicly and hesitate to state them on social media, but both of these actions prove unnecessary on the internet. Like-minded groups and pages already exist. The internet allows socially unacceptable views to find an audience, allowing individuals to rationalize their views.19

What causes people to conduct such antisocial searches? Dr. Mary Aiken, a cyberpsychologist and adjunct associate professor at University College Dublin, Geary Institute for Public Policy, Dublin, Ireland, calls this the online disinhibition effect, or ODE.20 Simply put, the structure of the internet causes people to be "bolder, less inhibited, and judgment-impaired almost as if they were drunk."21 This behavior leads to online amplification and can lead to greater generosity, amplification of anti-social ideas, or outright cruelty.22

The internet and social media are pervasive in society at large. People check their smartphones an average of 200 times per day, or—depending on how much sleep you get—every five to seven minutes.23 Facebook reported 4.5 billion "likes" per day in 201324 when there were approximately 1.1 billion users25

Without email, most units accomplish very little staff work, and online training is a requirement of the Noncommissioned Officer Professional Development System. Some Army units now conduct a great deal of business via online platforms. We, as leaders, must take great care when using social media and the internet.

Living and Working "In" the Internet

Leaders should treat "cyberspace" as an actual location.26 If we knew our Soldiers attended radical rallies or events, we would intervene to stop their participation. Online misconduct is punishable under articles 88, 89, 91, 133 and 134 of the UCMJ,27 which cover contempt toward officials, disrespect toward superiors, insubordinate conduct toward superiors, conduct unbecoming, and actions ruled to be detrimental to good order and discipline. Leaders who fail to address such activity could be subject to UCMJ action as well.

It is a good idea to "friend" your Soldiers on social media. The terminology here seems problematic. NCOs should not be their Soldiers' friend but their leader; NCOs may not fraternize with their Soldiers. However, the "add friend" button is not equal to fraternization or friendship. Naturally, special relationships—trainee/Drill Sergeant, trainee/instructor, and probably recruit/recruiter—are in a special class. Nor does it make sense for the first sergeant to "friend" all his Soldiers although keeping an eye on his or her NCOs is advisable. NCOs should "friend" their Soldiers and follow their Twitter feeds, read or at least skim their blog posts regularly, and otherwise monitor online activity for several significant reasons not listed above.

Remember Who's Watching: First, the major contributing factors to ODE are perceived anonymity and lack of authority.28 The examples above, such as Sheffrey,  prove online anonymity is limited at best, and knowing that one's NCO will see what one posts may positively alter online posting habits, resulting in a more professional image and eliminate operations security violations. Naturally, Soldiers can block their NCOs and post the same content, but at least they have to consider their audience before clicking "post." This practice works both ways: NCOs who know their Soldiers may see their content will be more careful what they post.

Involved Leadership: Second, Soldiers who post their interests online may never mention them at work. Leaders may identify troubling behavior or behavior that puts Soldiers at risk for radicalization, targeting by predators, or insider threats. Conversely, knowing one's Soldier likes a particular sport, a specific style of music, or other personal details supports involved leadership. This approach also allows leaders to gain a better knowledge of a Soldier's family, which shows Soldiers you care. NCOs must inspect where their Soldiers live both online and offline.

People Tell More Secrets to Strangers: Third, people are more likely to share secrets with total strangers than with close acquaintances or friends.29 Essentially, users substitute anonymity for the same safety: people treat the web as a stranger while sharing highly personal stories of sexual assault or suicidal ideation. The story of the viral "#MeToo" hashtag serves as a sobering illustration of this behavior. When actress Alyssa Milano shared a Me Too movement post, she received more than 60,000 comments, including many stories of women enduring sexual assault. One anonymous poster said her assaulter "liked" her post.30

Closely related to this are numerous stories of suicide notes posted to social media. A trend towards online suicide notes, real ones along with those written as simple cries for help, is sadly on the rise. The methods we invented in the 1990s to help people considering suicide, such as suicide hotlines, may soon become obsolete, and what will replace them? In the military, direct intervention is the best option but only if leaders and friends monitor the online lives of their brothers and sisters in arms.

Your Soldiers' Professional Image: Fourth, careful consideration of social media presence supports the Soldier for Life concept. The Army only has a Soldier for a finite time. Then, that Soldier returns to the civilian work sector where social media increasingly influences hiring decisions.31 The Guardian, an online news agency, gives several specific pieces of advice to avoid embarrassing situations in the future: refrain from rants and outbursts, remember every "like" leaves a permanent footprint, and ensure your photos display a professional image.32 Such practices should be common sense; however, if that were the case, there would not be a plethora of scholarly articles and other online literature addressing the subject.33 This serves as another example of the human failure to adapt to our new world.

Some Soldiers may feel their privacy settings insulate them; The Guardian reminds us this is by no means a sure thing.34 Aside from the possibility of your potential employer knowing one of your friends, perhaps even more likely with former Soldiers who tend to seek similar jobs, remember the Sacco story. She did not need to post her flight number; the internet did it for her.

The Operational Environment: The final reason for NCO involvement in social media does not deal with Soldier conduct. The 7th Army Training Command, which runs the Joint Multinational Readiness Center at Hohenfels Training Area in Germany, incorporates notional social media into the operating environment of all training rotations. Though these may be mistakes, issues can and do arise, both in training and real life, from the information we did not know we broadcast.

Besides the operational environment, we must consider OPSEC compromises, which can come from unsuspected sources. Turning off cookies and location services is not always enough. Websites can and do record both the domain and search arguments bringing you to their site even if you have cookies turned off. Even the citations in the endnotes of this article reveal more about the author than I might intend. To demonstrate, I performed an internet search with the following terms: "jobs interviews and social media presence." Even with personally identifiable information removed, the resulting search URL still shows I speak English, and I am on a German internet server.

The effect social media can have on military operations is not theoretical, but drawn from lessons learned in Iraq and Afghanistan. Unit mistakes in JMRC, ranging from poor interviews with key leaders to enemy information operations, impact the mission just as they would in the real world. Leaders cannot underestimate the impact social media has on the operational environment, and active involvement in social media improves understanding of these processes.

Conclusion

Like a pound of C4, the internet is both highly useful in the right hands and highly dangerous in the wrong hands. The smartphone in your pocket may weighs less than the C4, but it can cause far more wide-reaching damage. To ensure Soldiers respect the danger and power of the internet, we should treat it with the same respect as C4. People typically act differently online than they do in "real life" due to perceived anonymity and lack of accountability: both of which provide a false sense of security. Leaders owe it to themselves, their Soldiers, and the military to treat cyberspace as a real place.

Notes:

  1. U.S. Army Social Media website, "Scams," accessed March 28, 2018, https://www.army.mil/socialmedia/scams/.
  2. Mary Aiken, The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online (Spiegel & Grau: New York, 2016), 5.
  3. Mary Aiken, The Cyber Effect, 5, 22, 139.
  4. Christian Rudder, Dataclysm: Who We Are (When We Think No One's Looking) (Crown Publishers: New York, 2014), 139.
  5. Christian Rudder, Dataclysm, 140 paragraph 7.
  6. Helen Pow, "Shocking Photos Emerge Showing U.S. Marines Burning Bodies of Iraqi Insurgents, Posting for Pictures with Skeletons, and Even an Enemy Soldier's Remains Being Eaten by a Dog as Pentagon Launches Probe," The Daily Mail website, January 14, 2014, accessed March 28, 2018, http://www.dailymail.co.uk/news/article-2539906/Shocking-photos-emerge-showing-U-S-Marines-burning-bodies-Iraqi-insurgents-posing-pictures-skeletons-enemy-soldiers-remains-eaten-dog-Pentagon-launches-probe.html.
  7. Philip Caulfield, "Picture of Air Force Airmen Fooling Around with Casket Sparks Investigation," New York Daily News website, December 15, 2011, accessed March 28, 2018, http://www.nydailynews.com/news/national/picture-airmen-fooling-casket-sparks-investigation-article-1.992178.
  8. Mike Mount, "Puppy-throwing Marine is Removed from Corps," CNN.com, June 13, 2008, accessed March 28, 2018, http://edition.cnn.com/2008/US/06/12/marine.puppy/.
  9. Eric Meyer, "Selfies Gone Wrong: The Tariqka Sheffey story," Unwashed Advocate website, February 28, 2014, accessed March 28, 2018, https://unwashedadvocate.com/2014/02/28/selfies-gone-wrong-the-tariqka-sheffey-story/.
  10. Eric Meyer, "Selfies Gone Wrong."
  11. Christian Rudder, Dataclysm, 141.
  12. Christian Rudder, Dataclysm, 141.
  13. Christian Rudder, Dataclysm, 143.
  14. Christian Rudder, Dataclysm, 143.
  15. Mary Aiken, The Cyber Effect, 26.
  16. Daniel Schorr, "Was Internet Complicit in Fort Hood Shooting?" National Public Radio website, transcript from All Things Considered radio program, November 18, 2009, accessed March 28, 2018, https://www.npr.org/templates/story/story.php?storyId=120545573.
  17. Christian Rudder, Dataclysm, 129.
  18. Christian Rudder, Dataclysm, 130.
  19. Mary Aiken, The Cyber Effect, 26.
  20. Mary Aiken, The Cyber Effect, 5.
  21. Mary Aiken, The Cyber Effect, 5.
  22. Mary Aiken, The Cyber Effect, 5.
  23. Mary Aiken, The Cyber Effect, 54.
  24. Christian Rudder, Dataclysm, 225.
  25. The Associated Press, "Number of Active Users at Facebook Over the Years," Yahoo.com, May 1, 2013, accessed March 28, 2018, https://www.yahoo.com/news/number-active-users-facebook-over-230449748.html.
  26. Mary Aiken, The Cyber Effect, 9-12.
  27. Cheryl Rodewig, "Social media misuse punishable under UCMJ" Army.mil February 9, 2012 https://www.army.mil/article/73367/social_media_misuse_punishable_under_ucmj
  28. Mary Aiken, The Cyber Effect, 5.
  29. Mary Aiken, The Cyber Effect, 208-209.
  30. Ayana Lage, "Sexual Assaulters Are Interacting with #MeToo Posts, & It Reveals an Awful Truth About Rape Culture," Bustle.com, October 20, 2017, accessed March 28, 2018, https://www.bustle.com/p/sexual-assaulters-are-interacting-with-metoo-posts-it-reveals-awful-truth-about-rape-culture-2929079.
  31. Kirstie Brewer, "What Your Social Media Presence Says About You," The Guardian website, April 6, 2016, accessed March 28, 2018, https://jobs.theguardian.com/article/what-your-social-media-presence-says-about-you/.
  32. Kirstie Brewer, "What Your Social Media Presence Says About You."
  33. Kirstie Brewer, "What Your Social Media Presence Says About You."
  34. Kirstie Brewer, "What Your Social Media Presence Says About You."