An official website of the United States government
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Special Warfare

The Official Professional Journal of U.S. Army Special Operations Forces

News | Aug. 12, 2025

Book Review: LikeWar: The Weaponization of Social Media

By Captain Heather R. Cotter, 351st Civil Affairs Command Special Warfare Journal

Social media is a double-edged sword. The Army can use it to its advantage in the information environment, and it can also be used equally and effectively by adversaries to cause harm and destruction.
 
Peter W. Singer and Emerson T. Brooking published LikeWar: The Weaponization of Social Media in 2018. This non-fiction book is divided into nine chapters that address the evolution of social media and its use by the United States’ (US) strategic competitors as an information warfare (IWAR) tool.
Singer and Brooking summarize the book into five core principles.
These core principles are woven throughout the book to explain the relevance of social media, its threats, and what to expect in the future. Further, when considering IWAR, these principles shed light on its complexity, how quickly it can evolve, and how large it can become. Soldiers who read this book can better understand the depth of threats released on social media, how to recognize them, and how to leverage that information to adjust course and tactics in the information environment. Soldiers can expect to see malign actors become more sophisticated with their IWAR tactics and for disinformation campaigns to increase over time.
 
The authors explore how social media platforms have become battlegrounds in modern IWAR, where narratives are crafted, manipulated, and weaponized to influence public perception, disrupt societies, and advance geopolitical agendas. The book details how malicious actors—from governments to non-state actors—use digital tools to spread disinformation, conduct psychological warfare, and undermine trust, transforming the very fabric of conflict into IWAR. This exemplifies how contemporary warfare extends beyond physical combat, emphasizing the importance of understanding and defending against the strategic use of social media as a powerful tool in the ongoing evolution of IWAR. When considering how quickly technology and disinformation campaigns have evolved in the last 10 years, the question that the Army must ask is what the next 5 to 10 years will look like in the digital battlefield.
 
For soldiers, it is essential to understand how U.S. strategic competitors utilize social media to control their populace and influence civil-military operations. One example Singer and Brooking touch on is the three types of warfare in China (psychological, legal, and public opinion). They describe how China tends to divert attention when it comes to their weaknesses and amplifies their messaging when it comes to their strengths (p. 184).
 
One example addresses Russia’s interference in foreign elections. When interference with foreign elections occurs (or is suspected), a state’s democracy becomes vulnerable, which increases polarization and the possibility of civil disobedience, unrest, and conflict. This is a significant national security concern. The U.S. and North Atlantic Treaty Organization (NATO) allies must establish safeguards against foreign election interference. The intelligence community revealed that Russia interfered with the U.S. general election in 2016, and safeguards need to be in place to prevent Russia, or other malign actors, from interfering with future elections.
 
Another example the authors discuss centers on Russia’s military tactics in the information space. They have repeatedly proven their success in casting doubt on whether Russia committed an action. This doubt puts the U.S. and NATO allies in a reactive and challenging position to develop a response. Russia uses multiple propaganda outlets, including social media, to spread misinformation and disinformation. When misinformation and disinformation spread, it can challenge civil control, the rule of law, civil security, and public trust. This is a significant national security concern that affects not only the U.S. but also NATO allies and other partner nations.
 
Preparing for and responding to threats requires innovative and strategic approaches. One unique approach the authors touch on is Fort Polk’s application of the Social Media Environment and Internet Replication (SMEIR) – an online simulation of a small city that has news outlets, social media, and propaganda that troops must digitally navigate.
 
Weaponizing social media during peacetime and conflict is becoming increasingly common. Laws and regulations governing the use of social media are complex both domestically and internationally. They are continually evolving. This presents its own set of advantages and disadvantages. The most significant disadvantage is that anyone, both state and non-state actors, can easily use it as a tool of war. This is evident in the Russia-Ukraine conflict. Army special operations forces (ARSOF) should expect an added layer of complexity when social media is exploited by adversaries, whether to negatively influence the civilian population or spread disinformation with the intent of causing additional harm.
 
The digital battlefield is rapidly evolving, and the Army and ARSOF play a key role in staying in front of the threats. Given what we know today, Army Information Forces have an opportunity to collaborate and forecast what this environment will look like in the future. When it comes to the Army Transformation Initiative, this is an area in which Army Information Forces must be empowered with modernized capabilities and increased capacity to conduct IWAR.
 
About the Author
Captain Heather R. Cotter is in the U.S. Army Reserve and assigned to the 351st Civil Affairs Command in Mountain View, California. She received a direct commission as a 38G military-government officer in 2022 and holds the 38A AOC due to her successful completion of the Civil Affairs Captains Career Course in 2024. Captain Cotter has a master’s degree in international affairs and a second master’s degree in criminology. On the civilian side, she is currently employed as a federal contractor at the United States Department of Homeland Security. Captain Cotter has over 20 years of policy and research experience working with state, local, tribal, territorial, campus, and international law enforcement agencies.
 
Book Details:
Title: Likewar: The Weaponization of Social Media
Authors: P. W. Singer and Emerson T. Brooking
Number of Pages: 416
Publisher: Eamon Dolan/Houghton Mifflin Harcourt
Date: October 2, 2018
 

Archive Issues