Page 49 - JDPA Volume 02, Issue 02
P. 49

Journal of Defence & Policy Analysis          Volume 02, Issue 02, December 2023


             technologically improbable  and  legally  prohibited.  Telecommunication  com-
             panies employ robust security measures, including unique serial numbers and
             stringent identity verification during SIM card  issuance, making duplication
             highly unlikely., while unauthorized access to bank accounts linked to mobile
             numbers can occur, it almost always stems from social engineering, not SIM card
             duplication. Scammers manipulate victims into divulging sensitive information
             like PINs or OTPs, enabling them to bypass security measures and access funds.
             It is important to distinguish between genuine technological vulnerabilities and
             social engineering tactics. The viral podcast’s claims conflate these distinct con-
             cepts, causing needless worry among the public.



             Despite Sunday Morning’s extensive article debunking the myth of SIM card du-
             plication and manipulation, its impact remained limited due to several factors.
                      »  Firstly, the article’s length may have dissuaded some readers from fully
                       engaging with the content.
                      »  Secondly, concerns with the article’s persuasiveness might have hin-
                       dered its dissemination.
                      »  Finally,  the  lack  of  commentary  from telecommunication  operators
                       cited within the article as crucial stakeholders could have undermined
                       public trust in the information presented and further discouraged shar-
                       ing.


             Additionally, the internal approval processes within telecommunication compa-
             nies, as you aptly noted, can pose significant challenges in securing timely re-
             sponses from relevant personnel. This complex approval chain, often involving
             multiple touchpoints, may lead to delays in communication, potentially missing
             the window of opportunity to actively engage with and address public concerns
             raised in the article.

             The timeline of disinformation can be categorized as,
                   1. Pre-COVID
                   2. COVID
                   3. Post-COVID


             Pre-COVID

             Before  the advent  of the  COVID-19  pandemic,  disinformation existed, yet its
             prevalence did not garner significant attention from a psychological and social
             media standpoint. However, with the onset of the pandemic, a notable shift oc-
             curred. Individuals found themselves confined to their homes, leading to height-
             ened susceptibility to misinformation as they sought engagement in the absence
             of other activities.





             Faculty of Defence and Strategic Studies, General Sir John Kotelawala Defence University, Sri Lanka
                                                                                        39
   44   45   46   47   48   49   50   51   52   53   54