08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Jihad” listed the terms cyberattack, cyberwar, cyberterrorism, cybervandalism,<br />

and cybersecurity in one short article. 12 A Google search for the term cyber<br />

yielded 25,600,000 hits!<br />

The term “cyber” enjoys widespread use for good reason—it has been<br />

around for years. The word evolved from cybernetics, a term first written about<br />

at the end of the 1940s. The Merriam-Webster Online Dictionary defines<br />

cybernetics as “the science of communication and control theory that is<br />

concerned especially with the comparative study of automatic control systems<br />

(as the nervous system and brain and mechanical-electrical communication<br />

systems).” 13 Perhaps the most famous early cybernetic book was that of Norbert<br />

Wiener, who wrote Cybernetics, or Control and Communication in the Animal<br />

and the Machine. Later, in 1954, he wrote The Human Use of Human Beings.<br />

He stated that<br />

It is the thesis of this book that society can only be understood through<br />

a study of the messages and the communication facilities which belong<br />

to it; and that in the future development of these messages and<br />

communication facilities, messages between man and machines,<br />

between machines and man, and between machine and machine, are<br />

destined to play an ever increasing part. 14<br />

Cyber-based products have become the backbone of modern societies.<br />

They are used by a host of institutions and organizations to not only support<br />

their contemporary security environments but also to conduct their daily<br />

activities and advance their interests. Computer and telecommunication<br />

businesses across the globe battle one another for customers on each continent.<br />

In turn they create a communications infrastructure that enables both business<br />

and the population of these countries to operate with the efficiency and<br />

precision once reserved for government, military, and security services.<br />

A look at the newspaper on nearly any day of the year confirms just<br />

how widespread cyber-related technologies have become. A recent report noted<br />

that the average Internet user in the US spends three hours a day online. Use of<br />

the Internet has thus replaced much of the time previously spent watching TV<br />

and performing other activities according to the Stanford Institute for the<br />

Quantitative Study of Society. 15 Other examples abound. Surgeons now use<br />

12 Michael Isikoff and Mark Hosenball, “Virtual Jihad,” Newsweek, 10 February 2005,<br />

from CNO/IO Newsletter, Vol. 5, No. 10, 8-18 February 2005.<br />

13 Merriam-Webster Online Dictionary as downloaded on 20 February 2005.<br />

14 <strong>Download</strong>ed from www.angelfire.com, “Norbert Wiener Quotes.”<br />

15 John Markoff, “Internet Use Said to Cut into TV Viewing and Socializing,” The New<br />

15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!