08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

well as the Appendix “Summary of Principles,” should hold special prominence<br />

for people studying how advertisers use these techniques and, additionally, how<br />

terrorist websites have succeeded at times in influencing people to their side.<br />

Cyber products are the current rage. The names of these products are<br />

confusing (with combinations of capital letters and numbers) and sometimes<br />

misleading. It is also difficult to tell what the products do. The MOTO RAZR<br />

V3 is a phone, not a razor. The Monaco V4 is a concept watch, not a car. If<br />

listed separately from the product itself, the names are even more unintelligible.<br />

The Toshiba 26HF84, the Samsung MM-A700, the Suunto n3i, the MuVo<br />

Slim, the MyFi, and the Panasonic PV-GS120 are a high-definition wide-screen<br />

TV, a “smart watch,” an MP3 player, a Sprint phone, a portable satellite radio,<br />

and camcorder, respectively. 29 Cyber terminology is confusing too. According<br />

to a recent BBC report, the average home computer user is not sure about the<br />

meaning of pharming (fraudsters redirect net users from legitimate to fake<br />

sites); phishing (fake email or popup scams to get you to reveal personal<br />

information for criminal gain); rogue dialer (software that installs itself on<br />

computers and changes settings to dial a premium rate number instead of usual<br />

dialup accounts); spyware (small programs that secretly monitor sites visited);<br />

keylogging (software/hardware to track keystrokes on a computer to gather<br />

passwords and credit card numbers); and other terms that all warn people about<br />

online security threats. 30<br />

Thus, the effect of cyber-based technologies on the population as a<br />

whole is huge and not limited just to information. There are emotional, societal,<br />

economic, psychological, and political effects in addition to easy access and<br />

sharing of information. There is a mind-boggling array of cyber technologies<br />

that control many aspects of our daily activities and numb the average<br />

consumer with their ubiquity. New technologies have enabled the civilian<br />

world to work faster and more efficiently. They ease us through our daily lives,<br />

assist us in times of trouble, help us to enjoy our entertainment time more<br />

clearly and deeply, keep us more closely connected to family, inform us of local<br />

and international events of importance, and amaze us with their spread and<br />

increasing accessibility. Governments and businesses worldwide are wired to<br />

receive news instantaneously and are using cyber technologies to either do their<br />

jobs better or to keep them informed about competitors. Many of these devices<br />

were financially out of reach to the average consumer at the start of the Cyber<br />

Age, but they are now available to the masses as witnessed by the plethora of<br />

cell phones in the hands of teenagers and families of all incomes. For example,<br />

there are now over 159 million cell phones in the US and, even more amazing,<br />

29<br />

These items were taken from Time, 29 November 2004, pp. 63-136.<br />

30 “‘Geek Speak’ Confuses Net Users,” BBC News, 6 April 2005 from news.bbc.co.uk.<br />

18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!