08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

more than 194 million in China. But this is just the effect on society at large.<br />

What has been the effect on various military organizations around the world?<br />

Have they embraced cyber-related issues or avoided them?<br />

The Emergence of the Civilian and <strong>Military</strong> Cyber Battlefields<br />

Non-state entities (terrorists and criminal agents) use these same<br />

networks and products to conduct their “business.” They seldom use the terms<br />

cyber or information operations, although most civilian agencies and the media<br />

describe their activities as cyber-related. For example the media describes<br />

insurgent activities in Iraq and Israel as part of a virtual or cyberjihad, as<br />

cyberterrorism, or as the beginning of an Interfada. Terrorists and criminals<br />

feed off civilian and military technological advancements and use them to<br />

coordinate and advance their causes. Countering these activities employed by<br />

insurgents has proven most difficult in Iraq.<br />

Computers enable criminal, terrorist, and insurgent capabilities. Cyber<br />

capabilities allow information to be manipulated, stolen, or held hostage, for<br />

example; and they allow criminals, terrorists, and insurgents to conduct guerilla<br />

warfare tactics and illegal or extremist activities online. Cyber capabilities have<br />

introduced identify theft, financial fraud, and cyber money laundering into our<br />

lives. This has changed the subjective nature of war, adding a social context<br />

unlike any time in history.<br />

Cyber processes work in near-stealth mode. Electrons carry the “threat”<br />

of encryption or manipulation or some other capability, moving silently and<br />

surreptitiously around the world. These packets of electrons use the same<br />

networks and platforms that civilians use to conduct their everyday business.<br />

Today’s criminals, terrorists, and insurgents use their computer skills and offthe-shelf<br />

cyber purchases (equipment ranging from frequency intercept devices<br />

to mini-spy cameras) to conduct activities that cast cyber silhouettes of<br />

influence and agitation over the much more lethal and powerful information<br />

operations of modern armies. The title for this book, Cyber Silhouettes, was<br />

chosen for this reason.<br />

The cyber silhouettes cast by insurgents are not the traditional military<br />

ones of precision, speed, and efficiency. Instead these silhouettes are those of<br />

manipulation, perception, recruitment, mobilization, fear, and intimidation,<br />

among others. Quite often militaries and their associated intelligence agencies,<br />

while able to comprehend the outline of these silhouettes, have no arrow in the<br />

quiver that is flexible enough to target, eliminate, or control them. Their arrows<br />

were designed for other purposes such as the nation-state threat of the past.<br />

That is, a cyber threat enhances activities that an armed force is not prepared to<br />

handle at this time.<br />

19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!