08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

as armies do on the battlefield to conduct counterinsurgency warfare. For<br />

example, an anti-hacker alliance of top Internet Service Providers (ISPs) was<br />

recently formed, similar in function to a coalition of troops sent to stop hostile<br />

activity. They united to share attack profiles to stop Internet attacks as far from<br />

target areas as possible. The alliance included such important providers as BT<br />

Group, Deutsche Telekom, MCI, NTT Communications, Cisco Systems, and<br />

EarthLink, among others. Their realization is that “the operating principle of the<br />

technologies underlying the Internet will not allow hackers to be defeated.” 33<br />

Thus the goal is to improve the exchange of information among Internet<br />

providers as the best available method. Forming this coalition of ISPs is a first<br />

step. Civilian organizations are investing in computer tactics and strategies and<br />

in countercomputer activities as well. More interesting for purposes of this<br />

study, however, is that the Cyber Age has spawned a new age of military theory<br />

and practice.<br />

Instead of studying opposing armies, many civilians today, both private<br />

citizens and security organs, study Internet terrorist sites. The website<br />

http://haganah.org.il is dedicated to, as the site says, “confronting the global<br />

jihad online.” Instead of publishing training manuals, the Internet site offers<br />

insurgents a chance to use online tutorials about handling weapons or planning<br />

attacks. An Internet posting of 30 March 2005, obtained by NBC news, offered<br />

a missile tutorial. The targets were not military aircraft but civilian airliners. 34<br />

To view our borders, much like military units observe their perimeters,<br />

companies such as VistaScape offer a master system combining views from<br />

hundreds of cameras with GPS data that focuses on moving targets, digital<br />

borders, and final details from other sensors (infrared, chemical sniffing, etc.). 35<br />

A Florida lawmaker plans to introduce legislation to remotely inspect boaters<br />

returning from Caribbean ports with videophones and biometric technology. 36<br />

Information Operations (IO) and the <strong>Military</strong><br />

The distinction in terminology between civilians and armed forces to<br />

describe the age in which we live is interesting. By focusing on the term cyber,<br />

civilians and some federal media outlets talk directly about the myriad ways<br />

33 Computer Crime Research Center Staff, “Top World ISPs Unite in Fight against<br />

Hackers,” www.crime-research.org, 31 March 2005.<br />

34 Lisa Myers and the NBC investigative unit, “Al Qaeda Web Message Offers Missile<br />

Tutorial,” msnbc.msn.com, 30 March 2005.<br />

35 “The All-in-One, Widescreen Security Cam,” Wired, March 2005, p. 028.<br />

36 Greta Wodele, “Florida Lawmakers Want Remote System to Inspect Boaters,”<br />

National Journal’s Technology Daily, downloaded from the www.govexec.com on 5<br />

April 2005.<br />

21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!