08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

C4ISR technology to ensure that they can protect their digital systems in space<br />

and potentially cause harm to an opponent’s C4ISR capability.<br />

Better understanding of cyber-related terminology and concepts makes<br />

it more likely that the US can conduct cyber-based counterinsurgency on the<br />

Internet. The US and other nations have done much to monitor al Qaeda’s<br />

online techniques. In the US, academic and other organizations such as the Site<br />

Institute continue to monitor and analyze al Qaeda websites on a daily basis.<br />

The Homeland Security Department hired Dartmouth University to undertake a<br />

study of Islamic websites and foreign information operations— both of which<br />

they successfully completed. The website Internet Haganah (or “defense” in<br />

Hebrew) has developed a methodology to track and find the servers from which<br />

terrorists are sending their messages. The organization then explains the<br />

situation to the proprietors of the servers on which an insurgent or terrorist site<br />

exists and asks them to do something about it. This has resulted in the<br />

movement of many terrorist websites over the past few years from one site to<br />

another, putting them always on the run and disrupting their operations. 523 CNN<br />

reports that Jeremy Reynalds, who runs a faith-based homeless shelter, combs<br />

the Internet in his free time for illegal terrorist postings. He is given credit for<br />

discovering that the soldier identified as John Adams (a toy doll dressed as a<br />

US soldier with a rifle at his head) was a fake. 524 Such efforts must continue.<br />

Other creative strategies to deal with insurgents must be developed to<br />

supplement these efforts. However, monitoring is not countering, and herein<br />

lies the problem.<br />

New methods of analysis are being discovered that might help the<br />

cybercop more than the cybercriminal (see Appendix Three for more<br />

information on these topics). The Department of Defense’s Cyber Crime Center<br />

(DC3) is changing the way it conducts large computer forensic investigations in<br />

the wake of recent cases. It was reported that<br />

In particular, the DC3 has established a section of its lab and a team of<br />

examiners just to work on cases with large data sets, replacing ad hoc<br />

teams created to address case requests as they come in. DC3 is also<br />

using a combination of commercial forensic software and proprietary<br />

tools to comb seized data stored on large capacity storage-area<br />

networks and network-attached storage devices. The new DC3<br />

approach replaced individual examiners working on separate<br />

523 John Lasker, “Watchdogs Sniff Out Terror Sites,” Wired News, www.wired.com, 25<br />

February 2005.<br />

524 Henry Schuster, “The Internet War,” CNN.com, 16 February 2005.<br />

287

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!