08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Unintended Consequences of Cyber Age Technologies<br />

There is not a criminal or terrorist group with its own computer chip<br />

factory or military-industrial complex. Yet criminal and terrorist groups are<br />

able to access products either by purchasing them, stealing them, or trading for<br />

them; and they are able to spread their doctrine and connect with allies as never<br />

before due to their empowerment by cyber processes. Purchasing commercial<br />

satellite images or off-the-shelf information technologies (such as spyware<br />

materials, intercept devices, and other technology available at Radio Shack or<br />

on e-Bay) are two such examples. Using the Internet as a media device akin to<br />

the New York Times for publishing articles or CNN for photographing and<br />

running videos is another plus for transnational groups.<br />

It was not expected that terrorists and criminals would use the Internet<br />

to conduct cybermobilization, cyberplanning, cyberfear, and cybermanipulation<br />

activities. Law in most civilized countries forbids such activities. But because<br />

of the anonymity of the Internet, the ability to conduct these activities from faroff<br />

locations without fear of law enforcement agencies, and their total<br />

disrespect for the law, terrorists have little fear of being found and prosecuted.<br />

Further, a terrorist or insurgent cares very little about web credibility factors.<br />

Nation-states have to worry constantly about this issue. The terrorist or<br />

insurgent will put out any information that fits a specific need without worrying<br />

about being “called” on it for accuracy.<br />

Off-the-shelf communication technologies, such as decoding and<br />

intercept devices, have enabled terrorists, insurgents, and criminals to<br />

coordinate and perform key functions similar to modern army staffs in the sense<br />

of covertness, integration of effort, and speed. Remote digital devices, such as<br />

car door openers, are used to detonate an insurgent’s improvised explosive<br />

devices (IEDs). Surveillance cameras and voice intercept devices are available<br />

to the general consumer (and the insurgent/terrorist), and this allows them to<br />

plan ambushes with timeliness and precision. Before 9/11, websites contained<br />

schematics and sometimes even the plans of sensitive facilities that enemy<br />

operatives may still someday use. Information in a captured al Qaeda manual<br />

noted that “public information can provide 80% of the information needed<br />

about a possible target.” 46 A recent Associated Press report is indicative of this<br />

trend. The report was about Google’s new search tool that includes satellite<br />

images. The viewer gets an overhead shot of a site and driving directions to it.<br />

This information previously was owned by Keyhole Corporation and cost users<br />

$29.95 to download a version of Keyhole’s basic software package. Google<br />

46 “Al Qaeda Surveillance Techniques Detailed,” USA Today, 29 December 2004 as<br />

downloaded from the Internet at www.usatoday.com.<br />

28

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!