08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The important point to underscore is that cyber-age technologies that<br />

persuade or influence audiences psychologically through information,<br />

disinformation, or deception are ubiquitous and available to anyone on any<br />

continent whether it is a US soldier in a high-tech force or a terrorist in the<br />

desert. Legal organizations and entities have developed most of these<br />

technological devices, but they are available to anyone including religious<br />

zealots, terrorists, dictators, and so on.<br />

But this is only a discussion of the soft side of terrorism—the use of the<br />

media. A growing danger is the terrorist’s slow but steady acquisition of<br />

digitally enhanced, miniaturized technologies. These devices, at the heart of<br />

recent reports on the use of laser devices to blind airline pilots or the Chechen<br />

suicide bombers who sneaked explosives onto two Russian domestic flights<br />

within minutes of one another, will become more prevalent in the next five<br />

years. Terrorists are on the lookout for small, dirty bombs and for biological or<br />

chemical agents that can be dispersed into large population settings. All of<br />

these agents will be much harder to uncover as miniaturized technologies<br />

continue to proliferate.<br />

This description of the issues and uses of cyber technology offered<br />

above explains some of the “cyber silhouettes” that now are part of our lives.<br />

There are an ever-increasing number of cyber-related devices that are being<br />

forced upon us faster than we can comprehend their functioning or, more<br />

importantly, their eventual consequences. However, this is a fact we must<br />

accept and to which we must adapt. The good side is represented by cyber<br />

equipment’s many benefits. In the end we are relying daily on cyber-based<br />

technologies whether it is to help us with mundane tasks or to communicate<br />

with friends and family on the Internet. The bad side comes into play as the<br />

functionality falls into the hands of terrorists or criminals and the purpose<br />

becomes explosive. Another indicator that we do not understand how to<br />

integrate our efforts is the disparity in language and thus focus among civilians,<br />

the federal government, and the military. If the saying is true that “how you<br />

understand something determines what you will do with your day” then we are<br />

all going in different directions.<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!