08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

times. 104 Thus, the Cyber Age is offering insurgents new tools of operational<br />

empowerment.<br />

Insurgent website operators must remain anonymous, and so they<br />

create anonymous accounts. It usually is not known who is pressing the keys to<br />

publish the message. Insurgents use the net to conduct hit and run tactics,<br />

sending viruses out from one machine in a neutral location (cybercafé) and then<br />

moving to some safer computer sanctity. Further, the Internet provides<br />

insurgents with the logistic support they require. The Internet’s infrastructure is<br />

continuously updated free of charge, and new methods to attack the Internet are<br />

continuously posted at hacker sites—again free of charge.<br />

Reconnaissance of an objective is an important operation before an<br />

attack. Reconnaissance is also possible on the Internet to obtain vital<br />

information about attack objectives. This might occur before a computer attack<br />

or before an attempt to gain access to targeting information (such as a building<br />

design). It is not known if insurgents have used this technique, but it is<br />

important to note that although reconnaissance is an old tactic, new and<br />

possibly more effective methods of using it are available.<br />

The SDBot.UJ worm offers an example of reconnaissance on the<br />

Internet. It scans passing traffic for patterns of data “that normally precede the<br />

transmission of a username and password.” It then records the data sent<br />

immediately afterwards if it spots such a pattern. It does the same for electron<br />

packets containing PayPal, a web service for the transfer of money. Network<br />

reconnaissance is achieved through the use of a sniffer program, which<br />

monitors packets. 105 In this case insurgents may conduct reconnaissance to gain<br />

access to a computer to do one of several things: look for computer or network<br />

vulnerabilities, access sensitive files, or ascertain the level of police awareness<br />

of their activities.<br />

Hostage-taking is possible via the Internet as well. Insurgents can break<br />

into a database and encode several important files. In order to get the “key” to<br />

unscramble the code, the owner of the file may have to pay a ransom. The<br />

important file thus becomes the hostage. Public opinion can also be held<br />

hostage. As is the case with the hostage-taking in Iraq, demands can be made<br />

for the withdrawal of troops or some other request. If these demands are not<br />

met, insurgents can demonstrate to the whole world how a person suffered or<br />

104 “Al Qaeda Suspect Reveals Communication Strategy,” 4 August 2004,<br />

http://www.cnn.com.<br />

105 “Computer Worm ‘Sniffs’ out Passwords,” NewScientist.com news service, 14<br />

September 2004, p. 1.<br />

54

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!