08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

was killed as a result. Public opinion becomes the greatest hostage of such<br />

actions, which results in more pressure on governments to concede to the<br />

insurgent’s demands.<br />

Deception and surprise are still cornerstones of an insurgent’s operating<br />

techniques during conflict. Catching an opponent off-guard is crucial to<br />

success. Similar attack strategies and techniques can be used on the Internet.<br />

Most Internet users have been victimized to a degree by some of these methods.<br />

That is, the Internet is a place for mass psychological and virtual manipulation<br />

just as much as it is a place for mass mobilization. A recent example is an<br />

action appearing on spam messages that requests readers to “click here to<br />

remove.” In actuality the action allows spammers to know that the junk mail<br />

messages are being read. 106<br />

Another common deception technique used online (again, it is not<br />

known if insurgents are using this technique) is “phishing.” These are emails<br />

that appear to be from banks and other financial institutions asking for<br />

consumer credit card details—that is “phishing” for details. Insurgents could<br />

use this technique as an alternate funding mechanism to support their cause.<br />

They could pretend to send a user to a reputable site and then steal the user’s<br />

money or identity. A vulnerability in Microsoft’s Internet Explorer makes this<br />

technique appear even more legitimate. An email may load an actual bank<br />

website into the main Internet Explorer web page. A second, smaller popup<br />

page is then brought up. The location bar on the smaller page will be hidden so<br />

that the user doesn’t know the page actually originated from another country.<br />

Because the site operator can recreate the page to mirror an actual bank site, a<br />

degree of trust is created in the mind of the user. The user enters his credit card<br />

information and unknowingly sends information off to the country involved.<br />

Antiphishing websites are even beginning to appear.<br />

To overcome law enforcement efforts to catch them, criminals started<br />

sending image-based messages that can skirt most spam and other filters that<br />

rely on algorithms to seek out text strings. These new techniques involve<br />

steganography, or the embedding of text in an image. 107 Insurgents are believed<br />

to be using these techniques.<br />

Another example of masking or deceiving computer users could be<br />

termed “hiding in plain sight.” For example, many people have heard of .dll<br />

106 John Leyden, “Click Here to Become Infected,” The Register online version, 22<br />

September 2004.<br />

107 Dennis Fisher, “New Scam Tactic Hits Online,” 13 September 2004, from<br />

http://www.eweek.com.<br />

55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!