08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

files and know they are an integral part of the Windows Operation System. Can<br />

you tell the difference between these two files, win32.d11 .exe and<br />

win32.dll.exe? The small font style almost obscures the difference in the actual<br />

file names. The name is not totally legible and the look-alike file could be<br />

anything someone installed on the machine. In this case all of the “L’s” were<br />

substituted with “1’s”. When the computer user looks up the currently running<br />

processes in his Windows Task Manager, the switched letters are not so<br />

obvious. This program could be anything, from a keystroke logger, to a<br />

“zombie” bot used for Denial of Service attacks. Another form of hiding in<br />

plain sight would be if a person posts messages to a bulletin board that signals<br />

some event to members of al Qaeda via simple art forms on the message board.<br />

The person could change the position of an AK-47 on the screen or the<br />

direction that a “white horse” (a white stallion, according to another source, is<br />

purportedly the logo of al Qaeda) 108 is heading to signify the go ahead for an<br />

operation. So, while law enforcement officials are looking for hidden text or<br />

codes, the answer would be right there in plain sight.<br />

The most clever example of how al Qaeda might mentally manipulate<br />

law enforcement through the Internet is to allow (on purpose) some of its<br />

messages to be intercepted by law enforcement agencies in order to do one of<br />

two things: either divert attention to places specified in the messages and then<br />

attack somewhere else, or to simply observe FBI warnings to see if someone<br />

picked up on the message and is thus watching or monitoring Internet traffic.<br />

Conclusions<br />

The move from Industrial Age to Cyber Age warfare has changed the<br />

speed and way wars are perceived. This results in increased mobilization<br />

potential for insurgents. Industrial Age insurgencies were localized,<br />

hierarchical, centralized, covert, and contained a single message. Propaganda<br />

was for leaders, and agitation materials took the form of written or spoken<br />

messages. Cyber Age insurgencies are global, networked, decentralized, overt<br />

or covert, and templated at specific target groups. They use messages that<br />

attempt to manipulate local Arab opinion with themes such as the humiliation<br />

of male prisoners or the violation of human rights at Abu Ghraib. Cyber Age<br />

insurgencies take advantage of instantaneous communications means (financed<br />

and developed by governments) to deliver messages before governments can<br />

block or challenge the statement except after the fact. Charismatic figures or<br />

those in charge of a community of believers deliver propaganda, and the<br />

108 Lawrence Wright, p. 50.<br />

56

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!