Offensive Information Warfare Revisited

Author(s):  
Eli Rohn ◽  
Connie M. White ◽  
Guy Leshem

Socio-technical forecasts that materialized are of particular interest, as they are based on basic principles that must hold true for a long time, and thus worthy of special attention. The exploitation of the Internet as a vehicle for psychological and physical battle has been anticipated ever since the Internet became a world-wide phenomenon. Its potential for abuse by terrorist groups motivated Valeri & Knights to compile a list of key predictions, without the benefit of the hindsight afforded by the post-millennial terrorist attacks on the USA & Europe, and before social media was conceived. This paper evaluates some of their predictions in light of the massive social media and network attacks that occurred in Israel and Syria. Additionally, the paper examines how attacked governments and nations respond. The authors find that some of the key predictions advanced by Valeri and Knights have proven accurate. Offensive information warfare attacks have and will continue to influence policies, budgets and civic voluntary participation to counter such attacks.

Author(s):  
Eli Rohn ◽  
Connie M. White ◽  
Guy Leshem

Socio-technical forecasts that materialized are of particular interest, as they are based on basic principles that must hold true for a long time, and thus worthy of special attention. The exploitation of the Internet as a vehicle for psychological and physical battle has been anticipated ever since the Internet became a world-wide phenomenon. Its potential for abuse by terrorist groups motivated Valeri & Knights to compile a list of key predictions, without the benefit of the hindsight afforded by the post-millennial terrorist attacks on the USA & Europe, and before social media was conceived. This paper evaluates some of their predictions in light of the massive social media and network attacks that occurred in Israel and Syria. Additionally, the paper examines how attacked governments and nations respond. The authors find that some of the key predictions advanced by Valeri and Knights have proven accurate. Offensive information warfare attacks have and will continue to influence policies, budgets and civic voluntary participation to counter such attacks.


2017 ◽  
Author(s):  
Matteo Vergani ◽  
Ana-Maria Bliuc

We investigate differences in the psychological aspects underpinning Western mobilisation of two terrorist groups by analysing their English-language propaganda. Based on a computerized analysis of the language used in two English-language online magazines circulated by ISIS and al-Qaeda (i.e., Dabiq and Inspire), we found significant differences in their language - the ISIS’ language being higher in authoritarianism and its level of religiousness. In a follow-up experimental study, we found that being high in religiousness and authoritarianism predicts more positive attitudes towards the language used by ISIS, but not towards the language used by al-Qaeda. The results suggest that ISIS’ propaganda may be more effective in mobilising individuals who are more authoritarian and more focused on religion than that of al-Qaeda. These findings are consistent with the behaviour observed in recent homegrown terrorist attacks in the USA and Europe.


Author(s):  
Liudmyla Kurylo ◽  
◽  
Yaroslav Kozchenko ◽  

The author conducted a study of the role and actual functions of Internet marketing nowadays, analyzed the latest publications and studies of domestic and foreign scientists relating to Internet marketing. The definitions of Internet marketing by various scientists were considered. It was determined by the problematic that exists in the field of internet marketing at the moment. A review of modern tools we identified the main tools of Internet marketing, by which the communication occurs on the Internet: SEO (Search Engine Optimisation), search (paid) advertising, Media advertising, SMM (Social Media Marketing) social media marketing, content marketing, E-mail marketing; Hootsuit's company research analysis determined the number of Internet users and purchasing power in the online environment, which averaged 500 USD per year. The number of Internet users in the online environment averaged 500 USD per year. And also to prioritise specific types of products. We have also identified that search engines are the main source of learning new information for consumers. Having analysed the dynamics of internet penetration in Ukraine, it appears that the number of internet users increased by 8% in 2019, with 22.96 million Ukrainians using the internet at the end of 2019. The article examines the possibilities of Internet marketing tools that become available when using such a tool as web analytics, including: personalised offers to customers, building relationships with customers, after a purchase is made and increasing their retention rate. A study of advertising costs on the social network Facebook, during the presidential elections in Ukraine in 2019 and during the presidential race in the USA in 2020 was conducted. And also defined the role played by social networks in building relationships with the target audience. During the research, recommendations for the use of the main tools of Internet marketing were made and it was determined which business areas are not suitable for each of the tools. Based on the research and statistical data was predicted directions of development of Internet marketing.


Author(s):  
Ronald M. Baecker

Most computers during the Second World War, such as the British code-breaking Colussus machine, had been developed for military use. The effects on law and order and war and peace of computerization, worldwide telecommunications, social media, artificial intelligence (AI), and robotics is the topic of Chapter 6. As in Chapter 5, the most compelling visions of the potential opportunities and dangers have been in science fiction and in film; we begin the chapter by reviewing some memorable examples. We then discuss how technology is used by the police, such as the use of video evidence to sometimes exonerate the police against false accusations of needless brutality. We also examine how citizens are using social media to protect themselves and alert others to what they believe is unwarranted violence or unjust actions by law enforcement. We expand upon Section 5.7’s discussion of citizen mobilization by social media with the goal of regime change. In this context, we discuss how the government (especially police and security services) gains leverage via the surveillance of the digital information and communications of citizens. This surveillance has significantly increased due to security concerns post-9/11. We will examine these developments in the USA, Canada, and the UK, as well as in other parts of the world. We shall also discuss cases of organizations trying to subvert societies that repress and forbid access to the internet, with the goal of enabling its citizens to access the internet freely. Next, we consider ways in which tools of digital disruption are used by a country or government or a set of individuals against others. The timely and current case study explored is on governmental use of hacking and other aggressive digital means to interfere with the electoral processes of another country, or even to disrupt or destabilize the other country. At the extreme, governments engage in cyberterrorism or even cyberwar­fare. We shall discuss several recent examples of this and argue that weapons of cyberwar­fare could be as catastrophic as nuclear or biological weapons. The technology of warfare has also evolved.


IFLA Journal ◽  
2021 ◽  
pp. 034003522110411
Author(s):  
Md. Sayeed Al-Zaman

This study analysed 9657 pieces of misinformation that originated in 138 countries and were fact-checked by 94 organizations to understand the prevalence and sources of misinformation in different countries. The results show that India (15.94%), the USA (9.74%), Brazil (8.57%) and Spain (8.03%) are the four most misinformation-affected countries. Based on the results, it is presumed that the prevalence of COVID-19 misinformation can have a positive association with the COVID-19 situation. Social media (84.94%) produces the largest amount of misinformation, and the Internet (90.5%) as a whole is responsible for most of the COVID-19 misinformation. Moreover, Facebook alone produces 66.87% of the misinformation among all social media platforms. Of all the countries, India (18.07%) produced the largest amount of social media misinformation, perhaps thanks to the country’s higher Internet penetration rate, increasing social media consumption and users’ lack of Internet literacy.


Author(s):  
Shailja Dixit ◽  
Hitesh Kesarwani

Selling and marketing of both the products and services have undergone sea changes, in the last decade or so, with greater focus on internet marketing Expanding coverage of internet allows spreading of products without involving huge additional investments in distribution system. The internet technology has existed for more than 40 years now, yet it was the introduction of the World Wide Web (WWW) that caused its fast market penetration (Chaffey, 2003). In only four years, the internet reached an audience of 50 million users in the USA. It took the television over 13 years and the telephone over 75 years to reach this number (Angeli & Kundler, 2008). Considering that, the internet can said to be the fastest spreading information media in today's world. The strength of the WWW was the power to provide easy access to information using a network of web sites (Chaffey, 2003). Of course, many people realized the huge possibilities of this media. Companies saw big marketing opportunities as internet user numbers increased (Zeff, 1999). The chapter will try to seek the performance and effectiveness of current techniques of internet marketing and at the same time to identify the potential of new and emerging techniques for further strengthening the internet marketing with special emphasis on Affiliate Marketing.


Author(s):  
André Årnes

A central issue in assessing and responding to an attack on the Internet is the identification and localization of the attackers. In information warfare and cyber terrorism, an attack can be launched using a large number of hosts, in which case fast and accurate identification and tracing is crucial for handling and responding to the attack. In the digital world of the Internet, however, there are many cases where a successful trace is difficult or impossible. The design of the Internet, as well as services that hide the origin of communication and provide anonymity, complicate tracing and create a need for a wide range of tools for tracing. In this chapter, we provide a survey of different tools and services available for tracing the geographic location of hosts and users on the Internet. We consider both active and passive methods of identification and tracing. A passive trace uses information that is available through public sources, in log data, or through commercially available databases. Active methods involve the use of tools for probing the attacking party directly, for example, through scanning and pinging. Some of the methods for locating addresses on the Internet have been developed for use in electronic commerce and marketing applications, but the basic principles are equally applicable to digital investigations and information warfare. We consider only tracing of addresses on the Internet. Consequently, this chapter only considers the Internet Protocol (IPv4 and IPv6), as well as higher level protocols using IP (such as TCP, UDP, and HTTP). We refer to the host that we try to identify as the target host and its address as the target address. The system used to execute the tracing is referred to as the trace host.


Author(s):  
Lech J. Janczewski ◽  
Andrew M. Colarik

Business continuity management is a process aimed at reducing disruptions caused by disasters and security failures that could be the results of natural phenomena, accidents, failure of equipment, or deliberate human acts. Among the last of the results are cyber-terrorist attacks or acts of information warfare. A long time ago, it was proven that the present level of technology allows for the elimination of pilots from the cockpits of large commercial jets. A huge jumbo jet is able to take off, fly to the opposite side of the globe, and land safely without human intervention. With this knowledge, we must wonder why airline pilots spend so much time on flight simulators, and why pilots are still needed in the front of the plane. The answer is really quite simple: they are rigorously trained to handle emergency situations.


Author(s):  
Angela Daly

The focus of this chapter will be the recent conduct of various corporations in withdrawing Internet services provided to information portal WikiLeaks in light of the controversy surrounding WikiLeaks’ publishing classified documents of correspondence between the US State Department and its diplomatic missions around the world in late 2010. The implications for freedom of expression (especially the right to access information) on the Internet will be examined in the wake of WikiLeaks, particularly in the context of the infringer being a private actor, and one comprising a mono- or oligopoly. The motivation of these private actors in contributing to the suppression of WikiLeaks will be assessed to examine whether it constitutes an example of Birnhack and Elkin-Koren’s “invisible handshake,” i.e. the “emerging collaboration” between the state and multinational corporations on the Internet that they posit is producing “the ultimate threat.” The legal recourse open to WikiLeaks and its users for the infringement of fundamental rights will be examined, especially the First Amendment to the US Constitution since the geographic location for these events has mostly been the USA. Finally, the postscript to the WikiLeaks controversy will be considered: the “information warfare” conducted by hackers will be examined to determine whether the exercise of power of these Internet corporations in a way which infringes fundamental rights can be checked by technological means, and whether hackers are indeed the true electronic defenders of freedom of expression.


2016 ◽  
Vol 7 (4) ◽  
pp. 88-93 ◽  
Author(s):  
Ahmed M. Lutfi

Aims and Objectives: Performance- and Image-Enhancing Drugs (PIEDs) refer to all known forms of substances, that can enhance either the morphology or the physiological performance or both simultaneously. The exponential rise of electronic commerce (e-commerce) for PIEDs is a major public issue, for which control protocols are to be deployed.Materials and Methods: It would be a waste of time and resources to track and/or shut down all PIED-promoting websites one by one. Cyberspace is vast; the PIED “product managers” will always adapt to surveillance-control policies over their illegitimate online businesses. A more rational approach would be to track, challenge, and tackle the same resources upon which PIED electronic commerce is based: the infrastructure of the World Wide Web (the Internet).Results: Concerning PIED e-commerce, the main resources are Google and AOL (search engines); YouTube, Wikipedia, and Facebook (social media sites); and Alibaba, Amazon, and eBay (major e-commerce websites).Conclusion: Illegal PIED e-commerce became a major public problem. The major drivers are the Internet search engines, social media sites, and major e-commerce websites. Effective protocols toward these resources would hinder any future progress of this illegitimate worldwide phenomenon.Asian Journal of Medical Sciences Vol.7(4) 2016 88-93


Sign in / Sign up

Export Citation Format

Share Document