Offensive Information Warfare Revisited

Author(s):  
Eli Rohn ◽  
Connie M. White ◽  
Guy Leshem

Socio-technical forecasts that materialized are of particular interest, as they are based on basic principles that must hold true for a long time, and thus worthy of special attention. The exploitation of the Internet as a vehicle for psychological and physical battle has been anticipated ever since the Internet became a world-wide phenomenon. Its potential for abuse by terrorist groups motivated Valeri & Knights to compile a list of key predictions, without the benefit of the hindsight afforded by the post-millennial terrorist attacks on the USA & Europe, and before social media was conceived. This paper evaluates some of their predictions in light of the massive social media and network attacks that occurred in Israel and Syria. Additionally, the paper examines how attacked governments and nations respond. The authors find that some of the key predictions advanced by Valeri and Knights have proven accurate. Offensive information warfare attacks have and will continue to influence policies, budgets and civic voluntary participation to counter such attacks.

Author(s):  
Eli Rohn ◽  
Connie M. White ◽  
Guy Leshem

Socio-technical forecasts that materialized are of particular interest, as they are based on basic principles that must hold true for a long time, and thus worthy of special attention. The exploitation of the Internet as a vehicle for psychological and physical battle has been anticipated ever since the Internet became a world-wide phenomenon. Its potential for abuse by terrorist groups motivated Valeri & Knights to compile a list of key predictions, without the benefit of the hindsight afforded by the post-millennial terrorist attacks on the USA & Europe, and before social media was conceived. This paper evaluates some of their predictions in light of the massive social media and network attacks that occurred in Israel and Syria. Additionally, the paper examines how attacked governments and nations respond. The authors find that some of the key predictions advanced by Valeri and Knights have proven accurate. Offensive information warfare attacks have and will continue to influence policies, budgets and civic voluntary participation to counter such attacks.


2017 ◽  
Author(s):  
Matteo Vergani ◽  
Ana-Maria Bliuc

We investigate differences in the psychological aspects underpinning Western mobilisation of two terrorist groups by analysing their English-language propaganda. Based on a computerized analysis of the language used in two English-language online magazines circulated by ISIS and al-Qaeda (i.e., Dabiq and Inspire), we found significant differences in their language - the ISIS’ language being higher in authoritarianism and its level of religiousness. In a follow-up experimental study, we found that being high in religiousness and authoritarianism predicts more positive attitudes towards the language used by ISIS, but not towards the language used by al-Qaeda. The results suggest that ISIS’ propaganda may be more effective in mobilising individuals who are more authoritarian and more focused on religion than that of al-Qaeda. These findings are consistent with the behaviour observed in recent homegrown terrorist attacks in the USA and Europe.


Author(s):  
Liudmyla Kurylo ◽  
◽  
Yaroslav Kozchenko ◽  

The author conducted a study of the role and actual functions of Internet marketing nowadays, analyzed the latest publications and studies of domestic and foreign scientists relating to Internet marketing. The definitions of Internet marketing by various scientists were considered. It was determined by the problematic that exists in the field of internet marketing at the moment. A review of modern tools we identified the main tools of Internet marketing, by which the communication occurs on the Internet: SEO (Search Engine Optimisation), search (paid) advertising, Media advertising, SMM (Social Media Marketing) social media marketing, content marketing, E-mail marketing; Hootsuit's company research analysis determined the number of Internet users and purchasing power in the online environment, which averaged 500 USD per year. The number of Internet users in the online environment averaged 500 USD per year. And also to prioritise specific types of products. We have also identified that search engines are the main source of learning new information for consumers. Having analysed the dynamics of internet penetration in Ukraine, it appears that the number of internet users increased by 8% in 2019, with 22.96 million Ukrainians using the internet at the end of 2019. The article examines the possibilities of Internet marketing tools that become available when using such a tool as web analytics, including: personalised offers to customers, building relationships with customers, after a purchase is made and increasing their retention rate. A study of advertising costs on the social network Facebook, during the presidential elections in Ukraine in 2019 and during the presidential race in the USA in 2020 was conducted. And also defined the role played by social networks in building relationships with the target audience. During the research, recommendations for the use of the main tools of Internet marketing were made and it was determined which business areas are not suitable for each of the tools. Based on the research and statistical data was predicted directions of development of Internet marketing.


Author(s):  
Ronald M. Baecker

Most computers during the Second World War, such as the British code-breaking Colussus machine, had been developed for military use. The effects on law and order and war and peace of computerization, worldwide telecommunications, social media, artificial intelligence (AI), and robotics is the topic of Chapter 6. As in Chapter 5, the most compelling visions of the potential opportunities and dangers have been in science fiction and in film; we begin the chapter by reviewing some memorable examples. We then discuss how technology is used by the police, such as the use of video evidence to sometimes exonerate the police against false accusations of needless brutality. We also examine how citizens are using social media to protect themselves and alert others to what they believe is unwarranted violence or unjust actions by law enforcement. We expand upon Section 5.7’s discussion of citizen mobilization by social media with the goal of regime change. In this context, we discuss how the government (especially police and security services) gains leverage via the surveillance of the digital information and communications of citizens. This surveillance has significantly increased due to security concerns post-9/11. We will examine these developments in the USA, Canada, and the UK, as well as in other parts of the world. We shall also discuss cases of organizations trying to subvert societies that repress and forbid access to the internet, with the goal of enabling its citizens to access the internet freely. Next, we consider ways in which tools of digital disruption are used by a country or government or a set of individuals against others. The timely and current case study explored is on governmental use of hacking and other aggressive digital means to interfere with the electoral processes of another country, or even to disrupt or destabilize the other country. At the extreme, governments engage in cyberterrorism or even cyberwar­fare. We shall discuss several recent examples of this and argue that weapons of cyberwar­fare could be as catastrophic as nuclear or biological weapons. The technology of warfare has also evolved.


IFLA Journal ◽  
2021 ◽  
pp. 034003522110411
Author(s):  
Md. Sayeed Al-Zaman

This study analysed 9657 pieces of misinformation that originated in 138 countries and were fact-checked by 94 organizations to understand the prevalence and sources of misinformation in different countries. The results show that India (15.94%), the USA (9.74%), Brazil (8.57%) and Spain (8.03%) are the four most misinformation-affected countries. Based on the results, it is presumed that the prevalence of COVID-19 misinformation can have a positive association with the COVID-19 situation. Social media (84.94%) produces the largest amount of misinformation, and the Internet (90.5%) as a whole is responsible for most of the COVID-19 misinformation. Moreover, Facebook alone produces 66.87% of the misinformation among all social media platforms. Of all the countries, India (18.07%) produced the largest amount of social media misinformation, perhaps thanks to the country’s higher Internet penetration rate, increasing social media consumption and users’ lack of Internet literacy.


Author(s):  
André Årnes

A central issue in assessing and responding to an attack on the Internet is the identification and localization of the attackers. In information warfare and cyber terrorism, an attack can be launched using a large number of hosts, in which case fast and accurate identification and tracing is crucial for handling and responding to the attack. In the digital world of the Internet, however, there are many cases where a successful trace is difficult or impossible. The design of the Internet, as well as services that hide the origin of communication and provide anonymity, complicate tracing and create a need for a wide range of tools for tracing. In this chapter, we provide a survey of different tools and services available for tracing the geographic location of hosts and users on the Internet. We consider both active and passive methods of identification and tracing. A passive trace uses information that is available through public sources, in log data, or through commercially available databases. Active methods involve the use of tools for probing the attacking party directly, for example, through scanning and pinging. Some of the methods for locating addresses on the Internet have been developed for use in electronic commerce and marketing applications, but the basic principles are equally applicable to digital investigations and information warfare. We consider only tracing of addresses on the Internet. Consequently, this chapter only considers the Internet Protocol (IPv4 and IPv6), as well as higher level protocols using IP (such as TCP, UDP, and HTTP). We refer to the host that we try to identify as the target host and its address as the target address. The system used to execute the tracing is referred to as the trace host.


Author(s):  
Lech J. Janczewski ◽  
Andrew M. Colarik

Business continuity management is a process aimed at reducing disruptions caused by disasters and security failures that could be the results of natural phenomena, accidents, failure of equipment, or deliberate human acts. Among the last of the results are cyber-terrorist attacks or acts of information warfare. A long time ago, it was proven that the present level of technology allows for the elimination of pilots from the cockpits of large commercial jets. A huge jumbo jet is able to take off, fly to the opposite side of the globe, and land safely without human intervention. With this knowledge, we must wonder why airline pilots spend so much time on flight simulators, and why pilots are still needed in the front of the plane. The answer is really quite simple: they are rigorously trained to handle emergency situations.


Author(s):  
Angela Daly

The focus of this chapter will be the recent conduct of various corporations in withdrawing Internet services provided to information portal WikiLeaks in light of the controversy surrounding WikiLeaks’ publishing classified documents of correspondence between the US State Department and its diplomatic missions around the world in late 2010. The implications for freedom of expression (especially the right to access information) on the Internet will be examined in the wake of WikiLeaks, particularly in the context of the infringer being a private actor, and one comprising a mono- or oligopoly. The motivation of these private actors in contributing to the suppression of WikiLeaks will be assessed to examine whether it constitutes an example of Birnhack and Elkin-Koren’s “invisible handshake,” i.e. the “emerging collaboration” between the state and multinational corporations on the Internet that they posit is producing “the ultimate threat.” The legal recourse open to WikiLeaks and its users for the infringement of fundamental rights will be examined, especially the First Amendment to the US Constitution since the geographic location for these events has mostly been the USA. Finally, the postscript to the WikiLeaks controversy will be considered: the “information warfare” conducted by hackers will be examined to determine whether the exercise of power of these Internet corporations in a way which infringes fundamental rights can be checked by technological means, and whether hackers are indeed the true electronic defenders of freedom of expression.


2021 ◽  
Vol 17 (1) ◽  
pp. 258-264
Author(s):  
Alin PREDA

Beyond the benefits or risks of individual or institutional communication through social media, we must note that it is the perfect environment for fake news and propaganda because of the speed of information propagation, the unfriendly environment for checking sources, algorithms behind social networks and, last but not least, the extremely low cost. In other words, the Internet and web 2.0 have created the favorable framework for the conduct of the war "for minds and hearts", as it can be called the information war waged through social media. Beyond these considerations, the non-regulation of the online domain - the lack of rules, be they deontological, make social media a powerful weapon of attack in this type of war. At the same time, the use of this space by state actors should be done with caution because it involves risks that could result in the loss of the most important action capacity: credibility. This article aims to analyze social media as a tool in information warfare


Author(s):  
Njomza Krasniqi

As it is always with new inventions in human history the role they play in their early stages is mostly none acknowledged before they make a more widespread impact. The social media is one of them. Due to the new aspects that this relatively new kind of media its role is mostly negligee in favors of the more vastly popular other forms. In the kind of era that we live technology means that the place where we get the information is irrelevant in the grand scheme of the things, however that does not mean that the impact is lesser or higher. To make the example more clear even though a news that the currency is going to raise or lower in the USA- for example its mostly limited to the USA citizens it has a dire impact in the rest of the world, but even though the means for this news is the generic media, the ones to give the means to understand and make amends to prepare for the consequences to the rest of the world. Due to this kind of functionality is always difficult to separate where the generic forms of the media begin and where the social media begin. What is interesting is that this function of social media begins since the first forms of the internet and it’s just more pronounced nowadays. As an example of this functionality the more prominent one is the way Turkey interfered in the Kosovo Crises. More than the generic news and political affiliation at the time the most impact in the public opinion did the social media. This paper is a research in this regard. It’s not very detailed and it shows a general picture of the situation and only deal with the main aspects of the behavior of the social media, however is a beginning which shows the great impact all forms of communications, especially the social media.


Sign in / Sign up

Export Citation Format

Share Document