WHITE PAPER 1012 | 13TH, JUNE 2009 INDEX > LIBROS > ARTICULOS

ISBN  978-1-1583-126-6

DESDE 1999 HASTA 2010, LA COMPLETA HISTORIA DEL CYBERTERRORISMO Y DE LA EVOLUCIÓN DEL INTERNET

CYBERTERRORISMO

$9.99

DIGITAL BOOK FORMAT

WWW.AMAZON.COM

 DIGITAL PRICE ENGLISH EDITION | KINDLE EDITION

“Un líder hábil es el que logra derrotar las tropas del enemigo sin luchar, el que captura ciudades sin sitiarlas”.

 General Sun Tzu _________El Arte de la Guerra, 25 siglos atrás

DESDE 1999 HASTA 2010, LA COMPLETA HISTORIA DEL CYBERTERRORISMO Y DE LA EVOLUCIÓN DEL INTERNET

CYBERTERRORISMO | DIGITAL EDITION

ESTUDIO POLÍTICO

             INTRODUCTION | Desde smart phones, hasta medidores de agua y electricidad inteligente, desde digital TV, vía Internet, hasta información médica digital, desde el registro completo de que compramos con la tarjeta de crédito, hasta el registro de todas las páginas web que visitamos, desde archivar todo en los clound computing, hasta escrutinio electrónico de todo lo que ponemos en Twitter, Facebook, Myspace, Skype, LinkedIn, Google, Internet, la única cosa faltante es el código genético personal. Toda esta información, números y letras, están totalmente y para siempre en el Internet, en algún servidor, almacenada en bancos de memorias, y solo a unas techas de distancia de algún analista y/o terrorista cibernético. Súper computadoras en redes de súper servidores analizan a diario que hacemos y como nos comportamos. Estamos dentro del cyber control.

 No solo nosotros, como individuaos y personalidad estamos totalmente desnudos  de  nuestras íntimas fibras humanas, pero las empresas, las compañías de utilidades, transportes, organizaciones, bancos,  y el sistema de defensa nacional esta descubierto a la merced de unos pocos delincuentes y terroristas cibernéticos, cada día más talentosos, dedicados, instruidos en las mejores universidades, con hardware más potente y métodos más sofisticados.

 Como el Internet fue una vía de acercarnos al conocimiento y una tremenda plataforma de comercio, así podrá en los manos de pocos, por ser la vía ideal y nunca pensada en existir, la manera que las civilizaciones avanzadas se van a perder su fibra democrática, se van a transformar en dictaduras, van a ser destrozadas desde adentro y van a desaparecer debido al cyberterrorismo, cyber crimen y cyber fraude y cyber control.

| HEDI ENGHELBEERG


         FOR THIS BOOK | by Ileana Ros-Lehtinen

            The rapid spread and continuing evolution of the Internet has brought countless benefits to the world.  But as this transformation reaches ever further into our lives, it brings with it increasing vulnerabilities leaving us exposed to those who seek to do us harm. 

 We are all aware of computer viruses and other malicious efforts to steal and misuse our personal information.  The recent attack on Google and other companies by sources apparently originating in China has dramatically raised the visibility of the threat to businesses, from the financial sector to aircraft manufacturers. 

 Less well known are the highly sophisticated assaults on our national security agencies from several sources, including foreign governments, which may be planning to deliver a devastating blow in the event of war. 

 Terrorists who wish to strike the U.S. have rich pickings, such as our electricity grid and other essential services.

 In his newly revised book, Hedi Enghelberg has given us a wake-up call regarding this rapidly growing threat.  His warning that Cyberterrorism can only be understood as an act of war is one that the public and policymakers will ignore at their peril. 

 The executive branch, private business, and others must work together to combat this menace because it is one we share in common and for which there is no individual solution. 

 Congress has a key role to play in this effort by educating the public to the threat, ensuring that sufficient resources are devoted to defending the American people, and promoting a vigorous U.S. policy toward combating Cyberterrorism.

 Enghelberg begins to provide us with a roadmap of the threat, in order to better prepare against it. He has given us an unambiguous warning and I hope we are wise enough to heed it.

          The Hon. Ileana Ros-Lehtinen is a U.S. Representative from Florida’s 18th Congressional District and serves as Ranking Republican Member of the Committee on Foreign Affairs.”


 
 

Briefing on Cyber Terrorism

EDITION JUNE 2009

CYBER TERRORISM CONVERGENCE ®

TERRORISM MARKETING ®

CYBER TERRORISM MARKETING ®

 

   
   

  NEW CONCEPTS

CYBER TERRORISM CONVERGENCE ®

 Cyber terrorism convergence it’s a new trend in the worldwide terrorist activities. Due to the nature of the digital media, they are using now the entire spectrum, in means of technology, hardware and software. One device, for example, like a smart phone, or a laptop can collect, generate files of sound, images, film and transmit them over (via radio waves) internet, to be posted on a website, as files or messages on social networks (see www.twitter.com).

Using convergence, the terrorist are melting and interlocking all the resources of computers, information technology, digital media,  telecom, LAN, WIFI, publishing & editing software into generating content that will be broadcasted via Internet. This content or pocket of information as then retransmitted, for free by the media outlets, via newspapers, magazines, radio, television, web based news outlet, transformed into a certain type* of news and entertainment. Certain Type refers to the nature of damage it produces in the public option view, even if the military value is close to nothing.

Standard Example: the June 2009 message of the President Obama and his speech to the Muslim World, from Cairo University coincided with the near perfect timing of Osama bin Laden message, from an obscure cave in the Pakistan/Afghanistan border.  If this message (unpolished and with poor audio quality), published somewhere in internet,  have not been broadcasted (for free and other precise timing) by satellite news network Al Jazeera and rebroadcasted by the rest of the news network, translates, interpreted, re transmitted, discussed, it will just faded way in the immense electronic traffic generated by internet.

The trend (electronic media convergence) is dominated by:

  • Hardware on one side, like super smart devices, phones and laptops.

  • Internet access on the other hand, via telecom, Wi-Fi and Wimax,

This complex process is complimented by media researched, (data mining), internet based software, social networking, targeted media (object-based media).


 CYBER TERRORISM MARKETING ®

Now, new tactics are in place, as ideas and technology melt, and we are talking about CYBER TERRORISM MARKETING ® and TERRORISM MARKETING ® more than a direct terrorism attack.

ONE HAS TO APPLY GLOBAL STRATEGIES AND ENHANCES TACTICAL PROCEDURES TO FIGHTS THESE TRENDS AND PRECISION DELIVERY WEAPON OF THIS ASYMMETRIC TYPE OF WAR, WHICH IS CYBER TERRORISM.

The terrorist’s networks (+ its associates) are now savvy marketing specialists with professional knowledge in psychology. They are technology experts, mass media projectors and future analyst.

The object of terrorist analyze is behavior, perception, conversational marketing, body language, responsive environment, future emotion presumes, mass media mixes and cocktails, multi-sensory marketing, new flavors of sub-conscious advertise.

Banking is already a feature on a smart device. In a short time even credit card transactions over VoIP prone lines will be possible, so a full spectrum of services will be available from a smart phone, the center of convergence.

    Al Qaeda has become (tranformed/evolved into) a doctrine. Al Qaeda is now a doctrine, more than a cohered and effective fighting force, as communism doctrine was during the Cold War, and it have to be engaged in this very strategic level.

One of the fuels that feed terrorism and extremism is the continuing coverage of the Western and Islamic media of the Al Qaeda type (franchise) discourse. They (Western media) provide a wide platform the broadcasting of this doctrine, the largest one in the history of mankind. With this kind of wide broadcasting, every message, every argument, every speech is heard and received everywhere, and stored, for replays and references.

Al Qaeda is transforming into a symbol and it’s a franchised model to be adapted and (always) improved, with new technologies as cyber terrorism (an asymmetric war weapon) where technology convergence is a much needed and desired broadcasting tool.

MAJOR NEW OUTLETS SELF CENSURE OF THE TERRORISM COVERAGE HAVE TO BE FACTORED IN.  The media are careering out the terrorist agenda and propaganda. As “loose lips sinks ships”, as well loose media coverage of terrorist proclamations serves the very purpose of the proclamation: to be proclaimed and broadcasted. If no news about Al Qaeda & Co. will be broadcasted, then the state agencies and institutions can better handle the terrorism flagella. This is not limiting the free speech, but merely a tactic and strategy in this asymmetric war: cyber terrorism.

Cyber terrorism works on two main fronts:

  • The economical front, trying to mine and undermine the economical life of the opponent, causing disruptions in the economical, social and in some cases, even military operations.

  • The propaganda front, using internet as a platform to spread propaganda, doctrines of hate, provide training manuals, arguments and information and a tool to reach people and groups all over the world..

THE TERRORISTS KNOW THAT IT'S EASIER TO REINFORCE A PERCEPTION THAN CREATE A NEW ONE and they use the mass media and convergence to this end.

Al Qaeda opened the way with the explosive and deadly demonstration of 9/11. It provided in the 90’ and early 2000’ the structure and the doctrine for the fighting against the infidels. It may fade away, but new flavors will emerge, and the marketing and the technology convergence will be the platform to spread away the new doctrines and schools of thoughts.

Final Note The Cyber Terrorism it's a form/type of asymmetric war, using media convergence. Given the difficulty of monitoring, tracing and forensic analyze of the telecom, digitals VoIP, social sites and communications in Internet (read cyber space and networks) we want to make the strong case that the actual web space/internet (with all its marketing tools, telecom and  media) are an essential and sine-qua-non tool for extremists and terrorists worldwide.

  ORIGINAL CONCEPT BY Hedi Enghelberg  |


TALK BACK:     hedi@enghelberg.com

ENGpublishing

 INDEX-HOME |BOOKS-LIBROS |ARTICLES-ARTICULOS | COMMENTARIES | EVENTS |CONTACTS | BUY-COMPRAS

WWW.ENGPUBLISHING.COM

CARACAS +58 (0212) 862.2808  |  WORLD  +1 (954) 323.2024 |(954) 778.8543 |  EMAIL

 
 

TALK BACK:     hedi@enghelberg.com