SOCIAL MEDIA IN TIME OF PEACE AND WAR By Hedi Enghelberg [White Paper Book]

Post on 22-Feb-2023

0 views 0 download

Transcript of SOCIAL MEDIA IN TIME OF PEACE AND WAR By Hedi Enghelberg [White Paper Book]

HEDI ENGHELBERG

SOCIAL MEDIA

IN TIMES OF PEACE AND WAR

SOCIAL MEDIA IN TIMES OF PEACE AND WAR

CYBER WARS, CYBER ESPIONAGE, CYBER FRAUD, CYBER CRIME.

CYBER CONTROL OF INFORMATION FROM THE UNIVERSAL POINT-OF-VIEW OF THE PROCESS

AND IT’S USES IN TIMES OF PEACE AND WAR.

P O L I T I C A L S T U D Y

B R I E F I N G - W H I T E P A P E R

VOLUME III THIRD VOLUME IN THE CYBER TERRORISM SERIES

ELECTRONIC & DIGITAL EDITION | VERSION 1.0

ISBN 978-1-60585-126-6

December 2014 | MMXIV

This is a fragment of the full book format due to be published

Digital Format (e-Book) in December 2014

HEDI ENGHELBERG

SOCIAL MEDIA IN TIMES OF

PEACE AND WAR

Copyright © 2014 BY HEDI ENGHELBERG

ALL RIGHTS RESERVED

ENGLISH VERSION COPYRIGHT © 2014 THE ENG GROUP LLC

4700 SHERIDAN STREET, SUITE J, HOLLYWOOD, FL 330212, USA

DIGITAL BOOK

ISBN 978-1-60585-126-6

WWW.ENGHELBERG.COM

ENG PUBLISHING | A BUSINESS UNIT OF THE ENG GROUP LLC, USA

EDICIONES ENGHELBERG | A BUSINESS UNIT OF THE GRUPO HEDI ENGHELBERG, CA. VENEZUELA

Copyright © ENG PUBLISHING & HEDI ENGHELBERG 2013-2014 All right reserved. NO PART OF THIS PUBLICATION MAY BE REPRODUCED STORED IN A RETRIEVAL SYSTEM, OR

TRANSMITTED, IN ANY FORM OR BY ANY MEANS, ELECTRONIC, MECHANICAL, PHOTOCOPYING, RECORDING,

OR OTHERWISE, WITHOUT PRIOR PERMISSION FROM THE PUBLISHER OR AUTHOR | EMAIL:

HEDI@ENGHELBERG.COM

DIGITAL VERSION: 1. 0 EDITED + CH

FIRST PUBLICATION: ABRIL 2014 | WWW.AMAZON.COM, KINDLE STORE

PUBLISHER: ENG PUBLISHING | www.engpublishing.com

BOOK CONCEPT: HEDI ENGHELBERG

COVER DESIGN: HEDI ENGHELBERG and JESUS (VERDIN) RIVAS

DIGITAL PRODUCTION: HEDI ENGHELBERG

PRINTED EDITION: USA, Library of Congress

EDITOR: ANDRES USCATEGUI

Book written partially on an iPad

VIDEOS RECORDED ON A BLACKBERRY 9900

Other digital books by Hedi Enghelberg are published on iBooksStore (iTunes)

www.AMAZON.com | www.BN.com | www.apple/itunes.com

WWW.ENGPUBLISHING.COM 94,985 Words | 202 A4-type Pages

*******

ABOUT THE AUTHOR

“In my style of writing and reporting, I try to be concise and direct as possible; be

totally on the service of the content presented to my readers. The place of the

subject in the recorded history is important to me. I treat my work (subject) with

care and affection, I try to identify myself with the story, make it interesting for

the reader. I employ the best language style I can master. My message is to

convey the true meaning of the subject I am writing about from my point-of-

view and the times we live in. I am just (the) a messenger.”

Hedi Enghelberg | (Born August 14, 1957) is a Romanian/Israeli writer. Born in

Romania, he’s a University of Bucharest graduate in Mechanical Engineering (ICB). Enghelberg lived in Venezuela since 1986, and is founder and CEO of several successful businesses and organizations servicing a wide variety of clients and ranging from manufacturing to providing business solutions and web design for customers throughout Central and South America. Mr. Enghelberg is currently a resident of South Florida. Enghelberg was educated in Moinesti and continued in Bucharest, attending the Construction Institute of Bucharest, graduation in June 1982 with Mechanical Engineer Degree. In 2000, Hedi wrote and published his first book, “Escape del ultimo tren de Auschwitz” about his family history, Jewish history, and his father, Moises time as a forced labor prisoner/hand in the Romanian/German railways system, during WWII. The second book “The H Clone” is about facts based fiction history novel about attempts to clone Hitler in 2001. The third book, based on many conferences, was meant to open the awareness about a new type of war is “Cyberterrorismo / Cyber wars / InfoWar” and is about a new cyber wars and cyber terrorism. Since residing in U.S., there more titles will be published: “Codename: Capital”, about the first two hours of the Yom Kippur war and “Poemas del Medio Dia” a 51 poems book that will feature 12 poems from his son, Moises Enghelberg, under the title of “La Risa Nerviosa” In 2007 Enghelberg started a website for conserving old photographs and the means to communicate the photograph meanings and lessons: www.engpublishing.com

“THE TRAINS OF THE HOLOCAUST”, THE TRAINS: ANOTHER TOOL OF THE “FINAL SOLUTION” AND A SIMPLE GERMAN RAILWAYS LOGISTICAL PROBLEM. A Study of the Railways Transports Across Europe, During The Second and Final Phase of the Holocaust. THE ACTIVE COOPERATION OF EUROPE’S RAILWAYS IN THE “FINAL SOLUTION”

Other digital titles to be published in 2015-2016 Time. Limited Time-travel. Memory and Experience. The room with a red painting. Sharon, The Crossing (YOM KIPPUR WAR, OCTOBER 1973)

*******

TABLE OF CONTENT

DEFINITIONS, Terrorism, Hackers

CHAPTER 1, AUTHOR NOTES, INTRODUCTION BEFORRE

PUBLISHING, FORWARD, METODOLOGY,

CHAPTER 2, SOCIAL MEDIA IN TIME OF PEACE, STUDY CASES,

CHAPTER 3, THE DEVICES OF THE INTERNET AND SOCIAL MEDIA.

THE TECHNOLOGY AND THE ASSOCIATES HARDWARE.

CHAPTER 4, GOVERNMENT CONTROL OF THE INTERNET ACCESS,

TELECOM AND SOCIAL MEDIA

CHAPTER 5, SOCIAL MEDIA IN TIMES OF WAR, ISIS WAR

PROPAGANDA MACIONE ON SOCIAL MEDIA

BONUS MATERIAL, OTHER BOOKS ON CYBERTERRORSM,

VOLUME I AND VOLUME II BY HEDI ENGHELBERG, ARTICLES.

DEFINITIONS

Terrorism. Many people now, citizens, news consumers, with analyst along, and

governments are trading to redefine terrorism and acts of terrorism. Everyone

tries to micro manage the terms, from governments to UN.

Everybody, from civilian, agencies, government to non-state actors are try

to manage the term in order to serve their own interest, at home, abroad and

especially with an eye to the economic concerns which dictate many, if not all

political decisions. Trade wars are very costly and not well received by the

public at home, all consumers and voters. Each country is sensible to foreign

investment.

The example is China, with its aggression on South China Sea, registering

now a low in foreign investment. Another example is Russia, after taking Crimea

and fomenting secession and chancing frontiers by force in Ukraine. The Russian

Federation is facing an all-time low in foreign investment, who trickled to an

almost a stop. The rubbles is devaluated to a very low value. War, terrorism,

aggression, they are all reflect back at home.

Terrorism today is appearing in many faces and projections. Some political

correctness is making us thinks to name it and consider it as a purely act of

violence against unarmed civilians, pure terrorist acts. Acts of violence can take

many forms are copycat of web inspired. These copycats, as I call them

“terrorism franchises”, are not to be avoided to be called on what they are,

terrorism aggression. Sabotage can be a terrorist act like the fire at an Air

Control Center in Chicago, Sept. 2014.

Terrorist motivations are present and projected in thousands of web sites

on internet servers around the globe. I call this “terrorism by suggestion”. They

disguise their criminal/terrorist projects in internet, social media, chats rooms,

SMS, tweets and they are “sleepers”, in disguise living in communities near us.

Daniel Pearl, a journalist with WSJ was beheaded by a terrorist

organization. Now we have ISIS doing it on weekly bases, on line, on social

media, and Americans doing it in urban environment, here at home. Some are

naturalized, some are American born, some converts and they all are inspired

by Radical Islam. If an act of violence is inspired by another act of violence and

terrorism and is creating fear in the civilian population and noncombatants, with

a subtext of inciting to murder, then is an act of terrorism.

Hacker. We use so much the term, which the meaning evolved from one notion to many

other notions.

A hacker can a person with the hobby, especially a hobby related to

electricity, cables, phone systems, internet, computers, networks and related.

Evolving, a hacker can a person, with computer & software operation

dexterities/abilities, member of a group those activities is related to computers,

internet, software, computer games, exploration of new frontier on what

hardware and software can do.

The next level, the 3rd one, is that of a hacker versus a computer,

hardware and software security. His dexterities in operating hardware and

software are to put on the employment of finding system/internet/cybernetic

weakness. And Windows software system has many weaknesses, which were

exploited to the full spectrums in breaching the personal computers, servers,

routers.

These weakness were the base of cyber terrorism, cyber hacking, cyber

fraud, cyber espionage, etc. At first, these breaching were for fun and for

bravado, between the then hacker’s members, also named “crakers”. But,

bandits, military, terrorists operatives were employing hackers as outsourcing

manpower to do their work of cyber theft, cyber terrorism and military hacking.

Now we have as well cyber espionage and cyber fraud.

The pure hackers, belonging to a subculture of cybernetics are long gone.

These rare breeds of amateurs a replaced by professional teams of highly

trained specialists, cyber banditos, cyber terrorists, military personell, etc.

At first, the authorities, the banking system, the military, were surprised by

the hackers. But now, teams of specialist on both sides are battling in a

continuous, 24/7 counter espionage and counter blackmail, and counter hitting

the cyber opponents.

Once a subculture of few, pure hearts, with hand-made-from-scratch

computer-hardware and ad-hoc networks, working in dark basement, is now

dominated by super-fast computer systems, in high-rise buildings, with A/C at

63F, with extra fast internet access, fiber optics, large LED multiple screens,

immense digital data banks servers, free cafeteria, highly paid and highly

trained operators.

Sure, the term hacker remains controversial, but now this term belongs to

the Internet history, being replaced by full time, trained and paid cadre.

CHAPTER I

HEDI ENGHELBERG

SOCIAL MEDIA IN TIMES OF

PEACE AND WAR

THIRD EDITION OF THE CYBER TERRORISM SERIES | VOLUME III

AUTHOR NOTE

“EVERYBODY KNOWS NOW EVERYTHING,

EVERYWHERE, ANYTIME. WE ARE EXPOSED!” | HEDI ENGHELBERG

This new book is a compilation of three books. It’s the description of a

natural evolution of a phenomenon, public internet, only thirty years old.

This new book “Social media in times of peace and war”, is a continuation

of the second book in the series “THE EVOLUTION OF CYBER TERRORISM: A

PRECISION-DELIVERY WEAPON, AN ASYMMETRIC WAR. CYBER TERRORISM, CYBER

SABOTAGE AND CYBER WARFARE, THE NEW FRONTIERS IN 21st CENTURY

WARFARE” itself un upgrade of the first book, “Ciber Terrorismo”.

The first books, in Spanish, was published in 2003, but was based on dozen

of conferences starting back in 1999. At the time, 1999, the public internet was

only 16-17 years old and cyber terrorism was in infancy. I was one of the few and

the first to recognize the “clear and present danger” of these new flagella.

Over the years, as the computing power augmented and more people

got into personal computing and internet, cyber terrorism evolved as well into all

kinds of flavors and currents, cyber wars, cyber fraud, cyber bullying, cyber

espionage, identity theft, cyber control, etc. this was the subject of the second

book in the series, dedicated to the evolution of cyber terrorism and its currents.

But in the last 4-5 years a new form of interaction over internet took us all

by surprise and interconnected us into mass and vast social media.

This third book on the series is dedicated to this phenomenon, the Social

media, a vast pool of information, images, photos, movies, knowledge,

messages, news, that binds us all.

As a bonus for the reader, at the end of this book on Social Media, you will

find the second book, “THE EVOLUTION OF CYBER TERRORISM: A PRECISION-

DELIVERY WEAPON, AN ASYMMETRIC WAR. CYBER TERRORISM, CYBER SABOTAGE

AND CYBER WARFARE, THE NEW FRONTIERS IN 21st CENTURY WARFARE”. Some of

the last chapters are still in the original Spanish of the first books, Cyber Terrorism.

So here you have some 100,000 words dedicated to these fascinating

subjects, who affect us all, in many ways and sometimes, with devastating

effects: internet, terrorism and social media.

NOTE OF MARCH 2014

We are becoming a society that is gathering all type of electronic

Information. Unheard volume of data is gathered and saved every minute,

constantly. Nothing is private anymore, even if you have a “veil of privacy”

pulled over your eyes.

What we tweet, what we read, what we write, where we go (via the GPS

systems on the phone and the vehicle smart control unit), what we drink, eat

and buy, where we travel by car, airplane or boat, what we buy online, all is

known to the “big brother” or whatever agency with access to our online

records, internet access and credit card info.

What we rent from the local county or city library to what we watch on

the television (via Nielsen) is watched, monitored and stored in a data base, in

some server.

We are far from the Roman Empire, an ancient time, long ago, when

libraries were maintained by the state.

When you go to the airport, your scanned body image is stored

somewhere. 95% of the people choose to have the body scanned for security

reasons. All data is stored. Nothing is deleted.

Not only that we are watched, as I call it “cyber control”, but this info is

sold to advertise and other commercial companies to target us to buy more

stuff we don’t need. What we buy on line is analyzed and transformed into

code, to send us more stuff to buy. All is about matching information of what we

do and what we might do in the future, like reading our minds. The cookies, from

the sites we visit are tracking us all the time, automatically, rapidly, directly.

All this information is stored, solidly stored, forever, in some server close to

you. All the searches you do on internet, are stored…the good and the bad

ones…what you shop on Amazon, even the searches in amazon…, and later

they bombard you with more info and “ fantastic” offer, just to get from you the

last penny on you electronic wallet of pocket.

All you do is accessible to online search. All the data is there, even what

you purchased at the local supermarket, with a credit card.

Even if you think you’re private, you’re not. All this informs about you is

delivered and analyzed, stored and indexed.

EVEN IF YOU WANT TO BE PRIVATE, you cannot. Every time you get into

internet, you are numbered, like convict, with an IP number. This number is

tattooed on you!

Even if you go to secret search engines (Tor), enter internet via some dark

gateways, you can be tracked; and even at the gate of these “secret”

gateways, they will get you there. As well going to this length, the speed of

access will go at least four times slower.

Getting privacies installed on your devices, phones, iPADS, sms, laptops,

etc… it will not get you anywhere.

You are tracked, via the network, data or Wi-Fi access feature on your

phone, from the local mall, Starbucks or to the local airport. Free internet access

will get you anywhere, every time.

Your car have an active GSP system, all the time pinging and a smart

control module with internet or satellite access recording what you do and how

you drive and most importantly, where you drive. Some cars, engines, boat,

airplane has low-jack systems (via cellular towers) or satellite tracking (Inmarsat,

Iridium, Globalsat, etc.) burst data systems.

YOU CAN CHOOSE TO BE DISCONNECTED, live in s small cabin, in the

woods, in a tent in the desert or an isolated island. BUT OTHER PEOPLE PREFFER

TO LIVE IN THIS MODERN, ADVANCES, full technology AND FANTASTIC WORLD.

FOR EACH WORLD THERE IS A PRICE.

You can pay at the entrance or at the exit, but, eventually, you will pay.

You cannot escape being watched, even when using encryption.

Hedi Enghelberg

For this III-rd edition, Fort Lauderdale, 2013

NET NEUTRALITY: ALL TRAFIC BEING TREATED EQUALY???!!!

SOME BIG PLAYERS WILL GET MOTE POWERFUL AND SHAPE THE INDUSTRY,

ELIMINATING THE SMALL COMPANIES.

THE GIANTS WILL GET MORE POWERFULL AND THE SMALL COMPANIES WILL DIE.

The roadblock of the “free and chaotic” internet will end equality, fraternity and liberty.

A video on one site will load so slow, that the customer will go to the sites of the

big players. You know the faster channel on I-95, USA? So, large companies will pay

more to the service provider, in order for their content to get faster at destination. The

other companies will be stuck in traffic, get fewer views and access and die a slow and

painfully death.

Internet, from a free, chaotic and unregulated avenue and culture, to get

connected and get free and valuable information will get so regulated, and only the

big companies will reap the benefits from it. This is a paradox, but a mutation and

evolution. Large companies saw the great benefits of the free internet and are taking

advantage is power and money, concentrating this domination.

I am seeing a trend when the “traditional Internet”, free, chaotic and

deregulated is getting so much regulated, for the benefits of specific larger users,

content generations and dominant social media houses.

NOTE OF MAY 12-19, 2014 | JUST A WEEK IN THE NEWS We are crushed by the sheer volume of news related to electronic media, data,

big and small data, software failures, passwords failures, cybercrime, cyber

sabotage, cyber thefts, etc.

The world based on computer software, hardware and millions of

algorithms involve and wrap us as an onion with many peals. The public square

is controlled by CCTV and so many other sensors.

The only place left is home, but not anymore, because as well, at home

we have internet access, and all we do, is media streaming: radio, television,

news, works, music, smart phones, smart refrigerators, smart oven, smart toasters,

smart electricity meters, etc… everything is getting smarts, by the day… not

month, trimester or year…

Are we getting smarter? We should, and we have, because we have to

work harder and get money to pay for this entire array of smart artefacts

surrounding us.

Titles news from BBC WORLD SERVICE, in reference to the cyber terrorism, cyber

espionage, cyber theft and Social Media.

eBay faces investigation over breach

eBay is facing investigations in the US and the UK over its huge data breach

which led it to ask 145 million customers to reset their passwords.

House passes bill on bulk data sweep

The first legislation aimed at ending the National Security Agency's bulk

collection of US phone records is passed by the House of Representatives

Computers affect ability to learn

A teaching union in Northern Ireland voices concern about the impact of

modern technology on children's ability to learn at school.

World's first gaming mag may close

Computer and Video Games, which in 1981 was the world's first magazine

dedicated to gaming, is facing closure.

FBI 'could hire hackers on cannabis

The FBI's director qualifies remarks he made that indicated the agency might

hire hackers who used cannabis.

China's JD.com to debut on Nasdaq

Chinese online retailer JD.com raises $1.8bn in its US share sale, valuing the

company at more $25bn according to underwriters Bank of America and UBS

Investment Bank.

Blizzard sues Starcraft cheat-makers

Activision Blizzard is trying to sue the creators of cheats that allow Starcraft II

players to improve their rankings and unlock new weapons.

Anger over eBay hack delays

A day after a major security breach, online marketplace eBay is facing

questions over how it has dealt with the incident

Google receives 'forget me' requests

A former politician and a convicted paedophile are among those asking

Google to remove links following the right to be forgotten ruling.

Europe Google ruling 'astonishing'

A ruling forcing Google to remove search results has been described as

"astonishing" by Wikipedia founder Jimmy Wales.

Yahoo buys self-destruct chat app

Yahoo acquires Blink, a mobile application that allows users to share messages

that self-destruct, in order to poach the talent behind it.

FBI 'could hire hackers on cannabis'

The FBI's director qualifies remarks he made that indicated the agency might

hire hackers who used cannabis.

VOLUME III INTRODUCTION

BEFORE PUBLISHING

DECEMBER 2014

SO MUCH IS HAPPENING EVERY DAY, THAT I HAVE TO PUBLISH THE BOOK

FAST, OR IT WILL BECOME OBSOLETE IN A WEEK.

The WSJ is so full with news of cyber terrorism, cyber theft, cyber control,

cyber espionage and information leaking that cyber terrorism has evolved from

hackers, private, terrorism groups and state sponsored, working in dark rooms,

isolated and under the cloak of secrecy, into a colossal business of more than

100 billion US dollars a year. IBM just purchased 2 cyber security companies for a

billion each.

Like everything else in the last 2,500 years of well recorded history, the

humans, after a period of some guessing, after the shock of the novelty, realized

a monetary-business-model to each problem: preventing the problem is making

more money than the damages from the problem itself.

Now, there can be many types of damages:

1. Moral damages,

2. Physical damages (including medical issues),

3. Structural damages,

4. System damage,

5. Financial damages,

6. Military damages,

7. Domestic and home damages, caused by the cyber terrorism and cyber-

attacks.

But, preventing the damages, now, - this will be the wave of big

businesses in the next decade! Is already estimated the counter cyber-terrorism

industry will surpass US $25-50 billion by 2015.

Each side of the problem will get a more sophisticated attack method

and MO. Each will seek the upper hand, as the infantry’s attacks at Verdun

during the WWI. The French and the Germans were killed by the millions, with no

gains whatsoever. In our case, hopefully, we will have only hardware damages

and no physical victims. Sure, terrorist propaganda and copy-cat MO like the

ISIS is promoting, can get people killed, executed and terrorism attack plotted.

What goes on one side of the spectrum, replicates on the other side of the

spectrum…a smart phone, a tablet, sized by the police and hold as evidence

can be wiped remotely. Data from any device, smart phone, tablet, laptop

computer can be accesses, deleted and manipulated via remote control,

anywhere, anytime.

We, the good guys, the good companies, the decent people, we will

have to learn to live with the cyber terrorism, cyber-attacks and cyber

espionage, because we are so dependent on computers, cybernetics, robots,

smart phones and all kind of social media outlets.

SOCIAL MEDIA is still critical in some countries like Venezuela, Syria,

Vietnam, Iran, Afghanistan, Pakistan and Egypt.

Social media was critical on the immense popular uprising in Egypt,

which toppled, with the help of the military establishment, the elected Islamist

president Morsi and its Islamic Brotherhood orientated government.

But following twitter, you can get a fair image of the situation. An instant

image of the situation, because social media is faster than the traditional

media. The responses are coming via tweeter, the main conduit of the news

and commentaries. Everybody’s tweets…. Even ISIS!

Is the fastest way to get informed and piece together the whole picture

in each event, in each country! It is raw, and free, and open to each

interpretation and sentiments, but is a tube and the information flows fast in the

direction of truth. Every truth is packet in many paper shits and layers, but by the

end of the day a clear image of what is happening can emerge, after

descanting (or ignoring) the most negative and the most positive tweets.

Restrain, by commerce, government, hackers and bandits, is only

dictated only by the technological limitations. Life, as we know it now, is all

documented in the cloud. All we do on Internet or on the street, commanded

by CCTV, live in server, somewhere. We are leaded by “Policy Agreement” and

“Terms of Use”, “Policy Agreement” of Twitter, Facebook, Netflix, Amazon,

Google, IBM, etc. Every site we visit, have a long and complicated sales policy

of security policy, which have to be approved before we use the web services.

Global treats are only evolving. They will never go down, will always

increase.

WAR IS A CHOICE. BUT ANY CONVENTIONAL WAR OF TOMORROW WILL

START WITH A CYBER ATTACK - A MASSIVE ONE. NOT AN ATACK 24 HOURS PRIOR,

BUT MANY MONTHS BEFORE THE REAL ACTION ON FIELD, ARTILERRY, MISILES,

DRONES AND BULETS WILL START FLYING.

CYBER TERRORISM AND CYBER WAR IS AN ASYMETRIC TYPE OF WAR. IT IS

OUR WIKNESS, AS INDIVIDUALS AND/OR SOCIETY.

NO ONE WILL BE SPARED.

WE WILL HAVE TO FIGHT THIS WAR. AT THE SAME TIME WE WILL BE AUDIENCE

AND ACTORS.

It’s a new world. Drones and robots are taking over: the driverless cars,

trucks, airplanes, train and motor vessels are here.

We are intoxicated by the social media and cybernetics. In short time

clinics will offer a cyber-detox: des-intoxication treatment for humans of the

social media, smart phones, internet and cybernetics “viruses and bacteria”.

But, for sure, again, we, the people, the humans, will evolve from this.

OCT. 8TH, 2014

White House Monitored JPMorgan Breach With Alarm WASHINGTON — President Obama and his top national security advisers began

receiving periodic briefings on the huge cyber-attack at JPMorgan Chase and nine

other financial institutions this summer, part of a new effort to keep top national

security officials as updated on major cyber-attacks as they are on Russian

incursions into Ukraine or Islamic State attacks.

The terrorism and cyber terrorism is morphing, all around the world. The

war against large terrorist outfits, like ISUIS, al Qaeda, Al Nustra, Boko Hiram and

small al Qaeda/ISIS affiliates, subsidiaries and franchising is more expensive, by

the day. The deadest of this al Qaeda terrorism movement, fomented other

small, insignificant groups giving them a theme, a constitutions and fame of a

brand, the brand is Al Qaeda name.

Not all the countries facing new-styled Al Qaeda model have the means,

personnel and treasure to fight it. International help is needed, especially air

resources, satellite information, telecom. In some regions the state power is not

projected. Look what happened in Mali, Libya, Nigeria, CAR, Yemen, Somalia,

Sudan North and South, Syria, Iraq, and even Ukraine. Democracy I'd the big

ideas that have to be implemented, because it's mechanism of accountability

and a moral compass. A big problem that was Al Qaeda as a single group in

Afghanistan is not divided in smaller, bloody problems, around the world. The

disease is already speeded around.

On cyberterrorism, an all-new front is open with the convergence of

sabotage, spying/espionage and terrorism. Some government agencies cannot

operate under a total cloud of secrecy as before the Snowden divulging the

most kept secrets of NSA. That era is gone. Some transparency will be accepted

for the law enforcement, but for sure new type and new methods will be

introduces, with a deeper scanning of workers and analyst.

The large common denominator is the technology, like internet, smart

phones, GPS technology. All combined, voice, data, locations, give the answers

to all the two-millennium military questions of operation, defense and attack. Is a

world of difference today than the times of the mighty Roman Empire, the

model of the western civilization military organizations.

Optimism is mixed with caution... The internet have to be redesigned is

some ways. The management has to be different. Innovation cannot be

differed. The future is bright and all is based on technology. Disruption into the

flows of technology and information will expose us all. The big stick now is

financing of terrorist, off all kinds, because is so easy to trace the electronic

money exchanges. Blocking and reverse money exchange is very easy, when a

terrorist act occurs. The "infection" of the system is faster detected than before.

VOLUME III FORWARD

“QUEEN LYRICS …Too much love will kill you…If you can't make up your mind…Torn

between the lover and the love you leave behind…You're headed for disaster…'Cause

you never read the signs…Too much love will kill you every time…| CLASSIC ROCK,

ALBUM MADE IN HEAVEN, TRACK NO. 8, 1995

… TOO MUCH INTERNET WILL KILL YOU… WE ARE EXPOSED. .. TORN BETWEEN A

SMART PHONE AND A TABLET… BECOUSE ALL THE PRIVACY IS LOST …ALL WE WRITE

WILL LIVE IN THE SERVER… 'Cause you never read the privacy disclosures... | HEDI

ENGHELBERG, AUTHOR

Imagine Moses the Prophet with a Smart Phone, or a digital tablet with a

camera, or Jesus with global Internet Access. Smart media are having

extraordinary powers!

This is such a dynamic sector of our activity, INTERNET, that a book is a

medium to slow to reflect it. Maybe on hourly-updated blog will do better,

because developments succeed in a rapid succession.

This is a book in progress and its schematics can change with every new

edition and upgrade.

This is a repackaging of the previous editions of the Cyber Terrorism,

upgraded, overhauled, but with the Social Media at the forefront.

BEFORE: THE HUMAN BRAIN WAS FORGETTING THINGS AND EVENTS. “VERBA

VOLANT SCIPTA MANENT” THE WORDS ARE FLYING, THE WRITTEN TEXT REMINS.

TODAY: COMPUTER SYSTEMS - REMEMBERING ALL DATA AND INFORMATION

DARKE SIDE OF THE SOCIAL MEDIA AND COMPUTER AGE!

ANYTHING WE DO AND PLACES WE TRAVEL, ALL ARE RECORDED. COMPUTERS

NEVER FOGET THINGS!

THE Cyber Terrorism has evolved many times over. What was once only a one –

sided-directed-attack, from an unknown hacker to a person, or a group of

persons and some scattered institutions (in general Banks), is now a general war.

It has a broader rich, a general rich.

The cyber war, the cyber espionage and cyber controls are now directed

in all direction. The nature or cyber war changed. In a form of what we call

“cyber control” its flow from the government to the general population.

Trying to avoid “cyber oppression” the general population fights back,

attacking the government & its institutions.

As well this trend is valid as well in times or war: from government and

population to other governments and populations.

Who | Where | How | When is valid now both ways, from the population

to the government (oppressive governments) and from government to its own

people.

More than 24 years after the introduction of internet and less than 10 year

of generalization, internet and its associated technologies transformed into an

universal social right. Internet access it’s a fundamental right.

The internet has its own personality and it evolved. It reached a certain

level of maturity and identity.

In a time of enlighten by Internet and its electronic revolution, we see

both side in a war for freedom by the population and a war a control by the

governments. Nobody trusts anybody. They all argue and each side is

entrenched.

Information drives behavior. We want to know more, than we access the

internet more. We go to the liberties more, read more books, and access more

information. Some people have an emotional connect to the information.

Image a small war in a world region. People who access information about the

war will react different to the information. But the information they receive can

be real or simply manipulated. Operator, behind internet can manipulate the

information in such way, in order to create a specific reaction in the general

policy.

We are addicted to information and to the information cycle. The

information cycle is not anymore 24 hours. This cycle is reduced to minutes and

even second. Who is tweeting faster a new, is the king. Who is posting faster

contents, is another king, as well. We have adapted to the speed of the media:

is not anymore a senior anchor, sitting at a desk, in front of a mike, behind a

world map and dispensing the evening news. This format is gone! The new

format is digital news. And any radio, documentary, movie or TV program once

ended and is off the air, can be reviewed on internet, especially on iTunes; any

time you want, against a small fee. Some of the broadcast can be viewed for

free on YouTube. But the trend is here: digital news, fast and comprehensive,

with many commentaries on line. The commentaries are important, because

now, armed with a smart phone, we are actors, participants and critics, all at

the same time.

Our smart phones will fill our lives. We check the device every second, for

a new email, SMS, whatsup text, tweet or new post on Facebook. They will

maintain us in contact with the infinite knowledge stored in internet, with our

work, banking, friends, family and social media. We will open houses, dim lights,

order pay-per-view channels and movies on the TV, do all the works around the

house, the office, and maybe even vote. They will be our remote controls of

your lives. At the same time, as we go/walk away from desktop computers and

laptops and other heavy items, they, the smart phones (and the tablets) will the

target of a sustained cyber terrorism and cyber fraud offensive attack.

**********

“I am going to Africa. I hope I will not get AIDS. Just Joking! I am White.” A

PR woman twitted this message right on the airport gate, embarking on the

plane to Africa. She had a modest follower on Twitter. Before she landed, she

became, from an obscure person, a Public Enemy No.1. She was fired on arrival.

A young man is secretly searching for an engagement ring on internet.

Final choice is done on the next-to-be fiancé’s iPad. Not long before he buys

the ring, the woman knows already she will be asked the “big question”.

Social Media has a formidable speed!

A normal movie trailer is vied at least a few million times. Sometime we can

speak volume, huge volumes. A Korean rapper [PSY-GANGNAM STYLE

(강남스타일) M/V] published on Jul 15, 2012 a video posted on YouTube, was

downloaded or viewed at least 850,000,000+ times. When I write these lines,

were registered 875 million hits. At least 810-820 million (individuals) people

viewed the video (many reviewed the video a few times). Justin Bieber’s “Baby”

video was watched 803 million times.

No, no, no. PSY video is much faster downloaded than anticipated. Days

only after I wrote these lines, the count is on 880,000,000.

THE SOCIAL MEDIA IS NOT only turning the attention of the view for a

specific artist, political issue, education, can generate more web traffic for a

specific target or draw foot traffic to a store, restaurant, boutique, malls, etc.

An university campus is on the lock down, because a gunman was

spotted. All the students are warned via cellular phones, via tweeter, Facebook,

SMS. All the arsenal of social media is combined, in matter of seconds, to get

the information fast and directed. When all is cleared, another furry and salvoes

of emails, SMS, tweets and face books wall notes are sent to all students,

teachers and related personnel.

@JubelFoster: In the last 2 days @open_zion tweeted 30 anti-Israel comments. That blog

seems obsessed with topping the Guardian's anti-Israel propaganda.

EXAMPLE OF A TWEET.

The power of Social Media is global!

This outreach is unprecedented in the history of humans on Earth. By the time this

books will downloaded from internet in a kindle, iPad or other digital reader

device, three times the population of USA will have viewed the video! Imagine

the power of the smart media and the power of social media! Colossal!!! No

other media have this power: reaching all the corners of the world, all the time,

every time. [NOW available on iTunes: http://Smarturl.it/psygangnam]. By itself it

generated more than 6,000,000 likes and only 390,000 dislike. No other traditional

media could have claimed such a record in such a short time. A small war is

going on between the fans of this video and the Justin Bieber fans, for the first

place of most-watched video.

In the decision cycle, the good and economical decisions rarely intersect.

Sometimes a good decision, a correct one is not economical. And an

economical decision is not the good or the correct one for the issue we have.

The same cycle applies for the

*******

METODOLOGY

FIRST EDITION | PRIMERA EDICIÓN 2003-2004

Primera Edición en Español PRINTED IN USA/EE.UU. POR EDICIONES ENGHELBERG

ISBN 980-07-8518-3 Deposito Legal If 25220023032415, Caracas – VE, 2003

SECOND EDITION | SEGUNDA EDICIÓN 2010-2011 Segunda Edición en Español PRINTED IN USA/EE.UU. POR ENG PUBLISHING

ISBN 978-1-60585-126-6 FORT LAUDERDALE/FL, USA, 2010

THIRD EDITION | TERCERA EDICIÓN 2011-2014

TERCERA Edición en Español PRINTED IN USA/EE.UU. POR ENG PUBLISHING

ISBN 978-1-60585-126-6 FORT LAUDERDALE/FL, USA, 2014

In previous two volumes, since 1999, we wanted and we tried to analyze

the cyber terrorism, cyber theft, cyber fraud, cyber control in this uber-

computerized world.

In this volume we analyze the social media, this rising personal activity, in

times of peace and war, from the universal-point-of-view of the process, and

not form the deep technical, specialized, down-to-the-wire, hardware, software

details.

WE CONSIDER AND REGARD OURSELF AS AN ANALIST, AN OBSERVER OF

THIS UNIVERSAL PROCESS AND WE PRESENT IT AS WE SEE IT.

This book is an analysis of the process and the social repercussions of

universal internet access, on users and government, data storing, tracking our

activity on the internet, in an interconnected world and the price we have to

pay for it: no privacy.

This is not a technical book, just a social study.

The social media is reacting and adapting every day to new events. At

some point we have to go the presses and publish the book.

*******

This is a fragment of the full book format due to be published

Digital Format (e-Book) in December 2014