Practicing Peace: Quaker Relief work in the Spanish Civil War
SOCIAL MEDIA IN TIME OF PEACE AND WAR By Hedi Enghelberg [White Paper Book]
-
Upload
independent -
Category
Documents
-
view
0 -
download
0
Transcript of SOCIAL MEDIA IN TIME OF PEACE AND WAR By Hedi Enghelberg [White Paper Book]
HEDI ENGHELBERG
SOCIAL MEDIA
IN TIMES OF PEACE AND WAR
SOCIAL MEDIA IN TIMES OF PEACE AND WAR
CYBER WARS, CYBER ESPIONAGE, CYBER FRAUD, CYBER CRIME.
CYBER CONTROL OF INFORMATION FROM THE UNIVERSAL POINT-OF-VIEW OF THE PROCESS
AND IT’S USES IN TIMES OF PEACE AND WAR.
P O L I T I C A L S T U D Y
B R I E F I N G - W H I T E P A P E R
VOLUME III THIRD VOLUME IN THE CYBER TERRORISM SERIES
ELECTRONIC & DIGITAL EDITION | VERSION 1.0
ISBN 978-1-60585-126-6
December 2014 | MMXIV
This is a fragment of the full book format due to be published
Digital Format (e-Book) in December 2014
HEDI ENGHELBERG
SOCIAL MEDIA IN TIMES OF
PEACE AND WAR
Copyright © 2014 BY HEDI ENGHELBERG
ALL RIGHTS RESERVED
ENGLISH VERSION COPYRIGHT © 2014 THE ENG GROUP LLC
4700 SHERIDAN STREET, SUITE J, HOLLYWOOD, FL 330212, USA
DIGITAL BOOK
ISBN 978-1-60585-126-6
WWW.ENGHELBERG.COM
ENG PUBLISHING | A BUSINESS UNIT OF THE ENG GROUP LLC, USA
EDICIONES ENGHELBERG | A BUSINESS UNIT OF THE GRUPO HEDI ENGHELBERG, CA. VENEZUELA
Copyright © ENG PUBLISHING & HEDI ENGHELBERG 2013-2014 All right reserved. NO PART OF THIS PUBLICATION MAY BE REPRODUCED STORED IN A RETRIEVAL SYSTEM, OR
TRANSMITTED, IN ANY FORM OR BY ANY MEANS, ELECTRONIC, MECHANICAL, PHOTOCOPYING, RECORDING,
OR OTHERWISE, WITHOUT PRIOR PERMISSION FROM THE PUBLISHER OR AUTHOR | EMAIL:
DIGITAL VERSION: 1. 0 EDITED + CH
FIRST PUBLICATION: ABRIL 2014 | WWW.AMAZON.COM, KINDLE STORE
PUBLISHER: ENG PUBLISHING | www.engpublishing.com
BOOK CONCEPT: HEDI ENGHELBERG
COVER DESIGN: HEDI ENGHELBERG and JESUS (VERDIN) RIVAS
DIGITAL PRODUCTION: HEDI ENGHELBERG
PRINTED EDITION: USA, Library of Congress
EDITOR: ANDRES USCATEGUI
Book written partially on an iPad
VIDEOS RECORDED ON A BLACKBERRY 9900
Other digital books by Hedi Enghelberg are published on iBooksStore (iTunes)
www.AMAZON.com | www.BN.com | www.apple/itunes.com
WWW.ENGPUBLISHING.COM 94,985 Words | 202 A4-type Pages
*******
ABOUT THE AUTHOR
“In my style of writing and reporting, I try to be concise and direct as possible; be
totally on the service of the content presented to my readers. The place of the
subject in the recorded history is important to me. I treat my work (subject) with
care and affection, I try to identify myself with the story, make it interesting for
the reader. I employ the best language style I can master. My message is to
convey the true meaning of the subject I am writing about from my point-of-
view and the times we live in. I am just (the) a messenger.”
Hedi Enghelberg | (Born August 14, 1957) is a Romanian/Israeli writer. Born in
Romania, he’s a University of Bucharest graduate in Mechanical Engineering (ICB). Enghelberg lived in Venezuela since 1986, and is founder and CEO of several successful businesses and organizations servicing a wide variety of clients and ranging from manufacturing to providing business solutions and web design for customers throughout Central and South America. Mr. Enghelberg is currently a resident of South Florida. Enghelberg was educated in Moinesti and continued in Bucharest, attending the Construction Institute of Bucharest, graduation in June 1982 with Mechanical Engineer Degree. In 2000, Hedi wrote and published his first book, “Escape del ultimo tren de Auschwitz” about his family history, Jewish history, and his father, Moises time as a forced labor prisoner/hand in the Romanian/German railways system, during WWII. The second book “The H Clone” is about facts based fiction history novel about attempts to clone Hitler in 2001. The third book, based on many conferences, was meant to open the awareness about a new type of war is “Cyberterrorismo / Cyber wars / InfoWar” and is about a new cyber wars and cyber terrorism. Since residing in U.S., there more titles will be published: “Codename: Capital”, about the first two hours of the Yom Kippur war and “Poemas del Medio Dia” a 51 poems book that will feature 12 poems from his son, Moises Enghelberg, under the title of “La Risa Nerviosa” In 2007 Enghelberg started a website for conserving old photographs and the means to communicate the photograph meanings and lessons: www.engpublishing.com
“THE TRAINS OF THE HOLOCAUST”, THE TRAINS: ANOTHER TOOL OF THE “FINAL SOLUTION” AND A SIMPLE GERMAN RAILWAYS LOGISTICAL PROBLEM. A Study of the Railways Transports Across Europe, During The Second and Final Phase of the Holocaust. THE ACTIVE COOPERATION OF EUROPE’S RAILWAYS IN THE “FINAL SOLUTION”
Other digital titles to be published in 2015-2016 Time. Limited Time-travel. Memory and Experience. The room with a red painting. Sharon, The Crossing (YOM KIPPUR WAR, OCTOBER 1973)
*******
TABLE OF CONTENT
DEFINITIONS, Terrorism, Hackers
CHAPTER 1, AUTHOR NOTES, INTRODUCTION BEFORRE
PUBLISHING, FORWARD, METODOLOGY,
CHAPTER 2, SOCIAL MEDIA IN TIME OF PEACE, STUDY CASES,
CHAPTER 3, THE DEVICES OF THE INTERNET AND SOCIAL MEDIA.
THE TECHNOLOGY AND THE ASSOCIATES HARDWARE.
CHAPTER 4, GOVERNMENT CONTROL OF THE INTERNET ACCESS,
TELECOM AND SOCIAL MEDIA
CHAPTER 5, SOCIAL MEDIA IN TIMES OF WAR, ISIS WAR
PROPAGANDA MACIONE ON SOCIAL MEDIA
BONUS MATERIAL, OTHER BOOKS ON CYBERTERRORSM,
VOLUME I AND VOLUME II BY HEDI ENGHELBERG, ARTICLES.
DEFINITIONS
Terrorism. Many people now, citizens, news consumers, with analyst along, and
governments are trading to redefine terrorism and acts of terrorism. Everyone
tries to micro manage the terms, from governments to UN.
Everybody, from civilian, agencies, government to non-state actors are try
to manage the term in order to serve their own interest, at home, abroad and
especially with an eye to the economic concerns which dictate many, if not all
political decisions. Trade wars are very costly and not well received by the
public at home, all consumers and voters. Each country is sensible to foreign
investment.
The example is China, with its aggression on South China Sea, registering
now a low in foreign investment. Another example is Russia, after taking Crimea
and fomenting secession and chancing frontiers by force in Ukraine. The Russian
Federation is facing an all-time low in foreign investment, who trickled to an
almost a stop. The rubbles is devaluated to a very low value. War, terrorism,
aggression, they are all reflect back at home.
Terrorism today is appearing in many faces and projections. Some political
correctness is making us thinks to name it and consider it as a purely act of
violence against unarmed civilians, pure terrorist acts. Acts of violence can take
many forms are copycat of web inspired. These copycats, as I call them
“terrorism franchises”, are not to be avoided to be called on what they are,
terrorism aggression. Sabotage can be a terrorist act like the fire at an Air
Control Center in Chicago, Sept. 2014.
Terrorist motivations are present and projected in thousands of web sites
on internet servers around the globe. I call this “terrorism by suggestion”. They
disguise their criminal/terrorist projects in internet, social media, chats rooms,
SMS, tweets and they are “sleepers”, in disguise living in communities near us.
Daniel Pearl, a journalist with WSJ was beheaded by a terrorist
organization. Now we have ISIS doing it on weekly bases, on line, on social
media, and Americans doing it in urban environment, here at home. Some are
naturalized, some are American born, some converts and they all are inspired
by Radical Islam. If an act of violence is inspired by another act of violence and
terrorism and is creating fear in the civilian population and noncombatants, with
a subtext of inciting to murder, then is an act of terrorism.
Hacker. We use so much the term, which the meaning evolved from one notion to many
other notions.
A hacker can a person with the hobby, especially a hobby related to
electricity, cables, phone systems, internet, computers, networks and related.
Evolving, a hacker can a person, with computer & software operation
dexterities/abilities, member of a group those activities is related to computers,
internet, software, computer games, exploration of new frontier on what
hardware and software can do.
The next level, the 3rd one, is that of a hacker versus a computer,
hardware and software security. His dexterities in operating hardware and
software are to put on the employment of finding system/internet/cybernetic
weakness. And Windows software system has many weaknesses, which were
exploited to the full spectrums in breaching the personal computers, servers,
routers.
These weakness were the base of cyber terrorism, cyber hacking, cyber
fraud, cyber espionage, etc. At first, these breaching were for fun and for
bravado, between the then hacker’s members, also named “crakers”. But,
bandits, military, terrorists operatives were employing hackers as outsourcing
manpower to do their work of cyber theft, cyber terrorism and military hacking.
Now we have as well cyber espionage and cyber fraud.
The pure hackers, belonging to a subculture of cybernetics are long gone.
These rare breeds of amateurs a replaced by professional teams of highly
trained specialists, cyber banditos, cyber terrorists, military personell, etc.
At first, the authorities, the banking system, the military, were surprised by
the hackers. But now, teams of specialist on both sides are battling in a
continuous, 24/7 counter espionage and counter blackmail, and counter hitting
the cyber opponents.
Once a subculture of few, pure hearts, with hand-made-from-scratch
computer-hardware and ad-hoc networks, working in dark basement, is now
dominated by super-fast computer systems, in high-rise buildings, with A/C at
63F, with extra fast internet access, fiber optics, large LED multiple screens,
immense digital data banks servers, free cafeteria, highly paid and highly
trained operators.
Sure, the term hacker remains controversial, but now this term belongs to
the Internet history, being replaced by full time, trained and paid cadre.
CHAPTER I
HEDI ENGHELBERG
SOCIAL MEDIA IN TIMES OF
PEACE AND WAR
THIRD EDITION OF THE CYBER TERRORISM SERIES | VOLUME III
AUTHOR NOTE
“EVERYBODY KNOWS NOW EVERYTHING,
EVERYWHERE, ANYTIME. WE ARE EXPOSED!” | HEDI ENGHELBERG
This new book is a compilation of three books. It’s the description of a
natural evolution of a phenomenon, public internet, only thirty years old.
This new book “Social media in times of peace and war”, is a continuation
of the second book in the series “THE EVOLUTION OF CYBER TERRORISM: A
PRECISION-DELIVERY WEAPON, AN ASYMMETRIC WAR. CYBER TERRORISM, CYBER
SABOTAGE AND CYBER WARFARE, THE NEW FRONTIERS IN 21st CENTURY
WARFARE” itself un upgrade of the first book, “Ciber Terrorismo”.
The first books, in Spanish, was published in 2003, but was based on dozen
of conferences starting back in 1999. At the time, 1999, the public internet was
only 16-17 years old and cyber terrorism was in infancy. I was one of the few and
the first to recognize the “clear and present danger” of these new flagella.
Over the years, as the computing power augmented and more people
got into personal computing and internet, cyber terrorism evolved as well into all
kinds of flavors and currents, cyber wars, cyber fraud, cyber bullying, cyber
espionage, identity theft, cyber control, etc. this was the subject of the second
book in the series, dedicated to the evolution of cyber terrorism and its currents.
But in the last 4-5 years a new form of interaction over internet took us all
by surprise and interconnected us into mass and vast social media.
This third book on the series is dedicated to this phenomenon, the Social
media, a vast pool of information, images, photos, movies, knowledge,
messages, news, that binds us all.
As a bonus for the reader, at the end of this book on Social Media, you will
find the second book, “THE EVOLUTION OF CYBER TERRORISM: A PRECISION-
DELIVERY WEAPON, AN ASYMMETRIC WAR. CYBER TERRORISM, CYBER SABOTAGE
AND CYBER WARFARE, THE NEW FRONTIERS IN 21st CENTURY WARFARE”. Some of
the last chapters are still in the original Spanish of the first books, Cyber Terrorism.
So here you have some 100,000 words dedicated to these fascinating
subjects, who affect us all, in many ways and sometimes, with devastating
effects: internet, terrorism and social media.
NOTE OF MARCH 2014
We are becoming a society that is gathering all type of electronic
Information. Unheard volume of data is gathered and saved every minute,
constantly. Nothing is private anymore, even if you have a “veil of privacy”
pulled over your eyes.
What we tweet, what we read, what we write, where we go (via the GPS
systems on the phone and the vehicle smart control unit), what we drink, eat
and buy, where we travel by car, airplane or boat, what we buy online, all is
known to the “big brother” or whatever agency with access to our online
records, internet access and credit card info.
What we rent from the local county or city library to what we watch on
the television (via Nielsen) is watched, monitored and stored in a data base, in
some server.
We are far from the Roman Empire, an ancient time, long ago, when
libraries were maintained by the state.
When you go to the airport, your scanned body image is stored
somewhere. 95% of the people choose to have the body scanned for security
reasons. All data is stored. Nothing is deleted.
Not only that we are watched, as I call it “cyber control”, but this info is
sold to advertise and other commercial companies to target us to buy more
stuff we don’t need. What we buy on line is analyzed and transformed into
code, to send us more stuff to buy. All is about matching information of what we
do and what we might do in the future, like reading our minds. The cookies, from
the sites we visit are tracking us all the time, automatically, rapidly, directly.
All this information is stored, solidly stored, forever, in some server close to
you. All the searches you do on internet, are stored…the good and the bad
ones…what you shop on Amazon, even the searches in amazon…, and later
they bombard you with more info and “ fantastic” offer, just to get from you the
last penny on you electronic wallet of pocket.
All you do is accessible to online search. All the data is there, even what
you purchased at the local supermarket, with a credit card.
Even if you think you’re private, you’re not. All this informs about you is
delivered and analyzed, stored and indexed.
EVEN IF YOU WANT TO BE PRIVATE, you cannot. Every time you get into
internet, you are numbered, like convict, with an IP number. This number is
tattooed on you!
Even if you go to secret search engines (Tor), enter internet via some dark
gateways, you can be tracked; and even at the gate of these “secret”
gateways, they will get you there. As well going to this length, the speed of
access will go at least four times slower.
Getting privacies installed on your devices, phones, iPADS, sms, laptops,
etc… it will not get you anywhere.
You are tracked, via the network, data or Wi-Fi access feature on your
phone, from the local mall, Starbucks or to the local airport. Free internet access
will get you anywhere, every time.
Your car have an active GSP system, all the time pinging and a smart
control module with internet or satellite access recording what you do and how
you drive and most importantly, where you drive. Some cars, engines, boat,
airplane has low-jack systems (via cellular towers) or satellite tracking (Inmarsat,
Iridium, Globalsat, etc.) burst data systems.
YOU CAN CHOOSE TO BE DISCONNECTED, live in s small cabin, in the
woods, in a tent in the desert or an isolated island. BUT OTHER PEOPLE PREFFER
TO LIVE IN THIS MODERN, ADVANCES, full technology AND FANTASTIC WORLD.
FOR EACH WORLD THERE IS A PRICE.
You can pay at the entrance or at the exit, but, eventually, you will pay.
You cannot escape being watched, even when using encryption.
Hedi Enghelberg
For this III-rd edition, Fort Lauderdale, 2013
NET NEUTRALITY: ALL TRAFIC BEING TREATED EQUALY???!!!
SOME BIG PLAYERS WILL GET MOTE POWERFUL AND SHAPE THE INDUSTRY,
ELIMINATING THE SMALL COMPANIES.
THE GIANTS WILL GET MORE POWERFULL AND THE SMALL COMPANIES WILL DIE.
The roadblock of the “free and chaotic” internet will end equality, fraternity and liberty.
A video on one site will load so slow, that the customer will go to the sites of the
big players. You know the faster channel on I-95, USA? So, large companies will pay
more to the service provider, in order for their content to get faster at destination. The
other companies will be stuck in traffic, get fewer views and access and die a slow and
painfully death.
Internet, from a free, chaotic and unregulated avenue and culture, to get
connected and get free and valuable information will get so regulated, and only the
big companies will reap the benefits from it. This is a paradox, but a mutation and
evolution. Large companies saw the great benefits of the free internet and are taking
advantage is power and money, concentrating this domination.
I am seeing a trend when the “traditional Internet”, free, chaotic and
deregulated is getting so much regulated, for the benefits of specific larger users,
content generations and dominant social media houses.
NOTE OF MAY 12-19, 2014 | JUST A WEEK IN THE NEWS We are crushed by the sheer volume of news related to electronic media, data,
big and small data, software failures, passwords failures, cybercrime, cyber
sabotage, cyber thefts, etc.
The world based on computer software, hardware and millions of
algorithms involve and wrap us as an onion with many peals. The public square
is controlled by CCTV and so many other sensors.
The only place left is home, but not anymore, because as well, at home
we have internet access, and all we do, is media streaming: radio, television,
news, works, music, smart phones, smart refrigerators, smart oven, smart toasters,
smart electricity meters, etc… everything is getting smarts, by the day… not
month, trimester or year…
Are we getting smarter? We should, and we have, because we have to
work harder and get money to pay for this entire array of smart artefacts
surrounding us.
Titles news from BBC WORLD SERVICE, in reference to the cyber terrorism, cyber
espionage, cyber theft and Social Media.
eBay faces investigation over breach
eBay is facing investigations in the US and the UK over its huge data breach
which led it to ask 145 million customers to reset their passwords.
House passes bill on bulk data sweep
The first legislation aimed at ending the National Security Agency's bulk
collection of US phone records is passed by the House of Representatives
Computers affect ability to learn
A teaching union in Northern Ireland voices concern about the impact of
modern technology on children's ability to learn at school.
World's first gaming mag may close
Computer and Video Games, which in 1981 was the world's first magazine
dedicated to gaming, is facing closure.
FBI 'could hire hackers on cannabis
The FBI's director qualifies remarks he made that indicated the agency might
hire hackers who used cannabis.
China's JD.com to debut on Nasdaq
Chinese online retailer JD.com raises $1.8bn in its US share sale, valuing the
company at more $25bn according to underwriters Bank of America and UBS
Investment Bank.
Blizzard sues Starcraft cheat-makers
Activision Blizzard is trying to sue the creators of cheats that allow Starcraft II
players to improve their rankings and unlock new weapons.
Anger over eBay hack delays
A day after a major security breach, online marketplace eBay is facing
questions over how it has dealt with the incident
Google receives 'forget me' requests
A former politician and a convicted paedophile are among those asking
Google to remove links following the right to be forgotten ruling.
Europe Google ruling 'astonishing'
A ruling forcing Google to remove search results has been described as
"astonishing" by Wikipedia founder Jimmy Wales.
Yahoo buys self-destruct chat app
Yahoo acquires Blink, a mobile application that allows users to share messages
that self-destruct, in order to poach the talent behind it.
FBI 'could hire hackers on cannabis'
The FBI's director qualifies remarks he made that indicated the agency might
hire hackers who used cannabis.
VOLUME III INTRODUCTION
BEFORE PUBLISHING
DECEMBER 2014
SO MUCH IS HAPPENING EVERY DAY, THAT I HAVE TO PUBLISH THE BOOK
FAST, OR IT WILL BECOME OBSOLETE IN A WEEK.
The WSJ is so full with news of cyber terrorism, cyber theft, cyber control,
cyber espionage and information leaking that cyber terrorism has evolved from
hackers, private, terrorism groups and state sponsored, working in dark rooms,
isolated and under the cloak of secrecy, into a colossal business of more than
100 billion US dollars a year. IBM just purchased 2 cyber security companies for a
billion each.
Like everything else in the last 2,500 years of well recorded history, the
humans, after a period of some guessing, after the shock of the novelty, realized
a monetary-business-model to each problem: preventing the problem is making
more money than the damages from the problem itself.
Now, there can be many types of damages:
1. Moral damages,
2. Physical damages (including medical issues),
3. Structural damages,
4. System damage,
5. Financial damages,
6. Military damages,
7. Domestic and home damages, caused by the cyber terrorism and cyber-
attacks.
But, preventing the damages, now, - this will be the wave of big
businesses in the next decade! Is already estimated the counter cyber-terrorism
industry will surpass US $25-50 billion by 2015.
Each side of the problem will get a more sophisticated attack method
and MO. Each will seek the upper hand, as the infantry’s attacks at Verdun
during the WWI. The French and the Germans were killed by the millions, with no
gains whatsoever. In our case, hopefully, we will have only hardware damages
and no physical victims. Sure, terrorist propaganda and copy-cat MO like the
ISIS is promoting, can get people killed, executed and terrorism attack plotted.
What goes on one side of the spectrum, replicates on the other side of the
spectrum…a smart phone, a tablet, sized by the police and hold as evidence
can be wiped remotely. Data from any device, smart phone, tablet, laptop
computer can be accesses, deleted and manipulated via remote control,
anywhere, anytime.
We, the good guys, the good companies, the decent people, we will
have to learn to live with the cyber terrorism, cyber-attacks and cyber
espionage, because we are so dependent on computers, cybernetics, robots,
smart phones and all kind of social media outlets.
SOCIAL MEDIA is still critical in some countries like Venezuela, Syria,
Vietnam, Iran, Afghanistan, Pakistan and Egypt.
Social media was critical on the immense popular uprising in Egypt,
which toppled, with the help of the military establishment, the elected Islamist
president Morsi and its Islamic Brotherhood orientated government.
But following twitter, you can get a fair image of the situation. An instant
image of the situation, because social media is faster than the traditional
media. The responses are coming via tweeter, the main conduit of the news
and commentaries. Everybody’s tweets…. Even ISIS!
Is the fastest way to get informed and piece together the whole picture
in each event, in each country! It is raw, and free, and open to each
interpretation and sentiments, but is a tube and the information flows fast in the
direction of truth. Every truth is packet in many paper shits and layers, but by the
end of the day a clear image of what is happening can emerge, after
descanting (or ignoring) the most negative and the most positive tweets.
Restrain, by commerce, government, hackers and bandits, is only
dictated only by the technological limitations. Life, as we know it now, is all
documented in the cloud. All we do on Internet or on the street, commanded
by CCTV, live in server, somewhere. We are leaded by “Policy Agreement” and
“Terms of Use”, “Policy Agreement” of Twitter, Facebook, Netflix, Amazon,
Google, IBM, etc. Every site we visit, have a long and complicated sales policy
of security policy, which have to be approved before we use the web services.
Global treats are only evolving. They will never go down, will always
increase.
WAR IS A CHOICE. BUT ANY CONVENTIONAL WAR OF TOMORROW WILL
START WITH A CYBER ATTACK - A MASSIVE ONE. NOT AN ATACK 24 HOURS PRIOR,
BUT MANY MONTHS BEFORE THE REAL ACTION ON FIELD, ARTILERRY, MISILES,
DRONES AND BULETS WILL START FLYING.
CYBER TERRORISM AND CYBER WAR IS AN ASYMETRIC TYPE OF WAR. IT IS
OUR WIKNESS, AS INDIVIDUALS AND/OR SOCIETY.
NO ONE WILL BE SPARED.
WE WILL HAVE TO FIGHT THIS WAR. AT THE SAME TIME WE WILL BE AUDIENCE
AND ACTORS.
It’s a new world. Drones and robots are taking over: the driverless cars,
trucks, airplanes, train and motor vessels are here.
We are intoxicated by the social media and cybernetics. In short time
clinics will offer a cyber-detox: des-intoxication treatment for humans of the
social media, smart phones, internet and cybernetics “viruses and bacteria”.
But, for sure, again, we, the people, the humans, will evolve from this.
OCT. 8TH, 2014
White House Monitored JPMorgan Breach With Alarm WASHINGTON — President Obama and his top national security advisers began
receiving periodic briefings on the huge cyber-attack at JPMorgan Chase and nine
other financial institutions this summer, part of a new effort to keep top national
security officials as updated on major cyber-attacks as they are on Russian
incursions into Ukraine or Islamic State attacks.
The terrorism and cyber terrorism is morphing, all around the world. The
war against large terrorist outfits, like ISUIS, al Qaeda, Al Nustra, Boko Hiram and
small al Qaeda/ISIS affiliates, subsidiaries and franchising is more expensive, by
the day. The deadest of this al Qaeda terrorism movement, fomented other
small, insignificant groups giving them a theme, a constitutions and fame of a
brand, the brand is Al Qaeda name.
Not all the countries facing new-styled Al Qaeda model have the means,
personnel and treasure to fight it. International help is needed, especially air
resources, satellite information, telecom. In some regions the state power is not
projected. Look what happened in Mali, Libya, Nigeria, CAR, Yemen, Somalia,
Sudan North and South, Syria, Iraq, and even Ukraine. Democracy I'd the big
ideas that have to be implemented, because it's mechanism of accountability
and a moral compass. A big problem that was Al Qaeda as a single group in
Afghanistan is not divided in smaller, bloody problems, around the world. The
disease is already speeded around.
On cyberterrorism, an all-new front is open with the convergence of
sabotage, spying/espionage and terrorism. Some government agencies cannot
operate under a total cloud of secrecy as before the Snowden divulging the
most kept secrets of NSA. That era is gone. Some transparency will be accepted
for the law enforcement, but for sure new type and new methods will be
introduces, with a deeper scanning of workers and analyst.
The large common denominator is the technology, like internet, smart
phones, GPS technology. All combined, voice, data, locations, give the answers
to all the two-millennium military questions of operation, defense and attack. Is a
world of difference today than the times of the mighty Roman Empire, the
model of the western civilization military organizations.
Optimism is mixed with caution... The internet have to be redesigned is
some ways. The management has to be different. Innovation cannot be
differed. The future is bright and all is based on technology. Disruption into the
flows of technology and information will expose us all. The big stick now is
financing of terrorist, off all kinds, because is so easy to trace the electronic
money exchanges. Blocking and reverse money exchange is very easy, when a
terrorist act occurs. The "infection" of the system is faster detected than before.
VOLUME III FORWARD
“QUEEN LYRICS …Too much love will kill you…If you can't make up your mind…Torn
between the lover and the love you leave behind…You're headed for disaster…'Cause
you never read the signs…Too much love will kill you every time…| CLASSIC ROCK,
ALBUM MADE IN HEAVEN, TRACK NO. 8, 1995
… TOO MUCH INTERNET WILL KILL YOU… WE ARE EXPOSED. .. TORN BETWEEN A
SMART PHONE AND A TABLET… BECOUSE ALL THE PRIVACY IS LOST …ALL WE WRITE
WILL LIVE IN THE SERVER… 'Cause you never read the privacy disclosures... | HEDI
ENGHELBERG, AUTHOR
Imagine Moses the Prophet with a Smart Phone, or a digital tablet with a
camera, or Jesus with global Internet Access. Smart media are having
extraordinary powers!
This is such a dynamic sector of our activity, INTERNET, that a book is a
medium to slow to reflect it. Maybe on hourly-updated blog will do better,
because developments succeed in a rapid succession.
This is a book in progress and its schematics can change with every new
edition and upgrade.
This is a repackaging of the previous editions of the Cyber Terrorism,
upgraded, overhauled, but with the Social Media at the forefront.
BEFORE: THE HUMAN BRAIN WAS FORGETTING THINGS AND EVENTS. “VERBA
VOLANT SCIPTA MANENT” THE WORDS ARE FLYING, THE WRITTEN TEXT REMINS.
TODAY: COMPUTER SYSTEMS - REMEMBERING ALL DATA AND INFORMATION
DARKE SIDE OF THE SOCIAL MEDIA AND COMPUTER AGE!
ANYTHING WE DO AND PLACES WE TRAVEL, ALL ARE RECORDED. COMPUTERS
NEVER FOGET THINGS!
THE Cyber Terrorism has evolved many times over. What was once only a one –
sided-directed-attack, from an unknown hacker to a person, or a group of
persons and some scattered institutions (in general Banks), is now a general war.
It has a broader rich, a general rich.
The cyber war, the cyber espionage and cyber controls are now directed
in all direction. The nature or cyber war changed. In a form of what we call
“cyber control” its flow from the government to the general population.
Trying to avoid “cyber oppression” the general population fights back,
attacking the government & its institutions.
As well this trend is valid as well in times or war: from government and
population to other governments and populations.
Who | Where | How | When is valid now both ways, from the population
to the government (oppressive governments) and from government to its own
people.
More than 24 years after the introduction of internet and less than 10 year
of generalization, internet and its associated technologies transformed into an
universal social right. Internet access it’s a fundamental right.
The internet has its own personality and it evolved. It reached a certain
level of maturity and identity.
In a time of enlighten by Internet and its electronic revolution, we see
both side in a war for freedom by the population and a war a control by the
governments. Nobody trusts anybody. They all argue and each side is
entrenched.
Information drives behavior. We want to know more, than we access the
internet more. We go to the liberties more, read more books, and access more
information. Some people have an emotional connect to the information.
Image a small war in a world region. People who access information about the
war will react different to the information. But the information they receive can
be real or simply manipulated. Operator, behind internet can manipulate the
information in such way, in order to create a specific reaction in the general
policy.
We are addicted to information and to the information cycle. The
information cycle is not anymore 24 hours. This cycle is reduced to minutes and
even second. Who is tweeting faster a new, is the king. Who is posting faster
contents, is another king, as well. We have adapted to the speed of the media:
is not anymore a senior anchor, sitting at a desk, in front of a mike, behind a
world map and dispensing the evening news. This format is gone! The new
format is digital news. And any radio, documentary, movie or TV program once
ended and is off the air, can be reviewed on internet, especially on iTunes; any
time you want, against a small fee. Some of the broadcast can be viewed for
free on YouTube. But the trend is here: digital news, fast and comprehensive,
with many commentaries on line. The commentaries are important, because
now, armed with a smart phone, we are actors, participants and critics, all at
the same time.
Our smart phones will fill our lives. We check the device every second, for
a new email, SMS, whatsup text, tweet or new post on Facebook. They will
maintain us in contact with the infinite knowledge stored in internet, with our
work, banking, friends, family and social media. We will open houses, dim lights,
order pay-per-view channels and movies on the TV, do all the works around the
house, the office, and maybe even vote. They will be our remote controls of
your lives. At the same time, as we go/walk away from desktop computers and
laptops and other heavy items, they, the smart phones (and the tablets) will the
target of a sustained cyber terrorism and cyber fraud offensive attack.
**********
“I am going to Africa. I hope I will not get AIDS. Just Joking! I am White.” A
PR woman twitted this message right on the airport gate, embarking on the
plane to Africa. She had a modest follower on Twitter. Before she landed, she
became, from an obscure person, a Public Enemy No.1. She was fired on arrival.
A young man is secretly searching for an engagement ring on internet.
Final choice is done on the next-to-be fiancé’s iPad. Not long before he buys
the ring, the woman knows already she will be asked the “big question”.
Social Media has a formidable speed!
A normal movie trailer is vied at least a few million times. Sometime we can
speak volume, huge volumes. A Korean rapper [PSY-GANGNAM STYLE
(강남스타일) M/V] published on Jul 15, 2012 a video posted on YouTube, was
downloaded or viewed at least 850,000,000+ times. When I write these lines,
were registered 875 million hits. At least 810-820 million (individuals) people
viewed the video (many reviewed the video a few times). Justin Bieber’s “Baby”
video was watched 803 million times.
No, no, no. PSY video is much faster downloaded than anticipated. Days
only after I wrote these lines, the count is on 880,000,000.
THE SOCIAL MEDIA IS NOT only turning the attention of the view for a
specific artist, political issue, education, can generate more web traffic for a
specific target or draw foot traffic to a store, restaurant, boutique, malls, etc.
An university campus is on the lock down, because a gunman was
spotted. All the students are warned via cellular phones, via tweeter, Facebook,
SMS. All the arsenal of social media is combined, in matter of seconds, to get
the information fast and directed. When all is cleared, another furry and salvoes
of emails, SMS, tweets and face books wall notes are sent to all students,
teachers and related personnel.
@JubelFoster: In the last 2 days @open_zion tweeted 30 anti-Israel comments. That blog
seems obsessed with topping the Guardian's anti-Israel propaganda.
EXAMPLE OF A TWEET.
The power of Social Media is global!
This outreach is unprecedented in the history of humans on Earth. By the time this
books will downloaded from internet in a kindle, iPad or other digital reader
device, three times the population of USA will have viewed the video! Imagine
the power of the smart media and the power of social media! Colossal!!! No
other media have this power: reaching all the corners of the world, all the time,
every time. [NOW available on iTunes: http://Smarturl.it/psygangnam]. By itself it
generated more than 6,000,000 likes and only 390,000 dislike. No other traditional
media could have claimed such a record in such a short time. A small war is
going on between the fans of this video and the Justin Bieber fans, for the first
place of most-watched video.
In the decision cycle, the good and economical decisions rarely intersect.
Sometimes a good decision, a correct one is not economical. And an
economical decision is not the good or the correct one for the issue we have.
The same cycle applies for the
*******
METODOLOGY
FIRST EDITION | PRIMERA EDICIÓN 2003-2004
Primera Edición en Español PRINTED IN USA/EE.UU. POR EDICIONES ENGHELBERG
ISBN 980-07-8518-3 Deposito Legal If 25220023032415, Caracas – VE, 2003
SECOND EDITION | SEGUNDA EDICIÓN 2010-2011 Segunda Edición en Español PRINTED IN USA/EE.UU. POR ENG PUBLISHING
ISBN 978-1-60585-126-6 FORT LAUDERDALE/FL, USA, 2010
THIRD EDITION | TERCERA EDICIÓN 2011-2014
TERCERA Edición en Español PRINTED IN USA/EE.UU. POR ENG PUBLISHING
ISBN 978-1-60585-126-6 FORT LAUDERDALE/FL, USA, 2014
In previous two volumes, since 1999, we wanted and we tried to analyze
the cyber terrorism, cyber theft, cyber fraud, cyber control in this uber-
computerized world.
In this volume we analyze the social media, this rising personal activity, in
times of peace and war, from the universal-point-of-view of the process, and
not form the deep technical, specialized, down-to-the-wire, hardware, software
details.
WE CONSIDER AND REGARD OURSELF AS AN ANALIST, AN OBSERVER OF
THIS UNIVERSAL PROCESS AND WE PRESENT IT AS WE SEE IT.
This book is an analysis of the process and the social repercussions of
universal internet access, on users and government, data storing, tracking our
activity on the internet, in an interconnected world and the price we have to
pay for it: no privacy.
This is not a technical book, just a social study.
The social media is reacting and adapting every day to new events. At
some point we have to go the presses and publish the book.
*******
This is a fragment of the full book format due to be published
Digital Format (e-Book) in December 2014