{"id":110056,"date":"2017-12-04T12:36:00","date_gmt":"2017-12-04T12:36:00","guid":{"rendered":""},"modified":"2023-01-08T10:57:25","modified_gmt":"2023-01-08T10:57:25","slug":"meanwhile-back-on-web","status":"publish","type":"post","link":"https:\/\/cvnextjob.com\/index.php\/2017\/12\/04\/meanwhile-back-on-web\/","title":{"rendered":"Meanwhile, Back on the Web"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><h3 class=\"post-title entry-title\" itemprop=\"name\"><\/h3>\n<div class=\"post-header\"> <\/div>\n<p>Yesterday, <a href=\"http:\/\/formerspook.blogspot.com\/2007\/05\/one-of-dumbest-ideas-weve-heard.html\">we noted that the Army is cracking down on <span class=\"blsp-spelling-corrected\" id=\"SPELLING_ERROR_0\">soldiers<\/span> who might divulge sensitive information in their blogs or personal e-mails<\/a>.  Under a new Army policy that went into effect late last month, superior  officers must approve the content of blog entries or personal e-mails  before they are posted or transmitted.  The policy represents the  sharpest restriction on soldiers&#8217; on-line activities since the start of  the Iraq War.  Some observers also fear that the new restrictions could  mean the end of <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_1\">milblogs<\/span> in their present, uncensored form. <\/p>\n<p>Unfortunately, our enemies don&#8217;t operate with such restrictions.  <a href=\"http:\/\/www.usatoday.com\/printedition\/news\/20070503\/1a_offlede03.art.htm\"><em>USA Today&#8217;s<\/em> <\/a>Mimi Hall reports that terrorist groups&#8211;including Al <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_2\">Qaida<\/span>&#8211;are becoming even more sophisticated in their use of the <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_3\">internet<\/span> to propagandize, raise money, and recruit more operatives.  According  to a new government report, terror organizations are also using &#8220;flashy  websites, provocative video games, hip-hop music and gruesome images of  bloodied Muslim children to recruit young people online.&#8221;  And  apparently, the U.S. is doing little to counteract that activity:<\/p>\n<p><span style=\"font-size: 85%;\">&#8220;There&#8217;s only one side on the battlefield, and it isn&#8217;t us,&#8221; says Frank <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_4\">Cilluffo<\/span>, director of George Washington University&#8217;s Homeland Security Policy Institute, who will testify on the <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_5\">institute&#8217;s<\/span> Internet-Facilitated Radicalization report in the Senate today. &#8220;We&#8217;ve  created this global village \u2014 the Internet \u2014 without a police  department.&#8221;<\/span><br \/><span style=\"font-size: 85%;\"><\/span><br \/><span style=\"font-size: 85%;\"><span style=\"font-size: 100%;\">According to Republican Senator Susan Collins of Maine<\/span>, <\/span><span style=\"font-size: 100%;\">insurgents also use the web to review attack techniques (such as shooting down helicopters) , watch videos of hostage <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_6\">beheadings<\/span>, and listen to messages from terror leaders.  Virtual one-stop shopping for <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_7\">jihadists<\/span>.  <\/span><br \/><span style=\"font-size: 100%;\"><\/span><br \/><span style=\"font-size: 100%;\">Clearly, everyone agrees that the use of the web by terrorists is a growing problem.  But listen to this proposed &#8220;solution:&#8221;<\/span><br \/><span style=\"font-size: 100%;\"><\/span><br \/><span style=\"font-size: 100%;\"><span style=\"font-size: 85%;\">The  report doesn&#8217;t advocate stripping people of their rights to communicate  ideas on the Internet. Instead, it says national leaders need to  develop a compelling &#8220;counter-narrative&#8221; that the &#8220;West is not engaged  in a battle against Islam,&#8221; hire more intelligence officers to  infiltrate chat rooms and foster better relations with Muslims.<\/span><\/span><br \/><span style=\"font-size: 100%;\"><span style=\"font-size: 85%;\">Homeland Security Department spokesman Russ <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_8\">Knocke<\/span> says officials are working with intelligence officers, Muslim leaders  and police to address the problem. &#8220;It is something that is going to  require the vigilance of local authorities,&#8221; he says. &#8220;They are going to  be more likely than the federal government to detect the preliminary  signs of radicalization<\/span>.&#8221;  <\/span><\/p>\n<p>That&#8217;s all well and  good, but it only represents a partial solution&#8211;at best.  What we  really need is a full-scale Information Operations (IO) campaign against  the <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_9\">jihadists<\/span>, encompassing all the tools of the trade: intelligence, <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_10\">psyops<\/span>, deception, public information, and yes, <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_11\">cyber<\/span>-warfare.  For whatever reason, our response to terrorism on the web has been piecemeal at best, allowing <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_12\">jihadist<\/span> websites to multiply and flourish. <\/p>\n<p>The failure of our &#8220;traditional&#8221; approach was underscored in an <span class=\"blsp-spelling-corrected\" id=\"SPELLING_ERROR_13\">anecdote<\/span> recently relayed to me by a military IO officer.  During a recent deployment, he participated in a briefing that (<span class=\"blsp-spelling-corrected\" id=\"SPELLING_ERROR_14\">among<\/span> other things) highlighted insurgent activity on the web.  When the  senior officer present  &#8211;a two-star general&#8211;asked what was being done  to take down terrorist web sites, the briefer simply shrugged. <\/p>\n<p>As highlighted in the <em>USA Today<\/em> article, insurgents have become adept at developing content or entire  web sites, then placing it on U.S.-based servers.  That makes the job of  neutralizing that material more difficult, but not impossible.  And,  the first step in that process is realizing that the &#8220;global village&#8221;  described by Mr. <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_15\">Cilluffo<\/span> is really a battlefield, to be contested and won like any other in the  war on terrorism.  We can&#8217;t win the information war with net nannies, <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_16\">cyber<\/span> police and outreach programs for Muslim groups.  If we&#8217;re serious about  challenging our enemies on the web&#8211;and we&#8217;d better be&#8211;we need a  strategy that unleashes the full spectrum of IO techniques against our  enemies, and employment of that strategy on a relentless, global scale. <\/p>\n<p>Terrorists use the web for a variety of reasons; it&#8217;s universally available, cost-effective, relatively <span class=\"blsp-spelling-corrected\" id=\"SPELLING_ERROR_17\">anonymous<\/span>,  and allows them to reach millions of potential converts and operatives  with a few keystrokes.  But there&#8217;s another, compelling reason that  insurgents have migrated to the web&#8211;the lack of an effective  counter-strategy among their enemies.  We can fix that latter problem,  but only if our leaders&#8211;national and local, civilian and military&#8211;have  the courage to use all the tools at their disposal.  The revised  strategy won&#8217;t always be transparent, and it may sometimes spill into  &#8220;neutral&#8221; domains.  But this more aggressive approach would make it even  more difficult for terrorists to operate on the web&#8211;and that&#8217;s the  real bottom line.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday, we noted that the Army is cracking down on soldiers who might divulge sensitive information in their blogs or personal e-mails. Under a new Army policy that went into effect late last month, superior officers must approve the content of blog entries or personal e-mails before they are posted or transmitted. The policy represents [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110056"}],"collection":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/comments?post=110056"}],"version-history":[{"count":0,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110056\/revisions"}],"wp:attachment":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/media?parent=110056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/categories?post=110056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/tags?post=110056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}