Search /
Docfinder:
Advanced search  |  Help  |  Site map
RESEARCH CENTERS
SITE RESOURCES
Click for Layer 8! No, really, click NOW!
Networking for Small Business
TODAY'S NEWS
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested
/

PsyOps and network security

Schwartau archive

A significant component of cyberwar and cyberterrorism is called psychological operations, or PsyOps. Simply, PsyOps is the manipulation of the psyche of an adversary or target population with information, misinformation, disinformation and propaganda. It involves perception management, or controlling what a group of people think and believe is the goal.

PsyOps and perception management by the media and our adversaries affect the way we think and react to events - and most notably, security-relevant events.

In the world before Sept. 11, a common PsyOps threat was the virus hoax: "Beware! Your organization will come to a grinding halt in 30 seconds unless you call Microsoft and get a fix! Do it now!" Newbies and folks at home panicked and spread the hoax through e-mail to equally clueless Netizens, while most corporations could make a clear distinction between legitimate virus events and hoaxes.

In the post-Sept. 11 world, PsyOps take on a whole new dimension. A single piece of paper with apparently threatening words on it forces an emergency evacuation of an airplane. We are seeing heightened worry and reaction to once-innocuous events.

PsyOps are also affecting network security and cybersurvival. The National Infrastructure Protection Center is issuing warnings that some future yet unspecified terrorist attack will be cyber in nature and likely target critical infrastructures. How's that for PsyOps? Our government telling us we had damned well better shore up our cyberdefenses - or else something bad might happen. Talk about heightened sensitivity.

When a server slows down, many people now first think, "Is this the next wave of terrorist attacks?" When rumors of massive distributed denial-of-service attacks spread, what is our first thought today? A troublesome teenager or terrorists?

The most obvious byproduct of cyberterrorism PsyOps and the great unknown of possible attacks in the post-Sept. 11 world is that organizations are extensively re-examining the relationship between the physical and virtual components of their networks. We hear from U.S. Attorney General John Ashcroft that unspecified threats are "credible."

CIOs say they are decentralizing data centers to provide greater survivability in case of a physical attack. PsyOps - the mere presence of a credible threat - has changed the way we have organized our networks for the last decade.

But are all these rapid rethinks and changes a good thing? Or are they knee-jerk reactions that will potentially cause more trouble and create new weaknesses we haven't thought of yet?

According to some critics, the Pentagon has overstated network attacks it has suffered in the past in order to maintain funding and "find an enemy and mission." Perception management, spin doctoring, propaganda - PsyOps at work.

So here we sit, post Sept. 11, more nervous than we were Labor Day, warned that more attacks are likely, and we bob and weave, and make the best guesses about how best to protect our infrastructures.

What makes a credible threat against an organization? A threatening e-mail? A funky package with no return address? A barrage of hate messages from anonymous sources? An ominous phone call? A sudden deluge of spam or network clogging streams?

But most importantly, how do we react? Do we treat these the same way we did in August, or do we all function at ThreatCon Delta, anticipating imminent network collapse? What is real and what is "noise"?

Perhaps the only good thing about the effect of PsyOps on our collective networked consciousness is that security awareness is at an all-time high. But, at the same time, a twitch of a threat also can send us into unwarranted paroxysmal actions.

No, I don't have all the answers, but I do know that we have to achieve a reasonable balance between where we were and where we are today. And, as has always been the case, be alert, be aware, but don't believe everything you hear.

RELATED LINKS

Schwartau is president of Interpact, a security awareness consulting firm, and author of many books, including Cybershock and Computer and Internet Ethics. Reach him at winns@gte.net.

More Schwartau columns.

Error 404--Not Found

Error 404--Not Found

From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:

10.4.5 404 Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent.

If the server does not wish to make this information available to the client, the status code 403 (Forbidden) can be used instead. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address.


NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.