A person does not have to spend years analyzing and witnessing the phenomenon of the Internet to understand why the pornography industry has flourished.
Like other social and religious facets of our global culture, connected by hyper links, web sites and chat rooms, human beings are able to quickly and efficiently discover what they are looking for. Good and bad.
If the Internet is just a mirror of society itself, then of course it will have both the positive and humanitarian aspects along with the negative, criminal and evil elements.
Learning new skills and spreading new ideas via the Internet is nothing new. However, one could predict that the acceleration of threats to our youth, families and nations states has been influenced by the proliferation of Apples, Dells, and Androids across the globe.
Learning new skills and spreading new ideas via the Internet is nothing new. However, one could predict that the acceleration of threats to our youth, families and nations states has been influenced by the proliferation of Apples, Dells, and Androids across the globe.
Whether it's in the kitchen, the library, university dorm room or the corner cyber cafe the ubiquitous ICT 5G access now available has increased our operational risks at home, at work and to our economic well being.
When subjects such as this are discussed at length in the Board Room, NOC or War Room the arguments always come back to the same thing. How many people have been killed as a result of cyber-warfare?
Justification of spending dollars and allocating resources is in many cases a factor of the risk management exercise, likelihood vs. impact.
After all, the Internet seems to be self-healing and resilient to any long term outage. But those who are well versed in 4th Generation Warfare (4GW) sitting around the table know, that computerized jihad is a tactic of a far more encompassing strategy:
"Reflecting Sun Tzu’s philosophy, many recent Chinese writings have focused on asymmetric warfare as a means of defeating a militarily superior enemy. Asymmetric warfare uses political, economic, informational and military power. Military power is the least emphasized."
The silent war being waged each second of each minute of every hour every day, over every week and month of the year is taking place on a vast digital battlefield. Who will be the victor?
"Reflecting Sun Tzu’s philosophy, many recent Chinese writings have focused on asymmetric warfare as a means of defeating a militarily superior enemy. Asymmetric warfare uses political, economic, informational and military power. Military power is the least emphasized."
The silent war being waged each second of each minute of every hour every day, over every week and month of the year is taking place on a vast digital battlefield. Who will be the victor?
No comments:
Post a Comment