Report The POST of Benjamin FRANKLIN Bacon - HoaxED WARS and Social Media Liability - RAWinformationWAR
The only report that has ever been written about the Port of Charleston, S.C. Dirty Bomb Hoax of June 14, 2017. This booklet describes how social media hoax news sites can attack America's critical infrastructure. Seemingly, these deception merchants operate with no threat of legal action. This fertile environment has allowed the consequence-free attacks on maritime ports, generation of hysteria of supposed assassination plots, and generate fear over unsafe consumer products. The next generation of cyber attack tools will be based upon Artificial Intelligence and can execute complex social media attacks. Law enforcement is falling further behind the tip of the spear in comprehending the cyber warfare nature of these attach techniques.
Background and Purpose
"Information warfare" has become the buzzword for those looking to the future of U.S. national security as we approach the 21st century. Consensus has emerged that those capable of acquiring, leveraging, and protecting information and information processing systems will dominate the first decades of that era. However, little systematic thought has been given to the overall size and shape of the realm within which these contests will occur, the range of actors who will play significant roles, the instruments that will be brought to bear, or the opportunities and vulnerabilities inherent in the process.
This paper provides an initial exploration of the arena and attempts to (a) identify the key dimensions of the problem, (b) locate the most important areas of the global information systems, and (c) generate insights about the processes of important information interactions.
Typology of Information
The simple, but crucial, step of defining what is encompassed by the term "information" is all too often ignored by those who write about its importance and its future. Most typically in the fields of communication and computer systems "information" derives its technical meaning only when it is contrasted with the lesser category of "data." In this formulation, unsorted, inchoate data and reports (for example, raw sensor information or a set of unanalyzed news reports) are seen as data. Once sorted, classified, or interpreted into useful form (air tracks, an assessment of enemy military readiness, etc.) this same material becomes information. Thus, the key distinction is between data as raw material, and information as a product with added value for its users because of the processes by which it has been selected, organized, and presented.