Skip to main content
Log in

Small treatise about e-manipulation for honest people

  • Eicar 2008 extended version
  • Published:
Journal in Computer Virology Aims and scope Submit manuscript

Abstract

Information warfare is nowadays a well-known concept. However, articles are mainly split into two categories. The first one deals with how information must be managed in a system (e.g. a company or a state), in order to achieve information dominance, that is providing more and better information than the others so that they have to follow what is produced. The second one is more on how information can be used as a weapon. Dominance is one goal, but not the only one: deception, intoxication or misinformation are others. In this article, we chose the second approach. The goal when using information as a weapon is to influence a target so that it does what the attacker wants, or to cause effects. We chose also to focus on a specific battlefield: Internet. One particularly important aspect of the Internet is that it is both a container and contents. For instance, web sites are providing articles, but they are also some servers, referenced by search engines. As such, we combined this duality to increase the effects of the operations given as example. We illustrate the operation through examples, where both information is created, but also its container is improved. We show how Search Engine Optimization can be used for information warfare. Combining oriented action techniques and information based techniques make each of them much more efficient. This article shows how information warfare can be conducted on Internet. The goal is to illustrate how very few people can organize an information based attack, targeting either a company or a state for instance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Search engine optimization. http://www.en.wikipedia.org/wiki/Search_engine_optimization

  2. Captcha Breaking W/ PHPBB2 Example. http://www.bluehatseo.com/user-contributed-captcha-breaking-w-phpbb2-example/

  3. Page Hijack: The 302 Exploit, Redirects and Google. http://www.clsc.net/research/google-302-page-hijack.htm

  4. Liverani, R.S.: Web Spam Techniques. http://www.malerisch.net/docs/web_spam_techniques/web_spam_techniques.html

  5. Anderson, C.: The Long Tail. October (2004). http://www.wired.com/wired/archive/12.10/tail.html

  6. Raynal, F., Gaspard, F.: L’information, nouveau nerfs de la guerre. MISC 34. September (2007)

  7. CAPTCHA Killer—Automated CAPTCHA Bypass. http://www.captchakiller.com/

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Frédéric Raynal or François Gaspard.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Raynal, F., Gaspard, F. Small treatise about e-manipulation for honest people. J Comput Virol 6, 143–159 (2010). https://doi.org/10.1007/s11416-008-0093-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-008-0093-1

Keywords

Navigation