Infrastructure Attacks
American Corporations now operate in a landscape rife with new Advanced Threats and/or Belief Propaganda to their reputations. These outside intrusions or groups are usually deceptive in nature and can manipulate the truth with extreme and distorted views. These groups are equipped to do battle with large corporate competitors, which can be caught unaware of small-scale adversaries in command of a surprisingly potent new media and social network arsenal: blogs, tweets, text messages, online petitions, Facebook protest sites, and digital videos. Some companies have already experienced the damage that can be done by a single highly motivated critic lashing out from a personal computer. No one has failed to hear these stories. Manipulation of information and/or belief propaganda is heavily dependent upon infrastructure. Two distinct scenarios serve to illustrate the chaotic nature of infrastructure attacks. In the first case, a particular infrastructure attack may trigger a series of proximate consequences that are difficult to predict and that greatly magnify the effects of the attack. In the second case, a series of attacks will exhibit chaotic behavior when the sum of their cumulative effect far exceeds the sum of the individual affects of a series of independent events. These are not uncommon patterns.
After the explosion of BP’s Deepwater Horizon drilling platform, for example, Leroy Stick (an alias) began publishing the tweets of a totally made-up representative of a similarly bogus BP global public relations division. While crude oil spilled into the Gulf of Mexico, devastating the regional ecology and economy, the satirical (Twitter account; @ BPGlobalPR ) tweeted about the division’s lunch menu and other inane matters. Tens of thousands followed his updates – far more than the number who followed the real BP Twitter account. Through this low-cost effort, Stick helped keep Americans’ rage boiling as BP scrambled to deal with a very complex accident of plugging the well, in addition to trying to restore faith in its brand. As this one incident demonstrates, the rules of engagement changed. Critics no longer need the resources of an institution. The internet has leveled the playing field between large corporations and any kind of groups or individual activists. Although some antagonists are truthful, most are not. Often their diatribes are only a small part of the truth which distort the whole story; sometimes they are entirely, demonstrably false and/or manipulated. Attackers are probably not level-headed and many have extremist elements to their causes. Those who take on large companies single-handedly are almost always highly emotional, if not irrational and can negatively manipulate even their own people; business leaders have no advanced notice, time to reflect or to prepare properly. When traditional battles are brewing, companies have at least a flicker of warning and a modicum of control over how events will unfold. In this new-style of attacks, they don’t. The battle over reputation does not always favor the parties with the deepest resources. On the contrary, it tends to saddle them with greater obligations. The world’s Goliath’s are generally viewed as being in a better position than its David’s to behave reasonably, justly, and humanely, even when acting in self-defense.
Learn how to respond to these assaults
Northbound Logistic Infrastructures responds effectively to these assaults, we show corporate leaders how to conduct a review of what is now recognized as a new form of conflict: “Corporate Informational Warfare.” We have developed 3 principle initiatives of effective operational counter attacks—these 3 initiatives will aid in the restoration of a corporations reputation and will prevent future conflicts. Defending against information disturbance, degradation, and denial requires the use of many counter-measures. Our development of a compositional physical operations system that uses Logistic Strategies and Intelligent Structures provides a certain amount of inherent robustness and resiliency of the information that our customers want conveyed and get it where they want it to be, whereas the opposition physically cannot. Information and communications to and from these known threats can use social digital media technology to focus on frontal information and discard information that comes from either side. There are also several logistic digital media techniques coupled with redundancy, which means operating in a Digital Media Architecture strategy integrated with physical logistic operational techniques that are available and specifically designed to counteract the manipulation of any type of corporate information designed for performing a disturbance and/or degradation of its pubic stock.
For more information and a strictly confidential reply, please contact us.