It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Spy Fears: Twitter Terrorists, Cell Phone Jihadists

page: 1
0

log in

join
share:

posted on Oct, 27 2008 @ 07:29 PM
link   

Spy Fears: Twitter Terrorists, Cell Phone Jihadists


abcnews.go.com

Could Twitter become terrorists' newest killer app? A draft Army intelligence report, making its way through spy circles, thinks the miniature messaging software could be used as an effective tool for coordinating militant attacks.
A draft Army intelligence report thinks Twitter could be used as an effective tool for coordinating militant attacks. For years, American analysts have been concerned that militants would take advantage of commercial hardware and software to help plan and carry out their strikes. Everything from online games to remote-controlled toys to social network sites to garage door openers has been fingered as possible tools for mayhem.
(visit the link for the full news article)



posted on Oct, 27 2008 @ 07:29 PM
link   
Is this really a shock to anyone? If the technology is available, why would they not use it?
Are the west the only ones allowed to use internet and modern technology?

The report is roughly divided into two halves. The first is based mostly on chatter from Al-Qaeda-affiliated online forums. One Islamic extremist site discusses, for example, the benefits of "using a mobile phone camera to monitor the enemy and its mechanisms." Another focuses on the benefits of the Nokia 6210 Navigator, and how its GPS utilities could be used for "marksmanship, border crossings, and in concealment of supplies."

Such software could allow jihadists to pick their way across multiple routes, identifying terrain features as they go. A third extremist forum recommends the installation of voice-modification software to conceal one's identity when making calls. Excerpts from a fourth site show cell phone wallpapers that wannabe jihadists can use to express their affinity for radicalism:


What happend to the idea that all electonic media is being monitored already.


Scenario 3: Cyber Terrorist operative "A" finds U.S. [soldier] Smith's Twitter account. Operative "A" joins Smith's Tweets and begins to elicit information from Smith. This information is then used for… identity theft, hacking, and/or physical [attacks]. This scenario… has already been discussed for other social networking sites, such as My Space and/or Face Book.

Wouldn't any military personel already be aware of the risks in divulging any kind of info?

abcnews.go.com
(visit the link for the full news article)



new topics
 
0

log in

join