The potential use of Twitter and other communications technologies by terrorists is considered in a new draft Army intelligence paper, based on a review of jihadist web sites and other public sources.
The Army paper on “al Qaida-Like Mobile Discussions & Potential Creative Uses” was dissected by Noah Shachtman in “Spy Fears: Twitter Terrorists, Cell Phone Jihadists,” Danger Room, October 24. [bron]
De paper [pdf] waar naar verwezen wordt beschrijft drie scenario’s waarin Twitter door terroristen gebruikt zou kunnen worden:
Terrorist operative "A" uses Twitter with (or without) using a cell phone camera/video function to send back messages, and to receive messages, from the rest of his cell. Operative "A" also has a Google Maps Twitter Mash Up of where he is under a code word for other members of his cell (if they need more in-depth directions) posted on the WWW that can be viewed from their mobiles. Other members of his cell receive near realtime updates (similar to the movement updates tat were sent by activists at the RNC) on how, where, and the number of troops that are moving in order to conduct an ambush.
Terrorist operative "A" has a mobile phone for Tweet messaging and for taking images. Operative "A" also has a separate mobile phone that is actually an explosive device and/or a suicide vest for remote detonation. Terrorist operative "B" has the detonator and a mobile to view "A’s" Tweets and images. This may allow "B" to select the precise moment of remote detonation based on near real time movement and imagery that is being sent by "A".
Cyber Terrorist operative "A" finds U.S. Army Smith’s Twitteraccount. Operative "A" joins Smith’s Tweets and begins to elicit information from Smith. This information is then used for a targeting package (targeting in this sense could be for identity theft, hacking, and/or physical.) This scenario is not new and has already been discussed for other social networking sites, such as My Space and/or Face Book.