Modernizing Authentication — What It Takes to Transform Secure Access
The appeal of Twitter, the free social networking and micro-blogging service, is that it lets people stay in touch with their friends in pretty much real time.
That fun tool can also be put to nefarious uses, according to an addendum to the 304th Military Intelligence Battalion periodic newsletter, available on the Federation of American Scientists' (FAS) Web site.
The paper tracked some of the latest tactics terrorist groups use to organize and described some techniques that are emerging.https://o1.qnsr.com/log/p.gif?;n=203;c=204634421;s=15939;x=7936;f=201702151714490;u=j;z=TIMESTAMP;a=20304455;e=i"The [Twitter] member can send Tweets (messages) near real time to Twitter cell phone groups and to their online Twitter social networking page," the author said, adding that "there are multiple pro- and anti-Hezbollah Tweets."
Twitter members "can also mashup their Tweets with a variety of other tools including geo-coordinates and Google (NASDAQ: GOOG) Maps or other electronic files/artifacts. Members can direct and re-direct audience members to other Web sites and locations from 'Tweets' and can engage in rapid-fire group social interaction," the writer said.
The author outlined three scenarios where Twitter could be used by terrorists, and pointed out that terrorists have also talked about using other technologies, including cell phones, and Skype (define)and other internet telephony services.
The author, who did not sign the paper, warned that most of the information came from "al-Qaida-like Web sites from [uncorroborated] postings made by terrorists" and "persons sympathetic to terrorism." Only "rudimentary Arabic language skills and the Google translating tool" were used.
The military intelligence paper is "not a serious intelligence analysis. It's more like a student exercise discussing a topic of hypothetical concern," Steven Aftergood, who directs the FAS's project on government secrecy, told InternetNews.com.
A nugget of truth
Aftergood's criticism may be true, but that does not mean the military intelligence author's speculations are untrue.
"Al-Qaida's younger generation has shown a surprising degree of sophistication in adopting emerging high-tech Western communications standards -- Internet Relay Chat, PalTalk, YouTube, MSN Chat, PGP Encryption -- in order to stay one step ahead of law enforcement and intelligence agencies," Even F. Kohlmann, senior terrorism consultant at the NEFA Foundation, told InternetNews.com by e-mail from Guantanamo Bay, where he is attending a military commissions trial.