posted on Nov, 4 2008 @ 05:18 PM
Terrorists Could Use Twitter For Mayhem, Army Report Muses. Terrorism and Twitter go together like Darth Vader and Tribbles - the former aspiring to
instill fear, the latter chirpy and not very threatening.
Yet a draft Army intelligence paper, "Al Qaida-Like Mobile Discussions & Potential Creative Uses," contemplates just that combination.
The October 16 paper, posted on the Federation of American Scientists Web site, was written by the Army's 304 Military Intelligence Battalion Open
Source Intelligence Team.
It touches briefly on "Pro Terrorist Propaganda Cell Phone Interfaces," using cell phone GPS data to assist terrorist operations, mobile phone
surveillance, possible use of voice changing technology by terrorists, "Potential For Terrorist Use of Twitter," and other mobile phone technology
and software that bears further consideration.
In one "Red Team" scenario - the red team being the traditional attacker in attack/defense scenario planning - the report imagines a terrorist
operative using a cell phone with built-in camera or video capability to send Twitter messages to other terrorist operatives in near real-time
updates, "similar to the movement updates that were sent by activists at the [Republican National Convention]." The goal would be to provide troop
strength intelligence and to coordinate an ambush.
Another scenario imagines a terrorist operative wearing an explosive vest, capable of being detonated remotely, and carrying a mobile phone to send
and receive Twitter messages. This could allow a remote terrorist observer "to select the precise moment of remote detonation based on near real-time
movement and imagery" coming from the bomb-wearing terrorist, the report speculates.
Concerns about how new technologies may be used are hardly new: Earlier this year, the U.S. Department of Defense issued a communiqué to make it
clear that vehicles taking pictures for Google's Street View service are not allowed to photograph military bases. Google Earth has reportedly been
used by terrorists to help plan attacks against British troops in Basra, Iraq. The Taliban in Afghanistan reportedly have been using Skype to evade
eavesdropping by Western intelligence services.
And the report itself acknowledges the limits of its musings, noting that the contemplated scenarios deserve further research.
Steven Aftergood, director of the Federation of American Scientists' Project on Government Secrecy, sees the report "as a student exercise, not as a
serious threat assessment."
"Terrorists can use credit cards and can openers, so they can probably use Twitter too," he said in an e-mail. "But that doesn't make it a
national security concern." [Claburn/InformationWeek/27October2008]