Feeds:
Posts
Comments

Archive for October, 2008

The Army’s 304th Military Intelligence Battalion recently produced a presentation entitled, “ al Qaida-Like Mobile Discussions & Potential Creative Uses”. The presentation has some interesting information regarding, ‘Pro Terrorist Propoganda Cell Phone Interfaces”, mobile phone target surveillance, “Voice Changers for Terrorist Telephone Calls” and finally, “Potential for Terrorist use of Twitter”. This last topic has received some commentary having been seized upon by Wired’s Danger Room Blog. As usual with discussions centered on the terrorist potential use of any new technology, negative comments focus on the, “ why don’t they just use the telephone” argument. However, this as ever misses the wider point.

Twitter has been around since July 2006 and is billed as a micro-blogging service with a social networking aspect – it is a highly fluid platform that can be meshed with a variety of other online tools. As with many innovations in this space its full utility is simply unknown – therefore, it is useful to speculate on both the potential negative and positive uses. As a society we now have a pretty good idea of how the telephone works.

The military intelligence report highlights three scenarios relating to how Twitter could be used – terrorist command and control, terrorist real-time targeting for suicide operations and pre-operational research on terrorist targets who use Twitter. Of these scenarios it is the latter that is so far potentially the most ‘negative’ use of Twitter. It is possible to produce an unnerving amount of information relating to specific Twitter users based on their social patterns and individual entries. As a rule of thumb it seems that it is never the primary functions of these platforms, which are the most revealing but their secondary and tertiary applications.

Twitter along with its competitor Jaiku continues to develop and as it does so will its impact on society. It is worth noting that the LA Fire Department is making good use of Twitter as a real-time incident information platform. Perhaps the terrorist use of Twitter will be the revival of alhesbah as a micro-blog sending ideological updates to followers as well as including LAFD style incident updates – I would add this as, potential use scenario 4.

originally posted on the counter terrorism blog

Read Full Post »

In my many trawls across the internet I’ve come across a very interesting story here regarding the possible arrest and seize of Chinese Money Launder’s using an online game to supposedly transfer $38m in 18 months.

Those of you who’ve kept track with this website will be very aware that this is something I’ve been predicting as quite possible for quite some time now.

I’ll admit though, I’m not entirely convinced by the article and I’d like to see some secondary confirmation before I accept what it’s saying. On the face of it though it looks plausable, however, this is the internet and I’m sometimes extremely wary of news acquired from it. It’ll keep looking for confirmation of course.

If proved though, it’s an interesting development, and one which both law makers and law enforcement agencies should probably examine with concern.

Lets not cry wolf though until we have all the facts (or indeed prematurely cry “I warned you all!” 🙂 )

In addition, I can highly recommend a read of this published journal article examining the impact of organisted criminal groups on online systems. It makes for a fascinating read.

Read Full Post »

Virtual Forbidden City

IBM and China’s Palace Museum have created an exact replica of the Forbidden City.

It is an impressive piece of work but like so many virtual worlds – when I visit at least – are pretty much empty with not much going on.  However, with the Forbidden City you can choose to take a guided tour.

Link here.

Read Full Post »

A report by the National Science Foundation suggests that datamining is not particularly effective when trying to identify possible terrorists.

Here on CNET

I have previously commented that virtual worlds in particular do not lend themselves to datamining attempts very well.  Far better to develop practices and procedures that work effectively in gathering information within these virtual spaces — VirtutalHUMINT.

VHUMINT.

Read Full Post »