Criminal Communication Through Microblogging
Marissa Brassfield — October 27, 2008 — Social Good
A draft of what is said to be an Army intelligence report explores the possibilities of terrorists using microblogging tools like Twitter to communicate and disseminate information across an interconnected network.
According to CNET, the research that led to the report was collected using open-source intelligence, but the plausibility of terrorists using Twitter to openly communicate is troubling. It would be incredibly easy for terrorists and extreme activists to devise a code that utilizes everyday keywords, and Twitter's simple user interface makes real-time mass dissemination far simpler than any text message.
According to CNET, the research that led to the report was collected using open-source intelligence, but the plausibility of terrorists using Twitter to openly communicate is troubling. It would be incredibly easy for terrorists and extreme activists to devise a code that utilizes everyday keywords, and Twitter's simple user interface makes real-time mass dissemination far simpler than any text message.
Trend Themes
1. Terrorist Use of Microblogging - There is a growing trend of terrorists utilizing microblogging platforms like Twitter to communicate and share information, posing a significant challenge to security agencies.
2. Code-based Communication - As terrorists may devise codes using everyday keywords on microblogging platforms like Twitter, there is an opportunity for innovation in code-breaking and detection technologies.
3. Real-time Mass Dissemination - The simplicity of Twitter's user interface enables terrorists to rapidly and widely disseminate information, creating a need for advanced algorithms for real-time monitoring and content moderation.
Industry Implications
1. Security and Counterterrorism - The security and counterterrorism industry must develop advanced monitoring tools and intelligence gathering techniques to counter the use of microblogging platforms by terrorists.
2. Cybersecurity and Encryption - The cybersecurity industry can explore opportunities to enhance encryption technologies and develop code-breaking algorithms to detect and decrypt terrorist communications on microblogging platforms.
3. Social Media Monitoring and Content Moderation - The social media monitoring and content moderation industry needs to invest in AI-driven solutions to swiftly detect and take down terrorist content on microblogging platforms like Twitter.
2
Score
Popularity
Activity
Freshness