SOCIAL MEDIA JIHAD CONTINUES: ANSAR AL-SHARIA LIBYA OPENS TWITTER ACCOUNT
Okay I really didn't know where to put this.. Here or in early bird
Anyways ..I first read this on FB and thought this is a good topic and somewhere we should be looking at. I had read a couple books on cyber warfare and we have discussed this before after The Egyptian Revolution of 2011. So after seeing this on the Blaze I thought I'd post it for discussion. http://www.theblaze.com/contribution...itter-account/ Quote:
|
Cyberterrorism??
Okay since no comments, I'll start some thoughts with what I was looking at with this post from the The Blaze.
So are we looking more at the use of social media and internet platforms in terrorism "groups" to streamline their communication and use worldwide media platforms to drive home new messages or campaigns? I say this article brings (IMO) just one more example of what different groups are using to "reach out" in platform of cyberterrorism. We have seen terrorist groups and different "movements" worldwide have stepped up their "tapping into the" Internet in the forms of social media for their communications, fundraising, financing, indoctrination and recruitment. With this new "age of warfare," terrorist or movement groups using unconventional methods of attack, with a unprecedented in origin and execution, along with them waged by a non-state actor that uses extrinsic and intrinsic motivations to the means. These groups may lack the identity of a nation-state like nationality, language and sometimes-recognized territory in any form. But they use social media in targeting; personalities, economic and political whatever's in the heartland of the most capable superpower. Based that most are looked as dirt eaters. Look at Kenya last month, Syria this year, and all the way back to Egypt. Would this be something along the lines of Unconventional Warfare 2.0 and the need [or current] to reshape and/or restructure of the ARSOF or Army's future? |
This is a good article on how Somalia's al-Shabaab militant group who attacked a shopping mall in Nairobi used Twitter to broadcast their goals. I never heard about this on the local news. But you did hear on how local were using Twitter and Facebook and there cells to talk or commincate with love ones. The same thing happen with the LAX shooting two weeks ago.
http://online.wsj.com/news/articles/...91720477473610 |
Please Don't Rob Me.com
I thought about this site while typing in technology section over photo sharing.
This web site is great on three different levels. Social Engineering, Intel, and as they point out for robbers. http://pleaserobme.com Social Engineering. Okay if you don't know what social engineering is, we'll turn on the lights and check out social engineering.org With many of us on social networking sites as it was pointed out in the Rolling Stone article, so are open to online social engineering TTPs. Taking the classical sense of social engineering, in which refers to the social manipulation of a person, people or group(s) of people to meet social, political or economic means. Today we have to take a look at another meaning in the cyber security world. Your online information, in gaining access to information by exploiting human psychology rather than using traditional techniques. When I joined FB and other sites to get ready for retirement I was surprised at the amount of information military, SOF people had on these sites. A classic example is the "Robin Sage" female on LinkedIn two years ago, Google it, just WOW. So looking at pleaserobme.com you can see how online social engineering starts with a friend on your "network" or a Group sending you a message asking for help or gives you a story over a period of time, etc. This form of social engineering is surprisingly easy to achieve, and because of it many are easy targets. Social engineering isn’t limited to social networking, Google Sarah Palin and her email heckled. What happen to her is a great TTPS and during a Cyber Course we did just that, BTW great Team training IMO while at a bar or restaurant or best a convention. Intel. You have to be able look at social engineering and for anyone that knows a thing or two, you can see how it can be use very nicely. What you do F2F is now done online, it's an Environment. Now look at pleaserobme.com again, you can use this how? Think about those email phishing and how those techniques are used. Just as in phishing emails; FB, Twitter, SnapChat, LinkedIn, Google+, etc, in which perpetrators send out many (sometimes millions) of emails with the hopes of getting “bites” in return. This can, and is being done on the social media network levels. So tie what you know with social media, social engineering, BA/AD and Yeah a lot. So think outside of that box you call a laptop, the World Wide Web is your window. Think about using it. Lastly on the robbers side, I'll go with this. I posted this on FB to tell friends about how easy they are linked through there FB and Twitter pages from the CheckIn or FourSquares during the holidays. Quote:
So why does cyber warfare matter? The same as it does for yourself. |
All times are GMT -6. The time now is 21:32. |
Copyright 2004-2022 by Professional Soldiers ®