Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Digital Terrorism and Hate 2006 CD-ROM

Published by Dancho Danchev under , , , , , , on December 10, 2006
In some of my previous investigative posts "Tracking Down Internet Terrorist Propaganda", "Arabic Extremist Group Forum Messages' Characteristics", "Cyber Terrorism Communications and Propaganda", "Steganography and Cyber Terrorism Communications", "A Cost-Benefit Analysis of Cyber Terrorism", I extensively blogged about Cyberterrorism and emphasized on the defensive use of it, communication channels under the shadow of SCADA devices and critical infrastructure getting attacked. Perspectives like these often ruin someone's self-mythology, but the Pupper Master too made a point when saying that your desire to remain what you're is what limits you, so evolve, or end up on the verge of extinction.

Here's a little something for everyone thinking cyberterrorism is surreal. Considering for a while that even primitive forms of existence such as street gangs utilize the Internet for propaganda, wouldn't a much better financed terrorist organization be compelled to participate? In fact they've been doing so even before 9/11, but I feel it's the good guys' cavalier attitude that ended up in the now, mature cyberterrorism platform.

A great source for open source intelligence to anyone interested in, here's a summary :

"This sixth and newest version of the Simon Wiesenthal Center's annual report of problematic websites exposes the growing use of the Internet as a key propaganda weapon, marketing tool and fundraising engine by terrorist groups such as Al Qaeda and Hamas, in addition to its continuing assessment of traditional extremist groups such as the KKK and neo-Nazis. "Although they swear to destroy the West, extremists and terrorists have taken to using Western technology to recruit, finance and plan their insidious actions," said Mark Weitzman, Director of the Simon Wiesenthal Center's Task Force Against Hate."

Now what would an intelligence agency do when knowing exactly where to look? Shut them down and prosecute someone, or adapt deep within the community to gather as much OSINT as possible. Whatever the outcome, keep in mind on the possibility of indirect intelligence engineering, as the way you're watching them, the same way they're watching you, watching them.