Spy Fears: Twitter Terrorists, Cell Phone Jihadists

Scenario 3: Cyber Terrorist operative "A" finds U.S. [soldier] Smith's Twitter account. Operative "A" joins Smith's Tweets and begins to elicit information from Smith. This information is then used for… identity theft, hacking, and/or physical [attacks]. This scenario… has already been discussed for other social networking sites, such as My Space and/or Face Book.

Steven Aftergood, a veteran intelligence analyst at the Federation of the American Scientists, doesn't dismiss the Army presentation out of hand. But nor does he think it's tackling a terribly seriously threat. "Red-teaming exercises to anticipate adversary operations are fundamental. But they need to be informed by a sense of what's realistic and important and what's not," he tells Danger Room. "If we have time to worry about 'Twitter threats' then we're in good shape. I mean, it's important to keep some sense of proportion."

-- This embed didnt make it to copy for story id = 6108426. -- This embed didnt make it to copy for story id = 6108426. -- This embed didnt make it to copy for story id = 6108426.
Page
  • 1
  • |
  • 2
null
Join the Discussion
You are using an outdated version of Internet Explorer. Please click here to upgrade your browser in order to comment.
blog comments powered by Disqus
 
You Might Also Like...
See It, Share It
PHOTO: Debra Messing, left, attending the premiere of Smash in New York City on Jan. 26, 2012 and right, attending the Broadway opening of Outside Mullingar on Jan. 23, 2014 in New York.
Jim Spellman/Getty Images | Bruce Glikas/Getty Images
Baby Lemur Relaxes on Mom
Jens Meyer/AP Photo
PHOTO: Los Angeles Angels first baseman Albert Pujols watches the ball after connecting for his 500th career home run,April 22, 2014.
Pablo Martinez Monsivais/AP Photo
PHOTO: Online services such as AllPaws.com help match people with the perfect pet.
Courtesy Darrell Lerner/AllPaws.com