It touches briefly on "Pro Terrorist Propaganda Cell Phone Interfaces," using cell phone GPS data to assist terrorist operations, mobile phone surveillance, possible use of voice changing technology by terrorists, "Potential For Terrorist Use of Twitter," and other mobile phone technology and software that bears further consideration.
In one "Red Team" scenario -- the red team being the traditional attacker in attack/defense scenario planning -- the report imagines a terrorist operative using a cell phone with built-in camera or video capability to send Twitter messages to other terrorist operatives in near real-time updates, "similar to the movement updates that were sent by activists at the [Republican National Convention]." The goal would be to provide troop strength intelligence and to coordinate an ambush.
Another scenario imagines a terrorist operative wearing an explosive vest, capable of being detonated remotely, and carrying a mobile phone to send and receive Twitter messages. This could allow a remote terrorist observer "to select the precise moment of remote detonation based on near real-time movement and imagery" coming from the bomb-wearing terrorist, the report speculates.
Concerns about how new technologies may be used are hardly new: Earlier this year, the U.S. Department of Defense issued a communiqué to make it clear that vehicles taking pictures for Google's Street View service are not allowed to photograph military bases. Google Earth has reportedly been used by terrorists to help plan attacks against British troops in Basra, Iraq. The Taliban in Afghanistan reportedly have been using Skype to evade eavesdropping by Western intelligence services.
And the report itself acknowledges the limits of its musings, noting that the contemplated scenarios deserve further research.
Steven Aftergood, director of the Federation of American Scientists' Project on Government Secrecy, sees the report "as a student exercise, not as a serious threat assessment."
"Terrorists can use credit cards and can openers, so they can probably use Twitter too," he said in an e-mail. "But that doesn't make it a national security concern."
InformationWeek Elite 100Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
The UC Infrastructure TrapWorries about subpar networks tanking unified communications programs could be valid: Thirty-one percent of respondents have rolled capabilities out to less than 10% of users vs. 21% delivering UC to 76% or more. Is low uptake a result of strained infrastructures delivering poor performance?
Join us for a roundup of the top stories on InformationWeek.com for the week of December 7, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program!