It touches briefly on "Pro Terrorist Propaganda Cell Phone Interfaces," using cell phone GPS data to assist terrorist operations, mobile phone surveillance, possible use of voice changing technology by terrorists, "Potential For Terrorist Use of Twitter," and other mobile phone technology and software that bears further consideration.
In one "Red Team" scenario -- the red team being the traditional attacker in attack/defense scenario planning -- the report imagines a terrorist operative using a cell phone with built-in camera or video capability to send Twitter messages to other terrorist operatives in near real-time updates, "similar to the movement updates that were sent by activists at the [Republican National Convention]." The goal would be to provide troop strength intelligence and to coordinate an ambush.
Another scenario imagines a terrorist operative wearing an explosive vest, capable of being detonated remotely, and carrying a mobile phone to send and receive Twitter messages. This could allow a remote terrorist observer "to select the precise moment of remote detonation based on near real-time movement and imagery" coming from the bomb-wearing terrorist, the report speculates.
Concerns about how new technologies may be used are hardly new: Earlier this year, the U.S. Department of Defense issued a communiqué to make it clear that vehicles taking pictures for Google's Street View service are not allowed to photograph military bases. Google Earth has reportedly been used by terrorists to help plan attacks against British troops in Basra, Iraq. The Taliban in Afghanistan reportedly have been using Skype to evade eavesdropping by Western intelligence services.
And the report itself acknowledges the limits of its musings, noting that the contemplated scenarios deserve further research.
Steven Aftergood, director of the Federation of American Scientists' Project on Government Secrecy, sees the report "as a student exercise, not as a serious threat assessment."
"Terrorists can use credit cards and can openers, so they can probably use Twitter too," he said in an e-mail. "But that doesn't make it a national security concern."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.