Twitter Terrorists -- Come On...

  2008-10-26

Twitter Terrorists -- Come On...

  02:00, by Hagai Bar-El   , 184 words
Categories: Security Policies

I could not miss this one in Wired.com.

Then the presentation launches into an even-more theoretical discussion of how militants might pair some of these mobile applications with Twitter, to magnify their impact. After all, ?Twitter was recently used as a countersurveillance, command and control, and movement tool by activists at the Republican National Convention,? the report notes. ?The activists would Tweet each other and their Twitter pages to add information on what was happening with Law Enforcement near real time.?

It seems as people are making an effort to ring the bell on just about anything. Twitter? Twitter is merely an application that facilitates instant messaging, like tons of others. Whatever can be done with Twitter can also be done with IRC, Web chat rooms, shout boxes (those little frames on websites that display whatever is written by guests to the website), and what not.

Yes, someone evil can use Twitter to pass messages to other evil people in the field, but the ability to pass instant messages along is a ?problem? of ubiquitous network technologies, not of this or that particular product.

No feedback yet