REAL CONSERVATIVES

NEVER TOLERATE TYRANNY!....Conservative voices from the GRASSROOTS.

How do the terrorists beat Obama at making war? It's easy, he's stupid and so is Hitllary

Hitllary at a moment of hesitation trying to hide telling the truth

Muslim terrorists are very effective "fighters". They have been for a thousand years.

Taking that parameter into account and adding to it that Hitllary had her State Department computer system open to the public for YEARS helped the terrorists by a factor of a thousand.

The "secret operations" Hitllary thought she had were being shared by muslim terrorists across the globe. The proof shows in how many of our soldiers came home with missing limbs and in body bags. At times, like at Benghazi, we got slaughtered!

 So, how do they do it? How do the muslim terrorists do it. How do they communicate world wide without the USA finding out? With our best technology, the USA STILL hasn't been able to detect and defend against  muslim terrorists?

`

`

Obama at a moment of brilliance.

`

`

How ISIS Is Using High-Tech Tools for Planning, Propaganda, and War.

The Fiscal TIMES By Michael Sheetz, CNBC December 4, 2015

`

he technology proficiency of terrorist organizations is on a swift rise.

As governments continue to unravel the planning behind the Paris attacks, groups such as the Islamic State and Boko Haram are using consumer technology products and social media to communicate and propagandize.

Related: The Fight Against ISIS Has New Price Tag: $5 Billion and C...

"The Islamic State uses a wide variety of communication technologies, just as we do, the public," said Joe Hall, chief technologist at the Center for Democracy & Technology, a Washington, D.C.-based nonprofit organization dedicated to ensuring the Internet remains open, innovative and free.

The Islamic State devotes a division of its commanders to educating both sympathizers and members alike on how to use new, encrypted communications.

"The efficacy of their operation is largely derived from the emphasis on easy-to-use, popular technologies — by creating a dual use for Twitter and others as not only social media platforms but also as both broadcast channels and tools," said Michael S. Smith II, a Congressional counter-terrorism consultant at Kronos Advisory.

Smith serves as a liaison for hacking collective Ghost Security Group — a counterterrorism organization that uses data mining to combat extremist groups. Ghost Security Group found the following applications receive the most attention among members and supporters of the Islamic State: TwitterFacebook, Telegram, Threema, Kik, Wickr, SureSpot and WhatsApp, which is owned by Facebook. Ghost Security Group sent the information to Smith, who is not a member of Ghost, to share with governments.

'Encrypt almost everything'

The expansion of encryption is not going to slow down.

Related: With ISIS Making Millions, U.S. Boosts Its Attacks on Oil ...

"Very soon regular commercial laypersons' communications devices — such as your phone or [Apple's] iMessage — are going to have to be very, very secure by default," Hall said. "We're going to encrypt almost everything in the near future."

Encryption's increasing ubiquity comes from the benefits of securing oneself against everyone from common criminals to government-level hackers. And the answer is not by trying to staunch the flow of products or access to applications to certain groups.

"We might be able to stop ISIS from using iPhones, but they're going to be able to gain access to something that isn't from Cupertino, California," said David Fidler, a senior fellow for cybersecurity at the Council on Foreign Relations.

While encryption will continue to be a thorn in the side of government surveillance, the Islamic State's use of social media is also a confounding problem in efforts to slow its slick communications and recruiting. The extremist group continues to exploit the Internet in an overt, not covert, method with little resistance.

"They've developed a new model of using cyber technology as a part of their agenda," Fidler said. "And we're likely to see copycat efforts … Boko Haram, early in February and March, started to shift in the way they were using social media to follow that ISIS template."

The threat is heightened because of the Islamic State's combination of being both an organized faction, despite being decentralized, and open about their intent. "This is really the first terrorist group that has shown the type of sophistication and understanding of how off-the-shelf technology can be utilized," Fidler said.

"Counterterrorism agencies want to do something about the Islamic State's abuse of social media, but we haven't yet figured out how to do it without harming our own interests."

"No one should overlook the fact that while there's an emphasis on Telegram, they're not deterred in their use of Twitter," Smith said. "They want to utilize technologies which … are quite easy to gain access to, navigate content therein and use to communicate, both publicly and secretly."

Twitter was one of the services highly recommended by ISIS in a technology security manual recently provided to WIRED magazine by researchers at the U.S. Military Academy at West Point. The manual was written in 2014 by Cyberkov, a Kuwaiti cybersecurity firm, to instruct journalists and activists in Gaza on how to protect their identities, but was later found to be co-opted by ISIS.

Related: Is the U.S. Hopelessly Outclassed in the Cyber War Against...

Social media companies, including Twitter, combat these terrorist accounts by attempting to shut them down. However, they have varying degrees of success in keeping those accounts terminated.

"At least 70 percent of the content the Islamic State is putting out is first coming on Twitter," said Steven Stalinsky, executive director of the Middle East Media Research Institute. "About a year ago a number of Twitter account holders would start advertising on their descriptions and provide links to other accounts on Kik, Whatsapp, Askfm, SureSpot, Wickr and, in the last several months, Telegram."

In the days after the Paris attacks, Telegram took down public posts made by the terrorist group and reported that it blocked 78 ISIS-related channels across 12 languages.

"Telegram did shut down some accounts but some of them came right back. Already I'm seeing five or six accounts of jihadi extremist fighters in Syria and larger groups back on Telegram," Stalinsky said. "And the number one, the heart and soul of extremist groups, continues to be Twitter."

The Wall Street Journal recently reported on when hacking collective Anonymous appeared to publish lists of accounts it linked to Islamic State and urged followers to report those accounts as violating Twitter's terms of service. Those terms of service state, "Users may not make threats of violence or promote violence, including threatening or promoting terrorism."

A Twitter spokesman declined to comment beyond what had already been provided by the company to the WSJ for the recent article, in which Twitter stated that such lists "are often full of inaccuracies and include academics and journalists not affiliated with a targeted group."

Facebook declined to comment but in recent comments given toWIRED, a Facebook spokesman said, "There is no place for terrorists on Facebook. We work aggressively to ensure that we do not have terrorists or terror groups using the site, and we also remove any content that praises or supports terrorism."

Wickr, Surespot, Kik and Telegram did not immediately respond to requests for comment, but have, like Twitter and Facebook, opined on this issue both before and after the Paris attacks in recent comments to the press and in blog posts.

The hacktivist group Anonymous has also reportedly declared war on ISIS, saying it "will launch the biggest-ever operation" against the terrorist group.

One approach Anonymous could take is to shut down online accounts and thus undermine ISIS' recruiting tools. Another is to embarrass ISIS by publishing evidence of the hypocrisy among its leaders. And the Islamic State remains fallible in the digital world.

Regardless of how effective they are on social media, there's a debate over whether terrorist organizations remain handicapped by acting more as everyday consumers of technology than as an elite group of hackers. 

"Something we've been looking for that we haven't yet seen is the class of software used by law-enforcement entities for hacking. The Islamic State is more of the tech guy than the elite hacker. They're more cryptographers and social media managers, but that's about as sophisticated as it gets," Hall said.

But a hack into the U.S. Central Command's (Centcom) Twitter account in January 2015, which revealed pro-ISIS messages, led J. M. Berger — an analyst and non-resident fellow with the Brookings Institution and author of "ISIS: The State of Terror" — to tell theWashington Post, "ISIS has a team of hackers who are very deeply involved in ISIS the organization. ... They have been practicing and recruiting for a while, and this has been going on for months and months," Berger told the Post.

The Centcom hack could be considered "hacktivism" and not true cyber warfare, a "low level" activity that is already expected of ISIS.

In referring to the recently leaked security operations' manual, which includes a section on hacking, Aaron Brantly of West Point's Combating Terrorism Center, said, "They're not super-talented hackers, but they're reasonable."

Some aspects of hacking, such as "going dark," might conflict with terrorist group goals.

"Attribution is very important for terrorist organizations. They want people to know it was them who conducted an attack, which in the cyber realm can be very difficult," said Lillian Ablon, information systems analyst at the RAND Corporation.

This article originally appeared on CNBC. Read more from CNBC:

Views: 99

Comment

You need to be a member of REAL CONSERVATIVES to add comments!

Join REAL CONSERVATIVES

BOOK STORE

.

opencomments316

SUPPORT

REAL CONSERVATIVES 

Order our book!

$ 9.95

INSTANT DOWNLOAD

TO ORDER

CLICK HERE:

http://www.lulu.com/shop/raymond-athens/right-side-up/ebook/product-17358205.html

TO ORDER

CLICK HERE:

http://www.lulu.com/shop/raymond-athens/right-side-up/ebook/product-17358205.html

 

The book RIGHT SIDE UP is a compilation of choice content from this web site...reflecting sometimes forgotten, purely Traditional American Values...

*********************

The Unborn

...let them BE !

Image result for BABY BLUE EYES

TO ORDER

CLICK HERE:

http://tpartyus2010.ning.com/forum/topics/save-a-life-and-maybe-a-soul

 

*****************

.

.

RICHARD

ALLAN

JENNI'S

THE

DANNY MALONE TRILOGY

CLICK HERE:

http://www.amazon.com/Danny-Malone-Trilogy-Mohammeds-Daughter/dp/1432724932

"The Fox, Golden Gate and Mohammed's Daughter"

Paperback

*************************

© 2024   Created by Your Uncle Sam.   Powered by

Badges  |  Report an Issue  |  Terms of Service