Get a Pentest and security assessment of your IT network.

News

Cracking The Terrorists Social Media Handbook

The reported use of WhatsApp and social media by ISIS as a command and control network is just the latest example, but it raises some interesting dilemmas. It reopens the common carrier debate: should service providers be responsible for identifying potential terrorist or criminal users? Governments may see this as desirable, but in practice, it is unlikely to be successful, as businesses have very little information about signs of terrorist activity, plus the potential to infringe on users civil liberties. Terrorist organisations are not bound by policy or business cases, and they assimilate new technologies more quickly than governments.”]

Source: https://informationsecuritybuzz.com/news/cracking-terrorists-social-media-handbook/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months