The reported use of WhatsApp and social media by ISIS as a command and control network is just the latest example, but it raises some interesting dilemmas. It reopens the common carrier debate: should service providers be responsible for identifying potential terrorist or criminal users? Governments may see this as desirable, but in practice, it is unlikely to be successful, as businesses have very little information about signs of terrorist activity, plus the potential to infringe on users civil liberties. Terrorist organisations are not bound by policy or business cases, and they assimilate new technologies more quickly than governments.”]
Source: https://informationsecuritybuzz.com/news/cracking-terrorists-social-media-handbook/

