Вы находитесь на странице: 1из 11

FOROFHETALUSBONLY

Supplementaltothe 304thMl Bn PeriodicNewsletter


SampleOverview:alQaida-LikeMobile Discussions& PotentialCreativeUses
By 304th Ml Bn OSINTTeam
October 16, 2008
This is a draft FOUOproduct

The above examplesof Nokia Map Functions are displayed in a Pro


Islamic State of lraq (aI Qaida) Discussion thread at
http ://www,muslm.nethb/showthread.ohp ?o= I 797473 with sofruare
description and download instructions. Posting date March 24, 2008.
FCIROFFrcIALUSEO}TLY

Overview

Terroristsand personssympathetic to terrorismrecommenda varietyof differentmobile


to web technologies,software,and Voiceover InternetProtocol(VolP)rfor theirmobile
phoneuse. Someof the tacticsare old,someof the tacticsare stillemerging,and some
tacticsmay emergefromhacker,activist,and criminalnon-terrorist use. This paper
brieflycoversa few examplesof terroristuse and potentialuse of mobileto web and
web to mobiletechnologies and tacticsfroman opensourceperspective. The paper
includesthe followingfive topics: Pro TenoristPropagandaMobilelnterfaces,Mobile
Phone GPSfor Movements,Ops, Targeting,and Exploitation,The MobilePhoneas a
SurueillanceTool,VoiceChangersfor Terroist Phone Calls,a Red Teaming
Perspectiveon the PotentialTerroristUseof Twifter,and a sampleof softwarethat is
recommended on one pro terroristwebsitefor mobilephoneactivities.Thereare
numerouspossibilities that are not coveredin this paperdue to time and research
constraints.Forexample,GoogleEarth,MobileGPSMashups2 and MobilePhone
NumberSpoofingtechniquesare not addressedin this paperbut are certainlyworth
OpenSourceIntelligence (OSINT)consideration and probablydeservea paper(if nota
book)untoitself.

Pleasenotethe followingcaveatsto this article.The first limitationis the discussed


technologies werenot independently verifiedin a redteamingscenario, so it is unclear
whethersomeof the discussedtacticsand methodologies wouldactuallywork.For
example,extremistsuggestions to includeintegrating a mobilephonecameraintoa
missilewarheadseemhighlyimprobable.Second,a majorityof the information was
extractedfromal Qaida-likewebsitesfrom uncollaborated postingsmadeby terrorists,
personssympathetic to terrorism,or honeypots3.Third,the researchusedto generate
this paperwas conductedfromopensourcesonlyand has not beencomparedand/or
contrastedwith informationin non-opensource(classified) venues. Fourth,eachtopicis
merelyan introduction intothe subjectand deservesfurtherresearchand contemplation.
Fifth,the authoris nota linguist,but usedrudimentary Arabiclanguageskillsandthe
Googletranslatingtoolto extractwebsitecontext. Finally,the potentialfor use of certain
webto mobiletechnologies andtacticsis dependent uponthe mobileserviceavailable in
differentstatesand regions.Forexample,terroristscouldtheoretically useTwittersocial
networkingin the U.S.as an operationtool. However,it is unclearwhetherthat same
theoreticalusewouldbe availableto terroristsin othercountriesand to whatextent.

Whatdid becomeclearfromconductingresearchon thistopicis that thereare


numerousdifferenttactics,tools,and softwareservicesthat can be usedby terroriststo
conductactivitiesthat go wellbeyondthe originalintentof the mobilephonevoice
communications andthattheseburgeoning capabilities are availablefor OSINT
exploitation.Further,theremay be a possibilityto profilea portionof particularcyber

1 Prior August2007304'nMl Bn OSINTTeam ResearchArticle'Terroristand ExtremistUseof


Ml Bn OSINTTeam INTELINKU pageat
VoiceOvei InternetProtocol"is availableon the 3O4th
(lf you do not haveaccessto
https://www.intelink.qov/inteldocs/view.php?fDocumentld=10699
r N rrE rN ku a n o w o u ro ir -
2 http://sea-eves.com/vb/t33O6.html

t HoneyPot is definedas something(examplea website)that is set up in orderto allureselect


audiencemembersso thatthey may be trackedand monitored.
FCIROFHCIAL IJSEONLY

groupsandtheiraudiences
terrorist-like basedontheparticular
setof software
and
phones thatthegrouprecommends fromOSINTexploitation.

Tableof Contents
PRO TERRORIST PROPAGANDA CELL PHONE INTERFACES................ ..............2
CELL PHONE GPS FOR MOVEMENTS. OPS.TARGETING & EXPLOITATION........................3
MOBTLE PHONE SURVEILLANCE............. .........................4
VOICE CHANGERS FOR TERRORIST TELEPHONE CALLS?....... ...........................5
POTENTIAL FOR TERRORIST USE OF TWITTER: A RED TEAMING PERSPECTM...........7
SAMPLE OF OTHER MOBILE PHONE TOPICS & SOFTWARE RECOMMENDATIONS..........9

Pro Terrorist Propaganda Cett ptrone Interfaces


The mobilephoneprovidesan activeoutletfor terroristpropaganda.Currentlythereare
thousands of multimedia clips(audio,video,photo,PowerPoint,text,PDF)thatmaybe
up loadedto mobile phones frommultiplewebsitesand multimedia bunkers.In addition,
mobilephonetextingappearsto be consistently popular
and possiblyincreasingly
amongpro terroristaudiences(justas it is with non-terrorist
audiences).Someterrorist
organizationsare furtherbrandedby a specificcell phoneinterface,whichmakesthe
actualphonea pieceof propaganda.Followingare two examples:

Army of the MujahedeenCell Phone Interface(Advertized


celPhone Appearance)
screen

293031 t 2 3
iil $l.Qlert;fJr 10
rl,&jmtjt r$Jd',tz
rq{{:r.d;e 22 23 24
dzd'+fi:ri'}s m r
23456t8

lslamic State of lraq Cell Phone Interface (Advertized


cettPhonescreenAppearance)

a
FOROFFIC}ALIjSE ONLY

The softwarefor the above interfacesis advertizedas being availablefor downloadon


selectextremistwebsites,such as tamkeen.iraqserve.com.

.a;5:*l .,:LJL" a-,1 Cell PhoneGPSfor


Movements,Ops, Targeting&
,ri . Exploitation
ii F -i Fil rI Ji J. -L"1'
Nokia6210Navigatorandother
:._*'r
s )r-a' ;1+-
;. !*; GPScellphoneservicescould
';ts_'-r
be usedby our adversariesfor
travelplans,surveillance
and
targeting.

IlrI E Followingis an exampleof one


extremistdiscussion thread
Source: Arabic DiscussionForum http://llvan.oro/vb/showthread.pho?t=5844 surrounding the useof Mobile
(From Google Search Result Descriplion:"Make your love for God, Eid and PhoneGPS(thereare multiple
satisfaction and your obedience and Mwalatk and Zkirk and lslamic Jihad .... postings on thisissuewhich
Sailing fast and easy navigation system with A-GPS maps and the application
of Nokia Maps."
couldbe a paperuntoitself.)On
Compare the previous text with a vendo/s write-up "Sailing fast and easy May3, 2008a discussion topic
navigation sysfern with A-GPS and Nokia Maps application maps. Find your was postedin the proterrorist
destination on foot or in the car with a compass for navigation Sena. Take forumal Hebashat
pictures and video through the use of high-quality 3.2-megapixel camera with
www.alhesbah.net (nowdefunct)
flash The advantage Panoramic 240 x 320QVGA See maps, pictures and
videos on the screen QVGA stunning 2.4-inch size and the quality of 320 x 240 on the theoreticaluseof Nokia
Browse the Internet, send e-mail your uploaded content quickly connect via GPSfor "Specialist usein
high-speed3.5G '' Marksmanship, Border
Crossings, and in Concealment
of Supplies."The followingthree Graphicswere associatedwith this posting.
W I@
One response to the
topicthreadwasthatcity
imagesand pictures
werenotadequate
becauseadditional
information, suchas geo-
coordinates, was needed
for desertsandforests
(non-urban areas).A
laterpostingin thethread
discussed the prosand
consof GPSunderthe
title"An lntensiveCoursein the Use of LG PSVGPS"(Referencescreencaptureon
nextpage)whichbrieflycoveredsomeof the benefitsanddetriments of usingGPS. The
articlementioned the useof geocoordinatesfor bordercrossings,
itemconcealment,
andfor identifying enemylocations.The articlealsomentioned thatGPSwouldbe
usefulfor identifyingterrainand naturalresources,suchas water. In addition,
the article
mentioned thatattainedenemyGPScan be usefulforinformation exploitation.
ONLJ
FORCIFFrcI,{tTJSE-

.HfK epi Jtr,:-t .i itrs.;rrr


-;.+tt
:ri.*i stris jl+ilr ciiF:&it rJ+lt
!lJL1

iit Ji!Lr..&Lolrri& .s f,Jla'ji *r.rfi:,,.!*r:, r$iit"r;f,:ff


-: -rr',*,"irl ;::lil
":;
,.t' t u t tu t6 ; t. :r $ Ji b,rP,.ri !r,, dr d,n#L Lt' rr .-,
tl

it r l,r'.. >3 rd Jb J rb.r; d JJ &!, qn -J J ;-FI'Jpr u F.b :!; Ja J$ ? &Jr r :r r+ &L.r!


-p
J,qs.oL: *t.eli'P r+ tlu ts,errrrgllsir4,Jir-4r-lJ-strracr*1l.br'tl,J'&.:$Jtrj
F & JP ve fr.,i! gr rs.it)!& U {& Jb vr .4trr

: ir J* i{i

f r.r.j, F ji +Ji.l
"An Intensive Course in the ri'F, s JL.i-
t.i rr, i 4, r.ri J Jr ir *;1;,,;J:.i
Useof LG PSV GPS" ',

d l!!l-lt{ l..* r ,ry, ::ut* o ,'6 d te


"

t\.! ti":itiitiiiitiii/" ir,atin i. i,tAtrtrit&ni -'& ''

.s R ','.}J - .Iu1!s l i '." 'w * F s nH }j M d&< 4 l l l , q ' " ' *

3.n l ,ffi t* . r" ! @ -

( J;!)'.-.Ly'rb.!lrlv{t: s- elr Jt* 6s osi! o2:

Frt ryy'lni,t/g

An al Qaida-like Social Networking Pagein Maktoobblog,


www.shhidallah.maktoobblos.cont/l213376
that recommendsthe "An Intensive Course in the Use of
LG PSV GPS'

Mobile PhoneSurveillance
On September 6, 2008an individual usingthe pseudonym of "Volcano" provideda
theoretical
discussion in the Mujahedeen Armyof lraqEnablinglslamicMobilesforum,
www.tamkeen.iraqserve.com, on the useof mobilephonesfor targetsurveillance and
attacks.Underthe categoryof basicsurveillance, "Volcano" recommended usingthe
phone/video camerafor monitoring enemyactivities and operations in theater.Of
uniqueinterestis that"Volcano" posedseveraltheoretical examplesof howto usethe
mobilephonevideoand cameraoptionsin tandemwithconducting attacks.For
example,"Volcano" suggested thatonecouldusethe mobilephonefor remote
to tag the opportunetimeof attack. "Volcano"alsohypothesized
surveillance whethera
mobilephone cameracouldbe integrated intoa missileheadto filma targetas it is
beingattacked.Thisrecommendation probablywouldnotworkbut providesinsightinto
perspectives.
adversarial (Reference the screencaptureon thefollowingpage.)

-4-
FCIROFFIEIALUSEO}TLY

pl!lr:4!qt$&A_ryrti?#ry, lvvr m'a;1 "**xxxno*_ ": 'JJ'lEj


A. Ec $c{ f|itqy qffi Id E*
-:::

O e r8 J G'
aMHd |)cer# ff trOn,tt*,nn
'tddl*ltp,iiws.ilqsa...
l{Ortofi vLsdLlllEtrIl S tffi,*'

I ffi.$Er-coo*lryad I eoo4crr* 8*dfrd4[hh..E Etd-rfrffi

OK*rhEsdffiffiffi

Dlboylng th. t rg.t mobll. Bkrmlr.alhilv

Th. n.mc of God ttra marclful


M.yAll.h AlmkllouklnMohamm.d Afrrl ed hlr fmlly.nd compmion3
Mul.hld.cn brothcrs
Ar for GMualng r moblla phona crmara to monltortha .namy md ltt machanlrmt
Such $ lnst.ll.tlon otAlcimlrromrm mobllc d.vlc.s to control thr cx.ctdmc otdctonrdon by mobll. phonc to tllm lh. .r.r In whlch thc .n.my
n rpprorchlng rnd m.chrnbma oftha drvlca by ramotacontol MuJrhida.n bomblng rnd Hmulorlob Mulahld.an crn not Tllk pralanca In lh.
r.gion. Crn conbol th. dcvlc. md you.thomc or In Bldrkrto br moblh, whlch monhort lft..lrblw.l .nolh.? dth. Mul.hld.cn to b. giving
th.m Brtonld llourhal|mltirst Can ba urad la roving or mota monitorlng.
oJ:Jr ffi
:x
i,

:3
S:qP
Hara la tha racond ld.1 ,
Thr cn.mica olGod Amarlcanamd Jaw3 dlha d.ttruc{on otr targat rhootlng thrt procatr lnd guldad mlttila with r crm.n rnd lhcn thcy u,
olLr on tll.virion ud rc(a thc cnamiaaAvcjrrr.

Can rl3o voluntcGrsto do Tdmirohdryhm lllm.d urlng a cam.ra phonc .nd inshll it on th. liont ofiha mlttll. and rock.t Abokhip Aryi LG
Mobllala provan llnk.d to r rack.nd anothrr rt r mobll. ml$ll.l.unchlng th. ..cond ph.3. of r.glrtadon of crmarr md daatoy'ngtfi. tlre.t
Ngld ro unbdlavrri.
- oUt l* J & l J J

I a3k God Almightyto mrkG th. rGtugcHdon .vcrywhGr!


of r nG { d t

' *, tG! !.i !gT: i',"d*t{ Dii{* OafTgi

Voice Changercfor Terrorist TelephoneCalls?

You mayhaveseenit in a movie,the villaincallingthevictimwithan alteredvoiceto


hidehis/heridentity.In the movies,thatthemeis fairlycommon;the questionreallyis
whetherouradversaries willconsidervoicechangingtechnology for usein future
operations.The I Forum Enginclring audio and vidco.4i'Ennero..sska,vitu dcph.ton3

answercouldbe
yes. on September 1220 Pl,I
09-07-2008.
9, 2008Abu Aisha Abu Alsha L a vYo t€ tb n Fl h d 6 .0 .1 0 :l Eo cr .m cM Gd G.m n &fd .d h d f,d

the Moroccan, Moroccan


Technical
Superuisor,of the ((,( The nomeof Godthe merciful
TechnicalAudio
Discussionof the AVVolce ChanqerDlamond6.0.'10
Ansaral Jihad
forum ryIr
recommended orcc|l|m
!r.*M
voicechanging
softwarefor making
ra
RcqArdbn

Ih r.tc
Oatc

of 6i..rm6t
Jd 2O0a

lcEl:
ii J
EE@
VOIPtelephone
calls.He
mentioned thatthe
softwarewouldbe helpfulformostVOIPservicesincluding Skypeand Vonage.This
recommendation was postedfollowingpublicmediarepodsof the Talibanusing
FOROFFrcIALUS,EONIY

SKYPE.4Thetimingwas mostlikelycoincidental and unrelated butthe two concepts


cancomplement one another.TheTalibanandotherlikegroupssuspecting theirVOIP
communications are beingbe monitored combinevoicechanging
couldtheoretically
softwarewith(orwithout)encryption andcallerl.D.spoofing'in orderto makebasic
detectionmoredifficult.Thistacticmayor maynot be effective to eludeinternational
agencies.However,it mightbe effective
intelligence for callingin demands,interviews,
and/orattackclaimsto mediaoutlets.Abu Aishathe Moroccanspecifically
recommended AV VoiceChangerDiamond6.0.10off a freewaredownloadpage. Audio
describesthe softwarepackageas:
for Fun,http://www.audio4fun.com/voice-over.htm,

"The latesteditionin the VOICECHANGERSOFTWAREserieswhichis dedicatedto


voicechangingand voicemanipulatingfor onlineand local computer-based programs.
Thesoftwareis able to do a widerangeof voicechangingrelatedtasksfor many
differentpurposes,such as voice-overand voicedubbingfor audio/videoclips,
presentations,
narrations,voicernessages,voice mails,E-greetingcards,etc.; mimicthe
voiceof any person,createanimalsounds,changevoicesin songs,etc.
ThisDiamondedition also presenfsa fasfervoicemorphingalgorithm,a professional
lookinginterface,backgroundeffectslibraryand numerousready-to-usenickvoices.The
manypackagesof parody voiceswill help usersfo talk in the voicesof many Hollywood
starsand other celebrities.
VoiceChangerSoftwareDiamondworkswellwith many commonVolPprogramssuch
as Net2Phone,SkypeOut,Vonage,etc., and many lnstantMessengerprogramssuch as
Yahoo Messengerwith Voice, Skype,WindowsLive Messenger,AlM, etc.
KEY FEATURES:Ready-to-usenickvoices,ParodyMaker,FrequencyMorpher,Audio
StreamRecorder,Pitchand TimbreMorphergraph,EqualizersBackgroundEffects.
MAIN BENEFITS:VoiceChangerSoftwareDiamondis usefulforuserswho wantto be
the VoiceMasterof Mediain cyberspace.Theycan useit to have fun whilechatting
usinginstanfmessenger programs,do voicedubbingand voice-oversfor their own
video/audioclips,mimic the voiceof theirfavoriteldol, and more."

mayor may not be usingVoiceChangingsoftwarebut it shouldbe of open


Terrorists
sourceinterestthaton lineterrorists
and/orterroristenthusiasts it.
arediscussing

o
Owen,Glen,"TalibanUsingSkypePhonesto DodgeM16,UK DailyMail,Sept.13,2008,
1/Taliban-usinq-Skvpe-phones-dodoe-
http://www.dailvmail.co.uUnews/worldnews/article-105561
Ml6.html?lTO=1490;Wylie,Pete,"Taliban
VOIPCalls,"FierceVOIP,Sept.15,
iban-voip-calls/2008-09-
iercevoip.com/storv/tal
http://www.f 15
5 Spoofingis definedas usingdeceptionto createsomethingthat is fabricatedor false,suchas a
falselP or telephone
number.

-6 -
FOROFFIEI,{L,USE.ONLY

P.otah{d.-igrTe*tlr!U6e-d5--ffi A Redf€fil ve

Example lnq lweefs

"Less than 24 hrc before I head


ffii
off for my vacation in lraq and
the kids arc already maktng my
wife miserable. Today Is not
going to be fun."
lli'..".s
!t r
"Going to DFAC - Dining 6drrr
Facility - here at BIAP. Try to
get on helicopter to Kalsu
tonight." Twitteris describedas "a
free SocialNetworkingand MicroBloggingoservicethat lets
"Put ofl at BIAP (Baghdad
lntemational Airpoft). Not sure memberskeepin touchwith peopleusingthe web,their
wt'y.' phone,or lM (instantmessaging)."' Twitteris similarto
othersocialnetworkingsitesin that it allowspeopleto create
'Chillin in my tent at Baghdad a communityof interestand/orgroupof onlinefriends.
I ntem atlo nal Ai rport (BIAP).'
Twitterlaunchedin July 2006and has becomean
"Drove off base today down increasinglypopularnetworking venueoverthe pasttwo
Route lrtsh in an'NTV and years.oOn September 26,2008,therewere21,100,000
dldnl get blown up...fun fun." GoogleHitsfor doinga searchon Twitter.com, whichwas
advertisedon a multitudeof differentlanguageweb pages,
"Just picked my roomie up
from BIAP, now it's ten lil 2 in includingEnglish,Arabic,Armenian, SimplifiedChinese,
the momlng, ugh." Croatian, Czech,Indonesian, Korean,Thai,andother
languagese.
"Today is my day oft. 115
already in Camp Bucca,lraq."
WhatmakesTwitteruniqueis thatthe membercansend
Example Afg hanistan Tweets Tweets(messages)
nearrealtimeto Twittercellphone

"l'm in Bagram waiting for a 6 SearchMobileComputing OnlinedefinesMicroBlogging as


flightto Camp Salemo by "Microblogging
Kwost in the volatile easf of
is the practiceof sendingbrief poststo a personal
Afghanistan near the Paki. blog on a microbloggingWeb site, such as Twitteror Jaiku.
border. Hot daydcold nighb." Micropostscan be madepublicon a Web siteand/ordistributedto
a privategroup of subscribers.Subscrberscan read microblog
"Hi from Bagnm air field; 20 postsonlineor requestthat updatesbe deliveredin real time to
minutes from now l'll hopefully their desktopas an instantmessageor sent to a mobiledeviceas
board a flight to the Pakistan an SMS text message."
border," htto://searchmobilecomoutinq.techtaroet.com/sDef inition/0..sid40
oci1265620.00.htm1
"Flying to Bagram, Afghanistan
ln 12 hourc. Thejourney ts
about to beginl'
I CrunchBase,'TwitterCompanyProfile,"2008,
Example Foft Huachuca Tweefs
nchbase.com/companv/Twitte
http://www.cru r
"Email I just got: -We are
changing all of the PMstaslrs at e GoogleSearchof Twitter.com,
Sept.27,2OOB
Ft Huachuca. I hope fhis does
not add a lot of extra work on
your end.' HAI"

"...is at Ft. Huachuca. ltwas


great s*ing him last night
passing through Tucson
Intemational." -7
USBOI{LY
FORCIFFrcTAL

groupsand to theironlineTwittersocialnetworkingpage.Theycan also Mashuptheir


Tweetswitha varietyof othertoolsincludinggeo coordinatesand GoogleMapsor other
electronicfiles/artifacts.Memberscan directand re-directaudiencemembersto other
websitesand locationsfrom"Tweets"and can engagein rapid-firegroupsocial
interaction.Forexample,the earthquakethat occurredin LosAngeleson July 29,2008
was reportedvia a Twittermemberapproximately four minutespriorto the information
beingreportedby the newsand withinminutestherewere hundredsof Tweetsfrom
peopleexperiencing the earthquakefirsthand.10Twitterhas also becomea social
activismtoolforsocialists, humanrightsgroups,communists, vegetarians,anarchists,
religiouscommunities, atheists,politicalenthusiasts,hacktivists
and othersto
communicate witheachotherand to sendmessagesto broaderaudiences.ll

Twitteris alreadyusedby somemembersto postand/orsupportextremistideologies


and perspectives.Forexample,thereare multiplepro and anti HezbollahTweets. In
addition,extremistand terroristuse of Twittercouldevolveovertimeto reflecttactics
that are alreadyevolvingin use by hacktivisfsand activistsfor surveillance.This could
theoreticallybe combinedwithtargeting.Twitterwas recentlyusedas a counter-
surveillance,commandand control,and movementtool by activistsat the Republican
NationalConvention(RNC). The activistswouldTweeteachotherand theirTwitter
pagesto add informationon whatwas happeningwith Law Enforcement nearrealtime.

Activist Use of Twitter for Law EnforcementCounter Surveillanceand


MovementCoordinationat the most recent RepublicanNationalConvention
(RNc)

The followingsampleTweetswerecollectedand postedin a ComputerWorldarticle


'TwitterHelpsRepublicanConventionProtestorsOrganize,EludePolice,"on
September8, 2008(htto://www.pcworld.ido.com.au/index.oho/id:7484771):

o "Arrestteamsare approaching seatedprotesterson MarionBridge.Resisters


are toldthey'llbe met withforce."
o "Protestors are nowfightingback.Firstreportsof violencenow"
o "WesternAve. Bridge,westof capitolcan be safelycrossed."
o 'City is on lockdown.Go to 14thandJacksonif you needhelpfromtear gas
pepperspray."(http://www.linuxworld.com.au/index.php/id:7484771
)

Thereare multiplered-teaming potential


examplesthat couldbe createdsurrounding
adversarialuseof Twitter. Followingare threered teamscenarios:

toWeaver,Matthew,"Didthe EarthTweetForYou,"UK GuardianBlog,July30, 2008,


http://www.ouardian.co.ul</news/bloq/2008/iul/30/laearthquakehitsrealihltv
tt 3o4tnMl Bn OSINTTeamReviewof MemberTwitterPages

-8
ONIY
FOROFFrcI.{t US-E

Scenario1:
Terrorist "A" usesTwitterwith(orwithout)usinga cellphonecamera/video
operative
functionto sendbackmessages, andto receivemessages, fromthe restof his cell.
Operative "A"alsohasa GoogleMapsTwitterMashUp of wherehe is undera code
wordfor othermembersof his cell(iftheyneedmorein-depthdirections) postedon the
WWWthatcan be viewedfromtheirmobiles.Othermembersof his cellreceivenear
realtimeupdates(similarto the movement updatesthatweresentby activists at the
RNC)on how,where,andthe numberof troopsthatare movingin orderto conductan
ambush.

Scenario2:
Terrorist
operative"A"hasa mobilephonefor Tweetmessaging andfor takingimages.
Operative "A"alsohasa separatemobilephonethatis actuallyan explosive device
and/ora suicidevestfor remotedetonation.Terroristoperative"8" hasthe detonator
anda mobileto view"A's"Tweetsand images.Thismayallow"B"to selectthe precise
momentof remotedetonationbasedon nearrealtime movementand imagerythat is
beingsentby "A."

Scenario3:
CyberTerroristoperative"A"findsU.S.ArmySmith'sTwitteraccount.Operative "A"
joinsSmith'sTweetsand beginsto elicitinformation
fromSmith.Thisinformation is then
package
usedfor a targeting (targeting
in thissensecouldbe for identity hacking,
theft,
and/orphysical.)Thisscenariois notnewand hasalreadybeendiscussed for other
socialnetworkingsites,suchas My Spaceand/orFaceBook.

Sample of other Mobile Phone Topics & Software Recommendations

SampleSource: The mobile phonetechnologyforum in www.tamkeen.iraqserve.com

r Recommends anddebatesmobilephonebrands(Samsung, Nokia,etc.)


. Propaganda multimedia downloads for the phone(videos,audioclips,textfiles,PDF,
etc.)
. Mobilephonetipsfor surveillance activities
. Usesof SMStextmessaging
. WindowsLiveMessenger for the mobile
r Freeadvancedmobilemessages to yourmobilefromwebsiteHuda76
. MobilePhoneGPStrackingoptions
o Howto uploadsoftwareupdates
. Religious uploadsoftware, suchas prayertimesreminders
. Religious andideologicalbackground wallpaper
o TheSoftwarepackage-Mobile MasterProfessional 7.0.1Build2699
. Xilisoft3GPVideoConverter
o convert3GPto avi or mpg,andviceversa,as wellas 3gp mpg,mpeg2,mpeg4,
wmv,mp4,3gp,mov,rm,dv, yuv,h264and MP3,WAV,AC3,WMA,m4a,ogg
. EgoShareSoftware(datarecovery)
. Howto maintainandcrackmobilephonesecuritycodes
o Howto makemobilesoftwareprograms
. Discussions on howto protectand penetrateBlueToothtechnology
. PDAprogramsfor the mobilephone(Someof the softwaredownloadsthatwere
advertizedare sub-listedbelow)
o BestTaskManv2.01

9-
FOROFFICIALUSB
OD.ILY

o emTubeV1.06
o InstFastv0.01
o lslamicOrganizerv2.00
o Blacklistv2.00
o ActiveFilev1.25
o AnsweringMachine.vl.l0
o rotateMev2.0.5
o Symbian.Guru.BT.Guard.vl.00.S60v3.SymbianO59.l.Unsigned.Arabic-ArabPDA
o QuickOfficePremierUpgrade4.5.25.0
o TobiasStoger.S60Ticker.S60v3.SymbianOS9. 1.Arabic-ArabPDA
o CorePlayer.v1.1.2
o Flashlitev3.0
o MobiolaMediaPlayerv2.1
o AudioNotes.v1.31
o S60SpotOnv0.7
o Pocket.Quran.v0.96b
o ThemeDIYv1.2
o FreeTones.vl .05.S60v3.SymbianOS9. 1.Unsigned.Arabic
o SmartGuard v2.00
o Total recall(advertizedfor wire tapping)
o BestDictaphone v1.0
o Operav8.65(searchengine)
o KavMobile6.1.8(Antivirus)

- l0 -

Вам также может понравиться