• Subscribe to our newsletter
The Media Online
  • Home
  • MOST Awards
  • News
    • Awards
    • Media Mecca
  • Print
    • Newspapers
    • Magazines
    • Publishing
  • Broadcasting
    • TV
    • Radio
    • Cinema
    • Video
  • Digital
    • Mobile
    • Online
  • Agencies
    • Advertising
    • Media agency
    • Public Relations
  • OOH
    • Events
  • Research & Education
    • Research
    • Media Education
      • Media Mentor
  • Press Office
    • Press Office
    • TMO.Live Blog
    • Events
    • Jobs
No Result
View All Result
  • Home
  • MOST Awards
  • News
    • Awards
    • Media Mecca
  • Print
    • Newspapers
    • Magazines
    • Publishing
  • Broadcasting
    • TV
    • Radio
    • Cinema
    • Video
  • Digital
    • Mobile
    • Online
  • Agencies
    • Advertising
    • Media agency
    • Public Relations
  • OOH
    • Events
  • Research & Education
    • Research
    • Media Education
      • Media Mentor
  • Press Office
    • Press Office
    • TMO.Live Blog
    • Events
    • Jobs
No Result
View All Result
The Media Online
No Result
View All Result
Home Digital Mobile

‘Burner’ phones, social media and online magazines: Understanding the technology of terrorism

by Thomas Holt
May 9, 2016
in Mobile
0 0
0
‘Burner’ phones, social media and online magazines: Understanding the technology of terrorism
Share on FacebookShare on Twitter

Amid the global threat of terrorism, the actual attacks that occur can vary widely. Terrorists aim at different targets in different locations, and tend to either shoot or bomb or both.

There is, however, a central point of connection linking all terrorist activities: the use of technology to co-ordinate and organise the incident.

Recent reporting suggests that terrorists used ‘burner’ phones, prepaid disposable mobile phones, to co-ordinate their actions during last year’s Paris terror attacks. This is not a new or innovative tactic. Drug dealers, street prostitutes and other criminal groups in the U.S. regularly use these devices for communication: they are cheap, plentiful and difficult to link to a real identity. Their value lies in real-time communication, via text or voice call, that needs no software nor even a computer to connect.

Having researched cybercrime and technology use among criminal populations for more than a decade, I have seen firsthand that throwaway phones are just one piece of the ever-widening technological arsenal of extremists and terror groups of all kinds. Computers, smartphones and tablets also draw people into a movement, indoctrinate them and coordinate various parts of an attack, making technology a fundamental component of modern terrorism.

Attracting attention

Different resources and applications are pivotal at different phases in the process of radicalisation to violence, and for good reason. For instance, social media platforms like Facebook, Twitter, Instagram and Periscope give extremist groups a venue to attract individuals to join their movements.

Social media is especially effective for terrorist groups because it allows people to share and spread short messages, including text and images, in rapid bursts. With access from nearly any device, such as desktop or laptop computers and mobile phones – including burners – individuals can connect to larger networks of members around the world. Those communities can then reinforce ideological beliefs and spin messages.

The Islamic State group has a significant presence on Twitter. It uses hundreds of thousands of user accounts to broadcast information about its activities on the ground in real time, as well as to attract individuals to the movement. There have been several examples over the last few years of young people being recruited into the Islamic State group via social media and encouraged to travel to join the fight.

Since social media posts are shared in near-real time, terror groups can also post messages to claim responsibility for a terror attack or act of violence. People who see it can share it with others, drawing attention to this news and giving these groups additional attention from people who might join their cause.

Engaging in discussion

Web forums are another important venue for information sharing, radicalisation and recruitment. Forums are asynchronous, meaning posts made can be seen at any time – seconds, minutes or even days after being made. Forums also let individuals post lengthy messages with images, hyperlinks and text that may take more time to read and interpret. As a result, they are more conversational and lead people to participate over long periods of time.

Forums are essential for long-term construction of shared cultures underlying extremist movements. They let people debate at length topics and minutiae of belief systems beyond what is possible on social media. In fact, one of the oldest web forums used by members of neo-Nazi and other radical far-right extremist groups in the U.S., called Stormfront, has been in operation since 1996.

Individual websites also play an important role in the spread of information and radicalisation because creators can tailor specific messages to audiences in ways that may not be readily contradicted. For instance, the racist group Stormwatch operates a website about civil rights leader Dr. Martin Luther King Jr. The site (martinlutherking.org) appears to be filled with biographical information, but in reality attacks King, questioning his motives and his morals. It also takes facts about his life and quotes from speeches out of context in an attempt to undermine his role in the American civil rights movement.

In addition, websites allow groups to publish highly stylised media materials to support and promote their agendas. For example, Inspire magazine appears to be a lifestyle publication published in multiple languages, but is published by al-Qaida in the Arabian Peninsula to promote a jihadist agenda. Evidence suggests that the perpetrator of the San Bernardino terror attacks of 2015, Syed Rizwan Farook, and his neighbour would regularly consume radical jihadist media including Inspire magazine and online videos produced by al-Qaida’s Somalian branch, Al-Shabaab.

Planning and acting

Extremist groups can also use online information to plan their attacks. For instance, al-Qaida-linked actors allegedly used Google Earth in the run-up to their eventually failed attack against oil processing facilities in Yemen in 2006. Similarly, Google Earth maps were used by terrorists to navigate during the 2008 Mumbai attacks.

Once someone is radicalised and expresses willingness to travel to engage in foreign training or an actual attack, the use of burner phones becomes essential to reduce detection by law enforcement. It does take more work than regular use of a mobile phone: to sustain communications over time, users must share and keep track of often-changing phone numbers.

Privacy advocates suggest that burner phone users never actually store contacts’ numbers on the device itself, which would save them on the phone’s SIM card. That could let police use that data during an investigation. So users must write down or memorise phone numbers, which keeps the information available but easily abandoned in case of emergency.

Burner phones can also be used to activate bombs, since only the maker may know the phone number and call it to activate the device. After they are used, burner phones can be destroyed to further reduce the likelihood of identification and forensic evidence collection.

Taken as a whole, we must recognise that technology use by extremist groups extends well beyond any one type of device, across the continuum of both hardware and software communication platforms. As technologies continue to evolve, extremists will continue to stay on the cutting edge of communications, whether they are encrypted or completely open. Law enforcement and intelligence agencies must be able to adapt investigative resources to these various platforms and do so quickly in order to better respond to these threats. Otherwise, gaps in collection and analysis may lead to intelligence failures and successful attacks.

Thomas Holt, Associate Professor of Criminal Justice, Michigan State University

This article was originally published on The Conversation. Read the original article.

IMAGE: Prepaid cellphones are just one of many technological tools used by criminals and terrorists. flip phone image via shutterstock.com

Tags: burner phonescyber securitysocial mediaterrorism and social mediaThe ConversationThomas Holt

Thomas Holt

Thomas J. Holt is an associate professor in the School of Criminal Justice at Michigan State University whose research focuses on computer hacking, malware, and the role of the Internet in facilitating all manner of crime and deviance. His work has been published in various journals including Crime and Delinquency, Deviant Behaviour, the Journal of Criminal Justice, and Youth and Society.

Follow Us

  • twitter
  • threads
  • Trending
  • Comments
  • Latest
Kelders van Geheime: The characters are here

Kelders van Geheime: The characters are here

March 22, 2024
Dissecting the LSM 7-10 market

Dissecting the LSM 7-10 market

May 17, 2023
Keri Miller sets the record straight after being axed from ECR

Keri Miller sets the record straight after being axed from ECR

April 23, 2023
Getting to know the ES SEMs 8-10 (Part 1)

Getting to know the ES SEMs 8-10 (Part 1)

February 22, 2018
Sowetan proves that sex still sells

Sowetan proves that sex still sells

105
It’s black. It’s beautiful. It’s ours.

Exclusive: Haffajee draws a line in the sand over racism

98
The Property Magazine and Media Nova go supernova

The Property Magazine and Media Nova go supernova

44
Warrant of arrest authorised for Media Nova’s Vaughan

Warrant of arrest authorised for Media Nova’s Vaughan

41
AI in sponsorship: Beyond the buzzword

AI in sponsorship: Beyond the buzzword

May 9, 2025
Upping the ante: Tracking the year-on-year growth of gambling in SA

Upping the ante: Tracking the year-on-year growth of gambling in SA

May 9, 2025
Seven Days on Social Media: Tonya’s in hospital, the nation’s in chaos and SA doesn’t care about Joshlin

Seven Days on Social Media: Tonya’s in hospital, the nation’s in chaos and SA doesn’t care about Joshlin

May 9, 2025
Social media platforms are replacing Google

Social media platforms are replacing Google

May 8, 2025

Recent News

AI in sponsorship: Beyond the buzzword

AI in sponsorship: Beyond the buzzword

May 9, 2025
Upping the ante: Tracking the year-on-year growth of gambling in SA

Upping the ante: Tracking the year-on-year growth of gambling in SA

May 9, 2025
Seven Days on Social Media: Tonya’s in hospital, the nation’s in chaos and SA doesn’t care about Joshlin

Seven Days on Social Media: Tonya’s in hospital, the nation’s in chaos and SA doesn’t care about Joshlin

May 9, 2025
Social media platforms are replacing Google

Social media platforms are replacing Google

May 8, 2025

ABOUT US

The Media Online is the definitive online point of reference for South Africa’s media industry offering relevant, focused and topical news on the media sector. We deliver up-to-date industry insights, guest columns, case studies, content from local and global contributors, news, views and interviews on a daily basis as well as providing an online home for The Media magazine’s content, which is posted on a monthly basis.

Follow Us

  • twitter
  • threads

ARENA HOLDING

Editor: Glenda Nevill
glenda.nevill@cybersmart.co.za
Sales and Advertising:
Tarin-Lee Watts
wattst@arena.africa
Download our rate card

OUR NETWORK

TimesLIVE
Sunday Times
SowetanLIVE
BusinessLIVE
Business Day
Financial Mail
HeraldLIVE
DispatchLIVE
Wanted Online
SA Home Owner
Business Media MAGS
Arena Events

NEWSLETTER SUBSCRIPTION

 
Subscribe
  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2015 - 2023 The Media Online. All rights reserved. Part of Arena Holdings (Pty) Ltd

No Result
View All Result
  • Home
  • MOST Awards
  • News
    • Awards
    • Media Mecca
  • Print
    • Newspapers
    • Magazines
    • Publishing
  • Broadcasting
    • TV
    • Radio
    • Cinema
    • Video
  • Digital
    • Mobile
    • Online
  • Agencies
    • Advertising
    • Media agency
    • Public Relations
  • OOH
    • Events
  • Research & Education
    • Research
    • Media Education
      • Media Mentor
  • Press Office
    • Press Office
    • TMO.Live Blog
    • Events
    • Jobs

Copyright © 2015 - 2023 The Media Online. All rights reserved. Part of Arena Holdings (Pty) Ltd

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?