May 30, 2012

The Next War on Terror Will Be Fought Online

The video below was shared with me by SOFREP community moderator Laura Walker. It is an excellent example of an open source brief that discusses how extremist groups are using online technologies to communicate securely, promote “the cause”, train, launder money, plan and attack.

Feel free to share your thoughts and links to extremists groups you know of that are leveraging these types of online technologies.


or Log In


About the Author

is a former U.S. Navy SEAL with combat deployments to Afghanistan, and Iraq. During his last tour he served as the west coast sniper Course Manager at the Naval Special Warfare Center. He is Editor-in-Chief of SpecialOperations.com, a SOFREP contributing editor, and a New York Times best selling author (The Red Circle & Benghazi: The Definitive Report). Follow Brandon on Facebook, Twitter or his website.

To comment on this article please join/login. Here's a sample of the comments on this post.

  • JHR

    AQ has been onto the  tech track prior to 9/11. Many of their pups have gone to school specifically to learn computer/tech/progrmming skills, here in the U.S.. Some are entrenched in Universities and government jobs in the U.S. giving them access to sensitive information. Many AQ that arrived 30-40 years ago, deliberately inter-married, thus, traditionally, their daughters pass as caucausion. For some reason, the male gene seems to remain darker skinned. They have developed codes on FB and Twitter that easily pass for everyday lingo.

  • SEAN SPOONTS

    You know, I could see some aspect of the WOT being fought on line, just as a significant part of WWII involved signal intelligence warefare, code breaking, cypto stuff like the Navaho talkers and deception work like the false radio traffic that had the Germans thinking Patton and the 3rd Army were going to kick off D-Day at the Pas d Calais. But you still have to kill badguys. It seems to me that most of what I've seen is hackers using DOS attacks. Is that a big deal? Jester shuts down a jihadist website for for a couple of days or a week? What if the website was a false flag operation set up by the CIA to smoke out terrorists? What if it was an NSA mirror site? Is Jester going to know about that? The problem with someone like Jester operating alone, is that he is operating "alone" with a tactical picture he is viewing thru a soda straw given his isolation.. I'm not down on Jester(pause....sorry I lost my connection there for an hour) but I would think that our focus is not on those sites being up but on who is accessing them. Jihadist websites are like a light that draw moths to it. We're trying to kill the moths not bust the light bulb. I wonder if our cyber capability is a little misdirected? We should be doing more than disruption, we should be doing destruction. What I keep waiting to hear is that we've stolen all of Al Qaeda money and deposited it into the US Treasury. That's a wartime operation on the order of Rochefort breaking the JN-25 cipher. Rewrite the jihadists bomb making recipies so that wannabes blow themselves up making a bomb in their moms kitchen. Perhaps we are. I suspect that the Bin Laden raid gave us some very useful intel on bad guy locations and operational plans and I suspect that we have been using that stuff in relation to the recent drone strikes we've all be haring about. The stuff hitting Iran seems very sophisticated, but hell it could have come from Kapersky to make his anti-virus suite more marketable.

  • katgirl231

     @KineticFury I'm sure I've seen something like this in an old movie - something like Forbin, The Colossus Project.

  • KineticFury

    cyper, cyber, same thing. The dude in the video is rubbing off on me.

  • KineticFury

    There is so much out there about the present and future cyberwarfare, crimes, and terrorism, and I'm no subject matter expert on anything cyber. While most cyberterrorism articles talk about the danger to data, personal info, weapons systems, etc., here is an alleged cyper assassination. ------------------------ In Italy, not too long ago, a mob boss was shot but survived the shooting. That night, while he was in the hospital, the assassins hacked into the hospital computer and changed his medication so that he would be given a lethal injection. He was a dead man a few hours later. They then changed the medication order back to its correct form, after it had been incorrectly administered, to cover their tracks so that the nurse would be blamed for the “accident.” Read more: http://defensetech.org/2010/09/29/a-cyber-assassination-confirmed/#ixzz1wa1r4GKP Defense.org ----------------- There used to be an article in the Daily Sun about it (which I saved), but now it won't let me access it. This was written in 2010. http://www.sunnewsonline.com/webpages/features/special-%20reports/2010/sept/25/special-report-25-09-2010-001.htm