Documentos de Académico
Documentos de Profesional
Documentos de Cultura
ONLY
P.otah{d.-igrTe*tlr!U6e-d5--ffi A Redf€fil ve
-8
ONIY
FOROFFrcI.{t US-E
Scenario1:
Terrorist "A" usesTwitterwith(orwithout)usinga cellphonecamera/video
operative
functionto sendbackmessages, andto receivemessages, fromthe restof his cell.
Operative "A"alsohasa GoogleMapsTwitterMashUp of wherehe is undera code
wordfor othermembersof his cell(iftheyneedmorein-depthdirections) postedon the
WWWthatcan be viewedfromtheirmobiles.Othermembersof his cellreceivenear
realtimeupdates(similarto the movement updatesthatweresentby activists at the
RNC)on how,where,andthe numberof troopsthatare movingin orderto conductan
ambush.
Scenario2:
Terrorist
operative"A"hasa mobilephonefor Tweetmessaging andfor takingimages.
Operative "A"alsohasa separatemobilephonethatis actuallyan explosive device
and/ora suicidevestfor remotedetonation.Terroristoperative"8" hasthe detonator
anda mobileto view"A's"Tweetsand images.Thismayallow"B"to selectthe precise
momentof remotedetonationbasedon nearrealtime movementand imagerythat is
beingsentby "A."
Scenario3:
CyberTerroristoperative"A"findsU.S.ArmySmith'sTwitteraccount.Operative "A"
joinsSmith'sTweetsand beginsto elicitinformation
fromSmith.Thisinformation is then
package
usedfor a targeting (targeting
in thissensecouldbe for identity hacking,
theft,
and/orphysical.)Thisscenariois notnewand hasalreadybeendiscussed for other
socialnetworkingsites,suchas My Spaceand/orFaceBook.
9-