Archive for October 22nd, 2009
“The code is mightier than the sword”
Sophisticated technology has an important role to play in countering the terrorist web. While some portions of the terrorist web are out in the open, other parts operate in an area of the Internet commonly referred to as “the Deep Web.” Akin to an ocean, the Internet has surface pages, but a significant portion lies beneath that surface, out of reach of most popular search engines.
A handful of companies have developed data intelligence technologies that give access to sites traditional search engines cannot find. The U.S. intelligence community and military use these technologies to transform web data from terrorist sites into actionable intelligence.
For example, certain applications can crawl millions of domains simultaneously, a task impossible for human analysts alone. Since this volume of data, including dynamic content from the most complex websites, can be overwhelming for intelligence analysts, applications automatically extract and analyze only the data of higher intelligence value. They also use “anonymizer” tools to hide the computer user’s identity to try and keep the intelligence analyst from being shut out by terrorist web masters.
Absolutely true. There’s a lot out there and much of it has been more craftily hidden lately. The Jihadists have hired on hackers and coders who have been creating websites, hiding websites, and generally creating venues of communication and propagation of videos etc.
The paradigm for getting new recruits has changed too. These sites and their videos are the new Mosques where you need not know the Quran by heart. In fact, have Google will travel! So imagine how many youths can be reached by the internet…
You should also ponder how much money the Jihadists can make with the internet. Hacking, donation collection, etc. All of these things help them fund themselves and transfer funds quickly.
It’s a brave new world kids…