(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

“The code is mightier than the sword”

leave a comment »

Sophisticated technology has an important role to play in countering the terrorist web. While some portions of the terrorist web are out in the open, other parts operate in an area of the Internet commonly referred to as “the Deep Web.” Akin to an ocean, the Internet has surface pages, but a significant portion lies beneath that surface, out of reach of most popular search engines.

A handful of companies have developed data intelligence technologies that give access to sites traditional search engines cannot find. The U.S. intelligence community and military use these technologies to transform web data from terrorist sites into actionable intelligence.

For example, certain applications can crawl millions of domains simultaneously, a task impossible for human analysts alone. Since this volume of data, including dynamic content from the most complex websites, can be overwhelming for intelligence analysts, applications automatically extract and analyze only the data of higher intelligence value. They also use “anonymizer” tools to hide the computer user’s identity to try and keep the intelligence analyst from being shut out by terrorist web masters.

Full Article

Absolutely true. There’s a lot out there and much of it has been more craftily hidden lately. The Jihadists have hired on hackers and coders who have been creating websites, hiding websites, and generally creating venues of communication and propagation of videos etc.

The paradigm for getting new recruits has changed too. These sites and their videos are the new Mosques where you need not know the Quran by heart. In fact, have Google will travel! So imagine how many youths can be reached by the internet…

You should also ponder how much money the Jihadists can make with the internet. Hacking, donation collection, etc. All of these things help them fund themselves and transfer funds quickly.

It’s a brave new world kids…

Written by Krypt3ia

2009/10/22 at 01:44

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: