{"id":27197,"date":"2014-11-06T05:41:41","date_gmt":"2014-11-06T10:41:41","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27197"},"modified":"2014-11-06T05:41:41","modified_gmt":"2014-11-06T10:41:41","slug":"how-social-media-is-helping-islamic-state-to-spread-its-poison","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/how-social-media-is-helping-islamic-state-to-spread-its-poison.php","title":{"rendered":"How social media is helping Islamic State to spread its poison"},"content":{"rendered":"<p><p>    Isil is the first terrorist group whose members have grown up    using computers, and the group has demonstrated a high level of    sophistication both in the way it produces its propaganda    videos and in how it expertly exploits social media networks to    ensure they attract a large following.  <\/p>\n<p>    For example, the gruesome execution videos of Western hostages    such as the US journalist James Foley are carefully    stage-managed, in order to capture the full horror of the crime    without explicitly showing the exact moment when the captive is    decapitated  thereby staying within the social media    guidelines that ban the dissemination of acts of extreme    violence.  <\/p>\n<p>    Isil has also proved adept at making sure its cheap, home-made    videos reach the widest possible audience. One successful    tactic is to hijack popular Twitter hashtags, such as those    relating to the recent referendum on Scottish independence or    last summers World Cup in Brazil, which enables its hateful    message to reach a far wider audience than its traditional    following within the radicalised Islamist community.  <\/p>\n<p>    Thanks to Edward Snowden, renegade groups are    tech-savvy (REUTERS)  <\/p>\n<p>    Preventing Isil, as well as other criminal organisations such    as paedophile rings, from exploiting the internet in this    manner would be perfectly feasible if the intelligence agencies    still retained the ability to track the location where the    material originated. But thanks to Snowden, renegade groups are    now well-acquainted with the techniques that organisations such    as the NSA and GCHQ have employed in the past to identify    potential terrorist cells  including accessing social media    websites and private emails alongside the more traditional    interception of phone calls.  <\/p>\n<p>    In the post-Snowden world, this has become immeasurably more    difficult  not least because the whistle-blowers revelations    prompted many of the worlds leading social media companies to    tighten up their security arrangements, primarily to reassure    customers that their private activities were safe from the    activities of intelligence-seeking eavesdroppers.  <\/p>\n<p>    Both Apple and Google have recently changed their default    settings to make encryption an opt-out rather than an opt-in    feature. Moreover, the cosy relationship that existed    pre-Snowden between the service providers and the spooks, which    meant the agencies were given details of the access codes, is    now dead: it ended the moment Snowdens revelations provoked a    public outcry on both sides of the Atlantic about the alleged    mass surveillance this allowed.  <\/p>\n<p>    Subsequent attempts to heal the rift have foundered over the    internet firms erroneous belief that their interests are best    served by putting a higher priority on protecting their    customers than on preventing acts of terrorism.  <\/p>\n<p>    But if, as Mr Hannigan contends, these companies have become    the unwitting command and control networks for groups such as    Isil, it is very much in their interests to cooperate.    Otherwise, when the next bomb goes off in London or New York,    they could have some difficult questions to answer.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/telegraph.feedsportal.com\/c\/32726\/f\/567647\/s\/4029bb2b\/sc\/8\/l\/0L0Stelegraph0O0Cnews0Cuknews0Cdefence0C1120A87960CHow0Esocial0Emedia0Eis0Ehelping0EIslamic0EState0Eto0Espread0Eits0Epoison0Bhtml\/story01.htm\/RK=0\/RS=HpM3aA4LT8QhrMxA0YAQ28W6N1I-\" title=\"How social media is helping Islamic State to spread its poison\">How social media is helping Islamic State to spread its poison<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Isil is the first terrorist group whose members have grown up using computers, and the group has demonstrated a high level of sophistication both in the way it produces its propaganda videos and in how it expertly exploits social media networks to ensure they attract a large following. For example, the gruesome execution videos of Western hostages such as the US journalist James Foley are carefully stage-managed, in order to capture the full horror of the crime without explicitly showing the exact moment when the captive is decapitated thereby staying within the social media guidelines that ban the dissemination of acts of extreme violence<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-27197","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27197"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27197"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27197\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}