Stopping the Internet from Becoming a Tool of Terrorists

While al-Qaeda took advantage of the Internet’s “dark spaces” to recruit and instruct followers and to spread its message, the Islamic State (IS) has used the web and social media openly. Its beheading videos are the product of a carefully managed propaganda campaign, waged by means of technological innovations that allow its operatives to remain difficult or impossible to trace. In order to counter this threat, argues Robert Hannigan, head of the British intelligence agency tasked with monitoring electronic communication, governments will need the cooperation of the private sector:

I understand why [private technology companies] have an uneasy relationship with governments. They aspire to be neutral conduits of data and to sit outside or above politics. But increasingly their services not only host the material of violent extremism or child exploitation, but are the routes for the facilitation of crime and terrorism. However much they may dislike it, they have become the command-and-control networks of choice for terrorists and criminals, who find their services as transformational as do the rest of us. If they are to meet this challenge, it means coming up with better arrangements for facilitating lawful investigation by security and law-enforcement agencies than we have now.

Read more at Financial Times

More about: Intelligence, Internet, ISIS, Terrorism

Israel Just Sent Iran a Clear Message

Early Friday morning, Israel attacked military installations near the Iranian cities of Isfahan and nearby Natanz, the latter being one of the hubs of the country’s nuclear program. Jerusalem is not taking credit for the attack, and none of the details are too certain, but it seems that the attack involved multiple drones, likely launched from within Iran, as well as one or more missiles fired from Syrian or Iraqi airspace. Strikes on Syrian radar systems shortly beforehand probably helped make the attack possible, and there were reportedly strikes on Iraq as well.

Iran itself is downplaying the attack, but the S-300 air-defense batteries in Isfahan appear to have been destroyed or damaged. This is a sophisticated Russian-made system positioned to protect the Natanz nuclear installation. In other words, Israel has demonstrated that Iran’s best technology can’t protect the country’s skies from the IDF. As Yossi Kuperwasser puts it, the attack, combined with the response to the assault on April 13,

clarified to the Iranians that whereas we [Israelis] are not as vulnerable as they thought, they are more vulnerable than they thought. They have difficulty hitting us, but we have no difficulty hitting them.

Nobody knows exactly how the operation was carried out. . . . It is good that a question mark hovers over . . . what exactly Israel did. Let’s keep them wondering. It is good for deniability and good for keeping the enemy uncertain.

The fact that we chose targets that were in the vicinity of a major nuclear facility but were linked to the Iranian missile and air forces was a good message. It communicated that we can reach other targets as well but, as we don’t want escalation, we chose targets nearby that were involved in the attack against Israel. I think it sends the message that if we want to, we can send a stronger message. Israel is not seeking escalation at the moment.

Read more at Jewish Chronicle

More about: Iran, Israeli Security