Technology & terrorism“Burner” phones, social media and online magazines: understanding the technology of terrorism

By Thomas Holt

Published 2 May 2016

Amid the global threat of terrorism, the actual attacks that occur can vary widely. Terrorists aim at different targets in different locations, and tend to be either shooting or bombing or both. There is, however, a central point of connection linking all these events: the use of technology to coordinate and organize the incident. Taken as a whole, we must recognize that technology use by extremist groups extends well beyond any one type of device, across the continuum of both hardware and software communication platforms. As technologies continue to evolve, extremists will continue to stay on the cutting edge of communications, whether they are encrypted or completely open. Law enforcement and intelligence agencies must be able to adapt investigative resources to these various platforms and do so quickly in order to better respond to these threats. Otherwise, gaps in collection and analysis may lead to intelligence failures and successful attacks.

Amid the global threat of terrorism, the actual attacks that occur can vary widely. Terrorists aim at different targets in different locations, and tend to be either shooting or bombing or both. There is, however, a central point of connection linking all these events: the use of technology to coordinate and organize the incident.

Recent reporting suggests that terrorists used “burner” phones, prepaid disposable mobile phones, to coordinate their actions during last year’s Paris terror attacks. This is not a new or innovative tactic. Drug dealers, street prostitutes and other criminal groups in the U.S. regularly use these devices for communication: they are cheap, plentiful and difficult to link to a real identity. Their value lies in real-time communication, via text or voice call, that needs no software nor even a computer to connect.

Having researched cybercrime and technology use among criminal populations for more than a decade, I have seen firsthand that throwaway phones are just one piece of the ever-widening technological arsenal of extremists and terror groups of all kinds. Computers, smartphones and tablets also draw people into a movement, indoctrinate them and coordinate various parts of an attack, making technology a fundamental component of modern terrorism.

Attracting attention
Different resources and applications are pivotal at different phases in the process of radicalization to violence, and for good reason. For instance, social media platforms like Facebook, Twitter, Instagram, and Periscope give extremist groups a venue to attract individuals to join their movements.

Social media is especially effective for terrorist groups because it allows people to share and spread short messages, including text and images, in rapid bursts. With access from nearly any device, such as desktop or laptop computers and mobile phones — including burners — individuals can connect to larger networks of members around the world. Those communities can then reinforce ideological beliefs and spin messages.

The Islamic State group has a significant presence on Twitter. It uses hundreds of thousands of user accounts to broadcast information about its activities on the ground in real time, as well as to attract individuals to the movement. There have been several examples over the last few years of young people being recruited into the Islamic State group via social media and encouraged to travel to join the fight.