Documente Academic
Documente Profesional
Documente Cultură
Overview
groupsandtheiraudiences
terrorist-like basedontheparticular
setof software
and
phones thatthegrouprecommends fromOSINTexploitation.
Tableof Contents
PRO TERRORIST PROPAGANDA CELL PHONE INTERFACES................ ..............2
CELL PHONE GPS FOR MOVEMENTS. OPS.TARGETING & EXPLOITATION........................3
MOBTLE PHONE SURVEILLANCE............. .........................4
VOICE CHANGERS FOR TERRORIST TELEPHONE CALLS?....... ...........................5
POTENTIAL FOR TERRORIST USE OF TWITTER: A RED TEAMING PERSPECTM...........7
SAMPLE OF OTHER MOBILE PHONE TOPICS & SOFTWARE RECOMMENDATIONS..........9
293031 t 2 3
iil $l.Qlert;fJr 10
rl,&jmtjt r$Jd',tz
rq{{:r.d;e 22 23 24
dzd'+fi:ri'}s m r
23456t8
a
FOROFFIC}ALIjSE ONLY
: ir J* i{i
f r.r.j, F ji +Ji.l
"An Intensive Course in the ri'F, s JL.i-
t.i rr, i 4, r.ri J Jr ir *;1;,,;J:.i
Useof LG PSV GPS" ',
Frt ryy'lni,t/g
Mobile PhoneSurveillance
On September 6, 2008an individual usingthe pseudonym of "Volcano" provideda
theoretical
discussion in the Mujahedeen Armyof lraqEnablinglslamicMobilesforum,
www.tamkeen.iraqserve.com, on the useof mobilephonesfor targetsurveillance and
attacks.Underthe categoryof basicsurveillance, "Volcano" recommended usingthe
phone/video camerafor monitoring enemyactivities and operations in theater.Of
uniqueinterestis that"Volcano" posedseveraltheoretical examplesof howto usethe
mobilephonevideoand cameraoptionsin tandemwithconducting attacks.For
example,"Volcano" suggested thatonecouldusethe mobilephonefor remote
to tag the opportunetimeof attack. "Volcano"alsohypothesized
surveillance whethera
mobilephone cameracouldbe integrated intoa missileheadto filma targetas it is
beingattacked.Thisrecommendation probablywouldnotworkbut providesinsightinto
perspectives.
adversarial (Reference the screencaptureon thefollowingpage.)
-4-
FCIROFFIEIALUSEO}TLY
O e r8 J G'
aMHd |)cer# ff trOn,tt*,nn
'tddl*ltp,iiws.ilqsa...
l{Ortofi vLsdLlllEtrIl S tffi,*'
OK*rhEsdffiffiffi
:3
S:qP
Hara la tha racond ld.1 ,
Thr cn.mica olGod Amarlcanamd Jaw3 dlha d.ttruc{on otr targat rhootlng thrt procatr lnd guldad mlttila with r crm.n rnd lhcn thcy u,
olLr on tll.virion ud rc(a thc cnamiaaAvcjrrr.
Can rl3o voluntcGrsto do Tdmirohdryhm lllm.d urlng a cam.ra phonc .nd inshll it on th. liont ofiha mlttll. and rock.t Abokhip Aryi LG
Mobllala provan llnk.d to r rack.nd anothrr rt r mobll. ml$ll.l.unchlng th. ..cond ph.3. of r.glrtadon of crmarr md daatoy'ngtfi. tlre.t
Ngld ro unbdlavrri.
- oUt l* J & l J J
answercouldbe
yes. on September 1220 Pl,I
09-07-2008.
9, 2008Abu Aisha Abu Alsha L a vYo t€ tb n Fl h d 6 .0 .1 0 :l Eo cr .m cM Gd G.m n &fd .d h d f,d
Ih r.tc
Oatc
of 6i..rm6t
Jd 2O0a
lcEl:
ii J
EE@
VOIPtelephone
calls.He
mentioned thatthe
softwarewouldbe helpfulformostVOIPservicesincluding Skypeand Vonage.This
recommendation was postedfollowingpublicmediarepodsof the Talibanusing
FOROFFrcIALUS,EONIY
o
Owen,Glen,"TalibanUsingSkypePhonesto DodgeM16,UK DailyMail,Sept.13,2008,
1/Taliban-usinq-Skvpe-phones-dodoe-
http://www.dailvmail.co.uUnews/worldnews/article-105561
Ml6.html?lTO=1490;Wylie,Pete,"Taliban
VOIPCalls,"FierceVOIP,Sept.15,
iban-voip-calls/2008-09-
iercevoip.com/storv/tal
http://www.f 15
5 Spoofingis definedas usingdeceptionto createsomethingthat is fabricatedor false,suchas a
falselP or telephone
number.
-6 -
FOROFFIEI,{L,USE.ONLY
P.otah{d.-igrTe*tlr!U6e-d5--ffi A Redf€fil ve
-8
ONIY
FOROFFrcI.{t US-E
Scenario1:
Terrorist "A" usesTwitterwith(orwithout)usinga cellphonecamera/video
operative
functionto sendbackmessages, andto receivemessages, fromthe restof his cell.
Operative "A"alsohasa GoogleMapsTwitterMashUp of wherehe is undera code
wordfor othermembersof his cell(iftheyneedmorein-depthdirections) postedon the
WWWthatcan be viewedfromtheirmobiles.Othermembersof his cellreceivenear
realtimeupdates(similarto the movement updatesthatweresentby activists at the
RNC)on how,where,andthe numberof troopsthatare movingin orderto conductan
ambush.
Scenario2:
Terrorist
operative"A"hasa mobilephonefor Tweetmessaging andfor takingimages.
Operative "A"alsohasa separatemobilephonethatis actuallyan explosive device
and/ora suicidevestfor remotedetonation.Terroristoperative"8" hasthe detonator
anda mobileto view"A's"Tweetsand images.Thismayallow"B"to selectthe precise
momentof remotedetonationbasedon nearrealtime movementand imagerythat is
beingsentby "A."
Scenario3:
CyberTerroristoperative"A"findsU.S.ArmySmith'sTwitteraccount.Operative "A"
joinsSmith'sTweetsand beginsto elicitinformation
fromSmith.Thisinformation is then
package
usedfor a targeting (targeting
in thissensecouldbe for identity hacking,
theft,
and/orphysical.)Thisscenariois notnewand hasalreadybeendiscussed for other
socialnetworkingsites,suchas My Spaceand/orFaceBook.
9-
FOROFFICIALUSB
OD.ILY
o emTubeV1.06
o InstFastv0.01
o lslamicOrganizerv2.00
o Blacklistv2.00
o ActiveFilev1.25
o AnsweringMachine.vl.l0
o rotateMev2.0.5
o Symbian.Guru.BT.Guard.vl.00.S60v3.SymbianO59.l.Unsigned.Arabic-ArabPDA
o QuickOfficePremierUpgrade4.5.25.0
o TobiasStoger.S60Ticker.S60v3.SymbianOS9. 1.Arabic-ArabPDA
o CorePlayer.v1.1.2
o Flashlitev3.0
o MobiolaMediaPlayerv2.1
o AudioNotes.v1.31
o S60SpotOnv0.7
o Pocket.Quran.v0.96b
o ThemeDIYv1.2
o FreeTones.vl .05.S60v3.SymbianOS9. 1.Unsigned.Arabic
o SmartGuard v2.00
o Total recall(advertizedfor wire tapping)
o BestDictaphone v1.0
o Operav8.65(searchengine)
o KavMobile6.1.8(Antivirus)
- l0 -