Featured Articles

Intel refreshes CPU roadmap

Intel refreshes CPU roadmap

Intel has revealed an update to its CPU roadmap and some things have changed in 2015 and beyond. Let’s start with the…

More...
Hands on: Nvidia Shield Tablet with Android 5.0

Hands on: Nvidia Shield Tablet with Android 5.0

We broke the news of Nvidia's ambitious gaming tablet plans back in May and now the Shield tablet got a bit…

More...
Nokia N1 Android tablet ships in Q1 2015

Nokia N1 Android tablet ships in Q1 2015

Nokia has announced its first Android tablet and when we say Nokia, we don’t mean Microsoft. The Nokia N1 was designed…

More...
Marvell launches octa-core 64-bit PXA1936

Marvell launches octa-core 64-bit PXA1936

Marvell is better known for its storage controllers, but the company doesn’t want to give up on the smartphone and…

More...
Nvidia GTX 970 SLI tested

Nvidia GTX 970 SLI tested

Nvidia recently released two new graphics cards based on its latest Maxwell GPU architecture, with exceptional performance-per-watt. The Geforce GTX 970…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 10 September 2012 08:57

Taliban enlists Facebook to gather intelligence

Written by Peter Scott

Horny soldiers, hot girls, what could possibly go wrong?

Afghan insurgents have come up with a novel way of gathering intelligence, bringing the old “honey trap” approach into the 21st century.

Granted it sounds a bit strange, but a deeply religious and conservative movement stuck in the 7th century is apparently using fake Facebook accounts and posing as attractive women to befriend coalition soldiers in Afghanistan. Australian soldiers are now being given pre-deployment briefings about various cyber security threats, ranging from geo-tagging to fake Facebook profiles.

A government review conducted in March warned troops to be on the lookout for fake profiles, used by the enemy and event the press.

“The Taliban have used pictures of attractive women as the front of their Facebook profiles and have befriended soldiers," the review found. "Most did not recognise that people using fake profiles, perhaps masquerading as school friends, could capture information and movements. Few consider the possibilities of data mining and how patterns of behaviour can be identified over time."

There are also indirect risks, as families of troops in the field can spill the beans on their deployment online. The review concluded that many individuals are “extremely trusting” of social media and that they should be better educated about potential risks.

Some troops have even argued for a total social media blackout.

More here.

Peter Scott

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments