ISIS: STATE OF TERROR
LINKSBlogs of War
Making Sense of Jihad
Views from the Occident
American Al Qaeda Members
News, documents and analysis on violent extremism
Saturday, September 28, 2013
I've got a little listSo you want to go hunting for jihadis on Twitter. You see an intriguing account. So you click follow and sit back to watch. Easy right?
When I am working my way through online extremist social networks, I am continually amazed at how many journalists and analysts I see openly following accounts that have intelligence value.
It is generally bad form to follow accounts openly and under your real name. There are a couple of reasons for this. First, you create noise in analysis. This is a surmountable problem but also an unnecessary one. Second, and more importantly, you alert Twitter users that you are interested in them.
A user who thinks he is invisible is far more valuable than a user who knows someone from the other side is watching him. Users may become more cautious, or they may move sensitive information to another account. So here are your extremely simple options:
1) Create an account under a false name and use it to follow people of interest.
2) Use Twitter's private list function to follow people of interest. This is so easy there is no excuse not to be doing it.
I get that some of these accounts are public knowledge or publicity oriented and don't care who follows them. I also get that some of you may, from time to time, have need of DM access, which entails a follow.
But based on what I have seen in my travels, I don't think that applies in many of these cases, and I think that many of you are not making discriminating judgments about this. Terrorism is a stealthy affair, and it's not always obvious which accounts are operational and which are harmless. These are extremely simple precautions which entail very little hassle. When in doubt, there is zero downside to being discreet.
This isn't just about Twitter, of course, the same concerns apply to other social media. When you follow openly -- no matter what the format -- you are going to kill good sources of information. It's harder to be discreet in other formats, like YouTube and Facebook, but it's far from impossible.
Bottom line: There's absolutely no good reason for a serious researcher to smear his or her fingerprints all over the Internet, and it skews the data in unpredictable ways. Practice good online hygiene. You'll be glad you did.
Attack of the Hygiene Fairy! Creepy 1950s... by QualityInformation
Views expressed on INTELWIRE are those of the author alone.
Tweets referencing this post:
"...smart, granular analysis..."ISIS: The State of Terror
"Jessica Stern and J.M. Berger's new book, "ISIS," should be required reading for every politician and policymaker... Their smart, granular analysis is a bracing antidote to both facile dismissals and wild exaggerations... a nuanced and readable account of the ideological and organizational origins of the group." -- Washington Post
More on ISIS: The State of Terror
"...a timely warning..."Jihad Joe: Americans Who Go to War in the Name of Islam:
"At a time when some politicians and pundits blur the line between Islam and terrorism, Berger, who knows this subject far better than the demagogues, sharply cautions against vilifying Muslim Americans. ... It is a timely warning from an expert who has not lost his perspective." -- New York Times
More on Jihad Joe
An Open Letter to Jihadis on the Anniversary of Se...
Loopcast: AQ since 2008
Yellow and Black is the New Black Flag
Reflections of a Troll
What "The Wolverine" Can Teach Us About Lone Wolf ...
A Modest Test of Terrorism Forecasting with Google...
Weeks Before Assassination, Bhutto Complained to U...
2007 State Department Intelligence Report: Who Kil...
Eric Harroun, Indictment and Affidavit in Support ...
Understanding NSA Data Collection and Locations
New York Pipe Bomb Suspect Linked to Revolution Muslim
The Utility of Lone Wolves
Interview with Online Jihadist Abu Suleiman Al Nasser
A Way Forward for CVE: The Five Ds
How Terrorists Use The Internet: Just Like You
PATCON: The FBI's Secret War on the Militia Movement
Interview About Jihad With Controversial Cleric Bilal Philips
Forgeries on the Jihadist Forums
U.S. Gave Millions To Charity Linked To Al Qaeda, Anwar Awlaki
State Department Secretly Met With Followers of Blind Sheikh
State Department Put 'Political Pressure' On FBI To Deport Brother-in-Law Of Osama Bin Laden In 1995
FBI Records Reveal Details Of Nixon-Era Racial Profiling Program Targeting Arabs
Gaza Flotilla Official Was Foreign Fighter in Bosnia War
U.S. Had 'High Confidence' Of UBL Attack In June 2001
Behind the Handshake: The Rumsfeld-Saddam Meeting