USA: Army Says ‘Kill list’ Example Of Terrorist Use Of Personal Info

Although the ISIS terrorist network has claimed to have hacked Department of Defense networks to gain personal information, it is fairly obvious much of the information came from social media websites. Individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks. Users of social media websites are urged to use caution whenever they are online to avoid attracting attention to themselves or inadvertently providing easily accessible information that could be turned into targeting data.

The month of August is the ninth annual “Anti-terrorism Awareness Month” in the United States. And the extremist groups are also keeping with tradition, as the “Cyber Caliphate” have issued a new kill list. The Wahhabi-cyber-network has claimed to have hacked Department of Defense networks to gain personal information, however, the US Army reports that much of the information came from social media websites.

Individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks.

Sergeant Major Timothy Fitzgerald, Department of the Army, Provost Sergeant Major on Anti-terrorism Awareness Month released this video today.

Sergeant Major Fitzgerald said, “Terrorist-related threats during this past year and the recent attack in Orlando, Florida, demonstrates the realities of the risks we face. Terrorist tactics are persistent and evolving. To prevent and respond to terrorist activities, we must produce “vigilance” and “awareness” through our individual and collective action.

“Army leaders should encourage all community members to sustain vigilance, report suspicious activity, understand the indicators of radicalization and violent extremism, and be prepared to respond to an active shooter. Awareness of the terrorist threat and an understanding of individual protective measures are the hallmarks of our defense.

Every person is a sensor – if you See Something Suspicious, Say Something (REPORT IT) so military police and law enforcement can investigate.”

U.S. Army Garrison Fort Lee reports that: “Several times a year, the ISIS “Cyber Caliphate” releases a “kill list” with the names of law enforcement officers, firefighters, military personnel and other individuals who represent the strength and resiliency of America.”

Patrick Buffett’s article in the U.S. Army Garrison Fort Lee newsletter said, “The intent, as its title implies, is to eliminate those people through any means available gun, knife, baseball bat, bomb or running over them with a vehicle. If that’s not frightening enough, the list also includes addresses, places of employment and other personally identifiable information that could lead a potential killer to someone’s front door.

“The terrorist organization claims it hacked DOD networks to obtain the data, but it’s fairly obvious much of the information came from social media. That’s right, individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks. Quite surreal, but tragically true.

“In an effort to counter this threat, force protection experts across the DOD continue the push for social media discipline. “It has become a mainstay of the ongoing anti-terrorism awareness campaign,” noted a representative from the Protection Office – Directorate of Plans, Training, Mobilization and Security at Fort Lee.

““We’re urging all members of our community – particularly military personnel, government workers and their families – to use caution whenever they’re online to avoid attracting attention to themselves or inadvertently providing easily accessible information that could be turned into targeting data,the DPTMS representative said.Social media is the apex of vulnerability. ISIS and other criminal entities are mining that information and using it to instigate attacks and carry out identify theft and other illegal activities.””

Patrick Buffett’s article continues, “State and federal law enforcement and intelligence analysts concur with that assessment. Experts have long-observed the false sense of anonymity and security that tends to exist among internet and computer network users. While online, most people don’t exercise the same level of caution they would when meeting someone in person.

““Even a single instance of dropping your guard and providing information without careful consideration can make you vulnerable,” the DPTMS representative said.As we say often in our business, ‘once it’s posted, it’s public.’ Even closed groups and password-protected sites are capable of being hacked. So, the message is simple … think about the information before hitting the ‘send’ button.””

U.S. Army Major General Mark Inch, Provost Marshal General, talks about Anti-terrorism Awareness Month.

The Fort Lee Protection Office recommends using the information found at the following websites to assess one’s social media and internet safety:

Staying Safe on Social Networking Sites.
Keeping Children Safe Online.

🔝


Send inquiries and request to re-blog article to Alistair.Reign@Gmail.com, thank you.


We welcome comments and conversation. Scroll down page to use the comment box.

Author: Alistair Reign

Lover of humanity: I have traveled throughout North America, Mexico, parts of Europe, and the UK as a freelance consultant in the field of internet marketing; medical and corporate website development; writing for, and publishing digital magazines for international markets. Human Rights Activist: Canadian, Child and War Refugee Rights. . Artist: Sculpture, Wall-size Collage, Oil and Acrylic Painting. Writer: Non-fiction, Advertising, Poetry and Prose and journalism. Publisher: Digital and Print Magazines since 1992: Currently: publishing and writing for Alistair Reign News Blog. www.alistairreignblog.com Currently: Fundraising for the Children of War, a not-for-profit organization dedicated to helping children of war.

Start a Conversation or Write a Caption This joke.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.