The Crowhill Report - Content

Views and opinions on the news, culture, politics, beer, art, science, education, religion and ethics

Sites endorsed by Crowhill:
Crowhill Publishing
The Krehbiel Report on Publishing@gregkrehbiel

Aren’t we doing cyber warfare against the Taliban?

by Greg Krehbiel on 2 November 2017

I keep hearing stories about people — like NYC murderer Sayfullo Saipov — getting radicalized by watching Taliban videos and propaganda.

This is very confusing to me. Don’t we have cyber warfare capabilities? Can’t we take that stuff down? Can’t we attack the servers they’re coming from?

2017-11-02  »  Greg Krehbiel

Talkback x 7

  1. pentamom
    4 November 2017 @ 8:29 pm

    Don’t you think it’s probably quite decentralized?

  2. Greg Krehbiel GregK
    4 November 2017 @ 9:37 pm

    Yes, but I doubt the problem is tech. There’s no way we don’t have techies who can beat them. I’m certain it’s a lack of will, or some stupid policy that’s holding us back.

  3. William
    4 November 2017 @ 10:23 pm

    Unless terrorists are highly sophisticated, engaging in cyber warfare can be relatively straightforward. To your point, I suspect it’s more of a policy or resource issue.

    You’d think the government would make that a key priority…especially since online radicalization has been a catalyst for the majority of US terror activity to date. It’s likely more cost and time effective than building a wall.

  4. pentamom
    5 November 2017 @ 3:30 pm

    That’s all true. I just think that it’s probably not a matter of “their servers” somewhere, but just a lot of people using Facebook, in a decentralized fashion, and stuff like that. If the Imam or the cell chief is stirring people up to incite radicalization, they’re not doing it from a cube farm somewhere, but from their own phones. Not that that makes it impossible to attack though.

  5. William
    5 November 2017 @ 4:19 pm

    I’m not saying it’s always easy to track, yet most don’t realize that doing things electronically leaves a distinct cyber footprint (e.g., IEP addresses, locations, etc.) and it’s not totally anonymous. So, they may not always be able to track to the exact person but a lot can be determined just by analyzing the cyber footprint. As well, firewalls and other protections can be put into place to help manage cyber traffic/postings.

  6. William
    5 November 2017 @ 10:30 pm

    Speaking of attacks, my prayers go to the families of the victims of today’s church shooting in Texas. The Scalise shooting in June, Las Vegas last month, NY last week and now this. What is the world coming to? Does it seem this sort of thing is happening more frequently? It’s crazy!

  7. smitemouth
    6 November 2017 @ 11:11 pm

    If they are using a Tor browser, it makes it considerably more difficult. If I was doing illegal crap, I’d be using Tor.