|||| There are certain to be cases where some blog, outside the control of the U.S. government, promotes a message that is antithetical to U.S. interests, or actively supports the informational, recruiting and logistical activities of our enemies. The initial reaction may be to take down the site, but this is problematic in that doing so does not guarantee that the site will remain down. As has been the case with many such sites, the offending site will likely move to a different host server, often in a third country. Moreover, such action will likely produce even more interest in the site and its contents. Also, taking down a site that is known to pass enemy EEIs (essential elements of information) and that gives us their key messages denies us a valuable information source. This is not to say that once the information passed becomes redundant or is superseded by a better source that the site should be taken down. At that point the enemy blog might be used covertly as a vehicle for friendly information operations. Hacking the site and subtly changing the messages and data-merely a few words or phrases-may be sufficient to begin destroying the blogger's credibility with the audience. Better yet, if the blogger happens to be passing enemy communications and logistics data, the information content could be corrupted. If the messages are subtly tweaked and the data corrupted in the right way, the enemy may reason that the blogger in question has betrayed them and either take down the site (and the blogger) themselves, or by threatening such action, give the U.S. an opportunity to offer the individual amnesty in exchange for information. ||||
Undermining Mobile Phone Users’ Privacy Won’t Make Us Safer - *The Kelsey Smith Act Would Force Cell Providers to Turn Private User Data Over to Law Enforcement* Tragedies often bring political proposals that would d...
1 day ago