On Wed, 16 Dec 2015, Bill Cole wrote:
ISIS uses any "social media" where the proprietors welcome them. That is a business decision of for-profit private enterprises based in lightly-regulated jurisdictions (mostly the US and EU) who mostly have not thought about that choice in those terms.
There may also be liability issues as well, particularly in the litigation-happy US.
If they try to filter such communications out, and don't do a perfect job, they could potentially be sued for damages resulting from a successful attack that was planned and coordinated using their communication tools.
If they don't try at all, their exposure to such suits may be greatly lessened because they are acting as a common carrier rather than a gatekeeper.
But more to the technical point: Bill is exactly correct. You don't need something like SA when you have a single point of control over the communications (though something like bayes might well be a component of central filtering).
-- John Hardin KA7OHZ http://www.impsec.org/~jhardin/ jhar...@impsec.org FALaholic #11174 pgpk -a jhar...@impsec.org key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79 ----------------------------------------------------------------------- "Bother," said Pooh as he struggled with /etc/sendmail.cf, "it never does quite what I want. I wish Christopher Robin was here." -- Peter da Silva in a.s.r ----------------------------------------------------------------------- 9 days until Christmas