A U.S. military intelligence report has determined that the Twitter microblogging tool could be used by terrorists to coordinate their movements, activities and attacks.

The report from the U.S. Army's 304th Military Intelligence Battalion, now posted on the Federation of American Scientists Web site, details several scenarios where terrorists could use Twitter as an operation tool.

The report noted that human rights groups, communist organizations, anarchists and others are already using the Twitter to communicate with each other and send messages to broader audiences.

"Twitter is already used by some members to post and/or support extremist ideologies and perspectives," the report said. "For example, there are multiple pro and anti Hezbollah Tweets. In addition, extremist and terrorist use of Twitter could evolve over time to reflect tactics that are already evolving in use by 'hacktivists' and activist for surveillance. This could theoretically be combined with targeting."

Twitter is increasingly being used to broadcast short messages, or Tweets, from various newsmaking entities, including NASA's Phoenix Mars Lander and members of Congress. Some companies are even monitoring Twitter for customer service complaints.

Last month, Republicans in Congress used Twitter to help stage a protest over a piece of legislation.

The report cites Computerworld's coverage of how protesters at the Republican National Convention in St. Paul used Twitter to organize its movements and to help protesters elude and fend off police as an example of how terrorists could use the technology.

The report listed some Tweets used by the protestors, including:

"Arrest teams are approaching seated protesters on Marion bridge. Resisters are told they'll be met with force."

"Protestors are now fighting back. First reports of violence now."

"Western Ave. bridge, west of capitol can be safely crossed."

Such Tweets could be used by terrorists for counter surveillance and as command and control and movement tools, according to the report.

The report cited several potential terrorist scenarios, including one where a terrorist operative could use Twitter with or without a cell phone camera/video function to send and receive messages to and from members of his cell. The operative could also have a coded Google Maps/Twitter mashup of his location noted, which other cell members could view from their mobile phones. Members of the terrorist cell could receive near real-time updates -- similar to those sent by activists at the Republican convention -- on the location of and number of opposition troops.

In another scenario, a terrorist could use one mobile phone to send and receive Tweet messages and images, and another that's an explosive device that can be remotely detonated. A second terrorist has the detonator and a mobile phone to view the first terrorist's Tweets and images.

"This may allow [the second terrorist] to select the precise moment of remote detonation based on near real-time movement and imagery that is being sent by [the first terrorist]," the report noted.

The report also cited several examples of real Tweets sent from by unknown users, likely U.S. military personnel, to unknown recipients. They include:

"Drove off base today down Route Irish [Baghdad airport road] in an 'NTV and didn't get blown up fun fun"

"Today is my day off. 115 already in Camp Bucca Iraq."

In addition, the report noted this Tweet detailing an operational change at Fort Huachuca, home the US Army Intelligence Center and School:

"Email I just got: 'We are changing all the PMs tasks at Ft. Huachuca. I hope this does not add a lot of extra work on your end.' Ha!"

The potential for use of Twitter and other Web tools and mobile technologies by terrorists is dependent on the availability of mobile service, the report added. "For example, terrorists could theoretically use Twitter social networking in the US as an operation tool," the report said. "However, it is unclear whether the same theoretical use would be available to terrorists in other countries and to what extent."

Copyright 2008 IDG. All Rights Reserved.