Feeds

Islamic terror peril hits US giants' phone wallets

'We have made the decision to rebrand' says ISIS Isis

Gartner critical capabilities for enterprise endpoint backup

US mobile payments biz Isis has decided to change its name to avoid associations with terrorist group the Islamic State of Iraq and Syria (ISIS).

Isis – not an acronym for anything – offers a pay-by-tap platform that allows customers to use their NFC-enabled smartphones to make purchases wirelessly. As such, it competes directly with such services as Google Wallet.

ISIS, on the other hand, is a hardline Sunni Islamic jihadist militant group engulfing Iraq and is operating in Syria; it has become notorious for its strict interpretation of Islam and the harsh brutality of its violence.

A joint venture between AT&T, T-Mobile, and Verizon – three of the four largest US wireless carriers – Isis was launched in 2010 and went nationwide in 2013, following pilot programs in Austin, Texas and Salt Lake City, Utah.

ISIS is a bit older, having been formed in early 2004 by Osama bin Laden disciple Abu Musab al-Zarqawi. Since then, the group has conducted a campaign of bombings, beheadings, assassinations, and out-and-out guerrilla warfare, and it recently gained notoriety for having wrested control of the northern city of Mosul away from the Iraqi government.

"However coincidental, we have no interest in sharing a name with a group whose name has become synonymous with violence and our hearts go out to those who are suffering," Isis CEO Michael Abbott said in a blog post on Monday. "As a company, we have made the decision to rebrand."

In an unrelated statement, ISIS leader Abu Bakr al-Baghdadi appeared in a video on Monday from what appeared to be the Great Mosque in central Mosul, in which he called on Muslims to "obey me as long as I obey God." Previously, some analysts had believed al-Baghdadi had been killed during recent fighting.

Abbott, who has not participated in any sectarian violence, said that although his company initially chose the Isis name for its simplicity and because it "brought to life our company and our values," he now feels a change is best for the company, its partners, and its customers. Just what the new name will be, however, he didn't say.

"We are actively working on a new brand, and I'll share more with you as our journey progresses in the coming months," Abbott wrote.

ISIS, meanwhile, is known by various names, including the Islamic State of Iraq and the Levant (ISIL), the Islamic State of Iraq and al-Sham, the Arabic-derived acronym DAISH, or simply the Islamic State (IS). We recommend Abbott steer clear of these, too. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE accused of silencing customer gripes on social media pages
Hello. HELLO. Can EVERYTHING EVERYWHERE HEAR ME?!
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
Shoot-em-up: Sony Online Entertainment hit by 'large scale DDoS attack'
Games disrupted as firm struggles to control network
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
Broadband slow and expensive? Blame Telstra says CloudFlare
Won't peer, will gouge for Internet transit
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?