Feeds

Islamic terror peril hits US giants' phone wallets

'We have made the decision to rebrand' says ISIS Isis

Choosing a cloud hosting partner with confidence

US mobile payments biz Isis has decided to change its name to avoid associations with terrorist group the Islamic State of Iraq and Syria (ISIS).

Isis – not an acronym for anything – offers a pay-by-tap platform that allows customers to use their NFC-enabled smartphones to make purchases wirelessly. As such, it competes directly with such services as Google Wallet.

ISIS, on the other hand, is a hardline Sunni Islamic jihadist militant group engulfing Iraq and is operating in Syria; it has become notorious for its strict interpretation of Islam and the harsh brutality of its violence.

A joint venture between AT&T, T-Mobile, and Verizon – three of the four largest US wireless carriers – Isis was launched in 2010 and went nationwide in 2013, following pilot programs in Austin, Texas and Salt Lake City, Utah.

ISIS is a bit older, having been formed in early 2004 by Osama bin Laden disciple Abu Musab al-Zarqawi. Since then, the group has conducted a campaign of bombings, beheadings, assassinations, and out-and-out guerrilla warfare, and it recently gained notoriety for having wrested control of the northern city of Mosul away from the Iraqi government.

"However coincidental, we have no interest in sharing a name with a group whose name has become synonymous with violence and our hearts go out to those who are suffering," Isis CEO Michael Abbott said in a blog post on Monday. "As a company, we have made the decision to rebrand."

In an unrelated statement, ISIS leader Abu Bakr al-Baghdadi appeared in a video on Monday from what appeared to be the Great Mosque in central Mosul, in which he called on Muslims to "obey me as long as I obey God." Previously, some analysts had believed al-Baghdadi had been killed during recent fighting.

Abbott, who has not participated in any sectarian violence, said that although his company initially chose the Isis name for its simplicity and because it "brought to life our company and our values," he now feels a change is best for the company, its partners, and its customers. Just what the new name will be, however, he didn't say.

"We are actively working on a new brand, and I'll share more with you as our journey progresses in the coming months," Abbott wrote.

ISIS, meanwhile, is known by various names, including the Islamic State of Iraq and the Levant (ISIL), the Islamic State of Iraq and al-Sham, the Arabic-derived acronym DAISH, or simply the Islamic State (IS). We recommend Abbott steer clear of these, too. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.