Short Bytes: Cybersecurity group Flashpoint has released a new report, outlining the technologies and software used by ISIS terrorists. These security-first programs are used by jihadists to erase the tracks of their online activities and defeat surveillance. The software discussed in the report include the likes of TOR, Telegram, and VPN applications.
The same applies to the brutal terrorists of the Islamic State. They use multiple modes of encrypted communications. They use these means to circulate terror manuals and tutorials to train the new jihadists and spread their propaganda.
According to Flashpoint, a cybersecurity group focused on the deep and dark web, the terrorists have become more sophisticated since 2012.
Flashpoint has released a new report, elucidating about 36 tools and technologies used by terrorists. These technologies have become imperative to these terror operators for remaining underground, escaping surveillance, and covering their tracks.
The report outlines that ISIS members make use of secure browsers like TOR and Opera to pay a visit to the web. As NSA is known to monitor TOR traffic, the jihadists use extra layers of security.
The software used and recommended by ISIS are:
- Secure browsers like TOR and Opera Browser
- CyberGhost VPN
- Fake GPS software
- Secure messaging apps like Telegram
- Encrypted email services like Hushmail, Yopmail
- Radio station apps
- Locker — an app that deletes files on a mobile device after multiple incorrect unlocking attempts
Today’s terrorists are relentlessly adopting new technologies to conceal their online operations. Very often they are seen using open source tools as they are the best when it comes to online security.
Stressing upon the importance of more insights into the behaviour of terrorists, Flashpoint concludes the report:
Did you find this article interesting? Don’t forget to drop your feedback in the comments section below.