Tech for Jihad: Dissecting Jihadists’ Digital Toolbox
Flashpoint analysts reveal cyber tools used by islamic terrorists
Jihadist groups use a variety of digital tools and online services that allow them to maintain a strong online presence, while also helping them remain undetected by adversaries.
In a new report called Tech for Jihad: Dissecting Jihadists’ Digital Toolbox, Flashpoint’s analysts Laith Alkhouri and Alex Kassirer reveals a list of the tools employed by various jihadist groups: the online activity of these groups remains relatively unknown to the general public, although their use of social media has attracted significant attention over the past months.
It is no secret that confidentiality and privacy are paramount to jihadists’ survival. However, most communication platforms lack the sophistication necessary to ensure sufficient security. As a result, today’s jihadists constantly seek alternative ways to advance their agendas and communicate securely.
Here some of the tools under analysis in the report:
Secure Browsers
Virtual Private Networks (VPNs) and Proxy Services
E-Mail Services
Mobile Security Applications
Encrypted Messengers
Mobile Propaganda Applications
The original report
https://www.flashpoint-intel.com/home/assets/Media/TechForJihad.pdf