{"id":17863,"date":"2016-07-25T09:18:10","date_gmt":"2016-07-25T14:18:10","guid":{"rendered":"http:\/\/hcstx.org\/?p=17863"},"modified":"2016-07-25T09:18:10","modified_gmt":"2016-07-25T14:18:10","slug":"examining-terrorist-tactics-the-jihadist-comms-toolkit","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/07\/25\/examining-terrorist-tactics-the-jihadist-comms-toolkit\/","title":{"rendered":"Examining Terrorist Tactics: The Jihadist Comms Toolkit"},"content":{"rendered":"<p class=\"d1-article-subhead\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-17864\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/07\/comms.jpg?w=620\" alt=\"Comms\" width=\"620\" height=\"284\" \/><\/p>\n<p class=\"d1-article-subhead\"><span class=\"d1-article-subhead-inner-a\"><span class=\"d1-article-subhead-inner-b\"><span class=\"d1-article-subhead-inner-c\">A new report documents how extremist groups\u2019 use of secure digital tools software has evolved.<\/span><\/span><\/span><\/p>\n<div class=\"text d1-article-content\">\n<p>\u201cI don\u2019t think that there are too many [makers of encrypted communication tools who] can say that bad guys don\u2019t use their stuff, accurately,\u201d <span class=\"caps\">NSA<\/span> deputy director Richard Ledgett said during the recent <a href=\"http:\/\/www.defenseone.com\/feature\/technology-summit-2016\/\"><em>Defense One<\/em> Tech Summit<\/a>, describing <span class=\"caps\">ISIS<\/span>\u2019 use of various messaging services and platforms to communicate and distribute propaganda. A new <a href=\"https:\/\/www.flashpoint-intel.com\/home\/assets\/Media\/TechForJihad.pdf\">report<\/a> from cybersecurity group Flashpoint makes an attempt to catalog the digital tools in common use by jihadists, and when they started using\u00a0them.<\/p>\n<p>Here\u2019s the\u00a0shortlist:<\/p>\n<p><a href=\"https:\/\/www.torproject.org\/\">Tor<\/a>: Developed by the <span class=\"caps\">U.S.<\/span> Naval Research Laboratory in the 1990s to help installations and military units keep contact during a global conflict, <span class=\"caps\">TOR<\/span> anonymizes connections to the internet, making it harder for snoops to know who is visiting a given site. Throughout the last decade, \u201cTor\u2019s popularity grew sharply within jihadist Deep and Dark Web forums,\u201d the Flashpoint reports\u00a0says.<\/p>\n<p>In 2012, the Snowden revelations showed that the <span class=\"caps\">NSA<\/span> could snoop on <span class=\"caps\">TOR<\/span> traffic with a program called<a href=\"http:\/\/www.slideshare.net\/xkeyscore\/xkeyscore-nsa-program-presentation\"> <span class=\"caps\">XKEYSCORE<\/span><\/a>. In 2014, the German news service <a href=\"http:\/\/daserste.ndr.de\/panorama\/aktuell\/nsa230_page-1.html\">Tagesschau<\/a> poked around<span class=\"caps\">TOR<\/span>\u2019s source code and found that the <span class=\"caps\">NSA<\/span> was watching nine<span class=\"caps\">TOR<\/span> servers that allowed it to do \u00a0<a href=\"http:\/\/www.pcworld.com\/article\/249137\/what_is_deep_packet_inspection_.html\">deep packet inspection<\/a> on basically anyone accessing <span class=\"caps\">TOR<\/span> outside of Australia, Britain, Canada, New Zealand, and the United States (the so-called Five Eyes surveillance\u00a0partners).<\/p>\n<p>Extremist groups have also begun using virtual private networks, or VPNs, which encrypt traffic between computers. As early as 2012, Al Qaeda was discussing the use of the free<strong> CyberGhost<span class=\"caps\">VPN<\/span>,<\/strong> the report notes. But today\u2019s savvy suicide bomber is likely to go in for a paid subscription to a better <span class=\"caps\">VPN<\/span> service. \u201cSome safer VPNs require monthly subscription,\u201d the Pro-<span class=\"caps\">ISIS<\/span> United Cyber Caliphate wrote earlier this year, warning loyalists to stay away from cheap\u00a0VPNs.<\/p>\n<p>Secure messaging apps, such as <a href=\"http:\/\/www.thedailybeast.com\/articles\/2015\/11\/16\/this-is-isis-new-favorite-app-for-secret-messages.html\">Telegram<\/a>,<a href=\"http:\/\/www.thedailybeast.com\/articles\/2015\/11\/16\/this-is-isis-new-favorite-app-for-secret-messages.html\"> and other services are proliferating and getting easier to use every day<\/a>. \u201cIt used to be that you had to be pretty technically astute to use encryption on a device or for personal communications,\u201d Leggett said. \u201cThat\u2019s become very user friendly, very easy to use and now very unsophisticated actors can install very high-grade encryption on their devices, so <span class=\"caps\">ISIL<\/span>, like many other targets, use that to hide their activities from\u00a0us.\u201d<\/p>\n<p>Read the Remainder at<strong><a href=\"http:\/\/www.defenseone.com\/technology\/2016\/07\/quick-guide-jihadist-communications-toolkit\/130159\/?oref=defenseone_today_nl\"> Defense One<\/a><\/strong><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new report documents how extremist groups\u2019 use of secure digital tools software has evolved. \u201cI don\u2019t think that there are too many [makers of encrypted communication tools who] can say that bad guys don\u2019t use their stuff, accurately,\u201d NSA deputy director Richard Ledgett said during the recent Defense One Tech Summit, describing ISIS\u2019 use&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2805,3140,13,74,4445,1317,4912,4126,883,5943,5699,65,272,3712,10],"tags":[13079,2779,13080,13081,13082,13083,13084],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/17863"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=17863"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/17863\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=17863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=17863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=17863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}