[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Adolf Hitler had 'some good ideas', a fifth of Gen Z Americans believe according to Daily Mail poll

New 4um Site Software Ready For Review

"Calling Me Names Is NOT Gonna Stop Me!" Tucker Carlson on Ted Cruz, Trump, Israel & 9/11

Vietnam Erases 86 Million Bank Accounts – (NWO) Great Reset in Motion

Vietnam Erases 86 Million Bank Accounts – (NWO) Great Reset in Motion

Rifle Ammo In Kirk Assassination Engraved With 'Transtifa' Ideology: Law Enforcement Memo

Time for MASSIVE change in America (Black Crime and the Media))

How Much Are Teachers Paid Around The World?

Spain's Power Grid: Net Zero Drive Pushes Economy Toward Paralysis

Pepe Escobar: So the death cult "defends itself" by bombing..

Banks Are Hiding Credit Losses (Here’s How) | Bill Moreland of BankRegData

Housing stability is being propped up by hidden bailouts and toxic FHA debt,

Why Did Qatar's Air Defenses Fail During Israel's Attack?

German POWs Expected Execution — Instead an American Farmer Invited Them for Dinner

Charlie Kirk has been shot

Elon Musk Commits $1 Million To Murals Of Iryna Zarutska Nationwide, Turning Public Spaces Into Culture War Battlegrounds

Trump's spiritual advisor, Paula White: "To say no to President Trump would be saying no to God."

NETHERLANDS: Young natives are hunted and beaten on the streets by savage migrants

Female Police Officers Arrest Violent Man The Ponytail Police In Action

Lighter than Hare - Restored Classic Bugs Bunny

You'll Think Twice About Seeing Your Medical Doctor After This! MUST SEE

Los Angeles man creates glass that withstands hammers, saving jewelry from thieves.

This is F*CKING DISGUSTING... [The news MSM wishes you didn't see]

Nepal's Gen Z protest against Govt in Kathmandu Explained In-depth Analysis

13 Major World War III Developments That Have Happened Just Within The Past 48 Hours

France On Fire! Chaos & Anarchy grip Paris as violent protesters clash with police| Macron to quit?

FDA Chief Says No Solid Evidence Supporting Hepatitis B Vaccine At Birth

"Hundreds of Bradley Fighting Vehicles POURING into Chicago"

'I'll say every damn name': Marjorie Taylor Green advocates for Epstein victims during rally

The long-awaited federal crackdown on illegal alien crime in Chicago has finally arrived.


Resistance
See other Resistance Articles

Title: A Quick Guide to the ********* Communications Toolkit
Source: Defense One
URL Source: http://www.defenseone.com/technolog ... communications-toolkit/130159/
Published: Jul 22, 2016
Author: Patrick Tucker
Post Date: 2016-07-24 00:16:09 by X-15
Keywords: None
Views: 109
Comments: 1

A new report documents how extremist groups’ use of secure digital tools software has evolved.

“I don’t think that there are too many [makers of encrypted communication tools who] can say that bad guys don’t use their stuff, accurately,” NSA deputy director Richard Ledgett said during the recent Defense One Tech Summit, describing ISIS’ use of various messaging services and platforms to communicate and distribute propaganda. A new report from cybersecurity group Flashpoint makes an attempt to catalog the digital tools in common use by jihadists, and when they started using them.

Here’s the shortlist:

Tor: Developed by the U.S. Naval Research Laboratory in the 1990s to help installations and military units keep contact during a global conflict, TOR anonymizes connections to the internet, making it harder for snoops to know who is visiting a given site. Throughout the last decade, “Tor’s popularity grew sharply within jihadist Deep and Dark Web forums,” the Flashpoint reports says.

In 2012, the Snowden revelations showed that the NSA could snoop on TOR traffic with a program called XKEYSCORE. In 2014, the German news service Tagesschau poked around TOR’s source code and found that the NSA was watching nine TOR servers that allowed it to do deep packet inspection on basically anyone accessing TOR outside of Australia, Britain, Canada, New Zealand, and the United States (the so-called Five Eyes surveillance partners).

Extremist groups have also begun using virtual private networks, or VPNs, which encrypt traffic between computers. As early as 2012, Al Qaeda was discussing the use of the free CyberGhost VPN, the report notes. But today’s savvy suicide bomber is likely to go in for a paid subscription to a better VPN service. “Some safer VPNs require monthly subscription,” the Pro-ISIS United Cyber Caliphate wrote earlier this year, warning loyalists to stay away from cheap VPNs.

Secure messaging apps, such as Telegram, and other services are proliferating and getting easier to use every day. “It used to be that you had to be pretty technically astute to use encryption on a device or for personal communications,” Leggett said. “That’s become very user friendly, very easy to use and now very unsophisticated actors can install very high-grade encryption on their devices, so ISIL, like many other targets, use that to hide their activities from us.”

One less remarked tool is Hushmail, an encrypted email service that the al Qaeda-affiliated Ibn Taimia Media Center, began using in Gaza in 2013, the report says, noting the Dagestani Mujahideen group “leverage Hushmail in tandem with PayPal for fundraising purposes.”

Another popular service is Yopmail, the burner phone of email. It gives users an email address they can use for up to eight days without registration. After the 2015 Paris attacks, as eyes and scrutiny turned to ISIS, al Qaeda’s Yemen branch (AQAP) used Yopmail to release an audio message about the attacks.

ISIS isn’t the first extremist group to use many of these tools, but it has put them to more effective use. A key element of its success has been its ability to find and groom followers and supporters online — and securely.

For a vivid display of that that looks like, check out Rukmini Callimachi’s 2015 New York Times profile of a young Oregon woman whom ISIS wooed as a supporter, not through slick videos or online magazines, but through constant contact with real people who sent her gifts, heard her every complaint, and filled a vacuum that friends, family, community and church could not.

“Alex [not her real name] was communicating with more than a dozen people who openly admired the Islamic State,” Callimachi writes. “Her life, which had mostly seemed like a blurred series of babysitting shifts and lonely weekends roaming the mall, was now filled with encouragement and tutorials from her online friends.”

That digital communication and outreach is essential to the way groups like ISIS grow — but it also makes them vulnerable.

In his discussion, Ledgett described the Real Time Regional Gateway, which since 2007 has allowed civilian and military NSA operatives to combine various kinds of intelligence to tie extremist fighters to their online identities. That saves lives, he said.

“It’s correlating signals intelligence collection, but also human sources —whether it’s human sources, pocket litter, things that are captured in detainee operations — to say, ‘Hey, this particular electronic activity is associated with this individual and we know from other sources that this guy is making IEDs,” so if I see him on my path, then that’s a concern to people in my operation we can provide them with real-time warning and real time,’” said Ledgett.

Still, the proliferation of tools to mask identities and encrypt conversation is making it harder to intercept jihadist communications.

But that wide variety with new ones coming out every day – suggests that calls to outlaw any particular encryption scheme or product wouldn’t eliminate ISIS’s messaging or operations ability. If anything, it would provide an artificial sense of safety while hurting the ability of consumers to use the same services. Indeed, jihadists have even built security software of their own. As the group Recorded Future notes, in 2007, a group called the Global Islamic Media Front created a desktop encryption software suite called Asrar al-Mujahideen, or Mujahedeen Secrets. In 2014, they released a plugin called Asrar al-Dardashah for instant messaging platforms such as Google Chat, Paltalk, Yahoo, and MSN.


Poster Comment:

Embedded links at source. This stuff works for us, too. I changed the headline to reduce unwanted alphabet meddlers on freedom4um.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: X-15 (#0)

And ... ?

U.S. Constitution - Article IV, Section 4: NO BORDERS + NO LAWS = NO COUNTRY

HAPPY2BME-4UM  posted on  2016-07-24   1:35:54 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]