AST Digital Magazine July/August 2016 - Page 31

Volume 6 Laith Alkhouri, Director of Middle East/North Africa Research and a co-founder at Flashpoint Jihadists’ strategic use of social media has garnered significant attention over the last two years; however, for the most part, the general public remains relatively uninformed about the complex ways in which many jihadists maintain robust yet secretive online presences. Confidentiality and privacy are paramount to the survival of these groups, and with mainstream communication applications lacking the sophistication necessary to ensure sufficient security, jihadists are constantly forced to seek alternative methods of communication. In its report, Flashpoint researchers identify six categories of tools and tactics integral to jihadist operations: • Secure Browsers: Jihadists are increasingly turning to highly secure, alternative browsers, such as the Tor Browser, in order to operate online clandestinely without divulging identifying IP addresses and risking third-party surveillance. • Virtual Private Networks (VPNs) and Proxy Services: Tools such as CyberGhostVPN and F-Secure Freedome, often used in conjunction with secure browsers, help many jihadists further obfuscate their identities during online activities. • Protected Email Services: As e-mail surveillance remains a powerful tool for intelligence agencies to monitor actors, jihadists are turning to alternative e-mail services equipped with July-Aug 2016 Edition popular security features such as end-to-end encryption and temporary, anonymous account capabilities. • Mobile Security Applications: Increasingly, jihadists are leveraging specialized mobile applications to enhance security on smartphones. • Encrypted Messengers: Despite a vast assortment of secure messaging platforms publicly available, the chat application Telegram remains the top choice among jihadists. • Mobile Propaganda Applications: As propaganda plays an integral role within the daily operations of radical jihadist groups, affiliated media units have released popular mobile applications enabling supporters to disseminate and view propaganda with greater ease, speed, and accessibility. “Today’s jihadists’ unrelenting drive to adopt technology that facilitates concealing their online operations reflects their strong need to implement stringent security measures in order to operate outside the view of law enforcement while preserving their voice to attract new recruits,” said Alex Kassirer, report co-author and Senior Analyst, Counterterrorism, Middle East/North Africa at Flashpoint. “The better we understand the online tools and technology jihadists leverage to engage in nefarious activities, the better we can work to mitigate threats emanating from this global community.” For a full overview and list of the online tools and tactics used by the ISIS community, visit: https:// www.flashpoint-intel.com/home/assets/Media/ TechForJihad.pdf Flashpoint provides the tools, data, and expertise necessary to obtain tactical, operational, and strategic intelligence from the Deep & Dark Web. The company offers a state-of-the-art platform with data curated by world-class subject matter experts. Flashpoint’s ɽՍ́յєѡɕѕѽ̰)ɕѥ̰͡٥̰ݽɭ́)ݥѡѡ͔ɕ́ѡ%ѕɹи(((0