How ISIS avoids digital detection

Before you go, we thought you'd like these...
Before you go close icon
How to combat ISIS online


The Islamic State and other jihadist organizations are deftly employing dozens of digital products to mask their activity online, a new study shows.

Islamist terror groups leverage everything from temporary email services to tools that provide bogus GPS locations in order to skirt online detection and minimize the risk of cyber attacks against them, the intelligence firm Flashpoint found. ISIS and its extremist counterparts, such as al-Qaeda, also turn to this technology to help recruit, radicalize, and even orchestrate attacks.

"Although technology is not typically associated with jihadists, it is their lifeblood," write researchers Laith Alkhouri and Alex Kassirer in their report titled "Tech for Jihad: Dissecting Jihadists' Digital Toolbox." The pair based their findings on an analysis of extremist forums on the deep where ISIS-sympathizes and other professed jihadists gather to swap terror tips and peddle encrypted devices, most of them free and readily accessible online.

Analysts and law enforcement officials have long warned of terror groups "going dark" on the internet by using new tech products to mask their identity and whereabouts, making these groups increasingly difficult to monitor. Earlier this year, the Pentagon unveiled a sweeping plan to target ISIS' online infrastructure and well-oiled propaganda machine. U.S. military officials, however, told the Washington Post this month that the initiative is off to a slow, sputtering start.

Meanwhile, ISIS and other jihadists continue to benefit from the use of some 36 tech tools identified by Flashpoint. Here's how they're becoming more clandestine.

Secure Browsers
The report found that ISIS sympathizers are increasingly turning away from commercial web browsers, such as Google Chrome or Safari, in favor of more protected ones. Secure web browsers do not divulge IP addresses. They also minimize the risk of third-party surveillance. Jihadist-approved products: Tor Browser; Opera.

Virtual Private Networks (VPNs) and Proxy Servers
VPNs and proxy servers create an additional layer of encryption on the internet, providing additional online privacy. Islamist terror groups have been encouraging supporters to use them since at least 2012, Flashpoint found. Jihadist-approved products: F-Secure Freedome; CyberGhostVPN

Protected Email Services
The FBI and other intelligence agencies have long relied on email to monitor the activity of terrorism suspects. Alternative email services, however, provide security features such as end-to-end encryption and anonmyous account capabilities that undercut surveillance. Jihadist-approved products: Hush-Mail; ProtonMail; YOPmail; GhostMail; Tutanota.

Mobile Security Apps
The report shows that ISIS supporters routinely encourage one another leverage a suite of mobile phone security apps. These tools can delete browsing history, secure a user's location, and disable other apps from using a phone's camera, microphone or BlueTooth. Jihadist-approved products: Locker; Fake GPS; D-Vasive Pro; iShredder Pro; Hide.me; DNSCrypt; NetGuard; AFWall

Encrypted Messaging Apps
As social media companies such as Twitter and Facebook continue to crackdown on ISIS-related content, supporters have increasingly moved toward encrypted messaging apps, the study shows. Jihadist-approved products: Telegram; Threema.

The post How ISIS Avoids Digital Detection appeared first on Vocativ.

RELATED: See images of ISIS' weapons

1 PHOTOS
Islamic State weapons, ISIS
See Gallery
Islamic State weapons, ISIS
HIDE CAPTION
SHOW CAPTION
of
SEE ALL
BACK TO SLIDE

Read Full Story

Sign up for Breaking News by AOL to get the latest breaking news alerts and updates delivered straight to your inbox.

Subscribe to our other newsletters

Emails may offer personalized content or ads. Learn more. You may unsubscribe any time.

From Our Partners

Manatees Are Being Found With Cuts All Over Their Bodies - For This Horrifying Reason Manatees Are Being Found With Cuts All Over Their Bodies - For This Horrifying Reason
Man Suspects His Wife Is Cheating On Him - Then His Daughter Reveals What's Really Going Man Suspects His Wife Is Cheating On Him - Then His Daughter Reveals What's Really Going
This Photographer Brilliantly Documented Crime on the Mean Streets of New York City This Photographer Brilliantly Documented Crime on the Mean Streets of New York City