Short Bytes: Cybersecurity group Flashpoint has released a new report, outlining the technologies and software used by ISIS terrorists. These security-first programs are used by jihadists to erase the tracks of their online activities and defeat surveillance. The software discussed in the report include the likes of TOR, Telegram, and VPN applications.
According to Flashpoint, a cybersecurity group focused on the deep and dark web, the terrorists have become more sophisticated since 2012.
Flashpoint has released a new report, elucidating about 36 tools and technologies used by terrorists. These technologies have become imperative to these terror operators for remaining underground, escaping surveillance, and covering their tracks.
The report outlines that ISIS members make use of secure browsers like TOR and Opera to pay a visit to the web. As NSA is known to monitor TOR traffic, the jihadists use extra layers of security.
The software used and recommended by ISIS are:
- Secure browsers like TOR and Opera Browser
- CyberGhost VPN
- Fake GPS software
- Secure messaging apps like Telegram
- Encrypted email services like Hushmail, Yopmail
- Radio station apps
- Locker — an app that deletes files on a mobile device after multiple incorrect unlocking attempts
Stressing upon the importance of more insights into the behaviour of terrorists, Flashpoint concludes the report: