ISIS issues manual for using the web anonymously

From an IT standpoint it is clear the Islamic terror group ISIS takes its internet security protocols seriously.
From an IT standpoint it is clear the Islamic terror group ISIS takes its internet security protocols seriously.

From an IT standpoint it is clear the Islamic terror group ISIS takes its internet security protocols seriously.

Just a day after it was revealed that ISIS had its own “help desk,” The Hill cited the Combating Terrorism Center at West Point for releasing a translation of am ISIS document designed to use the internet to keep its members under the radar.

The document gives very direct instructions on how to use social media, including using hard to break passwords, to not use Instagram because it has a poor security reputation and to use an encryption app for securing mobile phone calls. The guide also gives an in-depth look at Tor and how to use it to browse privately.

ISIS' tech team was not shy about promoting certain products and companies, including Telegram, Wickr, Surespot and Threema all gained the ISIS IT seal of approval in the document.

You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS