How Jihadists Operate Online And Under The Radar


SUBMITTED BY: sahertian

DATE: July 23, 2016, 1:10 a.m.

FORMAT: Text only

SIZE: 918 Bytes

HITS: 638

  1. An analysis of activity on the Dark Web shows that jihadist groups are taking advantage of a wider range of technology tools and secure services than generally assumed for propaganda and communication purposes.
  2. Researchers from security vendor Flashpoint recently examined data obtained from what they described as primary sources from the Deep and Dark Web to understand how those affiliated with terror groups maintain online presences without being detected.
  3. The analysis showed that jihadist groups rely on six broad categories of digital tools and services to maintain an online presence, obscure their tracks from law enforcement, to proselytize, and to communicate with each other. The tools include secure browsers like Tor, proxy services and virtual private networks (VPNs) such as CyberGhost VPN, protected email services, and encrypted chat and messenger tools.
  4. Read more here http://goo.gl/RoR5eL

comments powered by Disqus