After ISIS attacks on people in Paris, the terrorist groups are suspected of using encrypted communicating apps. It’s a problem for government to find out the communications of terrorists and criminals.
According to NYPD Commissioner Bill Bratton said Wednesday on cybersecurity symposium that,
“They rate them as they are seeking to encourage people to join them”
“They’re rating these devices to show how masterful they’ve become in dealing with social media and reaching out to the audience they’re trying to recruit.”
List of secure apps used by ISIS terrorists for better encryption.
An Encrypted mobile messaging app used by ISIS members to talk in a group.
Most ISIS members connect through Twitter. Anonymous takes down more than 20,000 ISIS Twitter accounts.
HushMail & ProtonMail
Email service for ISIS are non-US companies. This service has invite-only option. Both email service offer free and encrypted email.
A tool that can change location data on photos, so that they don’t reveal the actual place.
CryptoPhone & BlackPhone
Highly used by ISIS terrorists for secure phone calls, offering secure message and voice communication.
FireChat & TinCan & TheServalProject
Recommended apps for ISIS members without internet, even though they are not encrypted.
Service to protect jihadis from spyware and fraudulent sites.
Tor & Avast SecureLine
Favorite browser for ISIS and hackers, sine it hides the user ID and encrypts everything.
VeraCrypt & TrueCrypt
These tools used to hide their data which is encrypted
According to Brantly, a cybersecurity in West Point Center said that,”The jihadis they encounter in ISIS forums and chatrooms. They are signs of increased interest not only in securing their own communication but hacking other targets as an ISIS.”
Cyber Caliphate, a hacking group that supports ISIS, says that they were responsible for hacking the US Central Command’s Twitter and YouTube accounts this year.
“They’re not super-talented hackers, but they’re reasonable.” Brantly says.
Latest posts by Unallocated Author (see all)
- Tips How To Recover Deleted Files on Windows PC Free and Easily - October 8, 2018
- iKeyMonitor Android Tracking App Review - September 4, 2018
- “Open Sesame” Vulnerability That Let Users Hack Windows 10 Was Demonstrated at Black Hat Conference - August 12, 2018