Terrorists, technology and fighting back
We investigate how extremists are using technology in their attempts to spread terror and threaten businesses.
As for communications, they are vital for any armed force, both the good and the bad. Internet-based technology has opened up many dark corners from which to plan surreptitious, seditious acts.
Inspire includes plenty of information on how to coordinate with allies. Unsurprisingly, encryption is key and the magazine has focused on one software program called Asrar al-Mujahideen 2.0.'
It should come as no surprise such software exists, or that more than capable programmers are operating for extremist groups. In one edition of Inspire, the writer outlines how to use the system, create keys, receive public keys of other parties, as well as how to encrypt and decrypt messages.
Asrar al-Mujahideen 2.0 seems simple enough, using both public and private keys, along with straightforward tabs such as Keys Manager' and File Shredder.'
The system looks easy to use too. With just a few clicks, some copying of code and following of instructions, users can apparently send and receive encrypted messages without much trouble.
Intriguingly, the article continues to talk about the importance of checking whether the copy of Asrar is legitimate or not. It's not down to any licensing laws, but because "the enemy" has created a copy to dupe genuine users, according to the writer.
"The only difference is that the enemy had built in a mechanism that would allow them to spy on your program if they were to just have access to your public key," they said.
As for other advice, users were told not to keep the Asrar program on their hard drive, but instead store it on a USB as anything on a hard drive could be hacked if the user accesses the internet in any capacity.
"It's possible that the enemy will use spy programs to infiltrate your computer and figure out your password for your private key by recording key strokes," the article read.
Then there are tips that wouldn't be out of place on any security blog, such as regular password alterations. It is all eerily familiar, similar to so much business technology being used by organisations across the world today.
In This Article
Unleashing the power of AI initiatives with the right infrastructure
What key infrastructure requirements are needed to implement AI effectively?Download now
Achieve today. Plan tomorrow. Making the hybrid multi-cloud journey
A Veritas webinar on implementing a hybrid multi-cloud strategyDownload now
A buyer’s guide for cloud-based phone solutions
Finding the right phone system for your modern businessDownload now
The workers' experience report
How technology can spark motivation, enhance productivity and strengthen securityDownload now