Terrorists, technology and fighting back
We investigate how extremists are using technology in their attempts to spread terror and threaten businesses.
As for communications, they are vital for any armed force, both the good and the bad. Internet-based technology has opened up many dark corners from which to plan surreptitious, seditious acts.
Inspire includes plenty of information on how to coordinate with allies. Unsurprisingly, encryption is key and the magazine has focused on one software program called Asrar al-Mujahideen 2.0.'
It should come as no surprise such software exists, or that more than capable programmers are operating for extremist groups. In one edition of Inspire, the writer outlines how to use the system, create keys, receive public keys of other parties, as well as how to encrypt and decrypt messages.
Asrar al-Mujahideen 2.0 seems simple enough, using both public and private keys, along with straightforward tabs such as Keys Manager' and File Shredder.'
The system looks easy to use too. With just a few clicks, some copying of code and following of instructions, users can apparently send and receive encrypted messages without much trouble.
Intriguingly, the article continues to talk about the importance of checking whether the copy of Asrar is legitimate or not. It's not down to any licensing laws, but because "the enemy" has created a copy to dupe genuine users, according to the writer.
"The only difference is that the enemy had built in a mechanism that would allow them to spy on your program if they were to just have access to your public key," they said.
As for other advice, users were told not to keep the Asrar program on their hard drive, but instead store it on a USB as anything on a hard drive could be hacked if the user accesses the internet in any capacity.
"It's possible that the enemy will use spy programs to infiltrate your computer and figure out your password for your private key by recording key strokes," the article read.
Then there are tips that wouldn't be out of place on any security blog, such as regular password alterations. It is all eerily familiar, similar to so much business technology being used by organisations across the world today.
In This Article
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now