Terrorists, technology and fighting back

We investigate how extremists are using technology in their attempts to spread terror and threaten businesses.

As for communications, they are vital for any armed force, both the good and the bad. Internet-based technology has opened up many dark corners from which to plan surreptitious, seditious acts.

Inspire includes plenty of information on how to coordinate with allies. Unsurprisingly, encryption is key and the magazine has focused on one software program called Asrar al-Mujahideen 2.0.'

It should come as no surprise such software exists, or that more than capable programmers are operating for extremist groups. In one edition of Inspire, the writer outlines how to use the system, create keys, receive public keys of other parties, as well as how to encrypt and decrypt messages.

Asrar al-Mujahideen 2.0 seems simple enough, using both public and private keys, along with straightforward tabs such as Keys Manager' and File Shredder.'

Advertisement
Advertisement - Article continues below

The system looks easy to use too. With just a few clicks, some copying of code and following of instructions, users can apparently send and receive encrypted messages without much trouble.

Intriguingly, the article continues to talk about the importance of checking whether the copy of Asrar is legitimate or not. It's not down to any licensing laws, but because "the enemy" has created a copy to dupe genuine users, according to the writer.

"The only difference is that the enemy had built in a mechanism that would allow them to spy on your program if they were to just have access to your public key," they said.

As for other advice, users were told not to keep the Asrar program on their hard drive, but instead store it on a USB as anything on a hard drive could be hacked if the user accesses the internet in any capacity.

"It's possible that the enemy will use spy programs to infiltrate your computer and figure out your password for your private key by recording key strokes," the article read.

Then there are tips that wouldn't be out of place on any security blog, such as regular password alterations. It is all eerily familiar, similar to so much business technology being used by organisations across the world today.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/network-internet/wifi-hotspots/354283/industrial-wi-fi-6-trial-reveals-blistering-speeds
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019