You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Terror Networks
How Al-Qaeda Uses Encryption Post-Snowden (Part 1)
2014-05-24
Since 2007, Al-Qaeda's use of encryption technology has been based on the Mujahideen Secrets platform which has developed to include support for mobile, instant messaging, and Macs.

Following the June 2013 Edward Snowden leaks we observe an increased pace of innovation, specifically new competing jihadist platforms and three (3) major new encryption tools from three (3) different organizations -- GIMF, Al-Fajr Technical Committee, and ISIS -- within a three to five-month time frame of the leaks.

The nature of these new crypto products indicates strategy to overlay stronger and broader encryption on Western (mainly US) consumer communication services.

The reader is pointed here for more detailed analysis.
Posted by:Squinty

00:00