Submit your comments on this article |
Terror Networks |
How Al-Qaeda Uses Encryption Post-Snowden (Part 1) |
2014-05-24 |
![]() Following the June 2013 Edward Snowden leaks we observe an increased pace of innovation, specifically new competing jihadist platforms and three (3) major new encryption tools from three (3) different organizations -- GIMF, Al-Fajr Technical Committee, and ISIS -- within a three to five-month time frame of the leaks. The nature of these new crypto products indicates strategy to overlay stronger and broader encryption on Western (mainly US) consumer communication services. The reader is pointed here for more detailed analysis. |
Posted by:Squinty |