Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Islamic State uses downloadable apps to hide attack plans, recruit followers
Washington Times ^ | 6/28/15 | Rowan Scarborough

Posted on 06/28/2015 6:29:48 PM PDT by markomalley

The Islamic State terrorist army is snatching up the latest off-the-shelf encrypted applications to hide their military planning, with fighters publicly thanking former National Security Agency contractor Edward Snowden for tipping them on U.S. spying tactics.

The West’s fertile tech laboratories have unwittingly become the Islamic State’s research and development arm for free messaging software. It uses the apps to recruit followers, defeat the U.S.-led coalition and expand conquests in Iraq and Syria.

The Islamic State’s mastery of secure communications is an especially important advance because its commanders do their attack planning — and then execution — via the Internet and smartphones. The Islamic State, also known as ISIL and ISIS, has set up cybercommand posts. It recently published photos it said showed commanders orchestrating a suicide bombing and relaying information from the Internet by cellphone to the attackers.

Al Qaeda and its followers for years have tried to encrypt telephone and email messages. Documents seized in the 2011 raid of Osama bin Laden’s Pakistan hideout confirm this.

(Excerpt) Read more at washingtontimes.com ...


TOPICS: Foreign Affairs; War on Terror
KEYWORDS: caliphate; computers; jihad; rop

1 posted on 06/28/2015 6:29:48 PM PDT by markomalley
[ Post Reply | Private Reply | View Replies]

To: markomalley

It’s something how these primitive barbarians use advantage technology in an attempt to drive civilization back to the stone age.


2 posted on 06/28/2015 6:36:00 PM PDT by ETL (ALL (most?) of the Obama-commie connections at my FR Home page: http://www.freerepublic.com/~etl/)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

Since the powerful encryption algorithms are all available in open-source libraries, anyone can write such an app, so you don’t even need to download it.

I have the C source code library for Blowfish, right on this computer.


3 posted on 06/28/2015 6:54:58 PM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

Just nuke them and be done with it. Everything else is just distraction.

L


4 posted on 06/28/2015 6:56:02 PM PDT by Lurker (Violence is rarely the answer. But when it is it is the only answer.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley
Encryption Technology Embraced By ISIS, Al-Qaeda, Other Jihadis Reaches New Level With Increased Dependence On Apps, Software – Kik, Surespot, Telegram, Wickr, Detekt, TOR: Part IV – February-June 2015 By: Steven Stalinsky and R. Sosnow*
5 posted on 06/28/2015 7:08:16 PM PDT by the_daug
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson