Jihadists receive a 30-page document with instructions in order to not to be located on the Web. It includes advice on how to navigate through Tor or how they must use Telegram instead of WhatsApp.
The self-proclaimed Islamic State has boasted in recent times to master the world of internet. From the propaganda of the use of social networks to encrypted communications between supporters worldwide. But the reality, according to many analysts, is another. The most obvious example is the mobile phone that was allegedly used by one of the terrorist in the attacks of Paris: not only been located but have extracted a lot of data relevant to the investigation.
Experts and researchers, consulted by the EP agency, reinforce this theory of careless handling of communications by jihadists. In fact, in Europe there have been several operations against suspected terrorists who have resulted in captured fans through online systems.
Forces of the US intelligence follow the line of terrorists Networks. Through this work, the Centre for Counter-terrorism of West Point located a manual in which the organisation lectured to their cells on how to protect their communications and preserve their cyber-security, according to Wired.
The document of 30 pages, offers amazing tricks. In fact it is simple tips that anyone can carry out in order to protect their privacy.
Isis’s great secret lies in the use of the Tor network, a browser that prevents the original IP user is located. In addition, they are betting on Telegram instead of WhatsApp thanks to the privacy it offers. Wickr cryptocat and also for chats; Hushmail and ProtonMail to send emails (although they can also use Gmail with false credentials when navigating with Tor) and Signal RedPhone to make encrypted calls.
They also ask to remove the option of location, an elementary measure for someone who lives in hiding but not for the jihadist who published a selfie in a logistics centre and ended bombed by the United States. General of the US Air Force directly Herbert Carlisle called them “bobo” terrorists.
For this reason-and others evident jihadists have prohibited the use of social networks.