- How video game developer Valve got served secret subpoena as part of FBI’s counterterrorism fight 4 Years Ago
- Aron Eisenberg, ‘Star Trek: Deep Space Nine’ actor, dead at 50 Today 11:35 AM
- Who needs glass slippers? This Cinderella cosplayer upgraded with a stunning glass arm Today 10:19 AM
- How to check if Yahoo owes you $358 Today 9:25 AM
- How to stream Bears vs. Redskins on Monday Night Football Today 7:00 AM
- What are the best alternatives to the electoral college? Today 6:30 AM
- The best PS4 games you can’t play anywhere else Today 6:00 AM
- How to watch the 2019 Emmy Awards Today 5:00 AM
- How to stream ‘Power’ season 6, episode 5 Today 4:00 AM
- Former developer at software company deletes his code to protest its ties to ICE Saturday 4:21 PM
- A mysterious website is doxing Hong Kong protesters and journalists Saturday 1:44 PM
- The best ‘Skyrim’ followers and how to get them Saturday 1:26 PM
- Why Joel Osteen gets cyberbullied every time Houston floods Saturday 12:40 PM
- How to stream Jets vs. Patriots in Week 3 Saturday 12:39 PM
- 10 indie dating simulator games you should be playing Saturday 12:31 PM
The ISIS guide to staying anonymous online
These are good tips, even if you’re not a vicious terrorist.
Perhaps it shouldn’t be surprising, given the terrorist group’s social media savvy, that a reported Islamic State “Guide to remaining anonymous online” is actually pretty good.
The guide, some 8 months old but still in active circulation, is posted to justpaste.it, so there’s no way to fully verify it’s an Islamic State (ISIS) document. It’s both been referenced as such by experts, though, and a search shows that the first accounts to tweet that link have since been suspended or deleted—a common fate for ISIS Twitter accounts.
Inside, it details some best practices for staying anonymous online and for how to keep your communications private, complete with a list of specific apps and services to use. Save the references to how using good operational security brings glory to Allah, it’s not markedly different from any of the number of other guides that exist the Internet.
“The United States government, the government of the United Kingdom, France, and elsewhere, want to jail you. They want you to suffer. And they aren’t playing games,” it cautions. This is probably a good point, though less applicable for non-ISIS users. People from these countries caught trying to sneak off and join ISIS are often spotted through their online activity. It’s certainly true that the National Security Agency (NSA), as well as its U.K. counterpart, the Government Communications Headquarters (GCHQ), are have incredibly sophisticated online tracking tools, and are particularly interested in potential terrorists.
“For the most part, these tools help minimize a digital footprint and mask communications,” Whitney Merrill, a lawyer who specializes in information security, told the Daily Dot.
The shortlist of apps that the guide recommends? Using Ghost VPN and Tor to hide one’s tracks when browsing, to encrypt your email, to chat with Cryptocat or ChatSecure, and to encrypt your entire experience with the operating system TAILS.
While these privacy tools appear to be used by IS terrorists, they are popular among many journalists, activists, and experts who want to keep their identities a secret, and most come highly recommended by security experts.
Washington Post reporter Barton Gellman, a longtime proponent of encryption tools, recently told the Daily Dot that Tor and TAILS were part of his regular toolbox. National Security Agency whistleblower Edward Snowden has long recommended people encrypt their email. (He’s been known to use GNU Privacy Guard (GPG) for that.) “Ghost VPN” appears to refer to the CyberGhost virtual private network, one of a handful of VPNs that made the Guardian’s recent, similar guide.
“I ask [Allah] to hasten our venturing to the lands of jihad and hijrah, the lands in which there is no worry about people spying on private matters,” the guide reads. They’re not there yet, but they’ve taken a step.
Sarah Joy/Flickr (CC BY SA 2.0) | Remix by Fernando Alfonso III
A former senior politics reporter for the Daily Dot, Kevin Collier focuses on privacy, cybersecurity, and issues of importance to the open internet. Since leaving the Daily Dot in March 2016, he has served as a reporter for Vocativ and a cybersecurity correspondent for BuzzFeed.