- Black man films ‘Crosswalk Cathy’ yelling racist slurs at him Tuesday 6:47 PM
- Guerrilla artists turn John Oliver billboard ad into right-wing meme Tuesday 4:20 PM
- Netflix lines up unnecessarily good cast for ‘Green Eggs and Ham’ Tuesday 3:48 PM
- Netflix drops trailer for Mötley Crüe biopic ‘The Dirt’—and the cast is wild Tuesday 3:41 PM
- QAnon’s repetitive posts are alienating even his most ardent supporters Tuesday 3:36 PM
- Noah Cyrus cries on Instagram after Lil Xan’s baby announcement Tuesday 2:26 PM
- The ‘Well yes, but actually no’ meme is here to help you explain things Tuesday 12:07 PM
- Judge orders Roger Stone to appear in court after his Instagram post Tuesday 11:24 AM
- I worked with the migrant caravan—and Trump is the cause of his national emergency Tuesday 11:09 AM
- How to watch Liverpool vs. Bayern Munich online for free Tuesday 11:08 AM
- ‘Patriot Act’ volume 2 proves Hasan Minhaj is the next big star of the news-comedy genre Tuesday 11:01 AM
- ‘Friends From College’ canceled after 2 seasons at Netflix Tuesday 10:53 AM
- Allow your wallet to be your spirit guide during this rad anime sale Tuesday 10:43 AM
- Man stages fake DUI trial to propose to girlfriend, and people are asking why Tuesday 10:40 AM
- Bernie Sanders’ website full of 404s on launch day Tuesday 10:23 AM
These are good tips, even if you’re not a vicious terrorist.
Perhaps it shouldn’t be surprising, given the terrorist group’s social media savvy, that a reported Islamic State “Guide to remaining anonymous online” is actually pretty good.
The guide, some 8 months old but still in active circulation, is posted to justpaste.it, so there’s no way to fully verify it’s an Islamic State (ISIS) document. It’s both been referenced as such by experts, though, and a search shows that the first accounts to tweet that link have since been suspended or deleted—a common fate for ISIS Twitter accounts.
Inside, it details some best practices for staying anonymous online and for how to keep your communications private, complete with a list of specific apps and services to use. Save the references to how using good operational security brings glory to Allah, it’s not markedly different from any of the number of other guides that exist the Internet.
“The United States government, the government of the United Kingdom, France, and elsewhere, want to jail you. They want you to suffer. And they aren’t playing games,” it cautions. This is probably a good point, though less applicable for non-ISIS users. People from these countries caught trying to sneak off and join ISIS are often spotted through their online activity. It’s certainly true that the National Security Agency (NSA), as well as its U.K. counterpart, the Government Communications Headquarters (GCHQ), are have incredibly sophisticated online tracking tools, and are particularly interested in potential terrorists.
“For the most part, these tools help minimize a digital footprint and mask communications,” Whitney Merrill, a lawyer who specializes in information security, told the Daily Dot.
The shortlist of apps that the guide recommends? Using Ghost VPN and Tor to hide one’s tracks when browsing, to encrypt your email, to chat with Cryptocat or ChatSecure, and to encrypt your entire experience with the operating system TAILS.
While these privacy tools appear to be used by IS terrorists, they are popular among many journalists, activists, and experts who want to keep their identities a secret, and most come highly recommended by security experts.
Washington Post reporter Barton Gellman, a longtime proponent of encryption tools, recently told the Daily Dot that Tor and TAILS were part of his regular toolbox. National Security Agency whistleblower Edward Snowden has long recommended people encrypt their email. (He’s been known to use GNU Privacy Guard (GPG) for that.) “Ghost VPN” appears to refer to the CyberGhost virtual private network, one of a handful of VPNs that made the Guardian’s recent, similar guide.
“I ask [Allah] to hasten our venturing to the lands of jihad and hijrah, the lands in which there is no worry about people spying on private matters,” the guide reads. They’re not there yet, but they’ve taken a step.
Sarah Joy/Flickr (CC BY SA 2.0) | Remix by Fernando Alfonso III
A former senior politics reporter for the Daily Dot, Kevin Collier focuses on privacy, cybersecurity, and issues of importance to the open internet. Since leaving the Daily Dot in March 2016, he has served as a reporter for Vocativ and a cybersecurity correspondent for BuzzFeed.