- People think novelist Dean Koontz predicted the coronavirus in 1981 thriller 5 Years Ago
- Twitter suspends 70 pro-Bloomberg accounts Today 9:15 AM
- In documentary ‘Modern Whore,’ a former escort takes control of her own narrative Today 6:30 AM
- Cara Delevingne calls out Justin Bieber for ‘ranking’ wife Hailey’s friends Friday 9:07 PM
- Fans defend Jenna Marbles after some people claimed she mistreated her dogs in a recent video Friday 8:37 PM
- ‘Friends’ gets reunion special on HBO Max, fans go wild Friday 7:37 PM
- Why you should drop everything and start reading ‘Lore Olympus’ Friday 6:27 PM
- ‘Boogaloo’ memes are trying to organize a second civil war—and they’re spreading fast Friday 3:48 PM
- People are disturbed by these McDonald’s-scented candles Friday 3:47 PM
- Season 2 of ‘The Witcher’ is in production Friday 3:16 PM
- Here are some cringey billboards Bloomberg ran in Arizona Friday 2:51 PM
- PewDiePie returns to YouTube after 37-day hiatus Friday 2:01 PM
- Why was a Republican Party Facebook page co-managed by someone in Turkmenistan? Friday 1:26 PM
- The shorthand guide to ‘Star Wars: The Clone Wars’ Friday 1:07 PM
- Congress urges Tinder to screen for sex offenders Friday 1:03 PM
The ISIS guide to staying anonymous online
These are good tips, even if you’re not a vicious terrorist.
Perhaps it shouldn’t be surprising, given the terrorist group’s social media savvy, that a reported Islamic State “Guide to remaining anonymous online” is actually pretty good.
The guide, some 8 months old but still in active circulation, is posted to justpaste.it, so there’s no way to fully verify it’s an Islamic State (ISIS) document. It’s both been referenced as such by experts, though, and a search shows that the first accounts to tweet that link have since been suspended or deleted—a common fate for ISIS Twitter accounts.
Inside, it details some best practices for staying anonymous online and for how to keep your communications private, complete with a list of specific apps and services to use. Save the references to how using good operational security brings glory to Allah, it’s not markedly different from any of the number of other guides that exist the Internet.
“The United States government, the government of the United Kingdom, France, and elsewhere, want to jail you. They want you to suffer. And they aren’t playing games,” it cautions. This is probably a good point, though less applicable for non-ISIS users. People from these countries caught trying to sneak off and join ISIS are often spotted through their online activity. It’s certainly true that the National Security Agency (NSA), as well as its U.K. counterpart, the Government Communications Headquarters (GCHQ), are have incredibly sophisticated online tracking tools, and are particularly interested in potential terrorists.
“For the most part, these tools help minimize a digital footprint and mask communications,” Whitney Merrill, a lawyer who specializes in information security, told the Daily Dot.
The shortlist of apps that the guide recommends? Using Ghost VPN and Tor to hide one’s tracks when browsing, to encrypt your email, to chat with Cryptocat or ChatSecure, and to encrypt your entire experience with the operating system TAILS.
While these privacy tools appear to be used by IS terrorists, they are popular among many journalists, activists, and experts who want to keep their identities a secret, and most come highly recommended by security experts.
Washington Post reporter Barton Gellman, a longtime proponent of encryption tools, recently told the Daily Dot that Tor and TAILS were part of his regular toolbox. National Security Agency whistleblower Edward Snowden has long recommended people encrypt their email. (He’s been known to use GNU Privacy Guard (GPG) for that.) “Ghost VPN” appears to refer to the CyberGhost virtual private network, one of a handful of VPNs that made the Guardian’s recent, similar guide.
“I ask [Allah] to hasten our venturing to the lands of jihad and hijrah, the lands in which there is no worry about people spying on private matters,” the guide reads. They’re not there yet, but they’ve taken a step.
Sarah Joy/Flickr (CC BY SA 2.0) | Remix by Fernando Alfonso III
A former senior politics reporter for the Daily Dot, Kevin Collier focuses on privacy, cybersecurity, and issues of importance to the open internet. Since leaving the Daily Dot in March 2016, he has served as a reporter for Vocativ and a cybersecurity correspondent for BuzzFeed.