Security Manual Reveals the OPSEC Advice ISIS Gives Recruits

/isis-opsec-encryption-manuals-reveal-te

  • ISIS OPSEC manual advice:
    http://www.wired.com/2015/11/isis-opsec-encryption-manuals-reveal-terrorist-group-security-protocols

    There are no surprises among the documents. Most of the recommendations are the same that other civil liberties and journalist groups around the world advise human rights workers, political activists, whistleblowers and reporters to use to secure their communications and obscure their identity or hide their location. The appearance of this and other OPSEC documents in ISIS forums and social media accounts indicate that the jihadis have not only studied these guides closely, but also keep pace with the news to understand the latest privacy and security vulnerabilities uncovered in apps and software that could change their status on the jihadi greatest-hits list.

    It contains advice on:
    – How to use Twitter securely
    – How to take photos bearing in mind Exif, tagging, geolocation etc
    – The usage of encrypted phones (Cryptophone, Blackphone, SilentCircle)
    – How to transmit info when public networks are (made) unavailable
    – VPN software to use (Freedome, Avast SecureLine)
    – safe browsing (TorBrowser, also on Android & iPhone, Aviator browser, Opera Mini, TrueCrypt, VeraCrypt)
    – Use e-Mail security (HushMail, #ProtonMail, Tutanota
    – Instant Messaging (Threema, Telegram, SureSpot, Wickr, CryptoCat, IO SwissCom, PQChat, Sicher, even #iMessage)
    – How to use encrytped VoIP (Linphone, IO Swisscom, Silent Circle, RedPhone, Signal, and also #FaceTime)
    – safe Cloud storage (MEGA, SpiderOak, SugarSync, Copy.com,

    http://www.wired.com/wp-content/uploads/2015/11/ISIS-OPSEC-Guide.pdf
    backup: http://docdro.id/COUqJwe

    #OPSEC
    #cybersecurity