Creative Commons License
Where the stuff on this blog is something i created it is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License so there are no requirements to attribute - but if you want to mention me as the source that would be nice :¬)

Friday, 20 March 2015

4 things you may not have know about how #terrorists & criminals approach online #anonymity & 3 #recommendations for addressing such

Via the tweet below I recently came across the March 2015 Demos paper it mentions "online anonymity islamic state and surveillance" by Jamie Bartlett & Alex Krasodomski-Jones.

MT ISIS encrypting better, but online privacy benefits still outweigh cost. My new paper

Jamie Bartlett is Director of the Centre for the Analysis of Social Media at Demos and Author of The Dark Net.  Alex Krasodomski-Jones is a Research Associate at Demos.

(the summary of the open access conditions under which the paper was published is at the foot of this post)

having read the paper here are

4 things you may not have known about how terrorists & criminals approach online anonymity

1) since at least 2007 Islamist terrorists have released their own encryption software (p3 of the paper)

2) links to videos & other material are often initially posted via sharing boards like justpasteit so followers can download such and so repost the material under different names when the original material is taken down by companies or authorities (p4 of the paper)

3) examples of existing or soon to be developed encryption software are Tor, PGP based, mailpile, the Ethereum Project, namecoin, bitmessage, twister, ghostvpn, tails, cryptocat and darkmail (p4 to 12 of the paper)

4) indeed terrorists appear to share technical advice on such software via it (p8 to 12 of the paper has the text from an example of such an technical advice post)

recommendations to address these issues (page 16 & 17 of the paper)

1) more human agents to gather intelligence

2) better oversight and scrutiny of government intelligence & security departments

3)  form alliances with groups like Anonymous who can disrupt terrorist and criminal organisations activities on the internet

No comments:

Post a Comment