{"id":24198,"date":"2014-06-23T16:41:05","date_gmt":"2014-06-23T20:41:05","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24198"},"modified":"2014-06-23T16:41:05","modified_gmt":"2014-06-23T20:41:05","slug":"kenya-al-qaeda-using-new-encryption-software-to-defy-u-s-intelligence-tracking","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/kenya-al-qaeda-using-new-encryption-software-to-defy-u-s-intelligence-tracking.php","title":{"rendered":"Kenya: Al Qaeda Using New Encryption Software to Defy U.S. Intelligence Tracking"},"content":{"rendered":"<p><p>    A new report shows that Al Qaeda and associate firms are using    new encryption software in a bid to defy US intelligence    tracking.  <\/p>\n<p>    The report from an intelligence firm called Recorded Future    states that since 2007, Al-Qaeda's use of encryption technology    has been based on the Mujahideen Secrets platform which has    developed to include support for mobile, instant messaging, and    Macs.  <\/p>\n<p>    Following the June 2013 Edward Snowden leaks about the National    Security Agency's intelligence programme, the study also    reveals an increased pace of innovation, specifically on new    competing jihadist platforms and three major new encryption    tools from three different organizations - GIMF, Al-Fajr    Technical Committee, and ISIS - within a three to five-month    time frame of the leaks.  <\/p>\n<p>    Al-Qaeda (AQ) has been using encryption technology in various    forms for a long time. The original Mujahideen Secrets is the    most common one, but recently there have been multiple new    encryption products as well as adaptations to new platforms    like mobile, instant messaging, and Mac.  <\/p>\n<p>    \"The nature of these new crypto products indicates strategy to    overlay stronger and broader encryption on Western (mainly US)    consumer communication services. We do not find evidence of    abandonment of US-based consumer communication services. Likely    risks are still greater to hide outside the consumer crowd, and    non-US-based services may be exposed to even stronger lawful    intercept,\" stated the study  <\/p>\n<p>    The Recorded Future timeline also laid out key developments    from 2007 to date and according to them, the original    Mujahideen Secrets (Asrar al-Mujahideen) encryption software    launched in 2007 was primarily for use with email. Asrar has    had multiple releases over time and is distributed by the    Global Islamic Media Front (GIMF).  <\/p>\n<p>    The second crypto Development was Asrar al-Dardashah, released    by GIMF in February 2013, which is an encryption plugin for    instant messaging based on the Pidgin platform - which connects    to major US-based platforms. Later on, GIMF released Tashfeer    al-Jawwal in September 2013 based on Symbian and Android and is    a mobile encryption program.  <\/p>\n<p>    Asrar al-Ghurabaa is yet another alternative encryption    program, however importantly, released in November 2013 by    Islamic State Of Iraq And Al-Sham (ISIS), which coincides with    ISIS breaking off from main AQ after a power struggle and Amn    al-Mujahid is an alternative encryption program released in    December 2013. In this case from Al-Fajr Technical Committee    (FTC) which is also a mainstream AQ outfit.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/allafrica.com\/stories\/201406230421.html\/RK=0\/RS=6KhZpLWIn0oT9srq20yMmTUwO0U-\" title=\"Kenya: Al Qaeda Using New Encryption Software to Defy U.S. Intelligence Tracking\">Kenya: Al Qaeda Using New Encryption Software to Defy U.S. Intelligence Tracking<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A new report shows that Al Qaeda and associate firms are using new encryption software in a bid to defy US intelligence tracking. The report from an intelligence firm called Recorded Future states that since 2007, Al-Qaeda's use of encryption technology has been based on the Mujahideen Secrets platform which has developed to include support for mobile, instant messaging, and Macs. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-24198","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24198"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24198"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24198\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}