- Sputnik International
World
Get the latest news from around the world, live coverage, off-beat stories, features and analysis.

Encryption Tips From Daesh: New Booklet Offers Jihadists Online Advice

© Sputnik / CollageEncryption tips from Daesh
Encryption tips from Daesh - Sputnik International
Subscribe
Britain's Home Secretary Theresa May is appearing before a parliamentary committee to defend controversial measures included in the proposed surveillance bill, dubbed the Snoopers' Charter. The Investigatory Powers Bill is subject to parliamentary scrutiny before it becomes law.

Theresa May has already received a warning from big Internet technology companies, including Apple, Google, Facebook and Twitter that proposals to allow police and security agencies the authority to access confidential data will compromise customer's right to anonymity and weaken encryption services.

The updated bill would also force Internet service providers to store the browsing history of every website you have visited for a year in order to bulk collect swathes of communications data, whilst keeping it.

If passed, the law would allow British authorities to look at every text message, every email, every website visited — without needing a warrant.

The demands for access to encryption services has led to concerns from technology firms, including Apple which states that if companies are forced by the government to provide encrypted data, then it would mean that the "key left under the doormat would not just be there for the good guys".

"The bad guys would find it too," said Apple.

Those "bad guys", with links to Daesh, also known as Islamic State, have recently updated their guidelines for would-be jihadists in a new booklet, which includes advice for slipping beneath the radar online.  

The disturbing new guidebook has been translated from Arabic into English and offers advice on how to virtually evade the security agencies on the Internet — and remain inconspicuous in public.

Sinister advice in the handbook includes a list of encrypted software that can be used to disguise the content of emails and mobile phone conversations in a direct attempt to avoid detection online.

Forensic police search for evidences outside the La Belle Equipe cafe, rue de Charonne, at the site of an attack on November 14, 2015 in Paris, after a series of gun attacks occurred across the city. More than 100 people were killed in a mass hostage-taking at a Paris concert hall and many more were feared dead in a series of bombings and shootings, as France declared a national state of emergency - Sputnik International
'Cross Necklaces': Daesh Gives Advice on How to Blend in to Launch Attacks

However, the home secretary hopes the new surveillance bill will force Internet and mobile phone companies to allow authorities access to the encrypted data, to keep tabs on potential terrorists.

The 62-page "safety and security guidelines for lone wolf mujahedeen and small cells" has been published as a resource for any potential "lone wolf" terrorists; but could almost serve as a dummy's guide to becoming a jihadi.

The booklet offers basic advice like leaving a prayer mat behind, carrying enough cash and making sure all the fake documents have the same name on it.

"A lot of brothers have been caught out because of that," the guidebook says.

According to Britain's Prime Minister David Cameron and the UK's security services, seven terrorist plots were foiled in Britain in 2015.

Newsfeed
0
To participate in the discussion
log in or register
loader
Chats
Заголовок открываемого материала