In May 2014 web intelligence firm Recorded Future published an interesting research on the use of encryption made by Al-Qaeda after the Snowden leaks. The study reported that members of Al-Qaeda are developing a series of new encryption software in response to NSA surveillance.
Since 2007, Al-Qaeda groups have developed the encryption software Mujahideen Secrets used to protect online and cellular communications, but according the report of the intelligence the militants are using different new encryption tools and communication channels (New services like mobile, instant messaging).
The below tools were designed starting from the Mujahideen Secrets tool used by terrorists of Al-Qaeda:
The second report published by Recorded Future with experts at ReversingLabs provides further details on the topic. Groups belonging to Al-Qaeda’s media arms are showing a growing interest in mobile technology, Android is the preferred platform for these groups due to the large availability and affordability of Android phones in their countries.
Since the first report provided by the Recorded Future firm, the group Al-Fajr released a new Android encryption app in June 2014 while GIMF also released a new version of their Android app.
According to the analysts, there is a strict correlation between Snowden leaks and the increased pace of innovation in encryption technology by Al-Qaeda.
“Take your precautions, especially in the midst of the rapidly developing news about the cooperation of global companies with the international intelligence agencies, in the detection of data exchanged over smartphones.” is reported on the Tashfeer al-Jawwal download page.
As Al-Qaeda has launched new software products and modules, are they using new crypto algorithms invented by themselves (“home-brew”) or adopting new algorithms available in the public?
Based on the analysis of the Recorded experts conducted through the reverse engineering of the encryption application used by the member of Al-Qaeda, the groups aren’t using home-brew encryption.
These products have been rumored to be infected with malware/backdoors of various sorts – inserted by governments and/or Al-Qaeda. Can we observe that?
Experts at Recorded Future asked to the colleagues at ReversingLabs to plot produce the detection rate of such encryption tool in the last years. The company observed that the detection rate rises from early 2011 reaching its maximum in early 2013 and then falls until now.
Despite intelligence agencies hare interested to infect such application to track terrorist groups the peak in the above graph is related to factors different from malware infection of the applications used by Al-Qaeda.
Let’s continue to monitor together the technological evolution of Al-Qaeda groups, reports like this one are essential to profile the threat of such organization.
For futher details give a look to the report “How Al-Qaeda Uses Encryption Post-Snowden (Part 2) – New Analysis in Collaboration With ReversingLabs”
Security Affairs – (Al-Qaeda, encryption)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.