Researchers: ISIS Has Built A Secure Messaging App

In this June 16, 2014 file photo, demonstrators chant pro-Islamic State group, slogans as they carry the group's flags in front of the provincial government headquarters in Mosul.

AP Photo, File

AA Font size + Print

In this June 16, 2014 file photo, demonstrators chant pro-Islamic State group, slogans as they carry the group's flags in front of the provincial government headquarters in Mosul.

Facebook and other big tech companies aren’t the only ones who can create apps for encrypted communication.

UPDATE: Ghost Security Group has changed their statements about this research. Here is the followup report.

ISIS has a new Android app for exchanging secure messages, joining another app that distributes propaganda and recruiting material, according to a counterterrorism network called the Ghost Security Group.

Last month, Ghost Security and others, observed ISIS members using private messages on the Telegram app and direct messages on Twitter to send followers to a site (since vanished) to download the Amaq Agency app.

“The application’s primary purpose is for propaganda distribution. Using the app you are able to follow the most recent news and video clips.” Ghost Security representatives told Defense One. The Amaq Agency has known ties to Islamic State and issued statements in support of the attackers in the recent California shootings before all the details were publicly available. .

Shortly after, Ghost Security discovered a separate app called Alrawi.apk, or just “the Alrawi app,” Initially, they believed it to resemble the Amaq Agency app. But on Jan. 11, they discovered “encrypted communications features although rudimentary to Telegram or other more-company created ones,” a Ghost Security representative told Defense One in an email.

The app would join ISIS’ other known methods of communication to individuals and groups.  Among their favorite is Telegram, the a messaging app created by Pavel Durov, a Russian entrepreneur residing in Germany. Telegram allows encrypted communication to individuals, similar to Facebook’s WhatsApp; as well as a public broadcasting capability.

Immediately after the Paris attacks in November, credited to ISIS-affiliated gunmen, Telegram suspended 78 public ISIS-related channels in 12 languages. But Durov has made no promises that private chats could be shut down.

Here’s what today’s announcement from Ghost Security means if it’s true: even if FBI Director James Comey and others get their wish and providers of end-to-end encrypted communication are forced to put in back doors into their services or face banning, then ISIS would still have the ability to communicate securely, just not as securely as if they were using a service like Telegram or WhatsApp … at least not yet.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.