
You've always knew it, I've always speculated on it, now I can finally provide a decent screenshot of cyber jihadist's howto recommending and taking the average reader step by step through the process of obtaining and using TOR -- a "rocket science" by itself. Following previous comments regarding
Jihadists' Anonymous Internet Surfing Preferences I also pointed out on the obsolesence of
Samping Jihadist IPs at various forums and sites, as it's both obvious and logical to consider that surfing, reconnaissance and communication is happening in a tunneled nature.
Related posts:Cyber Traps for Wannabe JihadistsMujahideen Secrets Encryption ToolThe Current State of Internet JihadCharacteristics of Islamist Web SitesA List of Terrorists' BlogsAn Analysis of the Technical Mujahid Issue OneAn Analysis of the Technical Mujahid Issue TwoTerrorist Groups' Brand Identities
No comments:
Post a Comment