Counterintelligence & Counterterrorism

Counterintelligence & Counterterrorism

Share this post

Counterintelligence & Counterterrorism
Counterintelligence & Counterterrorism
Global terrorist groups' treasured interaction and recruitment platforms

Global terrorist groups' treasured interaction and recruitment platforms

Cyberterrorism upsurges simulating a global virtual Islamic Caliphate

Ajmal Sohail's avatar
Ajmal Sohail
Nov 02, 2024
∙ Paid
3

Share this post

Counterintelligence & Counterterrorism
Counterintelligence & Counterterrorism
Global terrorist groups' treasured interaction and recruitment platforms
4
Share
(PDF) Marketing and Advertising Terrorist Propaganda: An Analysis of ...

Exclusive: According to research and investigation, done by Counterintelligence & Counterterrorism Publication’s exploratory team, the findings indicate, Taliban and al-Qaeda currently relies less on modern technology and primarily communicate important messages through special coordinators or envoys to relevant militant jihadist groups. Whereas, Islamic State-Central and Islamic State Khorassan’s live off ultra-modern technologies. Nonetheless, the dead-drops and other old-school communication and exchange of information tools employed by AQ and Taliban often require significant time to ensure that the messenger safely reaches the designated group and location. Therefore, both Taliban and al-Qaeda must rely on modern communication applications for urgent messages that have a lower degree of confidentiality, in addition to using special coordinating representatives.

Taliban and Al-Qaeda currently use two methods for secure communications and message exchanges with other international jihadist organizations in Afghanistan.       The first method involves using secure applications, which are known for their strong data security features. Especially, applications ensure that all messages are transmitted through encryption and are automatically deleted after a short delay. The second method involves exchanging messages through coded communications during online gaming sessions after establishing secure teams.

The International terrorist networks’ preferable online applications

1- Signal: Signal is an encrypted application highly regarded for its privacy and security features. It offers encrypted messaging and calls, self-destructing messages, and minimal metadata retention…

This post is for paid subscribers

Already a paid subscriber? Sign in
© 2025 Ajmal Sohail
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share