The Cyber Jihad

It's no secret that terrorists use the Internet to communicate, but the use is becoming more sophisticated, according to Jeff Bardin, a blogger for CSO online. Bardin, who worked for the National Security Agency and served as a chief security information officer for several private corporations, recently downloaded the Mujahedeen Secrets 2 Program (????????? // ??????? ???????????) and wrote in his blog:

This toolset provides groups like Al-Qaw-eda methods to securely transmit and wipe their files. Not that they haven’t had such tools in the past, but a second edition toolset demonstrates a software development lifecycle with some level of sophistication and planning.

Bardin said a look at the tool set -- which contains automatic (instantaneous-instant) message/messaging encryption/authentication and file encryption, as well as code signing and checking (digital signature creation/checking) and file shredding -- "reinforced [his] decision that the cyber jihad is ongoing and continuous."

Bardin wrote that Secrets 2 was easy to find, and that this comment from ‘alHambra’ was posted on the download site:

Mujahedeen Secrets #2 (Encryption Program) has been released today, and i just took a short look at it, but it is really a vast improvement compared to the first version, and seems like a really nice encryption program now. here's post and downloadinfo...

NEXT STORY: Web Headlines