Home Why Everyone Needs To Read This Jihadist Manual For Web Safety

Why Everyone Needs To Read This Jihadist Manual For Web Safety

There’s plenty of advice on how to secure your computer and smartphone, but most are targeted at law-abiding citizens looking to maintain personal privacy. One online publication, however, just released a guide for would-be Jihadists to keep clandestine plans from prying eyes.

The unpleasant realization you get while reading it: While it’s sound advice for terrorists looking to keep off the grid, some of it also makes sense for the rest of us, too.

Al-Minbar Jihadi Media Network, a well-known Islamic extremist organization, just published a new magazine with step-by-step directions for keeping plans private from the NSA or other government bodies. The 12-page online publication, first reported by The Wall Street Journal and translated by SITE Intel Group (subscription required), gives a series of suggestions for Internet security. And many apply to anyone interested in security.

Among the tips offered to the would-be extremist:

  • Don’t trust anyone you meet online; use a different identity with everyone with whom you deal
  • A phone can reveal your exact location [so] remove your phone battery and SIM before going to a sensitive location
  • A laptop used for accessing the Internet shouldn’t be used for any other work
  • Delete all messages after every exchange [pf course, nothing is ever truly deleted in the digital world… unless you really, truly go about it properly]
  • Memorize your passwords [terrorists don’t affix passwords on sticky notes to their machines, and neither should you]
  • Don’t go online with your regular phone; go offline when you’re done
  • Put no true information in any website registration [for years we’ve known that our online identities are stitched together by legitimate businesses—the more we give accurate information online, the easier it is to identify us for advertising and other activities]
  • Tape over the front camera of your mobile phone [because “most mobile phones, including the iPhone and Galaxy, take a picture of your face”]
  • Disguise your voice when making phone calls

Some of these are clearly excessive for law-abiding types, and really only make sense for someone trying to hide illegitimate activities. Few of us, for example, really need to remove the batteries and SIM cards from our phones, even if we’re trying to hide our repeat visits to McDonalds after promising our partner we’re adhering to a diet.

A terrorist obviously doesn’t want to inadvertently reveal his identity by mixing personal communications on a machine he uses to carry out his mission. Though less serious in scope, people also shouldn’t put themselves in a position to be fired for personal activities that might put one’s job at risk. Having an affair with your boss? That’s bad policy, anyway, but particularly if you send emails to her work address.

Think of disgraced former CIA director David Petraeus, who reportedly used a technique popular with terrorists to keep emails to biographer Paula Broadwell, with whom he was having an affair, safe from detection.

Other suggestions in the how-to indicate issues that might apply to terrorists now, but are quickly becoming mainstream issues. For example, most of us don’t think twice about our phone’s camera until we’re ready to snap a photo of that food we ordered. But malware already exists that allows someone to hijack your smartphone and surreptitiously snap photos of you and your surroundings constantly. Yes, it might be the NSA spying on you, but unless you’re a would-be terrorist, it’s more likely to be your perverted neighbors, as one British woman discovered to her surprise

Either way, it’s unpleasant. And it’s a suggestion of where mobile security is going to need to go to handle the emerging needs of mainstream consumers, first revealed by would-be terrorists. The terrible tension here: The same techniques that make it harder for law enforcement to catch terrorists before they act may be necessary to keep our private lives private.

Image courtesy of Shutterstock

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.