An Extremist's Guide to Life Online
To bolster secrecy, militants use hidden images on computers, Internet messaging services, voice calls over the Internet, and encryption software including a jihadist-developed encryption program called Asrar al-Mujahideen, according to terrorism analysts.
Top