There appears to have been a recent increase in discussion about operations security procedures among Islamic State (ISIS) supporters, including chatter about the dangers of malware and IP loggers. Many ISIS supporters and pro-ISIS groups have taken steps to mitigate these risks.
The full text of this report is available to MEMRI Jihad and Terrorism Threat Monitor subscribers.
Subscription information is available at this link.
JTTM subscribers can visit this page to view the report.