Pro-ISIS Tech Body Publishes Tutorial On Encryption Utility VeraCrypt On Telegram

November 3, 2017

On October 14, 2017, the Telegram channel of a pro-Islamic State (ISIS) technical body published a tutorial on installing and using VeraCrypt, an open-source disc encryption utility.

The tutorial includes a step-by-step guide to downloading, installing, and using the basic features of the program.

It also shows techniques that users should follow to create hidden files within the encrypted file container as well as ways to hide even the existence of VeraCrypt on the user's computer. Below are excerpts from the guidelines in the original English. The group released the guidelines in Arabic and English.

Following The Initial Download Of VeraCrypt

"Firstly, delete the program that you downloaded from the [VeraCrypt] site, because we have extracted the required files and if your computer is hacked, investigators do not know about VeraCrypt, and then continue to install VeraCrypt through extracted files."

Combining Three Encryption Schemes

"Select AES-Twofish-Serpent, this option [is] to encrypt files with 3 algorithms, if the attacker can decrypt one algorithm, [he or she] will not be able to decrypt the other algorithms."

 

The full text of this report is available to MEMRI Jihad and Terrorism Threat Monitor subscribers.

Subscription information is available at this link.

JTTM subscribers can visit this page to view the report.

Jihad and Terrorism Threat Monitor

JTTM subscribers receive daily updates on imminent and potential threats posed by terrorists, extremist organizations, and individuals worldwide.
For subscription information, click here

Share this Post: