Terrorists prefer to chat on Telegram and email with Gmail 恐怖份子喜歡用通訊軟體Telegram及電子郵件Gmail通訊

A new report shows which technology tools are being used by jihadists when they plot attacks against the West.一項新的報導指出聖戰士在策劃對抗歐洲時,使用許多科技產品。

ISIS and fellow jihadists are chatting on Signal, Telegram and WhatsApp to hide their plans. And they prefer Gmail over Yahoo Mail.
ISIS及聖戰士同夥在Singal、Telegram及WhatsApp上通訊來隱藏他們的計畫,而且他們比較偏好Gmail勝過Yahoo郵件。







The free, mobile chatting service Telegram -- which is anonymous and encrypted -- is used by 34% of jihadists whose communications were the subject of a study by cybersecurity firm Trend Micro .
這一個免費的行動通訊服務軟體Telegram,它是匿名並加密,34%將此軟體用來互通訊息的聖戰士是網路安全公司趨勢科技(TMICF)此次研究的主要調查對象。

Researchers monitored terrorist Internet forums and cataloged the listed contact information on 2,301 user accounts.
調查者監視恐怖組織的網路論壇及編列2301個用戶的帳號聯絡資訊。

This study confirms previous research that ISIS uses Telegram to exchange secret messages. Telegram was started by a Russian tech entrepreneur who champions privacy and freedom.
這項研究確認了前一個調查,ISIS使用Telegram來交換秘密情報,Telegram是由一間主張隱私及自由的俄羅斯科技公司所創立。



This is an example of a popular jihadist "channel" on Telegram.
這是一個Telegram熱門的聖戰士頻道
Other free chatting apps popular with jihadists are Signal, Facebook's WhatsApp, and Wickr. Each is used by roughly 15% of jihadists.
其他聖戰士之間常用的免費聊天軟體分別是Signal、臉書、WhatsAppWickr,每一個都大約有15%的聖戰士使用。

In their report, researchers said WhatsApp actually dropped in popularity after reports that investigators managed to make 16 arrests in anti-terror raids by spying on WhatsApp.
在他們的報告中,調查者表示在這份調查設法透過在WhatsApp臥底做反恐襲擊發生16次逮捕之後,WhatsApp實際上的使用人數開始下降。

A small fraction of jihadists use lesser known chatting services, like surespot and Threema.
一小部分的聖戰士使用較不知名的通訊軟體,像是surespotThreema

All offer encryption, which turns plain text conversations into jumbled code. This makes it extremely difficult -- sometimes impossible -- for government spies to conduct surveillance.
全都提供加密功能,可以把一般的文字對話轉成複雜的暗碼,這些讓政府的臥底要監控都會變得極度困難,有時候甚至是不可能。

Indeed, experts say ISIS is getting harder to track.
的確,專家表示ISIS漸漸變得難以追蹤。

FBI Director James Comey has warned this feature lets terrorists hide plans by "going dark." But the alternative -- limiting encryption -- has the self-defeating effect of putting everyday communication like banking and infrastructure at risk from hackers and terrorists themselves.
聯邦調查局局長James Comey告這個功能讓恐怖分子可以躲到暗處,把計畫藏起來,但是替代方案,限制加密,又會有弄巧成拙的影響,讓像是銀行、公共建設每天的通訊暴露於駭客及恐怖份子的風險之中。

Then there's email.
而還有電子郵件。

Gmail is the standard email service used by 34% of jihadists, according to Trend Micro.
Gmail是被34%的聖戰士所使用的標準電子服務,根據趨勢科技表示。

This shows terrorists have simply gravitated toward the most popular email service in the world, which now has 1 billion users.
這也顯示恐怖份子有些微被世界上最受歡迎的電子郵件服務(現在有十億用戶)所吸引。

But that just hides a person's name. The FBI can still track down the physical location of a Gmail user by asking Google to reveal the user's unique Internet Protocol address. Federal agents do this frequently.
但是這會把一個人的姓名隱藏,聯邦調查局仍然可以透過Google來揭露用戶的IP位址,追蹤真正的Gmail用戶位置,聯邦調查機構常常這麼做。

Obscure email services called Mail2Tor and SIGAINT come in second and third place, each drawing roughly 20% of jihadists.
名叫Mail2T SIGAINT,擁有匿名功能的電子郵件服務,分別是第二及第三名,每一個都有大約20%的聖戰士使用。

These email services are particularly hard for law enforcement to track, because they operate within a realm of the Internet that's largely anonymous, Tor.
這些電子郵件服務對於法律執行來追蹤尤為困難,因為他們是透過一個大部分都採取匿名方式的網域-Tor(洋蔥路由器)來運作。

Tor is a system that encrypts and bounces Internet signals around the globe. It helps you evade censors when surfing the Web -- and it hides your computer's true location. In this case, Tor also hides who's using Mail2Tor and SIGAINT for email.
Tor是一個加密和回傳全球網路信號的系統,它可以幫你在上網的時候,躲避偵測器,且它可以隱藏你的電腦真正的位置,如此一來,Tor也可以隱藏使用Mail2TorSIGAINT軟體的電子郵件。

There's some evidence that the FBI has been able to hack Tor users to figure out their true location. But it's not known as a common tactic.
有一些證據顯示FBI有能力可以入侵Tor的使用者,來找出他們的位置,但是這些並不是常用的策略。

RuggedInbox and Yahoo Mail are less popular email options, according to researchers.
根據調查者表示,RuggedInboxYahoo的郵件是比較不受歡迎的電子郵件選擇。
The Trend Micro study also looked at the unique, custom-built tools that jihadists built themselves to plot in secret.

趨勢科技的研究也瞄準聖戰士自己偷偷建設獨特、客製的工具,可以秘密的進行策劃。
A tool called Mojahedeen Secrets, which encrypts email, was released in 2007 as an alternative to the popular privacy software PGP. It was the first professional-looking software made specifically for Islamic extremists. It's unclear who created it.
有一個工具叫做Mojahedeen Secrets,是一個加密的電子郵件,於2007年推出,作為受歡迎的隱私軟體PGP的替代方案,這是第一個伊斯蘭極端份子所特別開發出來外觀看起來專業軟體,並不清楚開發者是誰。


Jihadists use the program Mojahedeen Secrets to encrypt email.
聖戰士使用Mojahedeen Secrets 程式來加密信件


Jihadists also created a tool, called Asrar al-Dardashah, that easily latches onto the universal chatting software Pidgin. It lets them encrypt conversations between AIM, Google Talk, MSN, and Yahoo accounts.
聖戰士也開發了工具,稱為Asrar al-Dardashah,可以輕易的連接上全球的通訊軟體Pidgin,它讓聖戰士們可以加密的在AIMGoogle TalkMSNYahoo帳號上通訊。

There are established organizations that churn out this jihadist software, according to researchers.
有一些組織成立是為了大量開發這些聖戰士用的軟體,根據調查者表示。

In 2013, a group called the Global Islamic Media Front created an app called Tashfeer al-Jawwal, which encrypts mobile devices.
2013年,有一個團體叫做Global Islamic Media Front,創造了一個app叫做Tashfeer al-Jawwa,可以加密行動裝置。

That same year, a group called the Al-Fajr Technical Committee developed a tool that encrypts email and text messages, Amn al-Mujahed.
而同年,有一個組織叫做Al-Fajr Technical Committee,發展了一個工具可以加密電子郵件和文字訊息的軟體Amn al-Mujahed

Not everything is guaranteed to work, said cybersecurity expert Robert Graham.
網路安全專家Robert Graham表示不是所有事情都可以保證有用。

Amn al-Mujahed encrypts messages on email, SMS, and instant messages.
Amn al-Mujahed加密電子郵件、SMS及即時通訊訊息。


It can be challenging for terrorists to build their own secrecy tools.
"Some of their tools are simple wrappers on existing [Western] tools.
In other cases, it's new code, which is likely to get them caught," Graham said. "Even experts like me would be afraid of creating new cryptographic code."
對於恐怖份子建造他們自己的秘密工具可能是具有挑戰性的,Graham表示:「他們有些工具只是將現存的西方工具在表面上做一些簡單的改變,在其他情況下,都是新的密碼,而這會讓他們更容易被抓到,甚至像我一樣的專家都會害怕創造新的加密代碼」。

原文網址:http://goo.gl/pDiaTC


這個網誌中的熱門文章

China opens former nuclear plant to tourism 中國前核電廠 對外開放觀光

Sky show: How to see the northern lights in Iceland 天空秀:要如何在冰島看到極光

French election 2017: The economic challenge 2017法國總統大選:經濟挑戰