Tech advancement of terror outfits becoming nightmare for agencies
BY Chayanika Nigam15 Oct 2015 5:23 AM IST
Chayanika Nigam15 Oct 2015 5:23 AM IST
As security agencies have stepped up vigil on social media and emails, the terror outfits are now using ‘private servers’ to dodge them. According to the sources, the terror outfits through their sleeper cells, are hiring experts to develop private servers and special apps for their internal communication.
After knowing about the improvised technology used by the terror outfits, the security agencies are finding difficulty in tapping and tracking down the communication between the terrorists. Apart from the information exchange, funds are also being raised using these private servers.
However, the investigation agencies are learning gradually the advancement in technology adopted by terrorist groups to counter them.
According to sources, the Lashkar-e-Taiba is one of the terror outfits that is technologically sound. “The outfit has a dedicated technology wing with young minds. <g data-gr-id="48">Initially</g> they lure young boys studying in Engineering colleges or who are working with IT firms and offer them handsome packages. They are used to create private servers and underground websites,” he added.
The job of the recruited youths is to innovate and make sure that before and after every operation the communication is secure.
They are being paid several lakhs of rupees every month. The funding is also done by the religious institutes in India and other neighbouring countries.
The trend of ‘private servers’ came after Google play store flourished in the android world. Since then the outfits are creating their own apps on the private server. As a result, none of the communication is found on the open space.
“Only important members of the plan and attack are given access to such applications. It is like a closed user group comprising of around 5 to 10 persons who would be involved in the operation for which that particular app is created,” a source said.
An official in the investigation agency, requesting anonymity said: “Tor and Bitcoin are the internet browsers used by the terror outfits whereas Dark web and <g data-gr-id="44">signet</g> email services are being used to dodge the agencies.
These servers are located in the cloud or are also known as floating servers that cannot be traced. These browsers have multiple level servers, and not a particular server.”
“At times, they access unused server (a computer having internet connection but not being used by the user) by hacking the IP address. Throughout the usage of the unused server the owner remains unaware,” the official said.
By making use of the Tor service the <g data-gr-id="42">terrorists</g> groups can discuss and dissipate information related to their cause with no repercussion and due to the location of information being anonymised, the authorities can do little to stop it.
Next Story