Are ISIS Geeks Using Phone Apps, Encryption to Spread Terror?

Senior European intelligence officials tell NBC News that France’s ability to prevent attacks like Friday’s massacre is now challenged by the increasing ability of ISIS to operate under the radar, as a squad of jihadi cybergeeks train would-be terrorists how to keep their electronic communications secret.

One senior European counterterrorism official said the region’s authorities have been “alarmed for quite some time” at ISIS’ use of young cyber experts to stay several steps ahead of law enforcement.

“When you look at how sophisticated Daesh is in its use of social networks,” he said, using an Arabic name for ISIS, “it suggests that there are geeks behind this. … Among the foreign [ISIS] fighters, you have people who are IT savvy [and] keep up with the technological developments.”

Officials believe the ISIS geek squad is teaching terrorists how to use encryption and communication platforms like Silent Circle, Telegram and WhatsApp.

Aaron F. Brantly said he and his colleagues at the U.S. Army-affiliated Combating Terrorism Center have found that Islamic State members use as many as 120 separate platforms, many of them encrypted, to communicate and share information. One of its most favored methods, he said, is a highly encrypted form of communication called Telegram.

“It essentially allows them to hide what they are discussing from people who aren’t explicitly looking for it,” especially law enforcement and intelligence agencies, Brantly said. “Obviously this is a major concern. … They are creating a space for themselves to operate independent of direct surveillance.”

The senior European counterterrorism official said that European authorities are gravely concerned and will meet this week to discuss the issue – though they are already becoming contentious with each other about their lack of options. Some are restricted by civil liberties concerns in their home countries, while others note that creating a “back door” in an electronic communication platform – meaning a way for governments to spy on messages in real time – also creates an opportunity for non-governmental groups to take a peek. When Greece put a “back door” in electronic communications passing through its territories, it was quickly exploited by hackers.

“I am waiting for somebody to show me a way we can do this that is guaranteed to be only used by the good guys,” said Paul Rosenzweig, a cyber consultant and former deputy assistant secretary in the U.S. Department of Homeland Security. “But it is not person-specific. Anything that we can create can, and will, be cracked.”

Jihadis have always used whatever communication platforms are available as soon as they become available. Officials have monitored multiplayer on-line games like World of Warcraft for jihadi meetups, and also believe that they use gaming consoles like PlayStation 4 to converse with each other. A Belgian official noted that a PlayStation console was found in one of the locations raided after Friday’s attacks. Rosenzweig said that jihadis also used to use Second Life, an on-line virtual world created more than a decade ago, to communicate and perhaps even to transfer money.

Rosenzweig said that U.S. officials have been concerned about ISIS and al Qaeda use of newer secure communications platforms like WhatsApp and Telegram for as long as they have existed.