Move Back
ADVERTISEMENT
Skip
  • Published
    11 Images

    Terror Tech: How Jihadists and Terrorists Rely on US Tech

    Jihadist groups, corrupt Middle Eastern governments, Al-Qaeda and even the anti-American forces in Iraq and Afghanistan regularly use U.S. technology to repress citizens and conduct terror campaigns, security experts told FoxNews.com. Read more

  • Teror Tech: Adobe recruitment
    This video uses Adobe SWF technology for playing an animation on the Web. It is a recruitment tool used by extremist groups to find new members.
    read more
    Jeff Bardin, Treadstone 71
  • Terror Tech: Installer for ESET security package
    This installer for ESET is a complete security package that Bardin says an extremist group offers on the Web for other members to download and protect their activities.
    read more
    Jeff Bardin, Treadstone 71
  • Terror Tech: YouTube
    YouTube, owned by Google, is a common platform for posting videos related to jihad activities. Here, a video shows a biker gang about to attack U.S. military.
    read more
    Jeff Bardin, Treadstone 7
  • Terror Tech: drone
    In some cases, amateur surveillance drone enthusiasts release software plans and hardware specs online, which are then used by terror groups to build their own models.
    read more
    Jeff Bardin, Treadstone 71
  • Terror Tech: video
    In this recruitment video, created with the video editing program Camtasia made by TechSmith in Michigan, an extremist group shows how to drive a tanker into a building.
    read more
    Jeff Bardin, Treadstone 71
  • Terror Tech: steganography
    Software with good intentions -- this steganography app was developed by Allan Latham -- is sometimes used for nefarious purposes: in this case, embedding jihadist plans in porn pictures.
    read more
    Jeff Bardin, Treadstone 71
  • Terror Tech: office
    Another extremist group created this portal (see the “powered by Melinda” note below the search field) for members to find serial numbers and download Microsoft software.
    read more
    Jeff Bardin, Treadstone 71
  • Terror Tech: kaspersky
    An industrious jihadist hacker made a pirated version of this encryption tool and released the instructions for using it, then posted the code for anyone to download.
    read more
    Jeff Bardin, Treadstone 71
  • Terror Tech: facebook message
    This message on Facebook, which Bardin found on Google Groups, explains how to make e-mail for discussing jihadist plans more secure. The message has since been removed.
    read more
    Jeff Bardin, Treadstone 71
  • Terror Tech: google groups
    Jeff Bardin, Treadstone 71
  • Terror Tech: facebook recruitment
    This message on Facebook, which Bardin found on Google Groups, explains how to make e-mail for discussing jihadist plans more secure. The message has since been removed.
    read more
    Jeff Bardin, Treadstone 71
  • Published
    11 Images

    Terror Tech: How Jihadists and Terrorists Rely on US Tech

    Jihadist groups, corrupt Middle Eastern governments, Al-Qaeda and even the anti-American forces in Iraq and Afghanistan regularly use U.S. technology to repress citizens and conduct terror campaigns, security experts told FoxNews.com. Read more

Move Forward
  • Terror Tech: How Jihadists and Terrorists Rely on US Tech
  • Teror Tech: Adobe recruitment
  • Terror Tech: Installer for ESET security package
  • Terror Tech: YouTube
  • Terror Tech: drone
  • Terror Tech: video
  • Terror Tech: steganography
  • Terror Tech: office
  • Terror Tech: kaspersky
  • Terror Tech: facebook message
  • Terror Tech: google groups
  • Terror Tech: facebook recruitment