Terror Tech: How Jihadists and Terrorists Rely on US Tech

Jihadist groups, corrupt Middle Eastern governments, Al-Qaeda and even the anti-American forces in Iraq and Afghanistan regularly use U.S. technology to repress citizens and conduct terror campaigns, security experts told FoxNews.com. Read more

  • https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2018/09/918/516/adoberecruitment.png?ve=1&tl=1

    Teror Tech: Adobe recruitment

    This video uses Adobe SWF technology for playing an animation on the Web. It is a recruitment tool used by extremist groups to find new members.
    Jeff Bardin, Treadstone 71
  • https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2018/09/918/516/eset.png?ve=1&tl=1

    Terror Tech: Installer for ESET security package

    This installer for ESET is a complete security package that Bardin says an extremist group offers on the Web for other members to download and protect their activities.
    Jeff Bardin, Treadstone 71
  • https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2018/09/918/516/ebda2768-youtube.png?ve=1&tl=1

    Terror Tech: YouTube

    YouTube, owned by Google, is a common platform for posting videos related to jihad activities. Here, a video shows a biker gang about to attack U.S. military.
    Jeff Bardin, Treadstone 7
  • https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2018/09/918/516/2a71ef00-drone.jpg?ve=1&tl=1

    Terror Tech: drone

    In some cases, amateur surveillance drone enthusiasts release software plans and hardware specs online, which are then used by terror groups to build their own models.
    Jeff Bardin, Treadstone 71
  • https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2018/09/918/516/terrorvideo.png?ve=1&tl=1

    Terror Tech: video

    In this recruitment video, created with the video editing program Camtasia made by TechSmith in Michigan, an extremist group shows how to drive a tanker into a building.
    Jeff Bardin, Treadstone 71
  • https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2018/09/918/516/steganography.png?ve=1&tl=1

    Terror Tech: steganography

    Software with good intentions -- this steganography app was developed by Allan Latham -- is sometimes used for nefarious purposes: in this case, embedding jihadist plans in porn pictures.
    Jeff Bardin, Treadstone 71
  • https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2018/09/918/516/office.png?ve=1&tl=1

    Terror Tech: office

    Another extremist group created this portal (see the “powered by Melinda” note below the search field) for members to find serial numbers and download Microsoft software.
    Jeff Bardin, Treadstone 71
  • https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2018/09/918/516/kaspersky.png?ve=1&tl=1

    Terror Tech: kaspersky

    An industrious jihadist hacker made a pirated version of this encryption tool and released the instructions for using it, then posted the code for anyone to download.
    Jeff Bardin, Treadstone 71
  • https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2018/09/918/516/facebookmessage.png?ve=1&tl=1

    Terror Tech: facebook message

    This message on Facebook, which Bardin found on Google Groups, explains how to make e-mail for discussing jihadist plans more secure. The message has since been removed.
    Jeff Bardin, Treadstone 71
  • https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2018/09/918/516/googlegroups.png?ve=1&tl=1

    Terror Tech: google groups

    Jeff Bardin, Treadstone 71
  • https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2018/09/918/516/facebookrecruitment.png?ve=1&tl=1

    Terror Tech: facebook recruitment

    This message on Facebook, which Bardin found on Google Groups, explains how to make e-mail for discussing jihadist plans more secure. The message has since been removed.
    Jeff Bardin, Treadstone 71
Image 1 of 10