Might 13, 2016 · 4:00 PM EDT
Player resources
Tune in to the tale.
ISIS makes use of an array of online tools, including TOR, VPNs, and encryption, to recruit supporters while remaining anonymous.
Whenever Sheera Frenkel began watching ISIS on line, she ended up being amazed by exactly exactly just how ordinary the conversations were. “They utilize a lot of emojis, ” Frenkel claims. “A great deal among these networks are simply a number of dudes mansplaining the net to one another. ”
Frenkel is BuzzFeed’s cybersecurity reporter, and she’s spent the final half a year finding out exactly just just how ISIS makes use of the web. Continue reading “How ISIS recruits online — using encryption, forums as well as online dating sites”