Al-Qaeda usage of encryption after Snowden leaks (Part 2)

Web Intelligence experts at Recorded Future issued the second part of the analysis on the usage of encryption by Al-Qaeda after the Snowden leaks.

In May 2014 web intelligence firm Recorded Future published an interesting research on the use of encryption made by Al-Qaeda after the Snowden leaks. The study reported that members of Al-Qaeda are developing a series of new encryption software in response to NSA surveillance.

Since 2007, Al-Qaeda groups have developed the encryption software Mujahideen Secrets used to protect online and cellular communications, but according the report of the intelligence the militants are using different new encryption tools and communication channels (New services like mobile, instant messaging).

The below tools were designed starting from the Mujahideen Secrets tool used by terrorists of Al-Qaeda:

  1. Tashfeer al-Jawwal, a mobile encryption platform developed by the Global Islamic Media Front (GIMF) and released in September 2013.
  2. Asrar al-Ghurabaa, another alternative encryption program developed by the Islamic State of Iraq and Al-Sham and released in November 2013, around the same time the group broke away from the main Al-Qaeda following a power struggle.
  3. Amn al-Mujahid, an encryption software program developed by Al-Fajr TechnicalCommittee which is a mainstream Al-Qaeda organization and released in December 2013.

The second report published by Recorded Future with experts at ReversingLabs provides further details on the topic. Groups belonging to Al-Qaeda’s media arms are showing a growing interest in mobile technologyAndroid is the preferred platform for these groups due to the large availability and affordability of Android phones in their countries.


Since the first report provided by the Recorded Future firm, the group Al-Fajr released a new Android encryption app in June 2014 while GIMF also released a new version of their Android app.


According to the analysts, there is a strict correlation between Snowden leaks and the  increased pace of innovation in encryption technology by Al-Qaeda.

“Take your precautions, especially in the midst of the rapidly developing news about the cooperation of global companies with the international intelligence agencies, in the detection of data exchanged over smartphones.” is reported on the Tashfeer al-Jawwal download page.

 As Al-Qaeda has launched new software products and modules, are they using new crypto algorithms invented by themselves (“home-brew”) or adopting new algorithms available in the public?

Based on the analysis of the Recorded experts conducted through the reverse engineering of the encryption application used by the member of Al-Qaeda, the groups aren’t using home-brew encryption.

These products have been rumored to be infected with malware/backdoors of various sorts – inserted by governments and/or Al-Qaeda. Can we observe that?

Experts at Recorded Future asked to the colleagues at ReversingLabs to plot produce the detection rate of such encryption tool in the last years. The company observed that the detection rate rises from early 2011 reaching its maximum in early 2013 and then falls until now.


Despite intelligence agencies hare interested to infect such application to track terrorist groups the peak in the above graph is related to factors different from malware infection of the applications used by Al-Qaeda.

  • A spike in the usage of this encryption package by Al-Qaeda groups.
  • A trend of marking these applications as a possible vehicle of infection to make them less attractive for Jihadist to use.
  • It is not excluded that some applications used by groups of Al-Qaeda were intentionally infected with backdoors or malware in Asrar causing warnings on possible infection to persist.

Let’s continue to monitor together the technological evolution of Al-Qaeda groups, reports like this one are essential to profile the threat of such organization.

For futher details give a look to the report “How Al-Qaeda Uses Encryption Post-Snowden (Part 2) – New Analysis in Collaboration With ReversingLabs

Pierluigi Paganini

FAIR USE NOTICE: Under the "fair use" act, another author may make limited use of the original author's work without asking permission. Pursuant to 17 U.S. Code § 107, certain uses of copyrighted material "for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright." As a matter of policy, fair use is based on the belief that the public is entitled to freely use portions of copyrighted materials for purposes of commentary and criticism. The fair use privilege is perhaps the most significant limitation on a copyright owner's exclusive rights. Cyber Defense Media Group is a news reporting company, reporting cyber news, events, information and much more at no charge at our website Cyber Defense Magazine. All images and reporting are done exclusively under the Fair Use of the US copyright act.

Global InfoSec Awards 2022

We are in our 10th year, and these awards are incredibly well received – helping build buzz, customer awareness, sales and marketing growth opportunities, investment opportunities and so much more.