• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia

Trendingnow

1

Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI

2

Former top Russian official admits the country is over Putin and can 'imagine a future without him' — even elites bail as Kremlin seizes their assets 

3

The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises

1

Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI

2

Former top Russian official admits the country is over Putin and can 'imagine a future without him' — even elites bail as Kremlin seizes their assets 

3

The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
TechChanging Face of Security

The Many Ways Terrorists Communicate Online

By
Don Reisinger
Don Reisinger
Down Arrow Button Icon
By
Don Reisinger
Don Reisinger
Down Arrow Button Icon
May 3, 2016, 12:25 PM ET
Mideast Syria Iraq
FILE - This undated file image posted on a militant website on Tuesday, Jan. 14, 2014, which has been verified and is consistent with other AP reporting, shows fighters from the al-Qaida linked Islamic State of Iraq and the Levant (ISIL), now called the Islamic State group, marching in Raqqa, Syria. U.S. President Barack Obama on Wednesday, Sept. 10, 2014 ordered the United States into a broad military campaign to “degrade and ultimately destroy” militants in two volatile Middle East nations, authorizing airstrikes inside Syria for the first time, as well as an expansion of strikes in Iraq. (AP Photo/Militant Website, File)Militant Website—AP

Terrorists need to communicate, too. And how they do it might surprise you.

Security firm Trend Micro recently analyzed thousands of alleged terrorist accounts to see how they communicate online. The company found that Google’s (GOOG) Gmail was the most popular email application among terrorists it analyzed, accounting for 34% of all accounts. Next up was the encrypted Mail2Tor with 21%, followed by other secure services, like Sigaint at 19% market share. Interestingly, Yahoo (YHOO) Mail also found its way into the list, with 12% of the more than 2,300 accounts Trend Micro analyzed relying on that platform for email services.

When it comes to instant messaging, however, alleged terrorists tend to go a bit more underground, Trend Micro says. The security company says that 34% of the accounts it analyzed were running on Telegram, an encrypted communications protocol that hides a person’s identity. Other similarly silent apps, including Signal and Wickr, were also popular. However, Facebook’s (FB) WhatsApp tied for second-most-popular chatting service among alleged terrorists, nabbing 15% market share.

The findings come at a time when debate over how to target and intercept terrorist plots as they communicate online has hit a fever pitch.

Get Data Sheet, Fortune’s technology newsletter

Most recently, Apple (AAPL) waged a battle with the FBI over whether it should be forced to help the agency unlock the iPhone 5c used by Syed Farook. While the case was eventually dropped after the FBI obtained a tool to unlock the handset itself, it prompted a firestorm in Silicon Valley. Apple, along with other industry titans, promised secure digital communication and privacy. Facebook’s WhatsApp went so far as to ensure end-to-end encryption across all of its apps.

Law enforcement agencies, meanwhile, have railed against such protests. While they’ve acknowledged that they support digital privacy, FBI Director James Comey, among others, has long said that preventing law enforcement officials from having access to terrorist communication can put people in danger.

Those concerns come in the wake of increasingly sophisticated efforts on the part of the Islamic State and others to use technology to communicate. While Trend Micro’s data suggests that much of that communication occurs on encrypted channels away from the prying eyes of governments, they’ve also used social media and used readily accessible forums to spread propaganda.

“One of the clearest differences between cybercriminals and terrorists is their desire to spread propaganda,” Trend Micro said in its security report. “While cybercriminals’ main goals are to commit cybercrime and stay hidden while they do it, terrorists aim to have their content go viral.”

The company added that “terrorists and their supporters use Twitter and Facebook not only to spread propaganda but also to communicate with each other and potential converts.”

That issue has prompted Presidential candidates, including Republican Donald Trump and Democrat Hillary Clinton, to call on Silicon Valley to work with the U.S. government to combat terrorism.

For more about ISIS, watch:

“Technology’s often called the great disrupter, and it has been in work and communications, so much else,” Clinton said in a speech in December. “But we need to put the great disrupters to work in disrupting ISIS and stopping them from having this open platform for communicating with their dedicated fighters and their wannabes, like the people in San Bernardino.”

Technology companies have actually been quite active at disrupting ISIS communications. Indeed, Trend Micro pointed to Twitter (TWTR), saying that it’s “cracking down on accounts that open support and spread terrorist propaganda by banning those accounts outright.”

A Twitter spokesperson echoed that sentiment to Fortune, saying that Twitter has suspended many terrorist-related accounts.

“We condemn the use of Twitter to promote terrorism and the Twitter Rules make it clear that this type of behavior, or any violent threat, is not permitted on our service,” the spokesperson said. “As the nature of the terrorist threat has changed, so has our ongoing work in this area. Since the middle of 2015 alone, we’ve suspended over 125,000 accounts for threatening or promoting terrorist acts, primarily related to ISIS.”

Google and Facebook, which have also cracked down on militant-related accounts, did not immediately respond to a request for comment.

But terrorist groups aren’t just stopping with social media. Trend Micro said that as their efforts have been dashed online, they’ve built their own “customized” tools to communicate. Those tools include an encrypted email application called Mojahedeen Secrets, a mobile app called Tashfeer al-Jawwal, and even an Android-based news app for “terrorist-related actions,” called Alemarah, according to Trend Micro.

For its part, Trend Micro believes that the sophisticated strategies used by terrorist groups online creates a “significant challenge for federal and international law enforcement.” However, the U.S. government might have already found a way in.

Last week, The New York Times reported that the U.S. Cyber Command, which is run by the NSA, has been hacking ISIS for quite some time. Those efforts have been focused on rerouting cash payments to militants and even issuing fake commands to direct militants to areas where drones are waiting.

“We are dropping cyberbombs,” Robert Work, Deputy Secretary of Defense, was quoted as saying. “We have never done that before.”

About the Author
By Don Reisinger
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

murdochs
CommentaryMedia
OpenAI paid $100 million for a talk show. James Murdoch is eyeing an even bigger deal. The hot new asset class is humanity
By Lin CherryMay 17, 2026
13 hours ago
dennis
CommentaryAI agents
Freshworks CEO: why agile enterprises are winning the AI race — and what they did differently
By Dennis WoodsideMay 17, 2026
13 hours ago
A man with a headset sits at a desk in a call center.
EconomyAutomation
The AI boom hasn’t stopped U.S. companies from hiring cheap offshore labor, and overseas call center employment is still skyrocketing
By Sasha RogelbergMay 17, 2026
14 hours ago
Zillow CEO doubles down on remote-work model: ‘There is talent everywhere in this country’
Workplace Cultureremote work
Zillow CEO doubles down on remote-work model: ‘There is talent everywhere in this country’
By Marco Quiroz-GutierrezMay 17, 2026
14 hours ago
Stressed job seeker
SuccessGen Z
Gen Z is right about the job hunt—it really is worse than it was for millennials, with nearly 60% of fresh-faced grads frozen out of the workforce
By Emma BurleighMay 17, 2026
14 hours ago
A 45,000-person labor strike at Samsung’s memory chip plants could throw a wrench into the AI boom
EconomySamsung
A 45,000-person labor strike at Samsung’s memory chip plants could throw a wrench into the AI boom
By Catherina GioinoMay 17, 2026
17 hours ago

Most Popular

Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI
AI
Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI
By Jake AngeloMay 16, 2026
2 days ago
Former top Russian official admits the country is over Putin and can 'imagine a future without him' — even elites bail as Kremlin seizes their assets 
Politics
Former top Russian official admits the country is over Putin and can 'imagine a future without him' — even elites bail as Kremlin seizes their assets 
By Jason MaMay 16, 2026
1 day ago
The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
Politics
The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
By Jake AngeloMay 12, 2026
5 days ago
SpaceX heads into a record-shattering IPO with the 'deepest moat that exists today' as investors vow to 'never bet against Elon'
Innovation
SpaceX heads into a record-shattering IPO with the 'deepest moat that exists today' as investors vow to 'never bet against Elon'
By Jason MaMay 16, 2026
1 day ago
'No one was coming to save me': How Reese Witherspoon built a $900 million company from a problem Hollywood wouldn't fix
Success
'No one was coming to save me': How Reese Witherspoon built a $900 million company from a problem Hollywood wouldn't fix
By Sydney LakeMay 17, 2026
15 hours ago
The top foreign holders of U.S. debt may soon dump Treasury bonds and bring their money back home, potentially spiking borrowing costs
Economy
The top foreign holders of U.S. debt may soon dump Treasury bonds and bring their money back home, potentially spiking borrowing costs
By Jason MaMay 17, 2026
8 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.