ISIS Suspect Was Sending Encrypted Emails

A senior Indian National Ivestigations Agency official said that accused had used tutanota.com, a secure encryption mail to be in touch with his handler abroad.

The National Investigation Agency (NIA) recently revealed that Ibrahim Yazdani, the Hyderabad youth arrested for his alleged links to Islamic State of Iraq and Syria, was sending encrypted emails to his Syria-based handler through a website that specialises in security and privacy of users. The probe agency further revealed details on purchases made by the other accused arrested by the agency recently.

A senior NIA official said that accused Ibrahim had used tutanota.com, a secure encryption mail to be in touch with his handler abroad. "The co-ordinates of places where logistics like weapons, urea etc. were to be delivered, were sent to him by his handler through this email, "said the officer. Developed by a German Company named Tutao Gmbh, Tutanota is an open-source end-to-end encrypted email software and hosts secure email service.

The agency suspects that Ibrahim was using the website to interact with Shafi Armar, who NIA believes to be the chief recruiter for NIA.Hyderbad resident, Ibrahim Yazdani, who was arrested by NIA along with four others including his brother Iliyas, is believed to be the alleged head of the ISIS module which had owed allegiance to Abu Bakr Baghdadi.

Ibrahim's younger brother, Iliyas, who was among the five arrested youth in Hyderabad had allegedly made some purchases before plans of carrying out terror attacks across the city. An NIA official told dna that Ilyas had purchased the weighing machine from a local shop at biwi bazar for weighing explosive precursors and chemicals.

While 30-year-old Ibrahim Yazdani, who is said to be a computer engineer by profession, his younger brother Iliyas is said to have dropped out of his graduation course and was working in Shalimar Online Seva, which is located close to the local police station in Talab Katta area of Hyderabad. Shalimar Online Seva, according to its online description, is like many private vendors used by the government to distribute pan cards, birth certificates and other identification documents.

The agency further said that Fahad, another arrested accused in the case, had procured nine Aircel pre-activated sims from promotional temporary stall at Charminar bus stop. "Subsequently he had purchased five Chinese mobile phones from a mobile shop at Charminar bus stop for use in their planning and operations, "said an official.

DNIndia: http://bit.ly/2bg3ABb

« Rio Olympics Hacking Threats
The Race To Regulate Self-Driving Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

EU Joint Research Centre

EU Joint Research Centre

JRC is the European Commission's science and knowledge service which employs scientists to carry out research in order to provide independent scientific advice and support to EU policy.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.

Judy Security

Judy Security

Judy provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

SecuLore

SecuLore

An innovator in public-safety-focused cybersecurity, SecuLore is dedicated to protecting critical infrastructure from cyber attacks.