Category Archives: Android

Quick Reference Resource: WikiLeaks CIA Vault7 Leak #16 – HighRise

HighRise is an android (V4.0 to V4.3) implant for SMS redirect to listening posts.

The 13th July 2017 WikiLeaks release overview:

“Today, July 13th 2017, WikiLeaks publishes documents from the HighRise project of the CIA. HighRise is an Android application designed for mobile devices running Android 4.0 to 4.3. It provides a redirector function for SMS messaging that could be used by a number of IOC tools that use SMS messages for communication between implants and listening posts. HighRise acts as a SMS proxy that provides greater separation between devices in the field (“targets”) and the listening post (LP) by proxying “incoming” and “outgoing” SMS messages to an internet LP. HighRise provides a communications channel between the HighRise field operator and the LP with a TLS/SSL secured internet communication.”

A HighRise User’s Guide was also published.

Previous Vault 7 WikiLeaks dumps #1 – #15 synopses are available on WikiLeaks and analysis of HighRise at The Hacker News.

ENDS

Image courtesy of The Hacker News – Twitter @TheHackersNews

Related Posts: #WikiLeaks #Vault7 Leak #16: #HighRise, #android implant for #SMS redirect #LP @TheHackersNews

https://airgapanonymitycollective.com/2017/07/15/wikileaks-cia-vault7-leak-16-highrise/

Terrorist Technology: “Amn al-Mujahid” (Security of the Mujahid)

On June 7, 2014, the Al­ Fajr Technical Committee (FTC) released an Android version of its ‘Amn Al­-Mujahid’ encryption program. The FTC also announced the launching of its new website – alfajrtaqni.net (now inaccessible).

BLOG - ENC - Amn Al­-Mujahid - Al-Qaeda.Android

The FTC was established in September 2012. It is comprised of an unknown number of individuals with various technical backgrounds. In December 2013, the FTC launched the first version of the encryption program. This version of their software was the evolution of several other encryption programs that were previously deployed for use by jihadis.

Commenting about its new Android app, the FTC wrote on its website:

“Your brothers in the Technical Committee, which belongs to Al-Fajr [media] center, were able to write the ‘Amn Al-Mujahid program. The ‘Amn Al-Mujahid program is characterized by a strong encryption, and it is the best aid for the brothers since it follows the technological advancements [in the field]. The encryption scheme of the program [can be] easily developed and updated [further] if necessary. That is in addition to the program being able to run on mobile phones. Add to that the technological experience… of the brothers in the [Al-Fajr] Technical Committee in the field of encryption, and which made this program more secure. The ‘Amn Al-Mujahid program has been provided with a 4096 bit public key [encryption]… making it the most secure system among the other [encryption] algorithms.”

For a review of AQ’s use of encryption see MEMRI’s Inquiry & Analysis report No. 1086, Al-Qaeda’s Embrace Of Encryption Technology – Part II: 2011-2014, And The Impact Of Edward Snowden April 25, 2014.

A full copy of this MEMRI Jihad and Terrorism Threat Monitor is available if you send an email with the report title, number, and date in the subject line, and include your name, title, organization, and official contact info in the body of the email to that organization.

END.