Following the arrest of several members of the jihadist Internet community, including Irhabi 007 , guides instructing in how a user may secure their identity and use the Internet with a high-degree of anonymity were distributed to several jihadist forums. Proxy servers are the cardinal tool used by those members seeking to avoid detection, and a recently issued manual by the Global Islamic Media Front provides a highly technical and detailed method of doing so. The eleven-page guide utilizes a combination of images and laymen analogies to instruct the end-user in using proxy servers, and even creating their own private proxy to ensure anonymity and trust.
The guide describes a variety of Internet protocols, web applications and language scripts as steps to creating a private proxy. Making evident in a clear way the importance of such a tool, the author provides a chart of various proxy types so that the user may see the advantages and disadvantages of each.
A translation of the guide is provided to our Intel Service members.