Might 13, 2016 · 4:00 PM EDT Player resources Pay attention to the storyline. ISIS utilizes an array of online tools, including TOR, VPNs, and encryption, to recruit supporters while staying anonymous. Whenever Sheera Frenkel began watching ISIS on line, she ended up being amazed by exactly how ordinary the conversations had been. “They utilize […]