And when they identify potential recruits, they shift to this encrypted form of communication, which is private and removes the burden of accountability.
In fact, there has been evidence to suggest that that IS operatives make specific requests for new recruits to carry with them a gadget (like a phone or tablet) which can support these apps and this mode of communication.
The argument against end-to-end encryption End-to-end encryption is a result of the post-Edward Snowden era which revealed governments' tendency to spy and snoop on private communication.
And while the idea behind it may be to ensure privacy and protection of intellectual property, lawmakers argue that it enables what the FBI calls "going dark" - implying the increasing hurdles that authorities face in accessing communication data even when they may be authorised to.
You can order your messages, photos, videos and files to self-destruct in a set amount of time after they have been read or opened by the recipient.