Monday, November 23, 2015

WAR ON TERROR - Terrorists Going Dark

"Terrorists hiding behind impenetrable communication, says FBI" PBS NewsHour 11/18/2015

Excerpt

SUMMARY:  How did the Paris terrorists communicate with each other and elude surveillance?  Investigators are eyeing readily available cellphone technologies that defy cracking by intelligence agencies and even the companies that created them.  Judy Woodruff takes a look at some of the encrypted apps and software being used to evade detection.

JUDY WOODRUFF (NewsHour):  Since the Paris attacks, there’s been lots of concern in Washington and other world capitals over fears of how terrorists can communicate by going dark, namely, using an array of technologies to hide from law enforcement before and after attacks.

In the aftermath of the Paris attacks, investigators are still hunting for answers to how the terrorists communicated with each other and eluded surveillance.  But their eyes are on the now ubiquitous cell phone, which can send coded information using free, readily available technologies that defy cracking by intelligence agencies and even the companies that created them.

In Washington yesterday, the chairman of the Senate Intelligence Committee, Republican Richard Burr, said that very technology was probably at play in Paris.

SEN. RICHARD BURR (R), North Carolina:  Globally, we need to begin the debate on what we do on encrypted networks, because it makes us blind to communications and to the actions of potential adversaries.

JUDY WOODRUFF:  It’s called end-to-end encryption, meaning data gets encrypted or locked away with special codes on one device and is only decrypted when it reaches another.

Popular applications like WhatsApp, Apple’s iMessage, Threema and Telegram all operate this way.  Some of the encrypted apps, like Dstrux, also employ technology that makes messages disappear after they’re delivered, leaving no trace.

Terrorists conceal their work using other sites like JustPaste.it.  It is one place the Islamic State group posts messages and claims of responsibility without having to register.  The TOR browser bounces communications around a distributed network of relays run by volunteers, hiding both the user’s activity and location.

Terrorist groups have even created their own encrypted software specifically to evade detection by the National Security Agency.



"Do governments need access to encrypted messages to thwart terrorism?" PBS NewsHour 11/18/2015

Excerpt

SUMMARY:  Would greater government access to messages sent through secure communication technology help intelligence agencies fight terrorism?  Judy Woodruff gets views from Stewart Baker, former assistant secretary of Homeland Security, and Kate Martin of the Center for American Progress.

No comments: