{"id":23659,"date":"2015-11-30T12:32:46","date_gmt":"2015-11-30T01:32:46","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=23659"},"modified":"2015-11-30T14:02:32","modified_gmt":"2015-11-30T03:02:32","slug":"encryption-technologies-and-counterterrorism","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/","title":{"rendered":"Encryption technologies and counterterrorism"},"content":{"rendered":"

\"\"<\/a>In the lead up to the Paris tragedy, the Federal Bureau of Investigation warned about the dangers of \u2018going dark\u2019<\/a>: data stored on e-mail, text messages, phone calls, live chat sessions, photos and videos being encrypted by terrorists leading to the loss of a previously exploited intelligence capability.<\/p>\n

US and French officials have told The New York Times\u00a0<\/em>that the Paris attackers\u00a0may have used\u00a0difficult-to-crack encryption<\/a> technologies to\u00a0organise\u00a0the plot. Authorities haven’t yet disclosed whether such encryption technology was used by the perpetrators of the Paris attacks.<\/p>\n

Law enforcement and security agencies have claimed<\/a> that encrypted platforms built for commercial purposes to safeguard privacy\u2014where only the sender and receiver hold the keys and devices to decipher the message\u2014are a gift to terrorists and criminals to help them communicate in a way that puts them beyond the law\u2019s reach.<\/p>\n

Indonesian terrorism analyst Sidney Jones recently pointed out<\/a> that \u2018many of the committed ISIS\u00a0supporters from Indonesia are using encrypted communications over WhatsApp and Telegram, not ordinary mobile phone communications that the Indonesian police can tap\u2019.<\/p>\n

The mobile messaging service Telegram has emerged as an important new promotional and recruitment platform<\/a> for ISIL:<\/p>\n

\u2018The main appeal of Telegram is that it allows users to send strongly encrypted messages, for free, to any number of a user’s phones, tablets or computers, which is useful to people who need to switch devices frequently. It has group messaging features that allow members to share large videos, voice messages or lots of links in one message, without detection by outsiders because this service does not run through the computing cloud\u2019.<\/p><\/blockquote>\n

In January an ISIL follower provided would-be fighters with a list of what he determined were the safest encrypted communications systems<\/a>. Soon after the list was published, ISIL\u00a0started moving official communications from Twitter to Telegram.<\/p>\n

Both in the US<\/a> and in the UK<\/a> there has been a push for technology companies to either\u00a0ban encryption on the grounds that we\u2019re paying too high a price in terms of security, or at the very least request that companies like Apple, Google and Facebook build \u2018backdoors\u2019 that allow law enforcement access into their encrypted tools.<\/p>\n

Tech companies have resisted any push to hand over to law-enforcement the keys to their customers’ encrypted data. Privacy advocates have, post-Snowden, defended the technologies as a protection against government snooping<\/a>.<\/p>\n

But tech companies, many of which have been helpful in combating child pornography, are arguing that there are real risks of going along with government requests to access encrypted messages. Apple CEO Tim Cook, for example,\u00a0recently warned<\/a> that \u2018any back door is a back door for everyone. Everybody wants to crack down on terrorists. Everybody wants to be secure. The question is how. Opening a back door can have very dire consequences.\u2019<\/p>\n

The Obama administration recently announced<\/a> that it wouldn\u2019t push for a law that would force computer and communications manufacturers to add backdoors to their products for law enforcement. They concluded that criminals, terrorists, hackers and foreign spies<\/a> would use that backdoor as well.<\/p>\n

Meanwhile, the NSW Crime Commission’s latest annual report states that \u2018uncrackable\u2019 phones have hindered at least two murder investigations<\/a> in Sydney. NSW police this year travelled to BlackBerry\u2019s headquarters in Canada<\/a> in a bid to get advice on how to retrieve information from encrypted devices.<\/p>\n

I can\u2019t offer a technical solution to this issue. But as I\u2019ve argued before, when it comes to privacy and security, we need to find the right balance<\/a> in not allowing new encryption technologies to obstruct our counterterrorism efforts.<\/p>\n

We need secure encrypted systems for commerce, government and the protection of personal information (our digital identity). Banks and telcos are using those products to safeguard our data. Deliberately weakening encryption solutions would arguably weaken key infrastructure, with the ultimate beneficiaries being criminals, cyber activists and rival nation states.<\/p>\n

A cooperative solution<\/a> with our police and security agencies working with relevant companies to identify the problems would be better than trying to introduce laws to restrict encryption.<\/p>\n

Indeed, there\u2019s no guarantee that by banning the use of encryption solutions, as recently proposed in the UK by David Cameron<\/a>, can be effective. Users and companies might migrate to other countries, solutions, products or servers.<\/p>\n

Intelligence agencies will want to be \u2018data-holics\u2019 and be able to read all communications\u2014back to the \u2018good ol\u2019 days\u2019\u2014so that they can make a judgement if it\u2019s important, rather than need to go to companies on a case-by-case basis.<\/p>\n

Instead of handing over the \u2018keys to crypto\u2019 there may, however, need to be more effort by our law enforcement and security agencies to strengthen \u2018old school\u2019 human tradecraft.<\/p>\n

Just as the blind may be able to compensate for their lack of sight with enhanced hearing or other abilities, our security agencies may also need to hone some of their old fashioned skills. Back to the future.<\/p>\n","protected":false},"excerpt":{"rendered":"

In the lead up to the Paris tragedy, the Federal Bureau of Investigation warned about the dangers of \u2018going dark\u2019: data stored on e-mail, text messages, phone calls, live chat sessions, photos and videos being …<\/p>\n","protected":false},"author":23,"featured_media":23660,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[273,1012,1570,170,332],"class_list":["post-23659","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-counterterrorism","tag-daesh","tag-encryption","tag-intelligence","tag-technology"],"acf":[],"yoast_head":"\nEncryption technologies and counterterrorism | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption technologies and counterterrorism | The Strategist\" \/>\n<meta property=\"og:description\" content=\"In the lead up to the Paris tragedy, the Federal Bureau of Investigation warned about the dangers of \u2018going dark\u2019: data stored on e-mail, text messages, phone calls, live chat sessions, photos and videos being ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-30T01:32:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-11-30T03:02:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/20971563620_c63878ed00_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"359\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anthony Bergin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anthony Bergin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/20971563620_c63878ed00_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/20971563620_c63878ed00_z.jpg\",\"width\":640,\"height\":359},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/\",\"name\":\"Encryption technologies and counterterrorism | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/#primaryimage\"},\"datePublished\":\"2015-11-30T01:32:46+00:00\",\"dateModified\":\"2015-11-30T03:02:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a057a968d3f01faeb5273fc8af831564\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption technologies and counterterrorism\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a057a968d3f01faeb5273fc8af831564\",\"name\":\"Anthony Bergin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/992e5536861e30520d738a28175a5ee0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/992e5536861e30520d738a28175a5ee0?s=96&d=mm&r=g\",\"caption\":\"Anthony Bergin\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/anthony-bergin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encryption technologies and counterterrorism | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/","og_locale":"en_US","og_type":"article","og_title":"Encryption technologies and counterterrorism | The Strategist","og_description":"In the lead up to the Paris tragedy, the Federal Bureau of Investigation warned about the dangers of \u2018going dark\u2019: data stored on e-mail, text messages, phone calls, live chat sessions, photos and videos being ...","og_url":"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-11-30T01:32:46+00:00","article_modified_time":"2015-11-30T03:02:32+00:00","og_image":[{"width":640,"height":359,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/20971563620_c63878ed00_z.jpg","type":"image\/jpeg"}],"author":"Anthony Bergin","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Anthony Bergin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/20971563620_c63878ed00_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/20971563620_c63878ed00_z.jpg","width":640,"height":359},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/","url":"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/","name":"Encryption technologies and counterterrorism | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/#primaryimage"},"datePublished":"2015-11-30T01:32:46+00:00","dateModified":"2015-11-30T03:02:32+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a057a968d3f01faeb5273fc8af831564"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/encryption-technologies-and-counterterrorism\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Encryption technologies and counterterrorism"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a057a968d3f01faeb5273fc8af831564","name":"Anthony Bergin","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/992e5536861e30520d738a28175a5ee0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/992e5536861e30520d738a28175a5ee0?s=96&d=mm&r=g","caption":"Anthony Bergin"},"url":"https:\/\/www.aspistrategist.ru\/author\/anthony-bergin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23659"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=23659"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23659\/revisions"}],"predecessor-version":[{"id":23663,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23659\/revisions\/23663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/23660"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=23659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=23659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=23659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}