Uh oh . Has ISIS been read Gizmodo.com for red-hot crown ? Because intelligence leaders are charge the wardrobe for encouraging ISIS and other terrorist constitution to “ go dark . ”
At a House Intelligence Committeehearingtoday on global terror , extremity of Congress spend ample time asking FBI Director James Comey what was up with theFBI and Apple . If I separate you that a life - size Comey doll with a voice recording that rasped “ I ’m not an expert ” playacting on a eyelet sat in for the FBI manager , I ’d in spades be lying — Comey was there . But he may as well have sent the doll .
The odd part occur at the goal , after everyone see that Comey was n’t actually going to say anything substantive . At that point , members of Congress inquire CIA Director John Brenner and NSA Deputy Director Rick Ledgett about terrorists “ move dark ” by using encryption engineering . “Going dark”has become an intelligence residential district slogan , a phrase to describe what fall out when it has the legal mean to search and bug digital communication but ca n’t technically do it because of security protections .

“ The ability of these terrorists to intercommunicate with one another that makes it very difficult to uncover has been increasing . It ’s very frustrating but very concerning , ” Brennan said . “ They follow the press , they observe these discussion . ”
Ledgett stab his digit at the media even more explicitly . “ We track when our alien intelligence prey talk about the protection of their communicating , ” he say . “ And we see a farm turn of them , because of what ’s in the press about the economic value of encryption , be active towards that . ”
The implication of these statements — that media reports are somehow optimized to serve terrorists be better at evading police force enforcement — is a dangerous one . Yes , of course terrorist read . But Brenner and Ledgett ’s statement situate media documentation for potent encoding on the side of terrorist act . Neither intelligence drawing card recognized how member of their own communities might also profit from medium reports about encryption . In fact , neither Brennan or Ledgett inconvenience oneself to acknowledge that their own agencies rely on encoding as a crucial security measure measuring .

Neither Brennan or Ledgett specified which reports were believe to be often wiener - eared on ISIS homesteader , but that does n’t matter . Extremists are interested in privacy tools , and medium reports on privacy prick . Saying that they read about which tools to practice is just saying that any group with goal essay to retrieve entropy that will help achieve those goal . Implying that medium reports are aid and abetting the enemy — not to cite the impression that reports highlight privacy protection are somehow devious — is just unjust and chilling .
touch the author at[email protected].Public PGP keyPGP fingermark : E71A 198B C6A4 60CB CEEA 2635 4AA0 EE14 6579 0F38
AppleSecurity

Daily Newsletter
Get the good tech , science , and acculturation news in your inbox day by day .
News from the future , rescue to your present .
Please choose your desired newssheet and submit your email to advance your inbox .

You May Also Like











![]()