Welcome Guest [Log In] [Register]

Kia Ora
You are currently viewing our forum as a guest. This means you are limited to certain areas of the board and that there are some features you can't use or read.

We are an active community of worldwide senior members participating in chat, politics, travel, health, blogging, graphics, computer issues & help, book club, literature & poetry, finance discussions, recipe exchange and much more. Also, as a member you will be able to access member only sections, many features, send personal messages, make new friends, etc.

Registration is simple, fast and completely free. Why not register today and become a part of the group. Registration button at the very top left of the page.

Thank you for stopping by.

Join our community!

In case of difficulty, email worldwideseniors.org@gmail.com.
If you're already a member please log in to your account to access all of our features:

Username:   Password:
Add Reply
Frightening ISIS encryption methods have surprising Canadian connection
Topic Started: Nov 24 2015, 09:30 AM (95 Views)
Darcie
Member Avatar
Skeptic
Quote:
 

Previous story

A grave intelligence failure marked multiple catastrophic terrorist attacks in recent weeks in Egypt, Beirut and Paris. Brussels is in lockdown, braced for a Paris-style attack, while a firestorm of controversy blazes over social media's encrypted instant messaging apps. And a Canadian technology company is caught in the crossfire.

Whether those responsible for the ISIS attacks actually used communication by untrackable encrypted instant messaging remains unclear. We know that at least some in Paris didn't. Data on a discarded cell-phone found in a trash-bin outside the Bataclan led authorities directly to the safe-house where attack leader Abdelhamid Abaaoud met his doom.

Oddly, supporters of blanket encryption apps consider this evidence in their favour, when it actually points to the opposite conclusion. Had the attackers encrypted all their communications, per standard ISIS instructions, Abaaoud and his co-conspirators would still be at large instead of chilling at the morgue.

ISIS won't make that mistake again.
Encryption robs investigators of indispensable wiretap powers

Encryption technology is now so powerful that it can't be unlocked even by the host under court order, and is freely available on a number of smartphone apps that all the kids use. Messenger platforms such as WhatsApp, Snapchat, and Telegram sprouted up following the well-worn Facebook path of making their owners rich by designing hook-up apps.

The thing is, these apps also inadvertently immunize malicious users like ISIS and child predators from lawful investigation. Authorities have now been robbed of indispensable wiretap powers that they've possessed since the invention of the telephone.

That's not a good thing, because we have nothing to replace it. There's simply no investigative substitute for the ability to intercept extremist communications in real-time as attacks are planned. Increasingly, authorities are seeing subjects "go dark," meaning they've accessed encryption messaging software and their communications can no longer be tracked.

snip

Quote:
 
What authorities seek is that encrypted messaging apps code in a "key" that allows police (operating under warrant) t​Kik's special offering goes beyond encryption technology; designed to target a teens without their own mobile accounts, it requires no registration to a cell-phone number. This also, it turns out, enables untraceable connection to anonymous cell phones. No registration is required beyond setting up a user name. As the Middle East Media Research Institute reports,

Anyone can now communicate securely via an untraceable throwaway smartphone, purchased online, including on Amazon. Installing an encrypted messaging app such as Kik... takes a few moments, and after that, chatting securely and secretly with an Islamic State (ISIS) fighter... is one click away.

Reached for comment on the above, Kik media representative Rod McLeod confirmed that malicious users could access the app via an untraceable device, but wouldn't characterize that as a system vulnerability.

"A lot of people look at that as kind of a bad feature, especially law enforcement," he said, "but we’ve received a lot of feedback saying that having a username instead of giving a phone number makes you feel safer."

Right. Especially if you're a terrorist.


http://www.nationalobserver.com/2015/11/23/opinion/frightening-isis-encryption-methods-have-surprising-canadian-connection

And here we are blaming the Muslims when we have a home grown capitalist laughing all the way to the bank making his fortune on a system that fits right into the terrorists communications needs.

Is this not aiding and abetting?

From what I understand this was put out in Waterloo, the capitalist capital of computer hardware and software.

Offline Profile Quote Post Goto Top
 
Delphi51
Member Avatar
Member title
Quote:
 
WhatsApp Inc., was founded in 2009 by Brian Acton and Jan Koum, both former employees of Yahoo!
. https://en.m.wikipedia.org/wiki/WhatsApp
I would like it to be a Canadian invention but I see no Canadian connection in the story. It is Californian all the way. The U.S. Has been the world leader in encryption since computers became available to the public. For most of the computer age anyone in the U.S. could use free encryption programs and of course they made their way to other countries, too. Facebook now owns WhatsApp.

WhatsApp has a redeeming feature - it allows texting via internet between different phone brands so no charge to text around the world from free wifi stations. Our daughter was using it when her boyfriend visited Europe last summer. With encryption turned off, I assume.

Yes, it looks like we must give up privacy to fight terrorism. It will be costly for anyone or any company with legitimate secrets. And certain countries will find it much easier to steal ideas from our companies.

Offline Profile Quote Post Goto Top
 
Trotsky
Member Avatar
Big City Boy
I have read that the attackers used Playstation 4 to communicate. Seems there is no record of their 100% private communications left ANYWHERE after they break the connection.
Beats even PERFECT encryption.
Who knew?
Edited by Trotsky, Nov 25 2015, 01:07 AM.
Offline Profile Quote Post Goto Top
 
1 user reading this topic (1 Guest and 0 Anonymous)
DealsFor.me - The best sales, coupons, and discounts for you
« Previous Topic · Rants, Bouquets, Consumer Issues · Next Topic »
Add Reply