FBI Unable to Monitor ISIS’s Encrypted Communications

622x350.jpg

The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS. It urges a law to give them more powers.

The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide a backdoor to monitor encrypted communication among jihadists.

According to Michael Steinbach, assistant director of the FBI’s counter-terrorism division, the Bureau admitted its inability to monitor encrypted online conversations and these communications are ordinarily exploited by the ISIS for propaganda and to recruit new militants.Steinbach reported to the House Homeland Security Committee that encrypted communications allow the establishment of an “afforded a free zone by which to recruit, radicalize, plot and plan.”

Steinbach admitted that law enforcement agencies did not know the volume of the hidden online messages.
This new terrorists generation have great cyber capabilities. They have mastered social media and the intelligence process needs the instruments to fight them on the same battlefield, including the Dark Web.

The Dark Web is difficult to monitor for intelligence agencies, it is not so easy to locate members of terrorist organizations like the ISIS and Al Qaeda that share propaganda content. In the principal black markets hosted on the deep web it is possible to purchase any kind of illegal products and services, but in the dark part of the web it is also possible to find propaganda videos and images.

Hidden services in the Deep Web also offer the possibility to download the mobile apps used by the jihadists to communicate securely and to transfer Bitcoins to terrorist cells in every place of the world.
At a recent Foreign Affairs Forum on Cryptocurrency Policy, government officials, Bitcoin entrepreneurs and others discussed the future of the cryptocurrency. Michael McCaul, chairman of the committee, confirmed that the inability to monitor communications among members of the ISIS in the dark web represents a “tremendous threat to our homeland.”
McCaul urged Congress to provide new investigation instruments to the authorities, he requested a law that provides them a full access to encrypted online communications and data archived in online storage.

But the US intelligence is also “asking companies to help provide technology solutions,” it request IT giants to provide access to their services. Privacy advocated and civil liberties groups they are on a war footing despite government assurances. Steinbach highlighted that the US government is not intentioned to run a new massive surveillance program.

US authorities would still have to seek permission from a court and prove that its request for surveillance was justified, he said.
Security Affairs: http://bit.ly/1RW5Egx

 

« Cyberwar: Enter the Trolls
PwC says UK Security Breaches Often Not Reported »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

Somansa

Somansa

Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Infodas

Infodas

Infodas provides Cybersecurity and IT consulting / system integration services as well as a range of innovative Cybersecurity products to public sector and commercial clients.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

Securden

Securden

Securden provide an all-in-one Platform for Next-Gen Privileged Access Governance, helping you to prevent identity thefts, malware propagation, cyber attacks, and insider exploitation.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

US Coast Guard Cyber Command

US Coast Guard Cyber Command

US Coast Guard Cyber Command’s focus is to ensure the security of our cyberspace, maintain superiority over our adversaries,and safeguard our Nation’s critical maritime infrastructure.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

Darknone Global

Darknone Global

Darknone is a consortium of elite hackers and security leaders united by an unbridled passion for augmenting the security of the digital realm.

Buguard

Buguard

Buguard is a multi-award-winning supplier of Application Security Assessments and GRC services.

SkillsDA

SkillsDA

SkillsDA is pureplay company in cyber security involved in capacity building towards National Security.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.