FBI Unable to Monitor ISIS’s Encrypted Communications

622x350.jpg

The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS. It urges a law to give them more powers.

The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide a backdoor to monitor encrypted communication among jihadists.

According to Michael Steinbach, assistant director of the FBI’s counter-terrorism division, the Bureau admitted its inability to monitor encrypted online conversations and these communications are ordinarily exploited by the ISIS for propaganda and to recruit new militants.Steinbach reported to the House Homeland Security Committee that encrypted communications allow the establishment of an “afforded a free zone by which to recruit, radicalize, plot and plan.”

Steinbach admitted that law enforcement agencies did not know the volume of the hidden online messages.
This new terrorists generation have great cyber capabilities. They have mastered social media and the intelligence process needs the instruments to fight them on the same battlefield, including the Dark Web.

The Dark Web is difficult to monitor for intelligence agencies, it is not so easy to locate members of terrorist organizations like the ISIS and Al Qaeda that share propaganda content. In the principal black markets hosted on the deep web it is possible to purchase any kind of illegal products and services, but in the dark part of the web it is also possible to find propaganda videos and images.

Hidden services in the Deep Web also offer the possibility to download the mobile apps used by the jihadists to communicate securely and to transfer Bitcoins to terrorist cells in every place of the world.
At a recent Foreign Affairs Forum on Cryptocurrency Policy, government officials, Bitcoin entrepreneurs and others discussed the future of the cryptocurrency. Michael McCaul, chairman of the committee, confirmed that the inability to monitor communications among members of the ISIS in the dark web represents a “tremendous threat to our homeland.”
McCaul urged Congress to provide new investigation instruments to the authorities, he requested a law that provides them a full access to encrypted online communications and data archived in online storage.

But the US intelligence is also “asking companies to help provide technology solutions,” it request IT giants to provide access to their services. Privacy advocated and civil liberties groups they are on a war footing despite government assurances. Steinbach highlighted that the US government is not intentioned to run a new massive surveillance program.

US authorities would still have to seek permission from a court and prove that its request for surveillance was justified, he said.
Security Affairs: http://bit.ly/1RW5Egx

 

« Cyberwar: Enter the Trolls
PwC says UK Security Breaches Often Not Reported »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Radisys

Radisys

Radisys offers software, products, integrated systems, and professional services for communication service providers and telecom solution vendors.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Improsec

Improsec

Improsec is a fully independent Cyber Security advisory company - we provide knowledge, experience and both strategic and deep technical expertise to our clients.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

WootCloud

WootCloud

WootCloud is the only enterprise device security solution provider to leverage both the radio and network characteristics to neutralize device threats.

WebSec B.V.

WebSec B.V.

WebSec is a Dutch Cybersecurity firm mainly focused on offensive security services such as pentesting, red teaming and security awareness and phishing campaigns.