FBI Unable to Monitor ISIS’s Encrypted Communications

622x350.jpg

The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS. It urges a law to give them more powers.

The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide a backdoor to monitor encrypted communication among jihadists.

According to Michael Steinbach, assistant director of the FBI’s counter-terrorism division, the Bureau admitted its inability to monitor encrypted online conversations and these communications are ordinarily exploited by the ISIS for propaganda and to recruit new militants.Steinbach reported to the House Homeland Security Committee that encrypted communications allow the establishment of an “afforded a free zone by which to recruit, radicalize, plot and plan.”

Steinbach admitted that law enforcement agencies did not know the volume of the hidden online messages.
This new terrorists generation have great cyber capabilities. They have mastered social media and the intelligence process needs the instruments to fight them on the same battlefield, including the Dark Web.

The Dark Web is difficult to monitor for intelligence agencies, it is not so easy to locate members of terrorist organizations like the ISIS and Al Qaeda that share propaganda content. In the principal black markets hosted on the deep web it is possible to purchase any kind of illegal products and services, but in the dark part of the web it is also possible to find propaganda videos and images.

Hidden services in the Deep Web also offer the possibility to download the mobile apps used by the jihadists to communicate securely and to transfer Bitcoins to terrorist cells in every place of the world.
At a recent Foreign Affairs Forum on Cryptocurrency Policy, government officials, Bitcoin entrepreneurs and others discussed the future of the cryptocurrency. Michael McCaul, chairman of the committee, confirmed that the inability to monitor communications among members of the ISIS in the dark web represents a “tremendous threat to our homeland.”
McCaul urged Congress to provide new investigation instruments to the authorities, he requested a law that provides them a full access to encrypted online communications and data archived in online storage.

But the US intelligence is also “asking companies to help provide technology solutions,” it request IT giants to provide access to their services. Privacy advocated and civil liberties groups they are on a war footing despite government assurances. Steinbach highlighted that the US government is not intentioned to run a new massive surveillance program.

US authorities would still have to seek permission from a court and prove that its request for surveillance was justified, he said.
Security Affairs: http://bit.ly/1RW5Egx

 

« Cyberwar: Enter the Trolls
PwC says UK Security Breaches Often Not Reported »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

Virsec Systems

Virsec Systems

Virsec detects and remediates previously “indefensible” advanced memory-based attacks on critical applications and server endpoints.

Slovenian Digital Coalition

Slovenian Digital Coalition

Slovenian Digital Coalition is a coalition working in the field of smart cities, e-commerce, e-skills, e-inclusion, cyber security, internet and other areas related to developing the digital society.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

Beosin

Beosin

Beosin is a blockchain security company providing cybersecurity services including security audits, on-chain asset investigation, threat intelligence and wallet security.

Zero Networks

Zero Networks

With Zero Network, you can achieve affordable, airtight network access security at scale.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Krypsis

Krypsis

Krypsys is an information security company with a focus on helping you defend your information and data against emerging security threats.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

PT Sydeco

PT Sydeco

At PT SYDECO we create a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

Pacific Global Security Group

Pacific Global Security Group

Pacific Global Security Group offers an intelligence-driven focus on all aspects of cybersecurity for IT/ICS/OT.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

Darknone Global

Darknone Global

Darknone is a consortium of elite hackers and security leaders united by an unbridled passion for augmenting the security of the digital realm.