FBI Unable to Monitor ISIS’s Encrypted Communications

622x350.jpg

The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS. It urges a law to give them more powers.

The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide a backdoor to monitor encrypted communication among jihadists.

According to Michael Steinbach, assistant director of the FBI’s counter-terrorism division, the Bureau admitted its inability to monitor encrypted online conversations and these communications are ordinarily exploited by the ISIS for propaganda and to recruit new militants.Steinbach reported to the House Homeland Security Committee that encrypted communications allow the establishment of an “afforded a free zone by which to recruit, radicalize, plot and plan.”

Steinbach admitted that law enforcement agencies did not know the volume of the hidden online messages.
This new terrorists generation have great cyber capabilities. They have mastered social media and the intelligence process needs the instruments to fight them on the same battlefield, including the Dark Web.

The Dark Web is difficult to monitor for intelligence agencies, it is not so easy to locate members of terrorist organizations like the ISIS and Al Qaeda that share propaganda content. In the principal black markets hosted on the deep web it is possible to purchase any kind of illegal products and services, but in the dark part of the web it is also possible to find propaganda videos and images.

Hidden services in the Deep Web also offer the possibility to download the mobile apps used by the jihadists to communicate securely and to transfer Bitcoins to terrorist cells in every place of the world.
At a recent Foreign Affairs Forum on Cryptocurrency Policy, government officials, Bitcoin entrepreneurs and others discussed the future of the cryptocurrency. Michael McCaul, chairman of the committee, confirmed that the inability to monitor communications among members of the ISIS in the dark web represents a “tremendous threat to our homeland.”
McCaul urged Congress to provide new investigation instruments to the authorities, he requested a law that provides them a full access to encrypted online communications and data archived in online storage.

But the US intelligence is also “asking companies to help provide technology solutions,” it request IT giants to provide access to their services. Privacy advocated and civil liberties groups they are on a war footing despite government assurances. Steinbach highlighted that the US government is not intentioned to run a new massive surveillance program.

US authorities would still have to seek permission from a court and prove that its request for surveillance was justified, he said.
Security Affairs: http://bit.ly/1RW5Egx

 

« Cyberwar: Enter the Trolls
PwC says UK Security Breaches Often Not Reported »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Tanium

Tanium

Tanium is an endpoint security and systems management company.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

Theos Cyber Solutions

Theos Cyber Solutions

Theos Cyber provides service-first cybersecurity solutions to digital businesses in Asia.

Vernetzen

Vernetzen

Vernetzen is an industrial network and cybersecurity innovator focused on delivering practical solutions to connect and secure industry across the globe.

SCS Technology Solutions

SCS Technology Solutions

SCS Technology Solutions has become the preferred partner for top performing organisations across Lincolnshire for IT support and consultancy.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

Redapt

Redapt

Redapt is an end-to-end technology solutions provider that brings clarity to a dynamic technical environment.