FBI Unable to Monitor ISIS’s Encrypted Communications

622x350.jpg

The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS. It urges a law to give them more powers.

The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide a backdoor to monitor encrypted communication among jihadists.

According to Michael Steinbach, assistant director of the FBI’s counter-terrorism division, the Bureau admitted its inability to monitor encrypted online conversations and these communications are ordinarily exploited by the ISIS for propaganda and to recruit new militants.Steinbach reported to the House Homeland Security Committee that encrypted communications allow the establishment of an “afforded a free zone by which to recruit, radicalize, plot and plan.”

Steinbach admitted that law enforcement agencies did not know the volume of the hidden online messages.
This new terrorists generation have great cyber capabilities. They have mastered social media and the intelligence process needs the instruments to fight them on the same battlefield, including the Dark Web.

The Dark Web is difficult to monitor for intelligence agencies, it is not so easy to locate members of terrorist organizations like the ISIS and Al Qaeda that share propaganda content. In the principal black markets hosted on the deep web it is possible to purchase any kind of illegal products and services, but in the dark part of the web it is also possible to find propaganda videos and images.

Hidden services in the Deep Web also offer the possibility to download the mobile apps used by the jihadists to communicate securely and to transfer Bitcoins to terrorist cells in every place of the world.
At a recent Foreign Affairs Forum on Cryptocurrency Policy, government officials, Bitcoin entrepreneurs and others discussed the future of the cryptocurrency. Michael McCaul, chairman of the committee, confirmed that the inability to monitor communications among members of the ISIS in the dark web represents a “tremendous threat to our homeland.”
McCaul urged Congress to provide new investigation instruments to the authorities, he requested a law that provides them a full access to encrypted online communications and data archived in online storage.

But the US intelligence is also “asking companies to help provide technology solutions,” it request IT giants to provide access to their services. Privacy advocated and civil liberties groups they are on a war footing despite government assurances. Steinbach highlighted that the US government is not intentioned to run a new massive surveillance program.

US authorities would still have to seek permission from a court and prove that its request for surveillance was justified, he said.
Security Affairs: http://bit.ly/1RW5Egx

 

« Cyberwar: Enter the Trolls
PwC says UK Security Breaches Often Not Reported »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TenIntelligence

TenIntelligence

TenIntelligence provides due diligence, brand protection and fraud investigation services including digital forensics.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

Kleiner Perkins

Kleiner Perkins

For five decades, Kleiner Perkins has made history by partnering with some of the most ingenious and forward-thinking founders in technology and life sciences.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

CodeHunter

CodeHunter

CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.

Zyber 365 Group

Zyber 365 Group

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

Xantaro

Xantaro

Xantaro specializes in technologies, software and services for Carriers, ISPs, Hosting and Cloud Providers as well as for Operators of Data Centres and Campus Networks.

Black Alps

Black Alps

Black Alp's mission is to promote cybersecurity through the organization of dedicated events.