- Facebook and Google could be tracking you on porn sites 3 Years Ago
- 7 best sites for psychic love readings 3 Years Ago
- Driver demonstrates why you always need to read road signs Today 12:58 PM
- Area 51 remix video proves it’s the summer of Lil Nas X Today 12:26 PM
- ‘ICE will come’: Convenience store clerk threatens customers speaking Spanish Today 12:11 PM
- Rand Paul dodges questions about 9/11 Victims Fund, says ‘watch Fox News’ Today 11:51 AM
- Report: ‘Stranger Things’ season 4 to begin shooting in October Today 11:03 AM
- AT&T paid Michael Cohen to consult on net neutrality, FBI documents show Today 9:10 AM
- Mysterio’s ruse changes on a second viewing of ‘Far From Home’ Today 9:06 AM
- Twitter overturns Barrett Brown’s third permanent suspension Today 8:49 AM
- How to live stream Liga MX Today 7:56 AM
- The QBaby’s parents are already trying to profit off their kid’s fame Today 7:45 AM
- How do 4DX movies work? Today 7:00 AM
- ‘Terminator 2’s John Connor will return for ‘Terminator: Dark Fate’ Today 6:41 AM
- What are all these ‘Game of Thrones’ fans supposed to do now? Today 6:00 AM
ISIS turns to foreign encryption products as Apple–FBI fight rages in U.S.
The move highlights a key argument against banning strong encryption in the U.S.
FBI and Apple officials spent Tuesday afternoon on Capitol Hill, debating American encryption laws with members of Congress. Prompted by a case related to the ISIS-inspired terrorist attack in San Bernardino, the intense discussion heavily focused on thwarting the Islamic State.
But ISIS supporters online didn’t seem worried at all.
Instead, they’ve spent the week—and longer—promoting strong encryption tools from outside the United States that the American government cannot touch with legislation.
In the last month, Islamic State supporters have promoted security software from Finland, Romania, America, France, the Czech Republic, Canada, Panama, Germany, Switzerland, Saint Kitts and Nevis, and other nations, a Daily Dot review found.
On Telegram, a popular Islamic State technology channel promoted a number of secure communications tools, including ProtonMail (from Switzerland), Ghostmail (also Swiss), and Tutanota (German) as ways to hide from Western surveillance.
IS supporters making email recommendations
Apple and the Federal Bureau of Investigation are currently embroiled in a legal battle over a court order that requires Apple engineers to create custom software that will let the FBI guess the password to San Bernardino shooter Syed Rizwan Farook’s locked iPhone 5c. The technology giant is fighting the order on the grounds that doing so would jeopardize its users’ security and violate the company’s rights.
The international availability of encryption technology, of which Islamic State militants are well aware, underscores FBI Director James Comey’s long-held desire to build an international legal regime to deal with the problems posed by encryption, what he calls “going dark.”
Sens. Dianne Feinstein (D-Calif.) and Richard Burr (R-N.C.) are currently crafting legislation that may mandate so-called “backdoors” in encryption technology as a means to combat criminals and terrorists evading the reach of intelligence agents and law enforcement. Another piece of legislation, introduced this week by Sen. Mark Warner (D-Va.) and Rep. Michael McCaul (R-Texas), aims to create a commission to study encryption and other digital-security technologies.
In the Tuesday hearing before the House Judiciary Committee, Apple’s top lawyer, Bruce Sewell, argued that free, open-source, foreign encryption solutions are popular and would benefit from any law weakening American encryption—an argument often repeated by technologists and other opponents of anti-encryption legislation.
“Couldn’t foreign companies and bad actors generally do that, whatever we said?” Rep. Jerrold Nadler (D-N.Y.) asked Comey.
Comey was skeptical that many people would ditch American devices and adopt foreign products due to encryption and privacy issues.
Various studies have concluded that U.S. tech companies lost billions of dollars because of the privacy and security concerns raised in the wake of former NSA contractor Edward Snowden‘s leak of secret National Security Agency documents in 2013. The Snowden revelations prompted Apple and Google, creator of Android, to build strong encryption into their mobile operating systems in an attempt to rebuild customer trust and strengthen their security.
Susan Landau, a Worcester Polytechnic Institute cybersecurity policy professor, argued forcefully that any terrorist can simply download foreign applications with strong encryption to get around whatever legislation Congress might pass.
“If congress were to pass a law prohibiting use of encryption on Apple phones … what it would do is weaken us but not change it for the bad guys,” Landau said, agreeing that any limits on encryption are virtually “undoable.”
Illustration by Max Fleishman
Patrick Howell O'Neill is a notable cybersecurity reporter whose work has focused on the dark net, national security, and law enforcement. A former senior writer at the Daily Dot, O'Neill joined CyberScoop in October 2016. I am a cybersecurity journalist at CyberScoop. I cover the security industry, national security and law enforcement.