diff options
| -rw-r--r-- | paper.ms | 51 | ||||
| -rw-r--r-- | refer | 12 |
2 files changed, 40 insertions, 23 deletions
@@ -63,29 +63,34 @@ encryption existing thereby only as a tool of authoritarian control. An argument is often made against allowing widespread use of encryption and generally against widespread effective operations security (OPSEC) in the public sector in the interest of -national security. With access to communications and usage history law -enforcement and government can quickly discover large amounts of -information useful in a criminal investigation or in preventing -criminal activity. Graham{#CTC terrorists} explores the use of -encryption by terrorists which is often cited in a reason for giving -governments access to unencrypted Internet communications so that -suspicious activity can be flagged and investigated in order to -prevent a terror attack or in order to better respond in the case of -an attack. Graham describes the extensive use of end to end encryption -used by terrorists in order to avoid interception by the authorities. -Due to U.S. usage of intercepted communications to uncover and prevent a -number of al-Qa'ida plots, the terrorist organisation and other -terrorist groups have increasingly used encrypted communications (read -citation from Graham). An significant factor is the use of -non-mainstreams software in early use of encryption by terrorists, -including a program that built a wrapper around the popular, secure, -and open source PGP called \fIMujahedeen secrets\fR. Although now -terrorists and criminals use widely available, popular, and -user-friendly software such as the Tails operating system or Telegram -(Graham citation 28), terrorists organisations have shown an ability -to make use of more obscure and complicated systems, as well as use -publicly available source code in order to construct software for -operatives to use. +national security, and the prevention of terror. With access to +communications and usage history governments can gather significant +information on terrorists and use this intelligence against +terrorists. It is clear that intelligence plays a significant role in +counterterrorism. The 9/11 terrorist attacks are seen potentially as a +phenomenal failure of intelligence as detailed in The 9/11 Commission +report {#9/11 commission report}, which detailed institutional failures +and also emphasised the difficulty and importance of intelligence in +counterterrorism {intelligence and national security}. Graham{#CTC +terrorists} explores the use of encryption by terrorists which is +often cited in a reason for giving governments access to unencrypted +Internet communications so that suspicious activity can be flagged and +investigated in order to prevent a terror attack or in order to better +respond in the case of an attack. Graham describes the extensive use +of end to end encryption used by terrorists in order to avoid +interception by the authorities. Due to U.S. usage of intercepted +communications to uncover and prevent a number of al-Qa'ida plots, the +terrorist organisation and other terrorist groups have increasingly +used encrypted communications (read citation from Graham). An +significant factor is the use of non-mainstreams software in early use +of encryption by terrorists, including a program that built a wrapper +around the popular, secure, and open source PGP called \fIMujahedeen +secrets\fR. Although now terrorists and criminals use widely +available, popular, and user-friendly software such as the Tails +operating system or Telegram (Graham citation 28), terrorists +organisations have shown an ability to make use of more obscure and +complicated systems, as well as use publicly available source code in +order to construct software for operatives to use. Although the issue of popular messaging technologies and their support for 'end-to-end encryption' is often discussed, the argument that the @@ -51,6 +51,18 @@ %J CTC Sentinel %O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022) +%T The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report) +%A National^Commission^on^Terrorist^Attacks^Upon^the^United^States +%D July 2004 + +%A Daniel Byman +%D 2014 +%T The Intelligence War on Terrorism +%J Intelligence and National Security +%V 29:6 +%P 837-863 +%G DOI: 10.1080/02684527.2013.851876 + %T International statement: End-to-end encryption and public safety %A Home^Office %D Oct 2020 |
