diff options
Diffstat (limited to 'paper.ms')
| -rw-r--r-- | paper.ms | 22 |
1 files changed, 12 insertions, 10 deletions
@@ -45,24 +45,26 @@ governments access to unencrypted Internet communications so that suspicious activity can be flagged and investigated in order to prevent a terror attack or in order to better respond in the case of an attack. Graham describes the extensive use of end to end encryption -used by terrorists in order to avoid interception by the autorities. +used by terrorists in order to avoid interception by the authorities. Due to U.S. usage of intercepted communications to uncover and prevent a number of al-Qa'ida plots, the terrorist organisation and other terrorist groups have increasingly used encrypted communications (read citation from Graham). An significant factor is the use of non-mainstreams software in early use of encryption by terrorists, -including a program that built a rapper around the popular, secure, +including a program that built a wrapper around the popular, secure, and open source PGP called \fIMujahedeen secrets\fR. Although now terrorists and criminals use widely available, popular, and user-friendly software such as the Tails operating system or Telegram -(Graham citation 28), Messaging -technologies and their support for `end-to-end encryption' is a -particularly significant issue. Introduction of end-to-end encryption -being introduced by large companies such as Facebook has raised -concern {conversation facebook} over the potential for usage by -criminals and a lack of ability for Facebook or law enforcement to -obtain conversation between criminals which may be vital in an -investigation. +(Graham citation 28), terrorists organisations have shown an ability +to make use of more obscure and complicated systems, as well as use +publicly available source code in order to construct software for +operatives to use. Messaging technologies and their support for +`end-to-end encryption' is a particularly significant issue. +Introduction of end-to-end encryption being introduced by large +companies such as Facebook has raised concern {conversation facebook} +over the potential for usage by criminals and a lack of ability for +Facebook or law enforcement to obtain conversation between criminals +which may be vital in an investigation. Concerns exist with digital technologies on at a hardware level. The Intel Management Engine that exists {Intel Management} |
