Tracking the next pandemic: Avian Flu Talk |
Isis encryption -today- Media got it wrong |
Post Reply |
Author | |
Medclinician
V.I.P. Member Valued Member Since 2006 Joined: July 08 2009 Status: Offline Points: 23322 |
Post Options
Thanks(0)
Posted: April 02 2016 at 10:10am |
Well despite the widespread reports of the media that had uncovered Isis secret to elude U.S. Intelligence in post Edward Snowden cyberspace, as usual - they never investigated their leads and were completely wrong. However - the real news on this follows.
March 31, 2016 http://www.newyorker.com/news/news-desk/the-strange-origins-of-truecrypt-isiss-favored-encryption-tool On Tuesday, the Times reporter Rukmini Callimachi published the latest in a series of blockbuster stories about the inner workings of the Islamic State. The piece focused on the logistics of the group’s deployment of terrorists in Europe, but also included a significant revelation in an ongoing debate about encryption. In ISIS’s training and operational planning, Callimachi reported, the group appeared to routinely use a piece of software called TrueCrypt. When one would-be bomber was dispatched from Syria to France, Callimachi writes, “an Islamic State computer specialist handed him a USB key. It contained CCleaner, a program used to erase a user’s online history on a given computer, as well as TrueCrypt, an encryption program that was widely available at the time and that experts say has not yet been cracked.” Before companies like Apple and Microsoft built encryption into their products, before Apple took on the U.S. government (briefly) over the unlocking of a San Bernardino shooter’s iPhone, TrueCrypt and programs like it were the primary means for securing files and disks by those with a privacy bent of whatever stripe. Free to download and relatively user-friendly, TrueCrypt has been considered by experts to be among the strongest file-encryption programs available, since its release in 2004. It allows its users to easily work with encrypted files, and can store them in such a way that even if the user is forced to provide a key to, say, the authorities, that key can lead only to a file the user doesn’t mind exposing while keeping more sensitive contents behind a thicker wall. Without the user’s password, the software has long been viewed as uncrackable. Included in the information that Edward Snowden provided to Glenn Greenwald, Laura Poitras, and other reporters in 2013 was a document showing that the National Security Agency had “major problems” breaking TrueCrypt. Medclinician - JB - CWN - GIM |
|
"not if but when" the original Medclinician
|
|
Post Reply | |
Tweet
|
Forum Jump | Forum Permissions You cannot post new topics in this forum You cannot reply to topics in this forum You cannot delete your posts in this forum You cannot edit your posts in this forum You cannot create polls in this forum You can vote in polls in this forum |