'Backdoor to Encryption Won't Stop Terrorists'

Advertisement
By Leonid Bershidsky, Bloomberg | Updated: 19 November 2015 10:44 IST
There's no evidence the plotters of the Paris terrorist attacks used encrypted communications, but the debate about whether the technology should have a "backdoor" for intelligence services is heating up again. The debate, however, probably will have little effect on terrorist organizations.

Michael Morell, former deputy director of the Central Intelligence Agency, told "60 Minutes" on Sunday that after the public discussion of encryption sparked by Edward Snowden and the privacy concerns he raised, "we're now going to have another debate about that. It's going to be defined by what happened in Paris."

Islamic State has claimed responsibility for the Paris attacks and for the explosion of the Russian airliner over Egypt last month. The group used Telegram, a Russian-designed, Berlin- based secure messenger app, to get out its message. The terrorists appear to prefer this methodto platforms such as Facebook and Twitter, where they are being censored and their accounts blocked.

There's no doubt that terrorist groups use these channels, and probably many other means, such as steganography, or the officially Snowden-approved messenger Signal and other apps with encryption capabilities that make it harder for governments to interfere with the communication. It's worth asking how they are using this software, however.

Advertisement

Propaganda and recruitment require relatively secure channels because IS needs to get its message out without interruption. And for potential Islamic State recruits getting in touch with the group is an important social experience that is made more exciting if some cloak-and-dagger stuff is involved. It's unlikely, however, that any experienced terrorist would assume that such communication channels - almost all developed in Western countries - are safe.

Advertisement

Apple Chief Executive Tim Cook says the encryption now used in his company mobile operating system, iOS, prevents everyone, including Apple itself and government agencies, from accessing user data. "We're not reading your e-mail, we're not reading your iMessages," Cook said on "Charlie Rose" last year. "If the government laid a subpoena on us to get your iMessages, we can't provide it. It's encrypted and we don't have the key."

Such statements aren't all that reassuring to the Islamic State, which last year specifically banned its fighters and officials from using Apple devices.

Advertisement

Smartphones in general are not particularly safe because they have built-in satellite navigation and can be used to locate and eliminate terrorists. Even with navigation turned off, the phones are untrustworthy because they use operating systems from Google and Apple, both flagged by Snowden as participants in the National Security Agency's electronic surveillance programs. US intelligence officials' complaints about the supposed impenetrability of publicly available encryption and the demands for access have been rejected by the administration, but to Islamic State and other terror groups, that's just a suspicious good cop, bad cop routine.

After all, even the encrypted messenger Signal was partly funded by the US government as part of its effort to provide encryption technology to people fighting oppressive regimes. There is no way for the terrorists to know whether a backdoor was built in.

Advertisement

On the morning after the Paris attacks, former White House Press Secretary Dana Perino blamed Snowden for tipping off terrorists about US electronic surveillance. Yet long before Snowden leaked NSA documents, terror groups knew encryption wasn't particularly useful. Al-Qaida was known to use encryption and steganography; according to one story, the Muslim fundamentalists used porn sites to send secret messages. But the Sept. 11 hijackers exchanged unencoded messages on Hotmail, merely substituting the phrase "The faculty of Commerce" for "World Trade Center."

From a terrorist's point of view, truly secure communication is either so routine-looking as to avoid interest - or it is offline. If a group uses a commonly available messaging app, it's likely to get caught, as an alleged Chechen jihadist group did in Belgium last summer.

Whatever communication method the Paris assailants turn out to have used, providing backdoors into commercial encryption probably won't prevent the next attack. Almost all the attackers were known to the authorities, and if they had been watched, their use of encryption programs would have itself invited closer scrutiny. There is, however, no way for intelligence services to watch every suspicious individual all the time, and terrorists will always be able to use that to their advantage.

© 2015 Bloomberg L.P.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Xbox Cloud Gaming Launched in India: Here's How You Can Start Playing
  2. Acerpure Nitro Z Series 100-Inch QLED TV Debuts: Price in India
  3. Google Pixel Phones to Get November 2025 Update Soon, Details Leak Online
  4. The Elder Scrolls 6 Is 'Still a Long Way Off', Says Todd Howard
  5. Rowan Atkinson Returns with Chaotic Fun in Netflix's Man vs Baby: When to Watch Online?
  6. WhatsApp May Let You Reserve Same Usernames Used on Facebook, Instagram
  7. Oppo Reno 15 Lineup Could be Powered by This MediaTek Dimensity Chipset
  1. Planets Could Create Their Own Water While Forming, Expanding Possibilities for Habitable Worlds
  2. Panda Plan OTT Release Date Revealed: What You Need to Know About Jackie Chan's Heartwarming Action Comedy
  3. The Bengal Files OTT Release Date Confirmed: Know When and Where to Watch it Online
  4. The Night Manager Season 2 OTT Release Date: When and Where to Watch Tom Hiddleston Starrer Series Online?
  5. Kamaro 2 Now Available on OTT: Know Where to Watch This Sequel of Kamarottu Checkpost
  6. Marines Season 1 Now Streaming on Netflix: What You Need to Know About This Captivating Military Docuseries
  7. Rowan Atkinson Returns with Chaotic Fun in Netflix’s Man vs Baby: When to Watch Online?
  8. Jurassic Park: Rebirth OTT Release Date: Know When and Where to Watch it Online?
  9. Sony Announces State of Play Japan Broadcast for This Week: What to Expect
  10. GoPro Max 2, Lit Hero Launched in India With Up to 8K Video Recording, Along With Fluid Pro AI Gimbal: Price, Specifications
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.