{"id":349,"date":"2016-12-27T18:14:30","date_gmt":"2016-12-27T18:14:30","guid":{"rendered":"http:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/?p=349"},"modified":"2017-01-19T11:52:21","modified_gmt":"2017-01-19T11:52:21","slug":"facilitating-terror-attacks-online","status":"publish","type":"post","link":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/2016\/12\/27\/facilitating-terror-attacks-online\/","title":{"rendered":"Facilitating Terror Attacks Online &#8211; The Use of Encrypted Communications"},"content":{"rendered":"<p>The recent<a href=\"http:\/\/www.bbc.co.uk\/news\/world-europe-38377428\" target=\"_blank\"> terror attack in Berlin<\/a> which has left 12 dead and 49 injured has raised a pivotal\u00a0question here at Logged Into Terrorism. That being, how are Terrorists <strong>facilitating<\/strong> and<strong> planning<\/strong> these kinds of attacks in the online world?<\/p>\n<figure id=\"attachment_366\" aria-describedby=\"caption-attachment-366\" style=\"width: 698px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-366 size-full\" src=\"http:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-content\/uploads\/sites\/19\/2016\/12\/Faceless-man-on-laptop-by.jpeg\" alt=\"Faceless man on laptop \" width=\"698\" height=\"400\" srcset=\"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-content\/uploads\/sites\/19\/2016\/12\/Faceless-man-on-laptop-by.jpeg 698w, https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-content\/uploads\/sites\/19\/2016\/12\/Faceless-man-on-laptop-by-300x172.jpeg 300w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><figcaption id=\"caption-attachment-366\" class=\"wp-caption-text\">By Frank Peters\/Shutter Stock. Used for educational purposes<\/figcaption><\/figure>\n<h2>Vital Information<\/h2>\n<ul>\n<li><strong>Offline communication methods may still hold relevance in today&#8217;s digital world for terrorists.<\/strong><\/li>\n<li><strong>There are now endless ways to communicate online which is impossible to track.<\/strong><\/li>\n<li><strong>The use of Encryption allows terrorists to communicate with no fear of being caught.<\/strong><\/li>\n<li><strong>The Investigatory Powers Bill aims to crack down on private online communication but it may not be enough.<\/strong><\/li>\n<\/ul>\n<h2>The Past<\/h2>\n<p>Before the prominence of web and mobile communications, terrorists had to use other methods to communicate and plan with one another.<\/p>\n<p><strong>Methods:<\/strong><\/p>\n<ul>\n<li>Dead Drops<\/li>\n<li>Courier By Hand<\/li>\n<li>Written Notes<\/li>\n<li>Face to Face communication<\/li>\n<\/ul>\n<p><strong>You<\/strong> may think these methods\u00a0are out of date in a digital world. Almost all of these are still successful in today&#8217;s\u00a0society because they are difficult to intercept.<\/p>\n<p>Courier by hand is a prolific method especially in the case of <a href=\"http:\/\/www.telegraph.co.uk\/news\/worldnews\/asia\/pakistan\/8489078\/Osama-bin-Laden-killed-phonecall-by-courier-led-US-to-their-target.html\" target=\"_blank\">Osama Bin Laden<\/a>. This offline method allowed him to stay hidden for years and kept everyone guessing.<\/p>\n<p>On the other hand, these methods are restricted because they only allow communication across small areas. Trying to communicate on a global scale using offline methods would take days maybe even weeks. Therefore, this makes it harder for terrorists to facilitate attacks.<\/p>\n<p>Unfortunately, this doesn&#8217;t\u00a0stop terrorism as the internet and mobile phones give terrorists the ability to communicate all over the world.<\/p>\n<h2>The Present<\/h2>\n<p>New online methods\u00a0are used by terrorists which now allow rapid communication. This is terrifying because it&#8217;s even harder to intercept messages, as plans could be changed in seconds via a text.<\/p>\n<p><strong>New Online Methods:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">Facebook<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/\" target=\"_blank\">Twitter<\/a><\/li>\n<li><a href=\"https:\/\/www.whatsapp.com\/\" target=\"_blank\">WhatsApp<\/a><\/li>\n<li><a href=\"http:\/\/www.forbes.com\/sites\/insertcoin\/2015\/11\/14\/why-the-paris-isis-terrorists-used-ps4-to-plan-attacks\/#1797c055731a\" target=\"_blank\">Game Consoles<\/a><\/li>\n<li><a href=\"http:\/\/www.terrorismanalysts.com\/pt\/index.php\/pot\/article\/view\/513\/html\" target=\"_blank\">The Dark Web<\/a>\u00a0&#8211; \u00a0A hidden network of sites and communities on the internet that can only be accessed through specialised browsers.<\/li>\n<li>Cryptic messages on sites like eBay and Amazon<\/li>\n<\/ul>\n<p><strong>There are literally\u00a0endless ways to communicate in the online world.<\/strong><\/p>\n<p>This has negatively revolutionised terrorism to a point where it can&#8217;t be controlled because millions of messages are being sent daily. Therefore, it has become impossible to manage and track every message.<\/p>\n<p>Ex-MI6 counter-terror chief, <a href=\"https:\/\/twitter.com\/rmdbarrett\" target=\"_blank\">Richerd Barrett<\/a>, highlighted that Germany alone has <a href=\"http:\/\/www.dailymail.co.uk\/news\/article-4057824\/Germany-7-000-terror-suspects-large-finding-impossible-monitor-former-UK-intelligence-chief-says.html\" target=\"_blank\">7,000 terror suspects<\/a> that are almost impossible to keep track of.<\/p>\n<h3>Encryption is the Key<\/h3>\n<figure id=\"attachment_367\" aria-describedby=\"caption-attachment-367\" style=\"width: 640px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-367 size-full\" src=\"http:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-content\/uploads\/sites\/19\/2016\/12\/Padlock-by-Yuri-Samoilov-Flickr.jpg\" alt=\"Digital padlock on computer screen \" width=\"640\" height=\"427\" srcset=\"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-content\/uploads\/sites\/19\/2016\/12\/Padlock-by-Yuri-Samoilov-Flickr.jpg 640w, https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-content\/uploads\/sites\/19\/2016\/12\/Padlock-by-Yuri-Samoilov-Flickr-300x200.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-367\" class=\"wp-caption-text\">By Yuri Samoilov\/Flickr<\/figcaption><\/figure>\n<p>The aim of planning attacks online is not to leave a digital footprint which the authorities could trace. Unfortunately, this is easy for Terrorists to achieve because of Encryption.<\/p>\n<p>Encryption in its simplest form is the translation of data into a secret code which is the most effective way to achieve data security. Only authorised recipients can view the message therefore preventing any form of interception\u00a0from the authorities.<\/p>\n<p>This is perfect for Terrorists however\u00a0its&#8217;s a serious issue for the rest of the world that shouldn&#8217;t be ignored. Terrorists are free to plan attacks without any fear of being caught.<\/p>\n<p>Terrorists also use encryption for recruitment as people can be secretly recruited from anywhere in the world if they have an internet connection. With no background information on certain terrorists, it becomes increasingly harder to stop them.<\/p>\n<p><a href=\"http:\/\/abcnews.go.com\/US\/feds-challenged-encrypted-devices-san-bernardino-attackers\/story?id=35680875\" target=\"_blank\">FBI Director James Comey <\/a>states:<\/p>\n<blockquote><p>\u201cIncreasingly, we are unable to see what they [terrorists] say, which gives them a tremendous advantage against us.\u201d<\/p><\/blockquote>\n<p>Current laws and policies stop most access to these encrypted messages in a peaceful way, due to this the <a href=\"http:\/\/www.wsj.com\/articles\/comey-fbi-paid-more-than-1-million-to-hack-san-bernardino-iphone-1461266641\" target=\"_blank\">FBI paid over $1 million for a hacking tool<\/a> to open up a terrorist gunmen&#8217;s phone.<\/p>\n<p>The new<a href=\"http:\/\/www.bbc.co.uk\/news\/uk-34713435\" target=\"_blank\">\u00a0Investigatory Powers Bill<\/a> in the UK tries to open up private communication channels. Therefore, requiring web and phone companies to store records of websites visited by every citizen for 12 months for access by police, security services and other public bodies.<\/p>\n<p>However, Apple&#8217;s iMessage and the WhatsApp messaging service places end-to-end encryption on all messages meaning they can not be read not matter what. Which means these new laws may only have a minor impact on terrorist communication methods.<\/p>\n<h3>WhatsApp<\/h3>\n<figure id=\"attachment_368\" aria-describedby=\"caption-attachment-368\" style=\"width: 846px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-368\" src=\"http:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-content\/uploads\/sites\/19\/2016\/12\/whatsapp-1789194_1280.jpg\" alt=\"WhatsApp icon on an iPhone home screen \" width=\"846\" height=\"564\" srcset=\"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-content\/uploads\/sites\/19\/2016\/12\/whatsapp-1789194_1280.jpg 1280w, https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-content\/uploads\/sites\/19\/2016\/12\/whatsapp-1789194_1280-300x200.jpg 300w, https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-content\/uploads\/sites\/19\/2016\/12\/whatsapp-1789194_1280-768x512.jpg 768w, https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-content\/uploads\/sites\/19\/2016\/12\/whatsapp-1789194_1280-1024x682.jpg 1024w\" sizes=\"(max-width: 846px) 100vw, 846px\" \/><figcaption id=\"caption-attachment-368\" class=\"wp-caption-text\">By Webster2703\/Pixabay<\/figcaption><\/figure>\n<p>WhatsApp is a texting service between mobile phones which uses an internet connection. It offers end-to-end encryption meaning messages, photos or videos don&#8217;t fall into the wrong hands.<\/p>\n<p><a href=\"http:\/\/www.express.co.uk\/life-style\/science-technology\/627577\/Islamic-State-Terrorist-Attack-Paris-WhatsApp-Encrypted\" target=\"_blank\">The Paris terror attacks<\/a> which killed 130 people on the 13 November 2015 was planned by ISIS members using WhatsApp. It is believed that the app was used several times to fully plan and coordinate the attack. However, the contents of these messages will never be known due to the encryption.<\/p>\n<p><a href=\"http:\/\/edition.cnn.com\/2016\/12\/23\/europe\/berlin-christmas-market-attack-suspect-killed-milan\/\" target=\"_blank\">Berlin terror attack suspect Anis Amri<\/a> was recently killed in Milan. Though, how did Anis manage to get so far away? To travel that far he had to pass 2 border security checks whilst being the most wanted man in the world. It would be interesting to see if WhatsApp or other encrypted communication apps were used to help plan his escape.<\/p>\n<h2>The Future<\/h2>\n<p>In conclusion, these online communications are rapidly evolving and in doing so disregarding\u00a0laws that allow governments to intercept content peacefully.<\/p>\n<p>Politicians such as <a href=\"https:\/\/www.theguardian.com\/commentisfree\/2015\/jan\/13\/cameron-ban-encryption-digital-britain-online-shopping-banking-messaging-terror\" target=\"_blank\">David Cameron<\/a> have suggested the idea of banning encryption. However, this solution is not only impossible but will put <strong>you<\/strong> at risk.<\/p>\n<p>Therefore, Governments and online communication companies should work together to expose terrorist\u00a0communication channels, whilst keeping <strong>your<\/strong> details and messages safe.<\/p>\n<hr \/>\n<p>Next week&#8217;s Post will be very different as the investigation\u00a0turns to look at what web and mobile communications have created for Terrorism, which is <strong>Cyber-Terrorism<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recent terror attack in Berlin which has left 12 dead and 49 injured has raised a pivotal\u00a0question here at Logged Into Terrorism. That being, how are Terrorists facilitating and planning these kinds of attacks in the online world? Vital Information Offline communication methods may still hold relevance in today&#8217;s digital world for terrorists. There [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":366,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[5,15,14,3],"_links":{"self":[{"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-json\/wp\/v2\/posts\/349"}],"collection":[{"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-json\/wp\/v2\/comments?post=349"}],"version-history":[{"count":25,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-json\/wp\/v2\/posts\/349\/revisions"}],"predecessor-version":[{"id":663,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-json\/wp\/v2\/posts\/349\/revisions\/663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-json\/wp\/v2\/media\/366"}],"wp:attachment":[{"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-json\/wp\/v2\/media?parent=349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-json\/wp\/v2\/categories?post=349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/connorbean\/wp-json\/wp\/v2\/tags?post=349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}