After Endless Demonization Of Encryption, Police Find Paris Attackers Coordinated Via Unencrypted SMS
from the anonymous-sources-say dept
In the wake of the tragic events in Paris last week encryption has continued to be a useful bogeyman for those with a voracious appetite for surveillance expansion. Like clockwork, numerous reports were quickly circulated suggesting that the terrorists used incredibly sophisticated encryption techniques, despite no evidence by investigators that this was the case. These reports varied in the amount of hallucination involved, the New York Times even having to pull one such report offline. Other claims the attackers had used encrypted Playstation 4 communications also wound up being bunk.
Yet, pushed by their sources in the government, the media quickly became a sound wall of noise suggesting that encryption was hampering the government’s ability to stop these kinds of attacks. NBC was particularly breathless this week over the idea that ISIS was now running a 24 hour help desk aimed at helping its less technically proficient members understand encryption (even cults help each other use technology, who knew?). All of the reports had one central, underlying drum beat implication: Edward Snowden and encryption have made us less safe, and if you disagree the blood is on your hands.
Yet, amazingly enough, as actual investigative details emerge, it appears that most of the communications between the attackers was conducted via unencrypted vanilla SMS:
“…News emerging from Paris ? as well as evidence from a Belgian ISIS raid in January ? suggests that the ISIS terror networks involved were communicating in the clear, and that the data on their smartphones was not encrypted.
European media outlets are reporting that the location of a raid conducted on a suspected safe house Wednesday morning was extracted from a cellphone, apparently belonging to one of the attackers, found in the trash outside the Bataclan concert hall massacre. Le Monde reported that investigators were able to access the data on the phone, including a detailed map of the concert hall and an SMS messaging saying ?we?re off; we?re starting.? Police were also able to trace the phone?s movements.
The reports note that Abdelhamid Abaaoud, the “mastermind” of both the Paris attacks and a thwarted Belgium attack ten months ago, failed to use any encryption whatsoever (read: existing capabilities stopped the Belgium attacks and could have stopped the Paris attacks, but didn’t). That’s of course not to say batshit religious cults like ISIS don’t use encryption, and won’t do so going forward. Everybody uses encryption. But the point remains that to use a tragedy to vilify encryption, push for surveillance expansion, and pass backdoor laws that will make everybody less safe — is nearly as gruesome as the attacks themselves.
Filed Under: clear text, encryption, going dark, isis, overreaction, paris attacks, sms, surveillance, terrorism
Comments on “After Endless Demonization Of Encryption, Police Find Paris Attackers Coordinated Via Unencrypted SMS”
Perhaps if they spent less time spreading anti-encryption propaganda, and more time actually focusing on terrorists who exist in the massive amount of unencrypted data they already collect, they would actually stop terrorists.
Re: Re:
See, there are two different goals there, and they are only coincidentally both number one. The first is to get the encryption backdoors so that no one can hide from them, ever. And the other first is to increase their big brotherish hold over…well everyone. How is it that you are not on the bandwagon yet? Please present your papers citizen!
Re: Re: Goals
The question everyone should be asking is, why isn’t government profiling? Its clear that it wasn’t 5-year-old boys, or elderly women in wheel chairs wearing diapers that flew planes into the WTCs. Yet we are spending billions to grope children and force the wheel chair bound elderly to remove their diapers in airports. These terrorists are not modern day Puritans wearing suicide belts, going door-to-door blowing people up. Most of us don’t fit the profile. So, why are we being surveilled?
Re: Re:
Your comments have been noted and a reeducation officer has been dispatched to your location. Thoughtcrime is NOT permitted!
Re: Re:
Hah, the intelligence community is more concerned about being able to see everything than saving the lives of civilians. They want to be able to take out anyone who can harm the elite…not protect the average citizen which is impossible even for them. And frankly, they really could care less about murder as they do it enough themselves.
Re: Unencrypted Data Collection
All that data they said they needed to collect from law abiding citizens has never resulted in shutting down a potential terror event. However, other law enforcement agencies have illegally used that data to conduct investigations of people here in the United States. Fact is, the U.S. government sold Americans a lemon, and most Americans keep sucking on it. Its Unbelieveable!
What not to do
If the TSA and its shoe fetish is any guide to go by, everyone, please, whatever you do in the next few years, do NOT, under ANY circumstances, text the phrase:
““we’re off; we’re starting”
to anyone, EVER.
Re: What not to do
Indeed. And what makes that silly is that being of Syrian descent and French citizens living in Belgium, it’s likely that the attackers didn’t even know English. The text is more than likely a translation.
Re: Re: What not to do
http://www.france24.com/fr/20151118-dernier-sms-terroristes-bataclan-attentat-paris-telephone-alfortville-saint-denis-planque
“On est parti, on commence” : le dernier SMS envoyé à l’un des terroristes
Re: Re: What not to do
I strongly suspect that the common image of these agencies setting up some alarm based on keywords is false, or at least exaggerated. I think the more important information is WHO is communicating. Once a person of interest is identified, because they were arrested or because they bragged to an informant or whatever, it seems like it would be helpful to quickly find out who that person has been communicating with, and this is the value of phone records. THEN the contents of those communications, if required, can be examined for critical information.
Re: What not to do
Dear voiceofReason:
we’re off
we’re starting
kisses, hugs and best regards, a trrrrist
PD:
https://www.techdirt.com/user/voiceofreason
Re: What not to do
i will
send this via sms to all my cellphone contacts
and via email to all my email contacts
at 11:59 am
Re: What not to do
I think the most worrying factor to me is that they know how to use a semi-colon better than I do!!
Re: What not to do
or…..everyone should text phrases like at least three times a day from their phones.
Re: What not to do
Why not? It certainly didn’t stop the terror tacks in Paris.
In other news: McCain gracefully backs away from his proposed encryption legislation.
Err…Too early for April Fool’s?
Re: Re:
Not a chance. Even seven years after such claims were thoroughly disproven…
“Well, some of the 9/11 hijackers did come through Canada, as you know.”
– John McCain, incorrectly, April 24, 2009
McCain is also warning that ISIS could come storming across the Canadian border.
The man who decided that Sarah Palin could command the country in a crisis isn’t one to flip-flop. When he says something goddamned stupid, he sticks with it.
Re: Re: Once Again
We need a Sad, but True, button.
Quick, Hurry
We need to quickly ban this SMS technology to prevent the next attack.
Re: Quick, Hurry
Ban any and all communications that do not first get routed through a central government repository for decryption/storage. It’s the only way.
Re: Re: Quick, Hurry
So talking to your neighbors over the fence should go through a government server first? I would forget about getting your ball back.
Re: Re: hive mindset
“routed through a central government repository for decryption/storage. It’s the only way.”
this would be like when the cops arrive 2 hrs later to your home just to take photos… (and you do not have guns).
they could try to use the dragnet database, streetcams, etc to find the burglars but YOU and YOUR FAMILY are already dead.
the collective hive sheep government system will continue
Re: Quick, Hurry
this trrist are VERY OLD SCHOOL: they use SMS !!!
Remind me again what the security services are meant to do, apart from being able to explain how an attack was carried out after the event.
Re: Re:
The Department of Hindsight Security knows exactly what happened after it happens.
Re: Re:
” what the security services are meant to do, apart from being able to explain how an attack was carried out after the event.”
this is brilliant
we do not care about the dead individual
but the collective herd…
Re: Security services
Security services provide a false sense of security. Our intelligence services, on the other hand, are supposed to gather and analyze data to prevent acts of terror.
ah! but they were only the messages they meant to be found! the real sneaky stuff was sent by encrypted pigeon!
Re: Re:
Data interception specialists:
“Quick! It’s a rock dove! Intercept it!”
“Er, isn’t it carrier pigeons that carry messages?”
“It’s likely a carrier pigeon in disguise. We need to capture and analyze it to be sure!”
+++ATH0&^89I&*^( NO CARRIER
Obvious answer? Ban all pigeons in Paris. It’s the only way to be sure.
No, really. http://www.parissweethome.com/parisrentals/art_uk.php?id=101
Re: Re: Re:
“Is it a European rock dove or an African rock dove?”
“I don’t know….”
“Aaaaahhhhhhgggg…….”
Re: Re: Re: Re:
“How do know so much about doves?”
Re: Re: Re:2 Re:
Laden or unladen?
Re: Re:
European citizens are hereby mandated to shoot every bird they see!
Too much hay?
Like people have said before, maybe collecting all data creates too much to search through. SMS is not exactly new and has been collected since the start.
If something that easy to find can circumvent the whole data collection and analysis apparatus maybe we should stop for a moment and reconsider how the whole system works or maybe even if the system works.
This just shows how useless the current data collection is
If the current data collection programs worked, then this would have been prevented, see, found out, or something…
Betcha no one in intelligence is going to own up to that!
Re: This just shows how useless the current data collection is
Reality is that the latest perpetrators were on the French police watch list. However that list is 5000 strong so they aren’t able to watch them all the time.
Most of these proposals will only increase the size of the watch list. That can only make things worse
encoded != encrypted
I think what the sound wall also seems to be forgetting is that encoded is not the same as encrypted.
Even if the powers that be got their wish and made the entire world less safe and less private, that probably still wouldn’t stop terrorists (or your garden variety criminal) from secretly communicating. People have been doing it since Roman times, heck probably since biblical times.
So what where these people really talking about?
Other than making it a little more work to get to, would the fact that it was encrypted or in plain text make it any easier for law enforcement to understand?
Removing encryption makes everyone less safe and is just a road bump to any serious criminal or terrorist organization.
Re: encoded != encrypted
Look up the pizza connection in which the Sicilian Mafia channeled drugs through (otherwise legitimate) pizza delivery joints. It took the FBI years to work out the code with thousands of hours of recorded phone tap.
Re: encoded != encrypted
I don’t think your examples would be read just out of the blue. The more likely scenario is that authorities had reason to be reading/listening/whatever to that specific contact, and could piece together your example traffic with other information to build a picture of the situation. Just like a suspected spy might be followed after work and arrested when he passes a briefcase to a known foreign agent, while other people who are not suspects can pass around briefcases whenever they want without attracting any notice at all.
If a person of interest contacts another person of interest, thereby establishing the existence of a relationship between the two, that is useful information (intelligence, if you will). The contents of their communication, if available, is more information. Obviously, more information is good.
Re: Re: encoded != encrypted
Sounds like you are talking about good ol fashioned police / intelligence work. You know, the kind that doesn’t require the police / intelligence agencies to plant bugs in all our phones, video cameras in all our bedrooms, and amass warehouses full of information that takes so long to process it’s only good at figuring out who committed a crime / attack after it’s happened.
[well that the official reason anyway]
I think that’s just too much work for our modern forces.
Re: encoded != encrypted
Politician here. Looks like we need to ban bread. Thanks for the tip.
Re: encoded != encrypted
how many grams of rye would 800€ get me?
I need high purity it is for a trader friend and he is picky.
Re: encoded != encrypted
Mi5 use to get resistance from Royal Mail about intercepting letters and so warrants had to be applied. The numerous methods of communicating (another one is multiple people logging into webmail and using drafts and not sending the email). Encryption would only encypt the message but not the fact that a message was sent, but for evidence gathering (especially proof of intent when preventing crime) it is important.
Besides, wont quantum computers make the current infrastructure useless anyway?
Re: Re: Quantum computers
Yeah. Quantum computers will be able to speed up factorization of large numbers so that private keys can be derived from public keys.
Everyone in the asymmetric crypto sector is worried about this.
Still, we’ve yet to make an actual Quantum. Dunno if the recent prototype logic gate is enough to do it.
Re: Re: Re: Quantum computers
On the flip side, quantum computing would also allow crypto that is far stronger than anything we can make right now. Quantum computing would not make crypto worthless, it would just be a continuation of the back-and-forth game that crypto has always been.
Re: Re: Re:2 Quantum computers
Of course, but that provides that we have access to them.
Right now our (partial) quantum computers are giant mainframes. It’ll be a while when we have qubits in our smartphones.
Re: Re: Re:2 Quantum computers
Quantum crypto is a completely separate thing from Quantum computers – and it is already in use- although it has potential flaws (that are also not directly related to quantum computers).
Quantum crypto makes use of the Heisenberg uncertainty principle to prevent undetectable eavesdropping whereas Quantum computers rely on superposition of states to create massive parallelism.
Biggest story of the day
See, this isn’t just not the story the surveillance maximalists want to tell. And it goes deeper than saying encryption doesn’t matter.
This suggests that the mass surveillance mentality itself is partly to blame.
We already know that France and most of the rest of the EU has NSA-type powers to collect it all and sort through the pile later. This means they probably had all the evidence they needed but couldn’t stop it anyway. There’s too much data to search in real time in any meaningful way. A more focused targeting of surveillance would greatly reduce the analysis paralysis.
Which leads to a point I’ve been making all along., that there are two realities to mass surveillance:
1) If they are parsing it all in real time, they may be able to prevent an attack, but this gives lie to the claim that your data is never being searched (everybody’s must be included in the data set).
2) If they are only looking at it in hindsight, they can be more specific about the selectors and exclude more people, but this gives lie to the claim that they can prevent an attack in the first place (it can only be investigated).
OK, so NOW can we start blaming the intelligence agency bosses for FAILING to do their jobs and FIRE THEM?!
Or are we going to wait until they hand us another scapegoat?
Paris Attackers Coordinated Via Unencrypted SMS
Ha! That’s just priceless!
Complete disgrace
Only bad people use encryption, that is why the governments missed this opportunity to stop it. They only focus on bad guys using encryption not good people in the clear. The question I have, is the intelligence agencies a complete disgrace for allowing the attack to happen in order to gain more power at the expense of innocent lives. Or are the a complete disgrace for once again failing to perform.
Re: Complete disgrace
Why not both?
Re: Complete disgrace
I don’t know if it’s that they are a complete disgrace. What is not properly communicated is that the intelligence community doesn’t have the legal right to sift through everyone’s data. There is no way that someone “let this happen” in order to get more power over their citizens– especially since it happened in France, it wouldn’t impact the US in any great way. Now, if it happened in the US, there might be an argument, but a loose one, and it wouldn’t allow the IC to batch collect data like that.
The problem, I would think, is that they would be overwhelmed by the volume of data and that they have no real program or enough analysts to sift through all the bullshit.
THE SHARK IS IN THE WATER. REPEAT. THE SHARK IS IN THE WATER.
Did the attackers’ SMS communications feature plain communications or ambiguous codes.
Minor delays here. Jabbir still priming detonators. Replacing Uman’s bent AK firing pin. Ready to go in 5 min.
Re: THE SHARK IS IN THE WATER. REPEAT. THE SHARK IS IN THE WATER.
last trip I got a couple of old “bottles of Kalashnikov vodka” through the border,
they are now in my basement,
but first we need to get Ahmed to clean and grease them
Re: Re: THE SHARK IS IN THE WATER. REPEAT. THE SHARK IS IN THE WATER.
we have to buy some prof. sewing machine oil in amazon
Breaking news
Manhattan DA’s Office and Senator Tom Cotton team up to ban the words “we’re”, “off”, and “starting”.
“No true American would use such terror-ridden words”, Senator Cotton may or may not have been quoted as saying.
More at 11!
Re: Breaking news
Manhattan DA’s Office and Senator Tom Cotton team up to ban the words “we’re”, “off”, and “starting”.
The first thing we do – round up all the sports commentators!
Where is the proof that all communications were SMS?
The police found a burner phone with a text.
This article is bullshit, as usual.
Re: Re:
Found the real politician…
How can you all be so thick?
If terrorists using unencrypted channels were able to communicate without being noticed, imagine how much more unnoticed they’d been had they used encryption.
Re: How can you all be so thick?
Apparently it wouldn’t have mattered… cuz the use of encrypted or non-encrypted communication isn’t the problem that needs to be solved in order to start catching people before they do bad things.
Re: Re: How can you all be so thick?
whoosh
Re: Re: Re: How can you all be so thick?
Sorry, given the usual comments around here – the sarcasm was hard to detect… this is how they actually think.
All this surveillance
isn’t about catching people doing bad things… that’s just the bullshit they’re feeding us to make us feel all warm and fuzzy.
No, it’s about collecting and STORING all communication between all people so that they can go back later and use that to find patterns of activity that are either illegal or embarrassing should they need this information at some point in the future.
Until there’s actually some reason to filter (or “target” as they say) the data – it’s just a big pile of hay. But with the right filtering, the data could show someone’s very private details – perfect when you need to find reasons to arrest people after the fact.
Re: All this surveillance
if you raise your voice
we will check the 30 yrs of info we have on you and your family
and we will destroy you
Re: Re: All this surveillance
this is exactly the message
Re: Re: All this surveillance
Also, if I’m an official and like your wife, or your business is innovatively competing with my business, then I can find something and ruin you.
In the Harlequin romance novel version, I use prison to hold you hostage to keep your wife receptive. She treats me well, you stay in the light wing and keep your access to the library and better food and stuff.
She turns cold, and you get transferred to the hard wing and become Bubba’s bitch.
Encryption end-goal
Devil’s advocate:
If the end-goal for the encryption push is to encrypt the content of all communication, then theoretically, those pushing for ubiquitous encryption are stating that the terrorists communicated over a medium that they still want encrypted to protect everyone else that uses it.
If these spooks had better hind sight,
they could have found the back door.
And Democrats using the attacks to justify Obama’s goal of firearms confiscation is also despicable.
Here's one of the messages found after the blast,
http://abcnews.go.com/images/International/abc_carrier_pigeon_dm_121101_wblog.jpg
still in its pidgeon pod.
We must outlaw unencryption!
So, the terrorists didn’t encrypt their communications. Based on the logic politicians have been using so far, doesn’t this mean they should be telling us to encrypt everything?
Re: Re:
Mind if I send that to our politicans? Finland is still pretty much only contry in EU that dosn’t do mass surveillance.
Ofcourse our Secret Police and Army want to legalize it, because…
National Security!
Total bogosity of the help desk idea
No one is commenting on the ludicrous bogosity of the help desk idea? None of you see it? Or are you ignoring it just because it’s peripheral to the encryption topic?
Let me just say that the notion of ISIS/ISIL setting up such a locus of communication is completely insane. Well, yes, they are insane, but it’s also completely stupid.
The fake reports say six of their senior leaders would be working the help desk. Okay, right there is a prime target for a bomb. However, the REAL risks of such a stupid idea are vastly larger. The Daily Show did a skit on fake help, but better to leave it in place. This is a case where just tapping the metadata would be incredibly effective. Pretty safe bet that everyone who calls a ‘how to be a terrorist’ help desk is a person of interest.
Even more obviously, the fundamental notion of a help desk is that you have to distribute the contact information widely. Oh, wait. How long until a copy of the contact information leaks out? Or some fool drops his wallet with the help desk number in it?
Never let facts get in the way of state supported propaganda. It is what every good shill knows. That and their inability to see how they are setting themselves up to be executed/discarded when they are no longer of use to the regime.
So, are you all just fucking retarded? Do you really need to fixate on this?
Re: Wow! Thoughtful.
Who’da thunk someone would pull out the what are you all retarded argument.
Jolly good show.
Re: Re: Wow! Thoughtful.
I really loved it back in ’68 when Gore Vidal eviscerated Buckley with an eloquent and perfectly crafted “retard” reference.
Re: Re:
Since you decided to be fixated on encryption, the fact that it got so easily sidestepped is pretty fucking retarded. For your side.
Re: Re: Whose side do you think I'm on?
I think encryption is a sweet thing we should be doing because it might slow down intelligence agencies from spying on everyone, and because it prevents our fourth-amendment rights from being encroached.
I think end-to-end encryption will prove necessary to keep governments and corporations out of our private lives, and out of the non-public records of our businesses.
US officials have been pushing for more surveillance and for hobbling encryption for the sake of intercepting terrorists.
Terrorists, that it appears, weren’t using encryption at all.
So that excuse is lame. And encryption is still very useful for the rest of us.
Are you up to speed now? I know it’s hard.
Re: Re: Re: Whose side do you think I'm on?
I think either you’re mistaken, or I’m mistaken and/or horrible at putting my point across.
My point was to counter the shill’s point that we were fixating on the fact that terrorists used unencrypted messages. The fact they did use unencrypted message rendered the obsession with removing encryption for citizens moot, because it doesn’t solve anything.
Re: Re: Re:2 Whose side do you think I'm on?
I’m probably mistaken then. As I agree with you.
I’m going to blame it on a tiresome day.
Re: Re: Re:3 Whose side do you think I'm on?
I concur. Dealing with anti-encryption shills is tiresome indeed.
Re: Re: Re:
Wait, so choosing not to encrypt your communication counts as “side-stepping” now? What?
The kinds of horrible attacks are never going to be prevented. Sufficiently dedicated terrorists are always going to find ways to circumvent surveillance systems. It wouldn’t surprise me if they revert to using pigeons to carry their messages.
It's WHO not HOW!
This just proves that the wide net data collection of everything from everyone is useless.
HOW they watch is useless!
What they need to get right is WHO they watch.
Re: It's WHO not HOW!
“wide net data collection of everything from everyone is useless”
useless for what? for whom?
THINK!
maybe YOU are wrong on the purpose they do this?
BREAKING
NSA DOC REVEALS ISIS LEADER AL-BAGHDADI IS U.S., BRITISH AND ISRAELI INTELLIGENCE ASSET
http://www.infowars.com/nsa-doc-reveals-isis-leader-al-baghdadi-is-u-s-british-and-israeli-intelligence-asset/
BREAKING! PARIS ATTACKS FALSE FLAG: DRILLS PLANNED ON SAME DAY!
https://www.youtube.com/watch?v=De_PyuLDfhg
CONFIRMED: Sandy Hook Crisis Actors Pose as Paris Attack Victims! SHAME ON CNN!
https://www.youtube.com/watch?v=_oxGMMNwYeo
Since when have people with their own agenda had a problem with making their own “truths” to satisfy whatever situation in order to get what they want? Corrupt people have always been willing to corrupt the truth. (People are stupid apparently.) Funny how the people who are bathed in blood are eager to accuse “enemies” of having “blood on their hands”.
Ending Blowback Terrorism
Painful as it is to admit, the West, especially the United States, bears significant responsibility for creating the conditions in which ISIS has flourished.
https://www.project-syndicate.org/commentary/islamic-state-blowback-terrorism-by-jeffrey-d-sachs-2015-11
Re: Ending Blowback Terrorism
what a flowery way of saying they designed created trained armed and payed the whole thing
Hiding in plain sight, so retarded it is brilliant. The spooks would never expect the obvious.
only terrorists use semi-colons
Haystack Problem
Problem: We’re looking for a needle in a haystack.
Solution: More haystack.
It’s like f’n cowbell for Christopher Walken.
Re: Haystack Problem
More cowbell
Veil of Freedom
The government won’t be happy until the populous is living under a veil of freedom. We are at the point where almost nothing is inviolable. Government wants its nose so far up your sphincter that they can smell your breath and tell you what you had for breakfast.
Baaa!
Anatomy of HATE;
If you’re not from my caste/religion, you’re non-human to me;
https://wh.gov/iyhMK
We need to bomb Syrians, reject refugees and ban encryption,
because Paris- terrorists were not Syrian, nor refugees and used no encryption.