New Study Says There's No Evidence That Terrorists Changed How They Communicate Post-Snowden
from the because-they-already-knew dept
One of the standard talking points right after the Ed Snowden revelations first started coming out was that the leaks were causing terrorists to change how they communicated, meaning that US intelligence was somehow "losing track" of important information on the whereabouts and plans of terrorists. The most obvious example of this was from CNN "reporter" Barbara Starr (who has a long track record of repeating Defense Department talking points) who directly claimed: "terrorists are trying to change the way they communicate because of what they learned from Edward Snowden's admitted leaks of classified information about government surveillance programs." We questioned this claim on a number of points -- in part because there was plenty of evidence that most terrorists already suspected such surveillance and acted accordingly. Meanwhile, in private, James Clapper (who publicly was claiming massive damage from terrorists changing how they communicate) admitted that he really wasn't that worried.Clapper has said repeatedly in public that the leaks did great damage, but in private he has taken a more nuanced stance. A review of early damage assessments in previous espionage cases, he said in one closed-door briefing this fall, found that dire forecasts of harm were seldom borne out.So it should come as no surprise at all that a new research report more or less confirms that there is no evidence of terrorists changing how they communicate post-Snowden. You can read the full report from Flashpoint Partners yourself, but it's pretty clear:
- The underlying public encryption methods employed by online jihadists do not appear to have significantly changed since the emergence of Edward Snowden. Major recent technological advancements have focused primarily on expanding the use of encryption to instant messenger and mobile communications mediums.
- Aside from warning of tampered copies of “Asrar al-Mujahideen” that were deliberately infected with spyware, none of the prominent jihadi logistical units have expressed any public doubt as to the continued effectiveness of encryption methods employed in their software packages that were released prior to the Snowden leaks.
- The actual release of new jihadi-themed encryption software packages, like “Asrar al-Dardashah,” seems to have had a far more noticeable impact in terms of driving waves of interest in the subject of encryption among users of jihadi web forums than the publication of the Snowden NSA revelations in June 2013.
- Well prior to Edward Snowden, online jihadists were already aware that law enforcement and intelligence agencies were attempting to monitor them. As a result, the Snowden revelations likely merely confirmed the suspicions of many of these actors, the more advanced of which were already making use of – and developing –secure communications software.
The report also looked at forum discussions on various encryption techniques on forums frequented by terrorist groups. As you can see from the following two charts, there doesn't appear to be any bump in discussions about encryption or related software post Snowden (the leaks began in June of 2013). If anything there was much more discussion before the Snowden revelations started:
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: communication, ed snowden, encryption, fud, james clapper, jihad, terrorists
Companies: flashpoint partners
Reader Comments
Subscribe: RSS
View by: Time | Thread
In a related story, the NSA is asking researchers how they determined terrorists were communicating because they are still eluding them.
[ link to this | view in chronology ]
Sick of it...
I care less about what intel that comes out that might change how the 'terrorists' communicate. What I care about is the mentality that this nation has to operate in the secret just like the 'Bad Guys' in order to fight them.
Only 'Bad Guys' like to operate in the dark, for very obvious reasons and the reasons that this government likes to operate in the dark is because it is breaking the law and the constitution to worthless pieces. There is literally no right not under assault by this government in pursuit of stopping terrorism.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
Guess you have not bothered to read the news much! And if you think it is a stretch then you need to stop voting because you are not competent enough to select the proper candidate. Governments have a dirty long list of doing just exactly what you called a stretch without having the convenience of technology.
[ link to this | view in chronology ]
Re: Re: Re:
You may not be reading the news much, but there are substantial threats, electronic and material, from foreign organizations that don't exactly telegraph their intentions, (as the US oddly does). While it's true that effective uses of surveillance is rare, it's still an important resource that can be properly leveraged in some circumstances.
[ link to this | view in chronology ]
Re: Re: Re: Re:
While they may not be actively targeting people with different political views, the information they have makes it really easy to do so. Not only has everyone in history that has been given unchecked power abused it, we have actually seen that the NSA routinely abuses these powers. Retaining their position of power will inevitably become their priority (if it isn't already) and that has to be stopped while we still have the ability to do so without violence.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
False!
[ link to this | view in chronology ]
Re: False!
[ link to this | view in chronology ]
Disinformation
Like the FBI, creating bad guys is easier than actually finding and catching actual bad guys.
If only there was a way to target their listening...
[ link to this | view in chronology ]
Re: Disinformation
All war is deception, I would definitely be using the interwebs to keep the 3-letter jackholes focused on their own citizens saying Joe Green is a well established operative targeting high value assets.
Make the enemy do your work for you... the USA has not learned this lesson yet, but the Terrorists are well versed in it has had the US dancing like a fraidy bitch for well over a decade now.
[ link to this | view in chronology ]
Re: Re: Disinformation (indeed)
That just happens to be the best paid, and best funded fraidy bitch on earth.
53 billion dollars a year worth of fraidy bitch in fact.
I think the Fraidy Bitch not only learned the lesson well and long ago, but manufactured the excuse, specifially in order to pay its self a king's ransom every year, forever, at your expense.
I've always found that if you follow the money, you will always find the real bad guys.
---
[ link to this | view in chronology ]
"Barbara Starr"
I started reading the press briefing and realized she was taking directly from them with the same (fucking arrogant) attitude and (usually banal) talking points the flacks who got their paychecks from the government (well, directly at least) were using.
That seems like ages ago and I can not believe she's still employed in the 'news' business
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
If you remember, there was a lot of humbug over wedding parties and funerals being targeted and getting the wrong people who were not terrorists. This happened because the terrorists figured out they were being targeted from the drones because of their SIM chips in their cell phones were IDing them. They put the chips in a bag, mixed them up and then passed them around so no one knew who had what SIM chip, which eliminated that method of targeting.
So encryption or not, they were already aware before the Snowden releases started.
The excuses given by Clapper were never anything more than attempted misdirection while at the same time attempting to justify Snowden being a criminal rather than a whistle blower.
[ link to this | view in chronology ]
Re:
This particular scenario has been used almost verbatim a great number of times to date and it always made me wonder if it was an actual event described by an actual terrorist to someone who then reported it to the west somehow, or if it was just a bit of Think-Tank propaganda tossed into the debate to keep the US public from realizing that the drones are actually killing innocent parties and missing the officially designated terrorists altogether.
This scenario reeks of the western "suicide bomber" mythos, by implying that the terrorists are letting fate decide which one of them is carrying the next to be droned SIM in his phone that day, and thus willingly taking the hit, along with whoever he is sitting with at the time, for martyrdom sake.
I mean, if you were a terrorist group aware of being spied on and aware that this was the method used, would you not consider it to be far less self-destructive to simply replace all of your terrorist gangs' NSA tagged SIMs with black-market SIMs from say, Russia or China, and to toss the NSA tagged chips into the houses or businesses of people you did not like.... so the US could drone-execute them for you.
Doe anyone know the origin of the SIM chip Bag story??
---
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Because they're listening
It is stupid to assume anything else if a government is looking to crush you.
If the TLA's ever thought otherwise, well that would fit my usual opinion of their "intelligence". But I don't think that's the case: instead I think it's just a cynical justification for pathological secrecy.
[ link to this | view in chronology ]
Oh! Look over there!
Yet the NSA and other spook agencies, world wide, somehow managed to completely miss the entire birth, growth, and mobilization of ISIS - the Army of masked, black-clad, Die-Hard type Hollywood Super Terrorists, that manage to conveniently "prove" the need for enormously bloated Anti-Terrorist Budgets, Mass Public Surveillance programs and the continuation and escalation of the War On Terror, through their internet-posting of recorded atrocities.
This just in:
US Officials now say its quite obvious ISIS communicated its vital intelligence via smoke signals and hand-passed notes written on flash paper, during that time period, and may have used what officials are calling camel-drop sites, where messages were passed via strategically organized camel turd patterns left in the sand of specially designated water holes and camel parking lots.
As the un-named NSA official told reporters:
"These boys really know their shit."
---
[ link to this | view in chronology ]
Re: Oh! Look over there!
"manage to conveniently "prove" the need for enormously bloated Anti-Terrorist Budgets, Mass Public Surveillance programs and the continuation and escalation of the War On Terror"
I would just add that groups like ISIS in no way prove that such things are needed. At all.
[ link to this | view in chronology ]
Re: Re: Oh! Look over there!
And I do use the term "prove" in jest.
It is after all, a political proof, otherwise known as the Big Lie, dependant on an emotional trigger, not a scientific proof.
And the "think-tanks" that constitute the government's brain, obviously consider a black-clad and black-masked, blatantly visible, extremely well-organized, incredibly well-equipped, Hollywood-Die-Hard-style-Evil-Acting and Boldly USA-hating Terrorist Gang to be far more effective in swaying those in the general public who now believe 9/11 was a real external terrorist attack, into supporting greater anti-terrorist expenditures, escalating drone strikes on foreign targets, more war in the middle east, increased US and foreign citizen surveillance and more unconstitutional actions by all branches of government.
Because the Federal Government's reaction to ISIS will be greater anti-terrorist expenditures, escalating drone strikes on foreign targets, more war in the middle east, increased US and foreign citizen surveillance, and more unconstitutional actions by all branches of the US government.....all on the taxpayer's dime, with their apparent consent.
You really don't have to fool all the People all the time.
In a pseudo-democracy, you only need to fool a majority of the people all the time.
---
[ link to this | view in chronology ]