After Endless Demonization Of Encryption, Police Find Paris Attackers Coordinated Via Unencrypted SMS
from the anonymous-sources-say dept
In the wake of the tragic events in Paris last week encryption has continued to be a useful bogeyman for those with a voracious appetite for surveillance expansion. Like clockwork, numerous reports were quickly circulated suggesting that the terrorists used incredibly sophisticated encryption techniques, despite no evidence by investigators that this was the case. These reports varied in the amount of hallucination involved, the New York Times even having to pull one such report offline. Other claims the attackers had used encrypted Playstation 4 communications also wound up being bunk.Yet, pushed by their sources in the government, the media quickly became a sound wall of noise suggesting that encryption was hampering the government's ability to stop these kinds of attacks. NBC was particularly breathless this week over the idea that ISIS was now running a 24 hour help desk aimed at helping its less technically proficient members understand encryption (even cults help each other use technology, who knew?). All of the reports had one central, underlying drum beat implication: Edward Snowden and encryption have made us less safe, and if you disagree the blood is on your hands.
Yet, amazingly enough, as actual investigative details emerge, it appears that most of the communications between the attackers was conducted via unencrypted vanilla SMS:
"...News emerging from Paris — as well as evidence from a Belgian ISIS raid in January — suggests that the ISIS terror networks involved were communicating in the clear, and that the data on their smartphones was not encrypted.The reports note that Abdelhamid Abaaoud, the "mastermind" of both the Paris attacks and a thwarted Belgium attack ten months ago, failed to use any encryption whatsoever (read: existing capabilities stopped the Belgium attacks and could have stopped the Paris attacks, but didn't). That's of course not to say batshit religious cults like ISIS don't use encryption, and won't do so going forward. Everybody uses encryption. But the point remains that to use a tragedy to vilify encryption, push for surveillance expansion, and pass backdoor laws that will make everybody less safe -- is nearly as gruesome as the attacks themselves.
European media outlets are reporting that the location of a raid conducted on a suspected safe house Wednesday morning was extracted from a cellphone, apparently belonging to one of the attackers, found in the trash outside the Bataclan concert hall massacre. Le Monde reported that investigators were able to access the data on the phone, including a detailed map of the concert hall and an SMS messaging saying “we’re off; we’re starting.” Police were also able to trace the phone’s movements.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: clear text, encryption, going dark, isis, overreaction, paris attacks, sms, surveillance, terrorism
Reader Comments
The First Word
“Quick, Hurry
We need to quickly ban this SMS technology to prevent the next attack.Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Goals
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Unencrypted Data Collection
[ link to this | view in chronology ]
What not to do
"“we’re off; we’re starting"
to anyone, EVER.
[ link to this | view in chronology ]
Re: What not to do
Indeed. And what makes that silly is that being of Syrian descent and French citizens living in Belgium, it's likely that the attackers didn't even know English. The text is more than likely a translation.
[ link to this | view in chronology ]
Re: Re: What not to do
“On est parti, on commence” : le dernier SMS envoyé à l’un des terroristes
[ link to this | view in chronology ]
Re: Re: What not to do
[ link to this | view in chronology ]
Re: What not to do
we’re off
we’re starting
kisses, hugs and best regards, a trrrrist
PD:
https://www.techdirt.com/user/voiceofreason
[ link to this | view in chronology ]
Re: What not to do
send this via sms to all my cellphone contacts
and via email to all my email contacts
at 11:59 am
[ link to this | view in chronology ]
Re: What not to do
[ link to this | view in chronology ]
Re: What not to do
[ link to this | view in chronology ]
Re: What not to do
[ link to this | view in chronology ]
Err...Too early for April Fool's?
[ link to this | view in chronology ]
Re:
"Well, some of the 9/11 hijackers did come through Canada, as you know."
- John McCain, incorrectly, April 24, 2009
McCain is also warning that ISIS could come storming across the Canadian border.
The man who decided that Sarah Palin could command the country in a crisis isn't one to flip-flop. When he says something goddamned stupid, he sticks with it.
[ link to this | view in chronology ]
Once Again
[ link to this | view in chronology ]
Quick, Hurry
[ link to this | view in chronology ]
Re: Quick, Hurry
[ link to this | view in chronology ]
Re: Re: Quick, Hurry
[ link to this | view in chronology ]
hive mindset
this would be like when the cops arrive 2 hrs later to your home just to take photos... (and you do not have guns).
they could try to use the dragnet database, streetcams, etc to find the burglars but YOU and YOUR FAMILY are already dead.
the collective hive sheep government system will continue
[ link to this | view in chronology ]
Re: Quick, Hurry
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
this is brilliant
we do not care about the dead individual
but the collective herd...
[ link to this | view in chronology ]
Re: Security services
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
"Quick! It's a rock dove! Intercept it!"
"Er, isn't it carrier pigeons that carry messages?"
"It's likely a carrier pigeon in disguise. We need to capture and analyze it to be sure!"
+++ATH0&^89I&*^( NO CARRIER
Obvious answer? Ban all pigeons in Paris. It's the only way to be sure.
No, really. http://www.parissweethome.com/parisrentals/art_uk.php?id=101
[ link to this | view in chronology ]
Re: Re:
"I don't know...."
"Aaaaahhhhhhgggg......."
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Too much hay?
If something that easy to find can circumvent the whole data collection and analysis apparatus maybe we should stop for a moment and reconsider how the whole system works or maybe even if the system works.
[ link to this | view in chronology ]
This just shows how useless the current data collection is
Betcha no one in intelligence is going to own up to that!
[ link to this | view in chronology ]
Re: This just shows how useless the current data collection is
Most of these proposals will only increase the size of the watch list. That can only make things worse
[ link to this | view in chronology ]
encoded != encrypted
Even if the powers that be got their wish and made the entire world less safe and less private, that probably still wouldn't stop terrorists (or your garden variety criminal) from secretly communicating. People have been doing it since Roman times, heck probably since biblical times.
So what where these people really talking about?
Other than making it a little more work to get to, would the fact that it was encrypted or in plain text make it any easier for law enforcement to understand?
Removing encryption makes everyone less safe and is just a road bump to any serious criminal or terrorist organization.
[ link to this | view in chronology ]
Re: encoded != encrypted
[ link to this | view in chronology ]
Re: encoded != encrypted
If a person of interest contacts another person of interest, thereby establishing the existence of a relationship between the two, that is useful information (intelligence, if you will). The contents of their communication, if available, is more information. Obviously, more information is good.
[ link to this | view in chronology ]
Re: Re: encoded != encrypted
[well that the official reason anyway]
I think that's just too much work for our modern forces.
[ link to this | view in chronology ]
Re: encoded != encrypted
[ link to this | view in chronology ]
Re: encoded != encrypted
I need high purity it is for a trader friend and he is picky.
[ link to this | view in chronology ]
Re: encoded != encrypted
Besides, wont quantum computers make the current infrastructure useless anyway?
[ link to this | view in chronology ]
Quantum computers
Everyone in the asymmetric crypto sector is worried about this.
Still, we've yet to make an actual Quantum. Dunno if the recent prototype logic gate is enough to do it.
[ link to this | view in chronology ]
Re: Quantum computers
[ link to this | view in chronology ]
Re: Re: Quantum computers
Right now our (partial) quantum computers are giant mainframes. It'll be a while when we have qubits in our smartphones.
[ link to this | view in chronology ]
Re: Re: Quantum computers
Quantum crypto makes use of the Heisenberg uncertainty principle to prevent undetectable eavesdropping whereas Quantum computers rely on superposition of states to create massive parallelism.
[ link to this | view in chronology ]
Biggest story of the day
This suggests that the mass surveillance mentality itself is partly to blame.
We already know that France and most of the rest of the EU has NSA-type powers to collect it all and sort through the pile later. This means they probably had all the evidence they needed but couldn't stop it anyway. There's too much data to search in real time in any meaningful way. A more focused targeting of surveillance would greatly reduce the analysis paralysis.
Which leads to a point I've been making all along., that there are two realities to mass surveillance:
1) If they are parsing it all in real time, they may be able to prevent an attack, but this gives lie to the claim that your data is never being searched (everybody's must be included in the data set).
2) If they are only looking at it in hindsight, they can be more specific about the selectors and exclude more people, but this gives lie to the claim that they can prevent an attack in the first place (it can only be investigated).
[ link to this | view in chronology ]
Or are we going to wait until they hand us another scapegoat?
[ link to this | view in chronology ]
Paris Attackers Coordinated Via Unencrypted SMS
[ link to this | view in chronology ]
Complete disgrace
[ link to this | view in chronology ]
Re: Complete disgrace
[ link to this | view in chronology ]
Re: Complete disgrace
The problem, I would think, is that they would be overwhelmed by the volume of data and that they have no real program or enough analysts to sift through all the bullshit.
[ link to this | view in chronology ]
THE SHARK IS IN THE WATER. REPEAT. THE SHARK IS IN THE WATER.
Minor delays here. Jabbir still priming detonators. Replacing Uman's bent AK firing pin. Ready to go in 5 min.
[ link to this | view in chronology ]
Re: THE SHARK IS IN THE WATER. REPEAT. THE SHARK IS IN THE WATER.
they are now in my basement,
but first we need to get Ahmed to clean and grease them
[ link to this | view in chronology ]
Re: Re: THE SHARK IS IN THE WATER. REPEAT. THE SHARK IS IN THE WATER.
[ link to this | view in chronology ]
Breaking news
"No true American would use such terror-ridden words", Senator Cotton may or may not have been quoted as saying.
More at 11!
[ link to this | view in chronology ]
Re: Breaking news
The first thing we do - round up all the sports commentators!
[ link to this | view in chronology ]
The police found a burner phone with a text.
This article is bullshit, as usual.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
How can you all be so thick?
[ link to this | view in chronology ]
Re: How can you all be so thick?
[ link to this | view in chronology ]
Re: Re: How can you all be so thick?
[ link to this | view in chronology ]
Re: Re: Re: How can you all be so thick?
[ link to this | view in chronology ]
All this surveillance
No, it's about collecting and STORING all communication between all people so that they can go back later and use that to find patterns of activity that are either illegal or embarrassing should they need this information at some point in the future.
Until there's actually some reason to filter (or "target" as they say) the data - it's just a big pile of hay. But with the right filtering, the data could show someone's very private details - perfect when you need to find reasons to arrest people after the fact.
[ link to this | view in chronology ]
Re: All this surveillance
we will check the 30 yrs of info we have on you and your family
and we will destroy you
[ link to this | view in chronology ]
Re: Re: All this surveillance
[ link to this | view in chronology ]
Re: Re: All this surveillance
In the Harlequin romance novel version, I use prison to hold you hostage to keep your wife receptive. She treats me well, you stay in the light wing and keep your access to the library and better food and stuff.
She turns cold, and you get transferred to the hard wing and become Bubba's bitch.
[ link to this | view in chronology ]
Encryption end-goal
If the end-goal for the encryption push is to encrypt the content of all communication, then theoretically, those pushing for ubiquitous encryption are stating that the terrorists communicated over a medium that they still want encrypted to protect everyone else that uses it.
[ link to this | view in chronology ]
If these spooks had better hind sight,
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Here's one of the messages found after the blast,
still in its pidgeon pod.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
Ofcourse our Secret Police and Army want to legalize it, because...
National Security!
[ link to this | view in chronology ]
Total bogosity of the help desk idea
Let me just say that the notion of ISIS/ISIL setting up such a locus of communication is completely insane. Well, yes, they are insane, but it's also completely stupid.
The fake reports say six of their senior leaders would be working the help desk. Okay, right there is a prime target for a bomb. However, the REAL risks of such a stupid idea are vastly larger. The Daily Show did a skit on fake help, but better to leave it in place. This is a case where just tapping the metadata would be incredibly effective. Pretty safe bet that everyone who calls a 'how to be a terrorist' help desk is a person of interest.
Even more obviously, the fundamental notion of a help desk is that you have to distribute the contact information widely. Oh, wait. How long until a copy of the contact information leaks out? Or some fool drops his wallet with the help desk number in it?
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Wow! Thoughtful.
Jolly good show.
[ link to this | view in chronology ]
Re: Wow! Thoughtful.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Whose side do you think I'm on?
I think end-to-end encryption will prove necessary to keep governments and corporations out of our private lives, and out of the non-public records of our businesses.
US officials have been pushing for more surveillance and for hobbling encryption for the sake of intercepting terrorists.
Terrorists, that it appears, weren't using encryption at all.
So that excuse is lame. And encryption is still very useful for the rest of us.
Are you up to speed now? I know it's hard.
[ link to this | view in chronology ]
Re: Whose side do you think I'm on?
My point was to counter the shill's point that we were fixating on the fact that terrorists used unencrypted messages. The fact they did use unencrypted message rendered the obsession with removing encryption for citizens moot, because it doesn't solve anything.
[ link to this | view in chronology ]
Re: Re: Whose side do you think I'm on?
I'm going to blame it on a tiresome day.
[ link to this | view in chronology ]
Re: Re: Re: Whose side do you think I'm on?
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
It's WHO not HOW!
HOW they watch is useless!
What they need to get right is WHO they watch.
[ link to this | view in chronology ]
Re: It's WHO not HOW!
useless for what? for whom?
THINK!
maybe YOU are wrong on the purpose they do this?
[ link to this | view in chronology ]
BREAKING
http://www.infowars.com/nsa-doc-reveals-isis-leader-al-baghdadi-is-u-s-british-and-israeli-inte lligence-asset/
BREAKING! PARIS ATTACKS FALSE FLAG: DRILLS PLANNED ON SAME DAY!
https://www.youtube.com/watch?v=De_PyuLDfhg
CONFIRMED: Sandy Hook Crisis Actors Pose as Paris Attack Victims! SHAME ON CNN!
https://www.youtube.com/watch?v=_oxGMMNwYeo
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Ending Blowback Terrorism
https://www.project-syndicate.org/commentary/islamic-state-blowback-terrorism-by-jeffrey- d-sachs-2015-11
[ link to this | view in chronology ]
Re: Ending Blowback Terrorism
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Haystack Problem
Solution: More haystack.
It's like f'n cowbell for Christopher Walken.
[ link to this | view in chronology ]
Re: Haystack Problem
[ link to this | view in chronology ]
Veil of Freedom
Baaa!
[ link to this | view in chronology ]
If you're not from my caste/religion, you're non-human to me;
https://wh.gov/iyhMK
[ link to this | view in chronology ]
because Paris- terrorists were not Syrian, nor refugees and used no encryption.
[ link to this | view in chronology ]