New Reports On Terror Attacks Underline Why Crypto Isn't A Serious Problem: It's Hard To Use And Easy To Get Wrong

from the multiple-missed-opportunities dept

As Techdirt has reported, politicians (and some journalists) haven't waited for the facts to be established before assuming that encryption is to blame for recent terrorist attacks. But as detailed information starts to appear, it becomes clear once more that the bombings and shootings did not succeed because things had "gone dark," but largely because intelligence agencies in both Europe and the US missed numerous clues and hints about the bigger picture. This emerges most powerfully from a long article in The New York Times, which charts the rise of ISIS over many years, and how the authorities were slow to catch on:

For much of 2012 and 2013, the jihadist group that eventually became the Islamic State, also known as ISIS or ISIL, was putting down roots in Syria. Even as the group began aggressively recruiting foreigners, especially Europeans, policy makers in the United States and Europe continued to see it as a lower-profile branch of Al Qaeda that was mostly interested in gaining and governing territory.
Arrests were made in Italy, Spain, Belgium, France, Greece, Turkey and Lebanon of European citizens that had been trained in Syria, and had returned to carry out terrorist attacks -- usually unsuccessfully. And yet:
in each instance, officials failed to catch -- or at least to flag to colleagues -- the men’s ties to the nascent Islamic State.
Sometimes the inability to grasp what was really happening borders on the incredible, for example in the case of the person alleged to have killed four people in the Jewish Museum of Belgium, in 2014:
Even when the police found a video in his possession, in which he claimed responsibility for the attack next to a flag bearing the words "Islamic State of Iraq and Syria," Belgium’s deputy prosecutor, Ine Van Wymersch, dismissed any connection.

"He probably acted alone," she told reporters at the time.
Another article, from CNN, makes it clear that missed opportunities to spot connections between possible terrorists have continued right up until the recent attacks in Paris and Brussels. It reports on current efforts to locate "at least 8 suspects" with links to those attacks:
All but one of the suspects are said to have connections to Abdelhamid Abaaoud, the leader of the Paris attacks, or Salah Abdeslam, the only survivor among the Paris attackers, who was arrested earlier this month in Brussels.

The security bulletin gives a sense of ISIS' geographical reach in Europe. Three of the suspects were residents or spent time in the Netherlands, Germany and Sweden respectively.
The picture that emerges from these two reports is of a large, well-established network of terrorists located across several European countries. Many of them were known in multiple ways to the authorities, which repeatedly failed to bring all this crucial information together, probably because there was too much, not too little, to sift through. What is conspicuous by its absence is any suggestion that the would-be attackers escaped arrest by using encrypted communications. Both stories do, however, reveal that ISIS-trained terrorists have used encryption tools, but in a non-standard way.

@thegrugq has written a good piece on Medium analyzing the system. It seems the discontinued encryption program TrueCrypt was provided by ISIS on a USB drive. The program was used to place one or more messages inside an encrypted volume, which was then uploaded to an inconspicuous online site. By employing a shared password to encrypt the volume, more than one person could read the messages in a relatively secure and anonymous way. The system creates a kind of digital dead letter drop that can't be addressed simply by mandating crypto backdoors.

That might seem to confirm the worst fears of all those politicians (and journalists), but as @thegrugq explains, there are some serious operational problems with this approach, notably the following:

This system makes non-standard use of the tools, which means the user has to take a number of additional manual steps to compensate. Requiring users to do a manual process generally means there will be mistakes. For example, I would expect that the user might forget to put the message into the volume before sending. Or the user might send an old version of the volume rather than the latest one. Or the user might fail to save the volume after copying the message in, and the contents get lost. Or the user might attempt to download the volume while the current volume is still open, and experience failures saving to disk. There are a number of places that this protocol can break down.
Using crypto is hard, and easy to get wrong -- which is probably why terrorists prefer to deploy old-fashioned means like burner phones. But don't take my word for it, just ask the person who was using the TrueCrypt system described above. Here's what the French police discovered when they arrested him last August:
Behind a couch, they found his USB stick from the Islamic State, and in his bag a piece of paper showing his login credentials for TrueCrypt.
Whoops.

Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: encryption, isis, terrorism


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • identicon
    Anonymous Coward, 8 Apr 2016 @ 7:43pm

    Criticism of NYT article

    This emerges most powerfully from a long article in The New York Times, which charts the rise of ISIS over many years
    Shortly after this Mar 30, 2016 New York Times story was published, the story received some criticism for its reporting of the technical facts.

    Sometimes techy details matter”, by Robert Graham, Errata Security (blog), Mar 30, 2016
    The problem with the NYTimes article is that the technical details are garbled. . (Update: at the bottom, I correct them). Normally, that's not a problem, because we experts can fill in the details using basic assumptions. But the technique ISIS used is bizarre, using TrueCrypt containers uploaded to a file-sharing site. This is a horrible way to pass messages -- assumptions we make trying to fill in the blanks are likely flawed.

    Moreover, there is good reason to distrust the NYTimes article. Small details conflict with a similar article in the French newspaper Le Monde from January 6. Both articles are based on the same confession by Reda Hame from last August. . . . 

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 8 Apr 2016 @ 7:46pm

      Re: Criticism of NYT article

      Mar 30, 2016 New York Times story
      March 30, 2016 is inaccurate. The New York Times story is dated March 29th, 2016.

      The next day's criticism is dated March 30, 2016.

      I regret the error.

      link to this | view in chronology ]

    • identicon
      Anonymous Coward, 8 Apr 2016 @ 8:04pm

      Re: Criticism of NYT article

      @thegrugq has written a good piece on Medium analyzing the system.
      Just incidentally, if you follow that link, read down to the botom and jump through—
      Update: further thoughts on the technique.
      —Then scan that next article down to the bottom again, and jump through—
      Update: some important clarification on the NYT article from @errataRob
      —Well, then, as they say in Fargo, “There you are. You betcha!”

      Just incidentally there.

      link to this | view in chronology ]

  • icon
    TechDescartes (profile), 8 Apr 2016 @ 7:53pm

    It's All in the History Books

    Haven't you read about the U.S. and U.K. repeatedly complaining before World War II about the Germans and Japanese "going dark" through the use of Enigma and Purple? Congress passed two declarations banning encryption, the Germans and the Japanese dutifully complied, and the war ended as abruptly as it had started. Problem solved.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 8 Apr 2016 @ 9:34pm

    The question that you should be arguing isn't if Crypto isn't currently a serious problem - that's simply an implementation challenge to be solved.

    What you should be asking is if it ever could reasonably be a problem.

    link to this | view in chronology ]

    • icon
      That One Guy (profile), 9 Apr 2016 @ 3:07am

      Re:

      Better question: Would the problems caused by lack of encryption, or lack of secure encryption be larger than the problems that truly secure encryption might cause or allow down the road?

      Secure encryption can absolutely prevent some crimes from being solved or even discovered, I don't think anyone's arguing otherwise, but I'm guessing that the number of problems caused by secure encryption are and likely always will be vastly smaller than the problems you'd get with ineffective encryption.

      link to this | view in chronology ]

      • identicon
        Michael J. Evans, 11 Apr 2016 @ 2:26am

        Re: Re: -- Why encryption doesn't matter

        Encryption wouldn't matter nearly as much if the money, physical resources, and social networks of those involved in actions of terror were traced; you know, /actual/ investigative work which has been so painstakingly designed in to modern law and civil operation.

        If the government agencies were doing their actual jobs instead of spying on the mostly harmless banal existence of the citizens they've sworn to protect then encryption or not wouldn't matter from the perspective of terrorism.

        link to this | view in chronology ]

  • identicon
    Anon, 9 Apr 2016 @ 12:31am

    Belgian Authorities ignored evidence...

    Good thing we have the FBI, where a group of 20 coming over to learn flying would be caught; where when someone was arrested who had a totally arrogant attitude and told his flight instructor he didn't care about learning to land large aircraft - the FBI hierarchy would not be actively discouraging pursuit of warrants and deeper investigation, would they?

    link to this | view in chronology ]

  • identicon
    Michael, 9 Apr 2016 @ 5:16am

    "He probably acted alone," she told reporters at the time.

    I am probably giving them more credit than I should, but it seems reasonable that they may also simply be trying to avoid a panic.

    "He probably acted alone" sounds a bit better than "We found some things that strongly suggest a tie to a giant network of terrorists that could attack at any time but we are still investigating".

    link to this | view in chronology ]

    • icon
      orbitalinsertion (profile), 9 Apr 2016 @ 6:56pm

      Re:

      They always try to avoid a panic until they need to manufacture one. Don't maybe have a brief panic over something real, have this sustained panic until we get what we want, over something we made up for some reason. And oh yeah, it allowed that thing to happen that we didn't want you to panic about before. Feel free to panic about it now. But only with respect to this other thing we want to do.

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 9 Apr 2016 @ 9:28am

    So once again, how will passing laws deter terrorists?

    Passing laws against encryption makes the rest of us unsafe, but does nothing to stop terrorists from using encryption.

    So politicians are either clueless or lying about the reasons for the laws against encryption.

    In either case, they don't belong in office.

    link to this | view in chronology ]

  • icon
    orbitalinsertion (profile), 9 Apr 2016 @ 6:58pm

    As Techdirt has reported, politicians (and some journalists) haven't waited for the facts to be established before assuming that encryption is to blame for recent terrorist attacks.


    Or... as Techdirt and others have noted, politicians and some journalists claim repeatedly that encryption is to blame when it is already well-established that it is not.

    link to this | view in chronology ]

  • identicon
    Justme, 9 Apr 2016 @ 9:42pm

    Congressional Ignorance.

    The ignorance of many in congress is unbelievable.

    Watched an interview of Rep. Adam Schiff, a member of the House Intelligence Committee, where he gives the impression that encryption prevents them from collecting info using court approved wire taps!

    The only thing affected by the encryption used by Apple on the iphone, is locally stored personal information, But calls, texts, emails that are transmitted over the cell network are certainly open to collection, unless additional efforts are taken to prevent that collection.

    And honestly i don't imagine someone willing to commit a terrorist attack will care about breaking any law against encryption.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 9 Apr 2016 @ 11:11pm

      Re: Congressional Ignorance.

      And honestly i don't imagine someone willing to commit a terrorist attack will care about breaking any law against encryption. Correct meaning the law will not have any affect on what the claim they are going after, only law abiding peoples 4th Amrndment rights

      link to this | view in chronology ]

  • icon
    klaus (profile), 10 Apr 2016 @ 2:14am

    Context & Misquoting... (but yes, encryption has nothing to do with this)

    ""He probably acted alone," she told reporters at the time."

    Ok, so the Belgian police found an incriminating video & a flag, but so what? And ok, he made a longish phone call to Abdelhamid Abaaoud, but again, so what? Mehdi Nemmouche could have been his interior decorator for all anyone knew. At that time.

    For the sake of accuracy, the full quote was "From the images we have seen, we can deduce that the perpetrator probably acted alone and was well prepared," said Ine Van Wymersch, a spokeswoman for the Brussels prosecutor's office."

    Which is a fair viewpoint when you see the images. Nemmouche had up till that point a criminal record. It's my belief here that regular law enforcement isn't sufficiently tied into anti-terror, at least for most parts of Europe. They have separate systems, distinct jurisdictions, often under different ministries. The UK & France especially so. Until they get their act together, more fish will slip through their nets. But when they do, my fear is that we will all be the poorer because of it.

    link to this | view in chronology ]

  • icon
    Graham J (profile), 10 Apr 2016 @ 7:45pm

    Method

    While I agree with th sentiment here I don't think it serves us to focus on details such as ease of use or lack thereof. While that definitely impacts the number of people using strong encryption today that certainly won't always be the case.

    I think the most salient point we can make is that there is no end to methods of encryption. If we legislate or weaken one type, people will use another. That is true now and it will be true long after your corrupt government has fallen.

    link to this | view in chronology ]

  • icon
    Kal Zekdor (profile), 11 Apr 2016 @ 2:15am

    What's the endgame?

    Sometimes I wonder what the point of all this anti-encryption rhetoric is. Even if we take at face value the claimed motivation of preventing, or at least better investigating, criminal activity, how does this get us there?

    To start with, take backdoored encryption. How does this help? Say you could implement a perfect backdoor with a golden key that is physically and inextricably tied to a warrant. We've waved our magic wand and made all the problems and side effects vanish. What would that actually do?

    Scenario A., criminals communicate over the backdoored channel, and their communications are available to law-enforcement. At first blush, that sounds great, but then you realize that any criminal who communicates over an effectively open channel knows shit about OpSec, and their communications would likely have been able to be intercepted even without the backdoor. So, what does this really gain for us?

    Scenario B., criminals use a different, non-backdoored, encryption scheme to communicate. This will always be a possibility; you can't legislate the math from working. But, say you went a step further and flagged, or even outlawed, non-backdoored encryption. Then the bad guys will have to either communicate in the clear or risk being identified as bad guys, right? Of course not. Let's ignore for the moment simple codes (code phrases, book codes, etc.) which can be used to communicate securely over a compromised channel. You can implement full blown public key cryptography using steganograpgic encoding. The message would look like any other message in the channel, blending in with the noise, but could contain any amount of concealed information. So, what was the point, again?

    Weakening encryption will only hurt normal citizens. The "bad guys" either can be caught already without weakening encryption, or weakening encryption won't seriously impact them.

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.