Gadgets News

FBI Attempts to Eliminate Secrecy Without Concealing

[ad_1]

Illustration of an article called How the FBI Attempts to Eliminate Concealment and No Violation of Writing

Figure: MANDEL NGAN / AFP (Getty Images)

Since the 1990’s, government officials have been active worrying that Secret messages help terrorists and terrorists. Often, they have been telling the truth.

In the early 2000s, Los Zetas, a well-known group in Mexico, actually they made their own hidden steam radios, which are used to hide the movement of their narco sales. Meanwhile, al Qaeda and other Mujahideen terrorist groups began to use a self-made program I hope to avoid the eye of the American state of security. Other gangs have followed suit and, today, the potential for “dark” potential has led to companies blaming themselves and selling themselves to lower-class customers. These companies, which are said to be working hard to protect their customers, seem to have a short life span, however: In the last few years, a number of advanced platforms and other technologies installed and downloaded by setting up rules — and the most recent examples that have taken place over the past week.

Last Tuesday, the U.S. Department of Justice he announced “Trojan Shield,” a brave and high-ranking official. In it, the FBI hired a senior lawmaker for select and then run a communication platform, called ANOM, designed specifically for international law enforcement agencies. Instead of stepping on an existing platform, the pastors decided to make their own. As drug traffickers and money launderers flocked to ANOM, the FBI and other officials were waiting, ready to deal with all the connections that the fraudsters had provided. He was the recipient of the site to end all gossip – a global campaign.

Indeed, the short-term benefits of the project have been huge: last week, governments around the world continued a group of hundreds of prisoners, the police are holding meetings with the media and are happily clearing the case. Motorcycle gangs, Italian gangs, and drug traffickers around the world have been caught in a trap. In the US, Department of Justice judges 17 persons he is said to be involved in “monitoring” ANOM (even FBI secret), many of them. The work has also revealed the flood of intelligence on how international criminal organizations operate, which will no doubt help to predict the future against these groups.

And yet, one of the long-term goals of the operation, as reported by the police, seems daunting – if not unusual. “We want to end any confidence in the firm that has a stake in our case and declare that the platform is operated by the FBI,” said US Attorney Randy Grossman. at a press conference last week. Similarly, Suzanne Turner, the FBI’s special intelligence officer at the San Diego Field Office, said this should be seen as a “warning” to terrorists. “[Those] “If you believe they are using confidential information, your connection is not secure,” Turner said. He later added that the operation “would have made the terrorists think” if the platform was a legitimate business or run by the federations.

Grossman and Turner’s words have changed for decades with the US government banning secret communications, which have increased dramatically in recent years, since The sign that iMessage, WhatsApp that Google Messages. If the police cannot break the secret technologies, they will make us less confident even if they are passing by on their own.

James A. Lewis, a security expert at the Center for Strategic and International Study, made a phone call. Lewis has been studying this subject for years.

“People used to talk to air conditioners, or walk around the park,” he says God-simple, in which criminals slip around to avoid being caught by the wire. Now, he said, everyone, plus a mafia, They have a cell phone in their pocket. As a result, the temptation to rely on easy-to-connect methods is strong. “It’s just a matter of texting,” he said. “Robbers have moved in with everyone else.”

The companies that led ANOM — many of them recruited and destroyed by the police — worked hard to cover up their activities, which are in line with environmental protection related to drug trafficking and murder, government officials have said. For example, Good Phantom, a wireless company that provided updated, hidden Blackberry and Android devices, says he sold most of his work for Mexican drug dealers, who use their weapons to communicate with those who were on the ground and to develop drug delivery strategies. Two other platforms that police recently released – Sky Global and EncroChat – are said to have worked in the same way.

Similarly, the tools used by groups caught in the “Trojan Shield” are very different from your online application sent as “Signal” or WhatsApp–all of which use concealment at the end, meaning the sender and recipient are the only ones who can communicate with them. In most cases, it is a modified phone that has the capabilities of GPS, mic, and camera, and has an online communication app that works “locked” with other devices designed for communication. On top of that, the government says companies that sell such devices often offer privacy protection to their customers — helping to erase the contents of their phones if they are confiscated by the police. With all these benefits, terrorists do not encourage giving up these types of jobs because they are so useful in their careers.

“A lot of writing isn’t possible,” Lewis said. “If you can use the device then your chances are good, but if you’re just crossing the street, it’s very difficult – if not impossible. [to hack it]. ”

The underlying issue is why the FBI and other government agencies have been campaigning for the past 30 years to crack down on secrecy. First time so-called “Crypto Wars” during the 1990’s, Clinton’s security politicians said the proliferation of hidden technologies around the world could lead to the formation of anti-corruption groups. Since then, government officials have, in one way or another, resorted to cruelty in the pursuit of professionalism, often using methods that threaten human rights and treat American privacy as a consequence.

This went through several times differently. When the 90-year-old attempt to stop the export failed did not work, the donations turned to another approach: forcing civilians to set up behind their secret machines so that the FBI could enjoy American security links. Since the mid-2000s, the Department of Justice and the FBI have been campaigning to explain to Congress and the American people why they really need to do this. This work has been going on for years, and Continued pressure from the FBI director beyond right now.

With the “Trojan Shield,” it seems like a new strategy in the civil war against secrecy, but one that is far more sensible than legal. Here, the office seems to be trying to shake up all confidence on secretive platforms — doubting whether such a connection is secure or just a giant giant with an FBI agent who is not far behind. In doing so, they are trying to undermine the technology that serves as one of the day-to-day security of human privacy in a country that is designed to be reviewed.

Jennifer Lynch, prosecuting attorney for the Electronic Frontier Foundation, said the recent work was concerned – adding that she doubted the FBI had a law in the US to carry out a “Trojan Shield,” which is probably why it allied itself with “more than 100 countries. GOD.

“We still do not know much about how the study was conducted and how the data sharing took place between the various countries affected,” Lynch said in a telephone interview. What we do know, however, is enough. “The FBI said they spoke like Americans. This tells me that even the FBI does not believe they have the legal authority under the fourth law or our anti-law law to do what they did.”

In addition to the point, Lynch noted the office’s agreement with Australia, which was recently issued TOLA law. The law allows the Australian government to compel security companies and experts to redesign programs and resources to use spies. Australian law also allows for greater wire connections, which are higher than those available in the US, Lynch said.

“Basically, the FBI is directing their surveillance across the country,” he said.

In contrast, Lewis argues that the dangers of secrecy encourage law enforcement to create skills and how to combat the use of technology by criminal gangs.

“You have to get a criminal record, you have to get the company to cooperate,” Lewis said, describing the restrictions that police want to try to investigate fraud through delivery platforms. “A company usually does not have access to confidential information. That’s when something becomes beautiful [to criminals]. ”

Although they have electrical power such as The National Security Agency, its findings may not be necessary for legal investigations, he said. “The NSA is not in the legal business,” he said. “They are not gathering evidence. So even in cases of traffic disruption, they could not be used in court, ”Lewis said. As a result, you have both technical and legal issues. ”

If the project raises doubts about the security of terrorist platforms, then it has lost its function, he says.

“Obviously, it planted seeds of doubt in their hearts,” he said of the terrorists. “Uncertainty really helps. It means they will want to have more face-to-face meetings or anything other than talking on the phone, ”which could make them easier to handle, he said.

Obviously, the FBI sows suspicious seeds by closing up pieces of material to anyone who hears it — not just terrorists who might be afraid that someone is reading every text, and all of us. And for Lynch, that is injustice.

“I think what the FBI did is very questionable,” he said, “and I think we should all be concerned about this – because it makes us doubt our privacy and security.”

[ad_2]

Source link

Related Articles

Leave a Reply

Back to top button