<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Exploiting Emotions About Paris to Blame Snowden, Distract from Actual Culprits Who Empowered ISIS</title>
	<atom:link href="http://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 16 Apr 2026 22:29:11 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/comment-page-2/#comment-1498201</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 04 Jul 2016 09:02:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=35696#comment-1498201</guid>
		<description><![CDATA[France: Belgium did not tell me in time for the suspected terrorist

France Parliament blamed Belgium for not having given to France in time for their data on suspected terrorist.

MPs&#039; view of Paris on November terrorist attack in Salah Abdeslam second main suspect have been arrested immediately after the impact, if the man had been known at the background. 

Abdeslam was caught in Belgium in March after four months of running off. He was handed over to France in April.

Abdeslam there is another terrorist attack in Brussels the prime suspect.

Belgium has been accused in the past shortcomings of protective measures, and the tracing of terror suspects. 

Source: http://www.iltalehti.fi/ulkomaat/2016070421842380_ul.shtml]]></description>
		<content:encoded><![CDATA[<p>France: Belgium did not tell me in time for the suspected terrorist</p>
<p>France Parliament blamed Belgium for not having given to France in time for their data on suspected terrorist.</p>
<p>MPs&#8217; view of Paris on November terrorist attack in Salah Abdeslam second main suspect have been arrested immediately after the impact, if the man had been known at the background. </p>
<p>Abdeslam was caught in Belgium in March after four months of running off. He was handed over to France in April.</p>
<p>Abdeslam there is another terrorist attack in Brussels the prime suspect.</p>
<p>Belgium has been accused in the past shortcomings of protective measures, and the tracing of terror suspects. </p>
<p>Source: <a href="http://www.iltalehti.fi/ulkomaat/2016070421842380_ul.shtml" rel="nofollow">http://www.iltalehti.fi/ulkomaat/2016070421842380_ul.shtml</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/comment-page-2/#comment-1497607</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 29 Jun 2016 21:33:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=35696#comment-1497607</guid>
		<description><![CDATA[How did the Istanbul airport attackers get past security?
http://edition.cnn.com/2016/06/29/middleeast/turkey-istanbul-ataturk-airport-security/index.html

The deadly assault by three suicide bombers on Istanbul&#039;s Ataturk Airport once again shows the difficulty in averting terror attacks.
Terrorists targeted the 11th busiest airport in the world in a country that borders the ISIS-stronghold Syria, and it&#039;s not hard to see why Ataturk posed an attractive soft target.
But what&#039;s particularly unnerving about the latest incident is the regional aviation hub had a much tighter security system in place than many other airports.
Travelers using the airport are required to undergo double security screenings. One before they enter the international terminal building, and a second time after they go through passport control. 

&quot;There&#039;s heavy security at the entrance to the international departures hall,&quot; Ward said. &quot;There&#039;s a full screening process. You have an X-ray machine and you have to go through a metal detector. But in the arrivals hall, of course you don&#039;t have that same level of security, so two of the attackers we believe went into the arrival halls.&quot; 

People going to the arrivals section on the bottom floor are required to go through metal detectors but are overseen only by a light guard presence. 

What about the response from Turkish airport security as the tragedy unfolded?]]></description>
		<content:encoded><![CDATA[<p>How did the Istanbul airport attackers get past security?<br />
<a href="http://edition.cnn.com/2016/06/29/middleeast/turkey-istanbul-ataturk-airport-security/index.html" rel="nofollow">http://edition.cnn.com/2016/06/29/middleeast/turkey-istanbul-ataturk-airport-security/index.html</a></p>
<p>The deadly assault by three suicide bombers on Istanbul&#8217;s Ataturk Airport once again shows the difficulty in averting terror attacks.<br />
Terrorists targeted the 11th busiest airport in the world in a country that borders the ISIS-stronghold Syria, and it&#8217;s not hard to see why Ataturk posed an attractive soft target.<br />
But what&#8217;s particularly unnerving about the latest incident is the regional aviation hub had a much tighter security system in place than many other airports.<br />
Travelers using the airport are required to undergo double security screenings. One before they enter the international terminal building, and a second time after they go through passport control. </p>
<p>&#8220;There&#8217;s heavy security at the entrance to the international departures hall,&#8221; Ward said. &#8220;There&#8217;s a full screening process. You have an X-ray machine and you have to go through a metal detector. But in the arrivals hall, of course you don&#8217;t have that same level of security, so two of the attackers we believe went into the arrival halls.&#8221; </p>
<p>People going to the arrivals section on the bottom floor are required to go through metal detectors but are overseen only by a light guard presence. </p>
<p>What about the response from Turkish airport security as the tragedy unfolded?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/comment-page-2/#comment-1497601</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 29 Jun 2016 21:18:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=35696#comment-1497601</guid>
		<description><![CDATA[Efe Kerem Sözeri / Vocativ:
Turkish government bans publication of news, interviews, visuals about Istanbul bombing  —  Once again, Turkey&#039;s government has cracked down on media after a terror attack  —  Less than an hour after a coordinated suicide attack on Istanbul&#039;s Ataturk Airport that left dozens dead and many more wounded … 

Turkey Blocks News Sites, Twitter, Facebook After Deadly Attack
Once again, Turkey&#039;s government has cracked down on media after a terror attack
http://www.vocativ.com/334890/turkey-blocks-news-sites-twitter-facebook-after-deadly-attack/

Less than an hour after a coordinated suicide attack on Istanbul’s Ataturk Airport that left dozens dead and many more wounded, Turkey’s government resumed a tactic frequently seen since last summer: a gag order for the country’s media outlets. Less than an hour later, watchdog groups reported Twitter and Facebook were inaccessible inside the country.

The order, issued by the Turkish Prime Minister’s office on the grounds of “national security and public order,” bans sharing of any visuals of the moment of explosion, blast scene, emergency work, of the wounded and dead, or any “exaggerated narrative” about the scene. It also bans the act of sharing any information about the suspects.]]></description>
		<content:encoded><![CDATA[<p>Efe Kerem Sözeri / Vocativ:<br />
Turkish government bans publication of news, interviews, visuals about Istanbul bombing  —  Once again, Turkey&#8217;s government has cracked down on media after a terror attack  —  Less than an hour after a coordinated suicide attack on Istanbul&#8217;s Ataturk Airport that left dozens dead and many more wounded … </p>
<p>Turkey Blocks News Sites, Twitter, Facebook After Deadly Attack<br />
Once again, Turkey&#8217;s government has cracked down on media after a terror attack<br />
<a href="http://www.vocativ.com/334890/turkey-blocks-news-sites-twitter-facebook-after-deadly-attack/" rel="nofollow">http://www.vocativ.com/334890/turkey-blocks-news-sites-twitter-facebook-after-deadly-attack/</a></p>
<p>Less than an hour after a coordinated suicide attack on Istanbul’s Ataturk Airport that left dozens dead and many more wounded, Turkey’s government resumed a tactic frequently seen since last summer: a gag order for the country’s media outlets. Less than an hour later, watchdog groups reported Twitter and Facebook were inaccessible inside the country.</p>
<p>The order, issued by the Turkish Prime Minister’s office on the grounds of “national security and public order,” bans sharing of any visuals of the moment of explosion, blast scene, emergency work, of the wounded and dead, or any “exaggerated narrative” about the scene. It also bans the act of sharing any information about the suspects.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/comment-page-2/#comment-1495192</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 16 Jun 2016 08:15:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=35696#comment-1495192</guid>
		<description><![CDATA[Hackers Hijack ISIS Twitter Accounts With Gay Porn After Orlando Attack
Anonymous hacker targets Twitter accounts of ISIS supporters following Orlando attacks.
http://europe.newsweek.com/isis-twitter-accounts-gay-porn-orlando-attacks-anonymous-470300

Twitter accounts belonging to supporters of the Islamic State militant group (ISIS) have been hacked in the wake of the Orlando shooting, with jihadist content replaced with gay pride messages and links to gay pornography.

A hacker affiliated with the hacktivist collective Anonymous, who uses the online moniker WauchulaGhost, first began hijacking pro-ISIS Twitter accounts several months ago. Following the mass shooting at the Pulse gay nightclub in Orlando, Florida, on June 13, the hacker decided to replace ISIS imagery posted to the accounts with rainbow flags and pro-LGBT messages.

The vigilante hacker claims to have taken over 200 Twitter accounts belonging to ISIS supporters. However, many have since been taken down by Twitter.]]></description>
		<content:encoded><![CDATA[<p>Hackers Hijack ISIS Twitter Accounts With Gay Porn After Orlando Attack<br />
Anonymous hacker targets Twitter accounts of ISIS supporters following Orlando attacks.<br />
<a href="http://europe.newsweek.com/isis-twitter-accounts-gay-porn-orlando-attacks-anonymous-470300" rel="nofollow">http://europe.newsweek.com/isis-twitter-accounts-gay-porn-orlando-attacks-anonymous-470300</a></p>
<p>Twitter accounts belonging to supporters of the Islamic State militant group (ISIS) have been hacked in the wake of the Orlando shooting, with jihadist content replaced with gay pride messages and links to gay pornography.</p>
<p>A hacker affiliated with the hacktivist collective Anonymous, who uses the online moniker WauchulaGhost, first began hijacking pro-ISIS Twitter accounts several months ago. Following the mass shooting at the Pulse gay nightclub in Orlando, Florida, on June 13, the hacker decided to replace ISIS imagery posted to the accounts with rainbow flags and pro-LGBT messages.</p>
<p>The vigilante hacker claims to have taken over 200 Twitter accounts belonging to ISIS supporters. However, many have since been taken down by Twitter.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/comment-page-2/#comment-1494397</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 12 Jun 2016 20:21:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=35696#comment-1494397</guid>
		<description><![CDATA[50 killed in Florida nightclub, shooter pledged ISIS allegiance
http://edition.cnn.com/2016/06/12/us/orlando-nightclub-shooting/

Orlando shooting suspect Omar Mateen was interviewed by the FBI in 2013 and 2014, FBI Assistant Special Agent Ronald Hopper told reporters Sunday. &quot;Those interviews turned out to be inconclusive, so there was nothing to keep the investigation going,&quot; Hopper said. Mateen was not under investigation at the time of Sunday&#039;s shooting and was not under surveillance, Hopper said.

An American-born man who&#039;d pledged allegiance to ISIS gunned down 50 people at a gay nightclub in Orlando -- the deadliest mass shooting in the United States and the nation&#039;s worst terror attack since 911, authorities said Sunday.

&quot;We know enough to say this was an act of terror and act of hate,&quot; President Obama said in an address to the nation from the White House.]]></description>
		<content:encoded><![CDATA[<p>50 killed in Florida nightclub, shooter pledged ISIS allegiance<br />
<a href="http://edition.cnn.com/2016/06/12/us/orlando-nightclub-shooting/" rel="nofollow">http://edition.cnn.com/2016/06/12/us/orlando-nightclub-shooting/</a></p>
<p>Orlando shooting suspect Omar Mateen was interviewed by the FBI in 2013 and 2014, FBI Assistant Special Agent Ronald Hopper told reporters Sunday. &#8220;Those interviews turned out to be inconclusive, so there was nothing to keep the investigation going,&#8221; Hopper said. Mateen was not under investigation at the time of Sunday&#8217;s shooting and was not under surveillance, Hopper said.</p>
<p>An American-born man who&#8217;d pledged allegiance to ISIS gunned down 50 people at a gay nightclub in Orlando &#8212; the deadliest mass shooting in the United States and the nation&#8217;s worst terror attack since 911, authorities said Sunday.</p>
<p>&#8220;We know enough to say this was an act of terror and act of hate,&#8221; President Obama said in an address to the nation from the White House.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/comment-page-2/#comment-1492136</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 28 May 2016 15:45:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=35696#comment-1492136</guid>
		<description><![CDATA[Reuters:
Sources: the Feinstein-Burr encryption bill has lost support in Congress, likely won&#039;t be introduced this year

Push for encryption law falters despite Apple case spotlight
http://www.reuters.com/article/us-usa-encryption-legislation-idUSKCN0YI0EM

After a rampage that left 14 people dead in San Bernardino, key U.S. lawmakers pledged to seek a law requiring technology companies to give law enforcement agencies a &quot;back door&quot; to encrypted communications and electronic devices, such as the iPhone used by one of the shooters.

Now, only months later, much of the support is gone, and the push for legislation dead, according to sources in congressional offices, the administration and the tech sector. 

Draft legislation that Senators Richard Burr and Dianne Feinstein, the Republican and Democratic leaders of the Intelligence Committee, had circulated weeks ago likely will not be introduced this year and, even if it were, would stand no chance of advancing, the sources said.

Key among the problems was the lack of White House support]]></description>
		<content:encoded><![CDATA[<p>Reuters:<br />
Sources: the Feinstein-Burr encryption bill has lost support in Congress, likely won&#8217;t be introduced this year</p>
<p>Push for encryption law falters despite Apple case spotlight<br />
<a href="http://www.reuters.com/article/us-usa-encryption-legislation-idUSKCN0YI0EM" rel="nofollow">http://www.reuters.com/article/us-usa-encryption-legislation-idUSKCN0YI0EM</a></p>
<p>After a rampage that left 14 people dead in San Bernardino, key U.S. lawmakers pledged to seek a law requiring technology companies to give law enforcement agencies a &#8220;back door&#8221; to encrypted communications and electronic devices, such as the iPhone used by one of the shooters.</p>
<p>Now, only months later, much of the support is gone, and the push for legislation dead, according to sources in congressional offices, the administration and the tech sector. </p>
<p>Draft legislation that Senators Richard Burr and Dianne Feinstein, the Republican and Democratic leaders of the Intelligence Committee, had circulated weeks ago likely will not be introduced this year and, even if it were, would stand no chance of advancing, the sources said.</p>
<p>Key among the problems was the lack of White House support</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/comment-page-2/#comment-1490520</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 16 May 2016 08:27:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=35696#comment-1490520</guid>
		<description><![CDATA[Sheera Frenkel / BuzzFeed:
How ISIS uses the internet: malware, phishing, DDoS attacks, and communicating over Telegram

 Everything You Ever Wanted to Know About How ISIS Uses The Internet
https://www.buzzfeed.com/sheerafrenkel/everything-you-ever-wanted-to-know-about-how-isis-uses-the-i?utm_term=.ltJ2y9DJ5g#.ek49xbaD6P

They talk on Telegram and send viruses to their enemies. BuzzFeed News’ Sheera Frenkel looks at how ISIS members and sympathizers around the world use the internet to grow their global network. 


What he wasn’t expecting was to wake up on the morning of March 29 to a virus planted by ISIS within a seemingly innocuous email attachment.

“Everything about this looked like a real email, sent from the admin of my own website. It looked safe, but it was not. They were trying to get my login information, my passwords. They were trying to get things that could have put real lives in danger,” said Abu Majad, who asked that his nickname be used instead of his real name to protect himself and his remaining family in Syria from reprisal attacks by ISIS. “It was very clever. When I saw it I thought to myself, Shit, now they are professional hackers?”

Cybersecurity experts and intelligence agencies who monitor ISIS say the malware is just one more sign that ISIS is growing more sophisticated in its use of the internet.

“I don’t think it is far-fetched to say that the internet is a major reason why ISIS is so successful, and so worrying, as far as global terror movements go,” said one U.S. intelligence officer, who spoke to BuzzFeed News in Washington, D.C., and asked not to be named as he wasn’t authorized to speak to the press. “They have always been ‘good’ at the internet, at the strategy of how they use it. Now they are smarter at the internet too.”

Many of the world’s major intelligence agencies are trying to figure out just how ISIS uses the internet.

“ISIS has been targeting sites that are outspoken against ISIS,” 

“Malware, phishing campaigns, DDoS attacks are all things I have seen,” he said. “Now, these dropper attacks are new and are more sophisticated. What we see is the group growing and evolving their capabilities. What we are seeing is worrying.”

Here’s an example of a conversation on a private ISIS channel on the messaging app Telegram on a recent Sunday afternoon:

“brother r u use VPN for site?”

“no brother, that is shit. use tor.”

“tor is creation of CIA. avoid tor.”

“so use vpn?”

“lol, no there is something else”

These sorts of exchanges appear daily on Telegram

The advice is meant to keep ISIS supporters safe, but for most it’s a confusing labyrinth of conflicting opinions.

“To be anonymous online is the most important thing so that we can safely help the jihad when the time comes,” Abu Jihad wrote BuzzFeed News in a private message on Telegram. He refused to give his real name or location. “The kuffars make it as hard as possible, but we always find a way to succeed,” he said, using a derogatory term for non-Muslims.

“There are rumours that our forums are infected,” said Abu Jihad. “But it is impossible for us to stay off of the internet.”

The internet is full of American and Israeli spies,” Abu Jihad wrote BuzzFeed in a private message, before asking for more details on where BuzzFeed News is based and whether it had a political agenda. “It’s well-known that most journalists are spies.”

A security expert who is only known online as “the grugq,” but whose blogs and tweets are widely read by cybersecurity experts, closely follows how ISIS communicates online. After reviewing the magazine, he told BuzzFeed News that he believed ISIS only had a limited understanding of how encryption works.

“The author believes encryption is a solution to every problem,” the grugq said in an email to BuzzFeed News, noting that it eschewed other techniques, such as teaching users how to be anonymous online by never revealing or entering into public forms personal details such as real names, birth dates, or countries of origin

The author is not clear on the real threats that jihadis actually face. The faith in crypto as a panacea to all the dangers faced by online jihadis demonstrates the shallowness of the author’s security understanding.”

“The main takeaway from this guide is that the author believes so strongly in encryption they think it will solve everything. It is the ignorant belief that ‘going dark’ is as simple as downloading TAILS. In the real world, nation state adversaries are not deterred by a little bit of crypto sprinkled here and there like OPSEC fairy dust,” he said.

“Generally the technical detail provided is impressive — not error-free, but remarkable for what after all is a general interest magazine for jihadis,” 

“Even people who use these programs every day occasionally make mistakes. The processes described by ISIS are not intuitive.&quot;

The attacks on Paris and Brussels ignited a global debate on encryption and terror.

On the one hand are certain intelligence agencies and governments, who say they missed signs of the attacks because ISIS was using the “dark web” to communicate, sending encrypted messages that intel agencies couldn’t crack. On the other hand are cybersecurity activists and experts, who say there is little evidence that sophisticated techniques were used by the attackers to mask their communication. (Quite the opposite, they argue: The attackers lived in the same apartment and used the old-school method of multiple burner phones.) And then there is the media, whose coverage of the issue has received intense scrutiny, with reports of ISIS sending encrypted emails scrubbed from the web just days after their publication, and unnamed sources giving conflicting evidence of how the attackers communicated.]]></description>
		<content:encoded><![CDATA[<p>Sheera Frenkel / BuzzFeed:<br />
How ISIS uses the internet: malware, phishing, DDoS attacks, and communicating over Telegram</p>
<p> Everything You Ever Wanted to Know About How ISIS Uses The Internet<br />
<a href="https://www.buzzfeed.com/sheerafrenkel/everything-you-ever-wanted-to-know-about-how-isis-uses-the-i?utm_term=.ltJ2y9DJ5g#.ek49xbaD6P" rel="nofollow">https://www.buzzfeed.com/sheerafrenkel/everything-you-ever-wanted-to-know-about-how-isis-uses-the-i?utm_term=.ltJ2y9DJ5g#.ek49xbaD6P</a></p>
<p>They talk on Telegram and send viruses to their enemies. BuzzFeed News’ Sheera Frenkel looks at how ISIS members and sympathizers around the world use the internet to grow their global network. </p>
<p>What he wasn’t expecting was to wake up on the morning of March 29 to a virus planted by ISIS within a seemingly innocuous email attachment.</p>
<p>“Everything about this looked like a real email, sent from the admin of my own website. It looked safe, but it was not. They were trying to get my login information, my passwords. They were trying to get things that could have put real lives in danger,” said Abu Majad, who asked that his nickname be used instead of his real name to protect himself and his remaining family in Syria from reprisal attacks by ISIS. “It was very clever. When I saw it I thought to myself, Shit, now they are professional hackers?”</p>
<p>Cybersecurity experts and intelligence agencies who monitor ISIS say the malware is just one more sign that ISIS is growing more sophisticated in its use of the internet.</p>
<p>“I don’t think it is far-fetched to say that the internet is a major reason why ISIS is so successful, and so worrying, as far as global terror movements go,” said one U.S. intelligence officer, who spoke to BuzzFeed News in Washington, D.C., and asked not to be named as he wasn’t authorized to speak to the press. “They have always been ‘good’ at the internet, at the strategy of how they use it. Now they are smarter at the internet too.”</p>
<p>Many of the world’s major intelligence agencies are trying to figure out just how ISIS uses the internet.</p>
<p>“ISIS has been targeting sites that are outspoken against ISIS,” </p>
<p>“Malware, phishing campaigns, DDoS attacks are all things I have seen,” he said. “Now, these dropper attacks are new and are more sophisticated. What we see is the group growing and evolving their capabilities. What we are seeing is worrying.”</p>
<p>Here’s an example of a conversation on a private ISIS channel on the messaging app Telegram on a recent Sunday afternoon:</p>
<p>“brother r u use VPN for site?”</p>
<p>“no brother, that is shit. use tor.”</p>
<p>“tor is creation of CIA. avoid tor.”</p>
<p>“so use vpn?”</p>
<p>“lol, no there is something else”</p>
<p>These sorts of exchanges appear daily on Telegram</p>
<p>The advice is meant to keep ISIS supporters safe, but for most it’s a confusing labyrinth of conflicting opinions.</p>
<p>“To be anonymous online is the most important thing so that we can safely help the jihad when the time comes,” Abu Jihad wrote BuzzFeed News in a private message on Telegram. He refused to give his real name or location. “The kuffars make it as hard as possible, but we always find a way to succeed,” he said, using a derogatory term for non-Muslims.</p>
<p>“There are rumours that our forums are infected,” said Abu Jihad. “But it is impossible for us to stay off of the internet.”</p>
<p>The internet is full of American and Israeli spies,” Abu Jihad wrote BuzzFeed in a private message, before asking for more details on where BuzzFeed News is based and whether it had a political agenda. “It’s well-known that most journalists are spies.”</p>
<p>A security expert who is only known online as “the grugq,” but whose blogs and tweets are widely read by cybersecurity experts, closely follows how ISIS communicates online. After reviewing the magazine, he told BuzzFeed News that he believed ISIS only had a limited understanding of how encryption works.</p>
<p>“The author believes encryption is a solution to every problem,” the grugq said in an email to BuzzFeed News, noting that it eschewed other techniques, such as teaching users how to be anonymous online by never revealing or entering into public forms personal details such as real names, birth dates, or countries of origin</p>
<p>The author is not clear on the real threats that jihadis actually face. The faith in crypto as a panacea to all the dangers faced by online jihadis demonstrates the shallowness of the author’s security understanding.”</p>
<p>“The main takeaway from this guide is that the author believes so strongly in encryption they think it will solve everything. It is the ignorant belief that ‘going dark’ is as simple as downloading TAILS. In the real world, nation state adversaries are not deterred by a little bit of crypto sprinkled here and there like OPSEC fairy dust,” he said.</p>
<p>“Generally the technical detail provided is impressive — not error-free, but remarkable for what after all is a general interest magazine for jihadis,” </p>
<p>“Even people who use these programs every day occasionally make mistakes. The processes described by ISIS are not intuitive.&#8221;</p>
<p>The attacks on Paris and Brussels ignited a global debate on encryption and terror.</p>
<p>On the one hand are certain intelligence agencies and governments, who say they missed signs of the attacks because ISIS was using the “dark web” to communicate, sending encrypted messages that intel agencies couldn’t crack. On the other hand are cybersecurity activists and experts, who say there is little evidence that sophisticated techniques were used by the attackers to mask their communication. (Quite the opposite, they argue: The attackers lived in the same apartment and used the old-school method of multiple burner phones.) And then there is the media, whose coverage of the issue has received intense scrutiny, with reports of ISIS sending encrypted emails scrubbed from the web just days after their publication, and unnamed sources giving conflicting evidence of how the attackers communicated.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/comment-page-2/#comment-1490175</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 May 2016 13:31:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=35696#comment-1490175</guid>
		<description><![CDATA[A warning message went to the wrong address - four minutes later exploded in the subway

The police tried to close after the metro Brussels airport attack, but the e-mail went to the wrong address. Four minutes later Maalbeekin metro station exploded. Decuyper never seen a message because it was sent to his personal email address and not to work mail.

Key question has become, how it was possible that the subway network was still operating at 9.11, or more than one hour after the Zaventem airport attack.

Source: http://www.iltalehti.fi/ulkomaat/2016051321555120_ul.shtml]]></description>
		<content:encoded><![CDATA[<p>A warning message went to the wrong address &#8211; four minutes later exploded in the subway</p>
<p>The police tried to close after the metro Brussels airport attack, but the e-mail went to the wrong address. Four minutes later Maalbeekin metro station exploded. Decuyper never seen a message because it was sent to his personal email address and not to work mail.</p>
<p>Key question has become, how it was possible that the subway network was still operating at 9.11, or more than one hour after the Zaventem airport attack.</p>
<p>Source: <a href="http://www.iltalehti.fi/ulkomaat/2016051321555120_ul.shtml" rel="nofollow">http://www.iltalehti.fi/ulkomaat/2016051321555120_ul.shtml</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/comment-page-2/#comment-1483291</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Apr 2016 08:44:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=35696#comment-1483291</guid>
		<description><![CDATA[The Strange Origins of TrueCrypt, ISIS’s Favored Encryption Tool
http://www.newyorker.com/news/news-desk/the-strange-origins-of-truecrypt-isiss-favored-encryption-tool

On Tuesday, the Times reporter Rukmini Callimachi published the latest in a series of blockbuster stories about the inner workings of the Islamic State. The piece focussed on the logistics of the group’s deployment of terrorists in Europe, but also included a significant revelation in an ongoing debate about encryption. In ISIS’s training and operational planning, Callimachi reported, the group appeared to routinely use a piece of software called TrueCrypt. When one would-be bomber was dispatched from Syria to France, Callimachi writes, “an Islamic State computer specialist handed him a USB key. It contained CCleaner, a program used to erase a user’s online history on a given computer, as well as TrueCrypt, an encryption program that was widely available at the time and that experts say has not yet been cracked.”

TrueCrypt and programs like it were the primary means for securing files and disks by those with a privacy bent of whatever stripe. Free to download and relatively user-friendly, TrueCrypt has been considered by experts to be among the strongest file-encryption programs available, since its release in 2004.

Without the user’s password, the software has long been viewed as uncrackable. Included in the information that Edward Snowden provided to Glenn Greenwald, Laura Poitras, and other reporters in 2013 was a document showing that the National Security Agency had “major problems” breaking TrueCrypt.

The genesis of TrueCrypt turns out to be as full of intrigue as the uses of it. The encryption software came up in my own reporting, in a story I’ve been researching for two years about a programmer named Paul Le Roux, who built a global drug, arms, and money-laundering cartel out of a base in the Philippines.

Both E4M and its progeny, TrueCrypt, are “open source” software. Their code is available to anyone to examine or to build upon, with some restrictions. The developers who expanded upon E4M to improve and maintain TrueCrypt over the years have remained anonymous. “The origin of TrueCrypt has always been very mysterious,”

In May, 2014, however, the anonymous developers behind TrueCrypt abruptly announced on their Web site that they would no longer support—or vouch for the security of—the software. Theories abound in the encryption community as to why

TrueCrypt shows is how impractical those back doors and requests are. TrueCrypt is an open-source program, maintained by mysterious, anonymous developers who are generally assumed to be outside the U.S. They likely have no legal incentive to help any government, and every practical incentive not to.

We now know that the original creator of E4M was not a company looking to curry favor with the U.S. government, but a man who went on to become one of its most wanted criminals. Negotiating back doors with such developers is almost certainly not an option. And TrueCrypt is just one of many open-source encryption programs available.

In 2015, Green and some colleagues completed a security audit of TrueCrypt, concluding that, the developers’ shutdown notwithstanding, the software remained secure from back doors or cracking. ISIS certainly seems to think so. 

How ISIS Built the Machinery of Terror Under Europe’s Gaze
http://www.nytimes.com/2016/03/29/world/europe/isis-attacks-paris-brussels.html?_r=0]]></description>
		<content:encoded><![CDATA[<p>The Strange Origins of TrueCrypt, ISIS’s Favored Encryption Tool<br />
<a href="http://www.newyorker.com/news/news-desk/the-strange-origins-of-truecrypt-isiss-favored-encryption-tool" rel="nofollow">http://www.newyorker.com/news/news-desk/the-strange-origins-of-truecrypt-isiss-favored-encryption-tool</a></p>
<p>On Tuesday, the Times reporter Rukmini Callimachi published the latest in a series of blockbuster stories about the inner workings of the Islamic State. The piece focussed on the logistics of the group’s deployment of terrorists in Europe, but also included a significant revelation in an ongoing debate about encryption. In ISIS’s training and operational planning, Callimachi reported, the group appeared to routinely use a piece of software called TrueCrypt. When one would-be bomber was dispatched from Syria to France, Callimachi writes, “an Islamic State computer specialist handed him a USB key. It contained CCleaner, a program used to erase a user’s online history on a given computer, as well as TrueCrypt, an encryption program that was widely available at the time and that experts say has not yet been cracked.”</p>
<p>TrueCrypt and programs like it were the primary means for securing files and disks by those with a privacy bent of whatever stripe. Free to download and relatively user-friendly, TrueCrypt has been considered by experts to be among the strongest file-encryption programs available, since its release in 2004.</p>
<p>Without the user’s password, the software has long been viewed as uncrackable. Included in the information that Edward Snowden provided to Glenn Greenwald, Laura Poitras, and other reporters in 2013 was a document showing that the National Security Agency had “major problems” breaking TrueCrypt.</p>
<p>The genesis of TrueCrypt turns out to be as full of intrigue as the uses of it. The encryption software came up in my own reporting, in a story I’ve been researching for two years about a programmer named Paul Le Roux, who built a global drug, arms, and money-laundering cartel out of a base in the Philippines.</p>
<p>Both E4M and its progeny, TrueCrypt, are “open source” software. Their code is available to anyone to examine or to build upon, with some restrictions. The developers who expanded upon E4M to improve and maintain TrueCrypt over the years have remained anonymous. “The origin of TrueCrypt has always been very mysterious,”</p>
<p>In May, 2014, however, the anonymous developers behind TrueCrypt abruptly announced on their Web site that they would no longer support—or vouch for the security of—the software. Theories abound in the encryption community as to why</p>
<p>TrueCrypt shows is how impractical those back doors and requests are. TrueCrypt is an open-source program, maintained by mysterious, anonymous developers who are generally assumed to be outside the U.S. They likely have no legal incentive to help any government, and every practical incentive not to.</p>
<p>We now know that the original creator of E4M was not a company looking to curry favor with the U.S. government, but a man who went on to become one of its most wanted criminals. Negotiating back doors with such developers is almost certainly not an option. And TrueCrypt is just one of many open-source encryption programs available.</p>
<p>In 2015, Green and some colleagues completed a security audit of TrueCrypt, concluding that, the developers’ shutdown notwithstanding, the software remained secure from back doors or cracking. ISIS certainly seems to think so. </p>
<p>How ISIS Built the Machinery of Terror Under Europe’s Gaze<br />
<a href="http://www.nytimes.com/2016/03/29/world/europe/isis-attacks-paris-brussels.html?_r=0" rel="nofollow">http://www.nytimes.com/2016/03/29/world/europe/isis-attacks-paris-brussels.html?_r=0</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/comment-page-2/#comment-1482554</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 29 Mar 2016 15:22:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=35696#comment-1482554</guid>
		<description><![CDATA[Remote Sensing Bombs Could Stem Terrorism
http://hackaday.com/2016/03/29/remote-sensing-bombs-could-stem-terrorism/

If you understand technology, there were a lot of things hard to explain on Star Trek. 

Remote sensing would have a very distinct use in today’s world: finding terrorist bombs earlier. A recent article published on New Scientist by [Debora MacKenzie] points out that stopping attacks like the recent one in Brussels is difficult without increasing congestion. For example, putting checkpoints at doors instead of inside transit stations is common in Asia, but causes lines and delays.

Airport security focuses on keeping explosives off planes. Hospital-like CT scanners and X-ray diffraction machines peer into checked luggage as it moves through the bowels of airports. Passengers line up to pass through metal-detectors and be swabbed for explosives. But the Brussels attackers targeted the busy check-in area – where no security checks take place.

How do we prevent a repeat attack? Moving check-points to the front doors is one solution; metal detectors and pat-downs are ubiquitous at airport entrances across Asia. But it would mean further delays, and create new lines of people that could be targeted.

One solution, say security researchers, is to keep people moving, and scan them remotely as they pass through the building. 

So how else can we stop explosives getting to crowds of people? “The technologies are either imagers or sniffers,”

Unfortunately, imagers can be tricked. Explosives can be moulded to look like ordinary objects

Sniffers are harder to fool. Dogs are the best, says Jenkins, but they are hard to use on a large scale. 

There are other ways to detect explosives remotely. Rather than analysing captured molecules – like the failed puffers – the Lincoln Laboratory at the Massachusetts Institute of Technology has turned to lasers to “sniff” explosives from a distance.

Lasers are also the main ingredient of a gun-shaped device called G-Scan, developed by Laser Detect Systems of Ramat Gan in Israel. This fires a green laser at a target then uses Raman spectroscopy to identify the molecules that are scattered back.

Detecting explosive material from a distance would let security services search for bomb-making materials – not just finished weapons.]]></description>
		<content:encoded><![CDATA[<p>Remote Sensing Bombs Could Stem Terrorism<br />
<a href="http://hackaday.com/2016/03/29/remote-sensing-bombs-could-stem-terrorism/" rel="nofollow">http://hackaday.com/2016/03/29/remote-sensing-bombs-could-stem-terrorism/</a></p>
<p>If you understand technology, there were a lot of things hard to explain on Star Trek. </p>
<p>Remote sensing would have a very distinct use in today’s world: finding terrorist bombs earlier. A recent article published on New Scientist by [Debora MacKenzie] points out that stopping attacks like the recent one in Brussels is difficult without increasing congestion. For example, putting checkpoints at doors instead of inside transit stations is common in Asia, but causes lines and delays.</p>
<p>Airport security focuses on keeping explosives off planes. Hospital-like CT scanners and X-ray diffraction machines peer into checked luggage as it moves through the bowels of airports. Passengers line up to pass through metal-detectors and be swabbed for explosives. But the Brussels attackers targeted the busy check-in area – where no security checks take place.</p>
<p>How do we prevent a repeat attack? Moving check-points to the front doors is one solution; metal detectors and pat-downs are ubiquitous at airport entrances across Asia. But it would mean further delays, and create new lines of people that could be targeted.</p>
<p>One solution, say security researchers, is to keep people moving, and scan them remotely as they pass through the building. </p>
<p>So how else can we stop explosives getting to crowds of people? “The technologies are either imagers or sniffers,”</p>
<p>Unfortunately, imagers can be tricked. Explosives can be moulded to look like ordinary objects</p>
<p>Sniffers are harder to fool. Dogs are the best, says Jenkins, but they are hard to use on a large scale. </p>
<p>There are other ways to detect explosives remotely. Rather than analysing captured molecules – like the failed puffers – the Lincoln Laboratory at the Massachusetts Institute of Technology has turned to lasers to “sniff” explosives from a distance.</p>
<p>Lasers are also the main ingredient of a gun-shaped device called G-Scan, developed by Laser Detect Systems of Ramat Gan in Israel. This fires a green laser at a target then uses Raman spectroscopy to identify the molecules that are scattered back.</p>
<p>Detecting explosive material from a distance would let security services search for bomb-making materials – not just finished weapons.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
