blog




  • Essay / Terrorist Use of Cryptography and Data Encryption

    A tactic that underpins the success of terrorist groups is blending in with the local population. The terrorists do not wear any distinctive uniform. Use false identities. Hide from view inside protected sanctuaries such as mosques. As a leading researcher and expert on terrorist use of the Internet said: “With more than 1.4 billion people on the Internet…it is not surprising to find terrorists among this population” (Denning 2010, 1). Terrorist groups use the Internet and other modern technologies for a variety of reasons. Through videos, text, and images, terrorists will learn, communicate, and conduct business (Denning 2010, 1-2). According to a recent Rand study, bad actors use cell phones, the Internet, and video recorders for a wide range of activities: training, dissemination of propaganda, and reconnaissance operations, among other goals. (Don et al., 2007, 9). Modern telecommunications technologies allow extremists to present their dogma on a global scale. As Zanini and Edwards point out, modern communications networks give terrorists the freedom to operate worldwide from almost any country (2001, 38). Therefore, terrorists must protect their digital information. It is a need to protect oneself, to hide and to mingle with the digital population in order to protect one's freedom of action. Two inexpensive and practical means, steganography and encryption, allow terrorist associations to hide and secure their digital information which protects their freedom of action. ObjectiveThe USSS faces many challenges. Cryptography, policy, legal, ethical and organizational aspects represent such challenges. This document asserts that terrorist groups will use old methods with new means to protect their communications; hence the terrorist's objective to protect the middle of paper......, Nicholas G. 2010. “Past, present and future methods of cryptography and data encryption”. Department of Electrical and Computer EngineeringUniversity of Utah. http://www.eng.utah.edu/~nmcdonal/Tutorials (accessed November 31, 2013). Murphy, SD 2004. “Steganography--the New Intelligence Threat.” Marine Corps War College, Marine Corps University, Marine Corps Combat Development Command. Quantico: VA. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA520517 (accessed November 31, 3013). National Security Agency. 2012. “National Centers of Academic Excellence – Cyber ​​Operations.” http://www.nsa.gov/academia/nat_cae_cyber_ops/ (accessed December 5, 2013). Zanini, Michele and Edwards, Sean. 2001. “The Networking of Terrorism in the Information Age.” Published in 2001 by RAND Corporation. http://www.rand.org/pubs/monograph_reports/MR1382.html (accessed November 31, 2013).