Menu

Blog

Archive for the ‘terrorist’ tag

Jun 29, 2016

Do you have a right to view an ISIS Kill List?

Posted by in categories: counterterrorism, ethics, geopolitics, rants, terrorism, transparency

According to The Clarion Project, a political information bureau that warns westerners of the growing threat from radical Islam, ISIS has published a ‘kill list’ that includes the names, addresses and emails of 15,000 Americans.

Clarion_300So far, this is interesting news, but it is not really new. I found ISIS, Hezbollah and Al-Qaida kill lists going back at least 8 years. This 2012 bulletin complains that NBC would not release the names contained on a kill list.

A kill list is newsworthy, and the Clarion article is interesting—but the article has more “facts” with which the publisher wishes to generate mob frenzy…

  • It explains that 4,000 of the names on the Kill List have been leaked by hackers
  • It echos a report by Circa News that the FBI has decided to not inform citizens that they are on the ISIS kill list.

In a clear effort to whip up and direct audience indignation, it asks readers to take a one-question poll. Which answer would you choose?

Continue reading “Do you have a right to view an ISIS Kill List?” »

Feb 22, 2016

Is San Bernardino iPhone Fully Encrypted?

Posted by in categories: encryption, government, hacking, law enforcement, mobile phones, policy, privacy, security

Here is a question that keeps me up at night…

Is the San Bernardino iPhone just locked or is it properly encrypted?

Isn’t full encryption beyond the reach of forensic investigators? So we come to the real question: If critical data on the San Bernardino iPhone is properly encrypted, and if the Islamic terrorist who shot innocent Americans used a good password, then what is it that the FBI thinks that Apple can do to help crack this phone? Doesn’t good encryption thwart forensic analysis, even by the FBI and the maker of the phone?

iphone-01In the case of Syed Rizwan Farook’s iPhone, the FBI doesn’t know if the shooter used a long and sufficiently unobvious password. They plan to try a rapid-fire dictionary attack and other predictive algorithms to deduce the password. But the content of the iPhone is protected by a closely coupled hardware feature that will disable the phone and even erase memory, if it detects multiple attempts with the wrong password. The FBI wants Apple to help them defeat this hardware sentry, so that they can launch a brute force hack—trying thousands of passwords each second. Without Apple’s help, the crack detection hardware could automatically erase incriminating evidence, leaving investigators in the dark.

Continue reading “Is San Bernardino iPhone Fully Encrypted?” »