{"id":25514,"date":"2014-08-14T09:41:19","date_gmt":"2014-08-14T13:41:19","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25514"},"modified":"2014-08-14T09:41:19","modified_gmt":"2014-08-14T13:41:19","slug":"snowden-leaks-show-that-terrorists-are-just-like-us","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/snowden-leaks-show-that-terrorists-are-just-like-us.php","title":{"rendered":"Snowden leaks show that terrorists are JUST LIKE US"},"content":{"rendered":"<p><p>        Recommendations for simplifying OS migration  <\/p>\n<p>    NSA whistleblower Edward Snowden's media allies have launched a    counteroffensive against allegations by intelligence agencies    that terrorists have upped their game in cryptography as a    result of his leaks about NSA spying.  <\/p>\n<p>    Glenn Greenwald's The Intercept published     leaked GCHQ mobile phone OPSEC guidance from 2010 alongside    excerpts from a comparable jihadist handbook from 2003 to argue    that terrorist groups were focused on mobile phone spying risks    years before the Snowden leaks began last year.  <\/p>\n<p>    \"So sophisticated is the 10-year-old 'Jihadist Manual' that, in    many sections, it is virtually identical to the GCHQs own    manual, developed years later (in 2010), for instructing its    operatives how to keep their communications secure,\" The    Intercept     argues.  <\/p>\n<p>    Greenwald's piece attempts to rubbish a recent NPR Morning    Edition radio report suggesting that the Snowden revelations    harmed national security and allowed terrorists to develop    countermeasures to state surveillance. NPR used research from    web intelligence and predictive analytics firm Recorded Future    to back up this accusation, which has repeatedly been aired by    everyone from Sir Iain Lobban, director of Britain's GCHQ spy    agency, who did so last year     in front of a parliamentary committee, to former NSA    General Counsel Stewart Baker earlier this month (here).*  <\/p>\n<p>    \"Following the June 2013 Edward Snowden leaks, we observe an    increased pace of innovation, specifically new competing    jihadist platforms and three major new encryption tools from    three different organizations  GIMF, Al-Fajr Technical    Committee, and ISIS  within a three to five-month time frame    of the leaks,\" Recorded Future     states.  <\/p>\n<p>    NPR failed to point out that financial backers of Recorded    Future include In-Q-Tel, the CIAs investment arm. Mario    Vuksan, chief exec of ReversingLabs, a cybersecurity expert who    worked on Recorded Future's report, entered into a \"strategic    partnership\" In-Q-Tel two years ago.  <\/p>\n<p>    \"Beyond all these CIA connections, the conclusion touted in the    NPR reportthat al-Qaeda developed more sophisticated    encryption techniques due to the Snowden reportingis dubious    in the extreme. It is also undercut by documents contained in    the Snowden archive,\" The Intercept argues.  <\/p>\n<p>    Recorded Future     subsequently claimed that terrorists were turning to \"off    the shelf\" methods of cryptography.  <\/p>\n<p>    Noted cryptographer Bruce Schneier maintains that the changes    terrorists appear to be making will, if anything, make the    counter-terror role of signals intelligence agencies such as    the NSA and GCHQ easier rather than harder.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2014\/08\/13\/snowden_effect_terrorist_crypto_debate\" title=\"Snowden leaks show that terrorists are JUST LIKE US\">Snowden leaks show that terrorists are JUST LIKE US<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Recommendations for simplifying OS migration NSA whistleblower Edward Snowden's media allies have launched a counteroffensive against allegations by intelligence agencies that terrorists have upped their game in cryptography as a result of his leaks about NSA spying. Glenn Greenwald's The Intercept published leaked GCHQ mobile phone OPSEC guidance from 2010 alongside excerpts from a comparable jihadist handbook from 2003 to argue that terrorist groups were focused on mobile phone spying risks years before the Snowden leaks began last year. \"So sophisticated is the 10-year-old 'Jihadist Manual' that, in many sections, it is virtually identical to the GCHQs own manual, developed years later (in 2010), for instructing its operatives how to keep their communications secure,\" The Intercept argues. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-25514","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25514"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25514"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25514\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}