- Sen. Rand Paul: ‘I am seriously thinking about’ running for president in 2016
- Sleet, ice, deepfreeze hit large swath of U.S.
- ‘Welcome to the edge of freedom’: Biden’s boots touch down in DMZ
- Obama: Hole U.S. ‘digging out of’ requires billions more in unemployment benefits
- Obama’s regulatory agenda will cost U.S. economy $143B next year: report
- Patriot Act author on James Clapper: Fire, prosecute him
- Russia P.M. Medvedev: No amnesty for political prisoners
- Michigan GOP Senate hopeful reminds government is the ‘servant’
- Christmas, by Congress: Members mull a 15-cent tax on trees
- U.S. unemployment falls to five-year low of 7 percent; 203K jobs added
Extremists take more security measures in wake of NSA leak
Extremists are sharing media reports about the National Security Agency’s telecommunications surveillance program and are urging each other to increase their security.
“Jihadi groups over the coming weeks will be going through a rapid evolution of their security measures in response to details revealed” in leaked NSA documents, said Ben Venzke, CEO of IntelCenter, which monitors open-source extremist communications for government clients.
Classified documents posted online last week revealed that the NSA can intercept emails, instant messages and Internet phone or video calls from nine service providers, using a system called Prism.
“If you are a bad actor and I tell you all email from company X is being monitored, are you going to continue to use company X or are you going to switch to company C that is not on the list?” said Mr. Venzke, who has followed jihadi messaging for more than a decade.
Among the measures being suggested is stopping the use of email and communications services listed in the leaked documents — Google, Microsoft, Yahoo, Facebook, Skype, YouTube, Paltalk, Apple and AOL.
Extremists on bulletin boards also are recommending “increased use of encryption tools,” Mr. Venzke said.
Online jihadists have long urged their comrades to use encryption, which can shield an electronic communication from surveillance by scrambling the data of which it is composed. There is even an Arabic language computer encryption program called Mujahideen Secrets that members of one Web forum have been urged to use for several years.
Documents posted online last week revealed that the NSA has been collecting “metadata” — the time and length of telephone calls, the calling and receiving numbers, and the two parties’ location — of about every call made or received in the United States.
In addition, the agency has been collecting massive amounts of content data — the texts of emails or the sounds of people talking on Internet calls — directly from Internet providers, although officials say this capability is used only against people “reasonably believed” to be foreigners outside of the United States.
Glenn Greenwald, the reporter for Britain’s Guardian newspaper who broke the Prism story, has said the revelation will not hurt counterterrorism efforts because terrorists already know their communications are being monitored.
“There’s not a single revelation that we’ve provided to the world that even remotely jeopardizes national security,” he told NBC Monday.
But Mr. Venzke said: “Terrorists, hostile intelligence agencies, child pornographers and the rest of the world of nefarious actors for the most part can all read.”
He said that terrorists and other intelligence targets may have “had a vague notion that this [surveillance] was going on” but likely were focused on other aspects of their plots, not communication security.
“I guarantee you it just went right to the top of their priority list,” he said.
© Copyright 2013 The Washington Times, LLC. Click here for reprint permission.
About the Author
Shaun Waterman is an award-winning reporter for The Washington Times, covering foreign affairs, defense and cybersecurity. He was a senior editor and correspondent for United Press International for nearly a decade, and has covered the Department of Homeland Security since 2003. His reporting on the Sept. 11 Commission and the tortuous process by which some of its recommendations finally became ...
- Britain eyes new powers to thwart Islamic extremists
- In global op, feds help seize websites selling fake goods
- Privacy board springs to life after NSA revelations
- Morocco trains 500 imams to counter spread of radical Islam
- Rice promises 'progressive' Asia tilt on women's rights, climate change
Latest Blog Entries
- Obama: Hole U.S. 'digging out of' requires billions more in unemployment benefits
- Spike in battlefield deaths linked to restrictive rules of engagement
- Bill OReilly reminds: Nelson Mandela was a communist
- PRUDEN: British press horrified as London's new mayor dares to proclaim the truth
- Activists urge Obama to go rogue, sidestep Congress
- Obama tries to calm Israeli fears over Iranian nuke deal 'not based on trust'
- 'Hunger Games' delivers Obama's message on income inequality
- Obamas call to close Vatican embassy is 'slap in the face' to Roman Catholics
- Craigslist killers: Police say newlyweds stabbed man for thrills
- Dick Cheney: Family feud over gay marriage has been 'dealt with'
Independent voices from the The Washington Times Communities
Get in the middle of all the action inside and outside the boxing ring.
Opinion, analysis, and musings on politics, pop culture, reinvention, and the resultant flotsam and jetsam floating around the right-of-center quadrant of the Left Coast.
The cold hard truth about politics in America today and the state of this once great nation.
Find the latest news and happening that effect those in the Washington D.C., Northern Virginia and Maryland Metro region.
White House pets gone wild!