Do GCHQ/MI5 etc need more powers to fight terrorism?
Discussion
0000 said:
smifffymoto said:
IT should be an open platform for MI6,MI5 and GCHQ but not the police.
I don't think end to end encryption should be weakened for anyone. I'm sure at least one of those three has the technical capacity to work around it to a limited extent in exceptional circumstances and I'm fine with that.Amber Rudd said:
The best people who understand the technology, who understand the necessary hashtags to stop this stuff ever being put up, not just taken down, but ever being put up in the first place are going to be them.
Shut up you tool.I'm amazed that Amber Rudd refuses to understand this. She must be very hard of thinking.
I'm in FS and everything relies on encryption that can't reasonably be broken. Without it no bank could trust another...errrmm.. the modern banking world requires stuff GCHQ can't break. How can you ban it!???
I expect they have his phone, and I also expect he wasn't in the frame of mind where he was deleting messages, contacts, backups and histories just before attacking. They have everything they need.
This is a spurious call to get access for full time monitoring, It's the only way in which access could be used for any kind of upfront warning of an attack.
Just target the handsets like the big boys do, and give people at least a bit of privacy from the snooping police state that exists in this country.
It's a shame she'll never read this. Maybe someone in GCHQ or the local council will and can pass it on.
This is a spurious call to get access for full time monitoring, It's the only way in which access could be used for any kind of upfront warning of an attack.
Just target the handsets like the big boys do, and give people at least a bit of privacy from the snooping police state that exists in this country.
It's a shame she'll never read this. Maybe someone in GCHQ or the local council will and can pass it on.
anonymous said:
[redacted]
Yeh sure, and that will probably continue to some degree - and was completely baffling to those in the infosuck community. But one can probably assume that their opsec skills will gradually increase. At least amongst the groups that have dedicated IT support who know what they're doing.Tonsko said:
Quite. Even if Whatsapp caves, Signal most definintely won't.
Even if Whatsapp caves and Signal does too, the Maths most definitely won't.anonymous said:
[redacted]
Are they asking their experts? It looks like they just assume they know enough to wade in and make demands as they see fit because that's simply their modus operandi. Admittedly Nadine Dorries isn't listening though.Rudd might not have a clue but stuff is moving on, albeit too slowly, this was today: (Subject: Cyber Security: UK National Security in a Digital World):
http://www.parliamentlive.tv/Event/Index/6df35e39-...
http://www.parliamentlive.tv/Event/Index/6df35e39-...
I cant help feel the politicians are the the type of people that click the "internet" icon on their desktop.
It doesnt help when sky news have people discussing it that have no clue how it works. One of the guys on there was saying "Are whatsapp lying and they could hand over everything if they want"
I turned the tv over.
It doesnt help when sky news have people discussing it that have no clue how it works. One of the guys on there was saying "Are whatsapp lying and they could hand over everything if they want"
I turned the tv over.
It is depressing that so many people are so utterly ignorant about the mathematics of encryption, or how open source works.
There is no going back. You cannot put a backdoor into encryption. You can put a backdoor into an application, of course, but the rest of us would laugh and just use something else. Mental.
There is no going back. You cannot put a backdoor into encryption. You can put a backdoor into an application, of course, but the rest of us would laugh and just use something else. Mental.
The Snowden stuff showed that they have pretty wide ranging decryption and data trawling operations already running and that was years ago. Bullrun and Edgehill are the NSA/GCHQ decryption programmes and PRISM and Tempora are their data trawling operations. Since Snowden the MOD issued notices to the major media outlets effectively stopping them reporting anything in relation to this area. The Guardian offices were of course raided by Mi5 who made them destroy a number of hard drives etc(I can only imagine the righteous liberal tears as all this happened).
As we hear time and time again, they intercept a number of attacks every year successfully with the existing powers. It appears the latest attack was someone who acted alone and wanted his 5 minutes of Jihadi fame. We won't stop that anymore than we can stop someone murdering his wife.
I personally think more needs to be done in the prisons, if we stop people being radicalised in the first place, that's far more effective than intercepting 1,000,000 innocuous WhatsApp chats.
As we hear time and time again, they intercept a number of attacks every year successfully with the existing powers. It appears the latest attack was someone who acted alone and wanted his 5 minutes of Jihadi fame. We won't stop that anymore than we can stop someone murdering his wife.
I personally think more needs to be done in the prisons, if we stop people being radicalised in the first place, that's far more effective than intercepting 1,000,000 innocuous WhatsApp chats.
Don said:
It is depressing that so many people are so utterly ignorant about the mathematics of encryption, or how open source works.
There is no going back. You cannot put a backdoor into encryption. You can put a backdoor into an application, of course, but the rest of us would laugh and just use something else. Mental.
Only if you're aware that a backdoor exists.There is no going back. You cannot put a backdoor into encryption. You can put a backdoor into an application, of course, but the rest of us would laugh and just use something else. Mental.
Don't the US have a history of intercepting iPhones, and even Cisco network equipment to install their own backdoors?
amusingduck said:
Only if you're aware that a backdoor exists.
Don't the US have a history of intercepting iPhones, and even Cisco network equipment to install their own backdoors?
Correct: https://arstechnica.com/tech-policy/2014/05/photos...Don't the US have a history of intercepting iPhones, and even Cisco network equipment to install their own backdoors?
Cisco thought it was so rife that they enacted a protocol to ship to decoy addresses in an effort to avoid interception:
https://www.theregister.co.uk/2015/03/18/want_to_d...
CIA has android device rootkits (and more than likely others)... and as noted earlier, 'end to end' encryption does not defend against this kind of attack.
Here's an interesting article about how James Comey's secret twitter account was tracked down purely by the use of metadata.
http://gizmodo.com/this-is-almost-certainly-james-...
http://gizmodo.com/this-is-almost-certainly-james-...
Theresa May has called on internet companies to do more to tackle the spread of extremist material in the wake of the London Bridge terror attack as a former cabinet minister said online giants must “face up to their responsibilities”. The Prime Minister said the UK “cannot and must not pretend that things can continue as they are” as she set out tough measures to tackle terrorism in response to the attack. She said that there must now be greater regulation of the internet and that existing online “safe spaces” that allow terrorism to “breed” must be eradicated.
Theresa May said:
We need to work with allied democratic governments to reach international agreements that regulate cyberspace to prevent the spread of extremist and terrorism planning.
And we need to do everything we can at home to reduce the risks of extremism online.
And we need to do everything we can at home to reduce the risks of extremism online.
Gassing Station | News, Politics & Economics | Top of Page | What's New | My Stuff