{"id":181766,"date":"2016-03-22T17:47:00","date_gmt":"2016-03-22T22:47:00","guid":{"rendered":"https:\/\/www.panix.com\/~msaroff\/40years\/2016\/03\/22\/what-a-surprise-the-terrorists-in-paris-did-not-use-encryption\/"},"modified":"2016-03-22T17:47:00","modified_gmt":"2016-03-22T22:47:00","slug":"what-a-surprise-the-terrorists-in-paris-did-not-use-encryption","status":"publish","type":"post","link":"https:\/\/www.panix.com\/~msaroff\/40years\/2016\/03\/22\/what-a-surprise-the-terrorists-in-paris-did-not-use-encryption\/","title":{"rendered":"What a Surprise.  The Terrorists in Paris Did Not Use Encryption"},"content":{"rendered":"<p>They <a href=\"http:\/\/arstechnica.co.uk\/tech-policy\/2016\/03\/paris-terrorist-attacks-burner-phones-not-encryption\/\">used burner phones and made calls instead of texting and emailing<\/a>:<\/p>\n<blockquote><p><span style=\"color: blue;\">New details of the Paris attacks carried out last November reveal that it was the consistent use of prepaid burner phones, not encryption, that helped keep the terrorists off the radar of the intelligence services. <\/p>\n<p>As an article in <i>The New York Times<\/i> reports: &#8220;the three teams in Paris were comparatively disciplined. They used only new phones that they would then discard, including several activated minutes before the attacks, or phones seized from their victims.&#8221; <\/p>\n<p>The article goes on to give more details of how <a href=\"http:\/\/www.nytimes.com\/2016\/03\/20\/world\/europe\/a-view-of-isiss-evolution-in-new-details-of-paris-attacks.html\">some phones were used only very briefly<\/a> in the hours leading up to the attacks. For example: &#8220;Security camera footage showed Bilal Hadfi, the youngest of the assailants, as he paced outside the stadium, talking on a cellphone. The phone was activated less than an hour before he detonated his vest.&#8221; The information come from a 55-page report compiled by the French antiterrorism police for France\u2019s Interior Ministry. <\/p>\n<p>Outside the Bataclan theatre venue, the investigators found a Samsung phone in a dustbin: &#8220;It had a Belgian SIM card that had been in use only since the day before the attack. The phone had called just one other number\u2014belonging to an unidentified user in Belgium.&#8221; <\/p>\n<p>As police pieced together the movements of the attackers, they found yet more burner phones: &#8220;Everywhere they went, the attackers left behind their throwaway phones, including in Bobigny, at a villa rented in the name of Ibrahim Abdeslam. When the brigade charged with sweeping the location arrived, it found two unused cellphones still inside their boxes.&#8221; At another location used by one of the terrorists, the police found dozens of unused burner phones &#8220;still in their wrappers.&#8221; <\/p>\n<p>As The New York Times says, one of the most striking aspects of the phones is that not a single e-mail or online chat message from the attackers was found on them. That seems to be further evidence that they knew such communications were routinely monitored by intelligence agencies. But rather than trying to avoid discovery by using encryption\u2014which would in itself have drawn attention to their accounts\u2014they seem to have stopped using the Internet as a communication channel altogether, and turned to standard cellular network calls on burner phones. <br \/>&nbsp;<\/span><br \/><span style=\"color: blue;\">\u2026\u2026\u2026<\/span><\/p>\n<p><span style=\"color: blue;\">As Ars has reported, along with other countries the UK government is pushing for <a href=\"http:\/\/arstechnica.co.uk\/tech-policy\/2016\/03\/revised-snoopers-charter-ignores-key-criticisms-widens-police-powers-further\/\">ways to circumvent or weaken encryption<\/a> because it claims strong crypto creates a &#8220;safe space&#8221; for terrorists.  This new information that the Paris attackers did not routinely use  encryption, if at all, but turned instead to the tried-and-tested  technique of burner phones, undermines the argument that everyone&#8217;s  communications must be weakened in order to tackle terrorism.<\/span><\/p>\n<p><span style=\"color: blue;\">\u2026\u2026\u2026<\/span><\/p>\n<p><span style=\"color: blue;\">Until we have stronger evidence to the contrary, it seems likely that  encryption played little or no part in the Paris terrorist attacks.<\/span> <\/p><\/blockquote>\n<p>The various agencies of various state security apparatuses have been trying to sell the idea that the terrorists will kill us all if we don&#8217;t let them.<\/p>\n<p>It does not make us safer.<\/p>\n<p>They intend to use this to go after ordinary criminals and dissidents.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>They used burner phones and made calls instead of texting and emailing: New details of the Paris attacks carried out last November reveal that it was the consistent use of prepaid burner phones, not encryption, that helped keep the terrorists off the radar of the intelligence services. As an article in The New York Times &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[971,1041,1066,1025,1076],"tags":[],"class_list":["post-181766","post","type-post","status-publish","format-standard","hentry","category-civil-rights","category-law-enforcement-misconduct","category-privacy","category-technology","category-terrorism"],"_links":{"self":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/181766"}],"collection":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/comments?post=181766"}],"version-history":[{"count":0,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/181766\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/media?parent=181766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/categories?post=181766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/tags?post=181766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}