Encryption and Terrorism: The Secrecy Problem

Encryption technology is rapidly becoming a political football, and leaders like to link it to an alluring idea:¬† Wouldn’t it be nice if police had a door into every encryption scheme? Then they could root out the criminals and terrorists and put an end to their activities.

Can this work? Probably not. Commercial encryption is only a small piece of the counter-terrorism puzzle. The real problem is much more sinister, insidious and difficult to control. It’s called communication secrecy, and that, not encryption software, is the real dilemma.

Thinking About Secrecy

A little logic is needed, and we need to understand the basics. Before they go into battle, people have always done several things:

1. They plan in secret.
2. They prepare in secret.
3. They deploy in secret.
4. Then they attack.

Does anyone think that terrorists are unaware of these simple precautions? This is elementary operational security. After all, a terrorist attack depends on surprise, and surprise requires secrecy. Judging from the frequency of terror incidents (as many as one or two a day around the globe), law enforcement experts have a remarkably lame record when it comes to uncovering extremists’ illegal activities — the planning and preparation that precede attacks.

This is the unfortunate truth: Terrorists have access to encryption technology, but they don’t need it.

Secrecy isn’t Rocket Science

If you think terrorists find it difficult to hide their planning and messages, you’ll get an eye-opener when you read Top Secret: A Handbook of Codes, Ciphers, and Secret Writing by Paul B. Janeczko (Cambridge, Ma.:¬†Candlewick Press, 2004).

Written for a middle-school audience, this handbook for “the budding cryptographer” includes codes and ciphers, invisible inks and concealment strategies — dozens of ways messages can be scrambled without relying on commercial encryption software.

If eighth-graders can conveniently maintain privacy, we have to assume that terrorists do the same.

(Another useful source is The Code Book by Simon Singh, New York: Doubleday, 1999.)

A Successful Counter-Terrorism Effort?

The current mass surveillance program misses the mark when it comes to stopping determined attackers. If you support the current policy of universal tracking, you’ve basically bought a bill of goods.

Surveillance is ineffective at uncovering plots and terrorists’ preparations, but it probably has some effect somewhere. What does it do? Mass surveillance likely drives enemies further underground, and, further, it fragments the counter-terrorism effort, maybe irreparably (if surveillance targets everyone, it’s effectively overwhelmed and is actually looking for no one).

In theory, it seems there’s only one way Big Brother could stop terror plots. On the signals intelligence end, agents would need a back door into every commercial and custom encryption software package, relentlessly track every possible suspect and then penetrate their private ciphers and codes. This penetration would require HUMINT — actual human intelligence gathered from spies who infiltrate terror networks or insiders who are persuaded to turn against their fellow terrorists.

19 Replies to “Encryption and Terrorism: The Secrecy Problem”

  1. Hello there! Thhis is my first visit to your blog! We are a group
    of volunteers and starting a neew project in a community in the same niche.

    Your blog provided us useful information to work on. You have dine a extraordinary job!

  2. My brother suggested I may like this blog. He
    used to be entirely right. This publish actually made my day.
    You can not consider just how so much time I had spent for this info!
    Thanks!

  3. Hi there would you mind stating which blog platform you’re using?

    I’m planning to start my own blog in the near future
    but I’m having a difficult time selecting between BlogEngine/Wordpress/B2evolution and Drupal.

    The reason I ask is because your design and style seems different then most blogs
    and I’m looking for something unique.
    P.S Sorry for getting off-topic but I had to ask!

    • Hi. We’re using WordPress and it’s highly recommended. We use the
      Catch Box template.

  4. Howdy! I could have sworn I’ve been to this web site before but
    after going through some of the posts I realized it’s new to me.
    Nonetheless, I’m certainly pleased I discovered it and I’ll be bookmarking it and checking back
    often!

    • Thanks for visiting doingbigbrother.com — any comments or suggestions would be appreciated!

    • Thanks for the wonderful feedback! Let us know if you have any suggestions.

      spooky

  5. I think this is among the most significant information for me.
    And i am glad reading your article. But should remark on some general things, The site style is great, the
    articles is really great : D. Good job, cheers

  6. I’m impressed, I must say. Seldom do I encounter a blog that’s both educative and engaging, and
    without a doubt, you’ve hit the nail on the head.
    The issue is something too few folks are speaking intelligently about.
    I’m very happy that I stumbled across this during my hunt for something concerning this.

Leave a Reply to cheap website hosting Cancel reply

Your email address will not be published. Required fields are marked *

*