TY - SER AU - Graham, Robert TI - How terrorists use encryption KW - Terrorismo KW - Ciberterrorismo KW - Tecnologías de la Información y de la Comunicación KW - Analisis de inteligencia KW - Estado Islámico KW - Legislación N2 - As powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, Islamist terrorists are exploiting the technology to communicate securely and store information. Legislative eforts to help law enforcement agencies wrestle with the phenomenon of “going dark” will never lead to a return to the status quo ante, however. With the code underlying end-to-end encryption now widely available, unbreakable encryption is here to stay. However, the picture is not wholly bleak. While end-to-end encryption itself often cannot be broken, intelligence agencies have been able to hack the software on the ends and take advantage of users’ mistakes UR - https://www.ctc.usma.edu/v2/wp-content/uploads/2016/06/CTC-SENTINEL_Vol9Iss613.pdf ER -