000 01490nab a22002177a 4500
008 120229t xxu||||| |||| 00| 0 eng d
040 _aES-MaBCA
_cES-MaBCA
100 _914329
_aGraham, Robert
245 _aHow terrorists use encryption
_h[Recurso electrónico] PDF
300 _aRecurso online
520 _aAs powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, Islamist terrorists are exploiting the technology to communicate securely and store information. Legislative eforts to help law enforcement agencies wrestle with the phenomenon of “going dark” will never lead to a return to the status quo ante, however. With the code underlying end-to-end encryption now widely available, unbreakable encryption is here to stay. However, the picture is not wholly bleak. While end-to-end encryption itself often cannot be broken, intelligence agencies have been able to hack the software on the ends and take advantage of users’ mistakes.
650 0 _91735
_aTerrorismo
650 0 _91739
_aTerrorismo
_xCiberterrorismo
650 0 _912849
_aTecnologías de la Información y de la Comunicación
650 0 _91181
_aAnalisis de inteligencia
650 0 _913909
_aEstado Islámico
650 0 _91959
_aLegislación
773 0 _aCTC Sentinel
_g. -- Vol. 9 Issue 6 (June 2016) p. 20-25
_iEn :
_tCTC Sentinel
_w4458
856 4 _uhttps://www.ctc.usma.edu/v2/wp-content/uploads/2016/06/CTC-SENTINEL_Vol9Iss613.pdf
_qPDF
942 _2udc
_cAN
999 _c18438
_d18441