| 000 | 01490nab a22002177a 4500 | ||
|---|---|---|---|
| 008 | 120229t xxu||||| |||| 00| 0 eng d | ||
| 040 |
_aES-MaBCA _cES-MaBCA |
||
| 100 |
_914329 _aGraham, Robert |
||
| 245 |
_aHow terrorists use encryption _h[Recurso electrónico] PDF |
||
| 300 | _aRecurso online | ||
| 520 | _aAs powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, Islamist terrorists are exploiting the technology to communicate securely and store information. Legislative eforts to help law enforcement agencies wrestle with the phenomenon of “going dark” will never lead to a return to the status quo ante, however. With the code underlying end-to-end encryption now widely available, unbreakable encryption is here to stay. However, the picture is not wholly bleak. While end-to-end encryption itself often cannot be broken, intelligence agencies have been able to hack the software on the ends and take advantage of users’ mistakes. | ||
| 650 | 0 |
_91735 _aTerrorismo |
|
| 650 | 0 |
_91739 _aTerrorismo _xCiberterrorismo |
|
| 650 | 0 |
_912849 _aTecnologías de la Información y de la Comunicación |
|
| 650 | 0 |
_91181 _aAnalisis de inteligencia |
|
| 650 | 0 |
_913909 _aEstado Islámico |
|
| 650 | 0 |
_91959 _aLegislación |
|
| 773 | 0 |
_aCTC Sentinel _g. -- Vol. 9 Issue 6 (June 2016) p. 20-25 _iEn : _tCTC Sentinel _w4458 |
|
| 856 | 4 |
_uhttps://www.ctc.usma.edu/v2/wp-content/uploads/2016/06/CTC-SENTINEL_Vol9Iss613.pdf _qPDF |
|
| 942 |
_2udc _cAN |
||
| 999 |
_c18438 _d18441 |
||