Military Review

The FBI can not decipher the correspondence of terrorists IG

56
The methods of encryption used by the militants of the IG put the FBI specialists at a standstill, transmitting RIA News Statement by the Director of the Office of James Komi.




“The bureau monitors in social networks the correspondence of recruiters with potential terrorists, after receiving a court order, it looks at the mail of citizens sympathizing with the militants. However, as soon as someone expresses a desire to become a suicide bomber, terrorists go over to coded platforms, fading into the shadows, ”Komi said in New York at a conference on cyber security.

At the conference, it was noted that the IG "demonstrated serious knowledge of technology: the extremists published a number of textbooks telling how to avoid electronic surveillance, with minimal money spending, including an eight-minute video about the capabilities of special services for tapping and tracking phones."

In addition, the terrorists have compiled a rating of mobile devices and mobile applications that are the most protected from foreign intrusions.

Manhattan Prosecutor Cyrus Vance complained at the same conference that “even a court order did not help access mobile devices in more than a hundred cases — Apple's new operating systems. and Google didn’t allow investigators to enter phones without an owner’s password, and even manufacturing companies themselves were powerless to hack their products. ”

In 2014, Apple CEO Tim Cook said that "the security and privacy of users is fundamental to Apple devices." According to him, Apple "never worked for the government and special services and did not give them access to the company's products or services."
Photos used:
http://www.globallookpress.com/
56 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. Decathlon
    Decathlon 19 November 2015 10: 38
    +13
    Come on! The maximum that may be incomprehensible is a light Arabic accent! In English speech ...
    1. Tor5
      Tor5 19 November 2015 10: 40
      +8
      Or do not really want to decipher.
      1. Baikonur
        Baikonur 19 November 2015 10: 40
        +12
        That's it! His own correspondence!

        PS:
        Apple "never worked for the government and intelligence agencies and did not give them access to the company's products or services."
        Don't drive us out! (Makovetskii, film "Zhmurki")
        1. Temples
          Temples 19 November 2015 10: 42
          +14
          However, as soon as someone expresses a desire to become a suicide bomber, terrorists switch to coded platforms, going into the shadows

          Identified a suicide bomber.
          Identified a recruiter.
          The essence of the conversation is clear - terrorist activity.
          They are preparing a terrorist attack.
          And why listen to them further?
          What does it mean to go into the shadows?
          You need to bring them down.
        2. Snake AAA
          Snake AAA 19 November 2015 10: 47
          0
          :))) there are two options, the first is yours (Baikonur), and the second is that overseas everything is numb to the edge, their special services are shrinking !!!
          1. opus
            opus 19 November 2015 12: 00
            +1
            Quote: Serpent AAA
            and the second is that across the ocean they stupefied everything in the region, their special services are fading !!!

            Voice chat during online collaborative games using PlayStation 4.
            multi-user simultaneous logins: multiple "players" on one console, support for voice commands and face recognition. PlayStation Network.
            ===================
            very difficult
        3. Now we are free
          Now we are free 19 November 2015 11: 12
          +6
          “Even a court order didn’t help access mobile devices in more than a hundred cases - Apple Inc.’s new operating systems and Google did not allow investigators to enter phones without an owner password
          И
          In 2014, Apple CEO Tim Cook said that "the security and privacy of users is fundamental to Apple devices." According to him, Apple "never worked for the government and special services and did not give them access to the company's products or services."
          Downs from the FBI, contact the NSA, they don’t need any decisions without permission from anyone, Merkel and most of the world according to nods
        4. The comment was deleted.
      2. vovanpain
        vovanpain 19 November 2015 11: 02
        +6
        Quote: Tor5
        Or do not really want to decipher

        It is difficult to decipher what he himself taught.
        1. Peterhof 73
          Peterhof 73 19 November 2015 11: 11
          -1
          Quote: vovanpain
          Quote: Tor5
          Or do not really want to decipher

          It is difficult to decipher what he himself taught.

          Could it be that the Yankees lost the decryption manual? Well, as a type, he himself came up with a PIN code for something that would definitely not be forgotten. And at the right moment, bam-forgot. Or simply "fool" is included.
      3. sgazeev
        sgazeev 19 November 2015 15: 33
        0
        Quote: Tor5
        Or do not really want to decipher.

        They do not have sensible Arabists, they work on the principle of came to shit and left. With a wish to the natives, learn English. Kaklov instructed on ukroaglitsky mov. wassat
      4. Skif83
        Skif83 19 November 2015 23: 05
        0
        Yes, it’s not fate without snowden ...
    2. bulvas
      bulvas 19 November 2015 10: 40
      +6
      Manhattan Prosecutor Cyrus Vance complained at the same conference that “even a court order did not help access mobile devices in more than a hundred cases — Apple's new operating systems. and Google didn’t allow investigators to enter phones without an owner’s password, and even manufacturing companies themselves were powerless to hack their products. ”


      Hard to believe

      How much time everyone was sure that Skype is impossible to listen to or read

    3. Vend
      Vend 19 November 2015 10: 41
      +8
      And to take a person who wants to become a suicide bomber under surveillance is weak. Again the mattress covers hit in a lie. You can’t decrypt, give it to specialists from Russia.
    4. The comment was deleted.
    5. lukke
      lukke 19 November 2015 10: 43
      +1
      solid mat?
      1. Vita vko
        Vita vko 19 November 2015 11: 26
        +2
        Rather, sheer nonsense! Special services once again want to have a universal key for wiretapping everyone they want around the world. If there is a court order, then who is bothering to connect to a network server in the area where the mobile device works and listen to all messages in standard protocols? But they also need not only in the United States, but also in those countries for which the ruling of American courts is a light bulb. Therefore, we need scrap OSes.
      2. sgazeev
        sgazeev 19 November 2015 15: 40
        0
        Attention! You do not have permission to view hidden text.
        I am a native speaker of Arabic, I would like to know, and what expressions do you know?
        I would like to know your opinion about the Arab mate.
        I give a few examples:
        [kusomak] - literally mom's p ..., used as "f ... b your mother."
        [zarba] ​​[Aha] [Khara] -.
        [Elif air ab tizak!] - a hundred ** yo in your ass.
        [Elif air ab dinich] - a hundred ** yo in your religion.
        [kisich] - "pussy".
        [Mos zibby!] - suck my ****!
        [Waj ab zibik!] - the disease is on your ****.
        [kelbeh] [gaeheba] -
        [Bouse Tizi] - kiss my ****
        [Sharmoota Haygana] - "Horny Bitch"
        [Ebn el Metanaka] - son of a bitch
        [Mara] - (only in Egypt)
        [Khara beek / Khara Beech] - in you w / m
        [khodo we nam] - go f * t
        [kusuhtik] - n ... sisters (literally), used a little less often, meaning e .. your sister.
        [neck] - pubic hair.
        [sharmuta] is a prostitute.
        [hawal] [Khawal] - pi * op.
        [mitnak] - blue.
        [cus] - n ** yes
        [tees] - ass.
        [teeth] [zib] - member.
        [Ahebbu lahma elhanzir!] - I love pork
        [nikomak] - yo * your mother.
    6. The comment was deleted.
    7. 79807420129
      79807420129 19 November 2015 10: 44
      +10
      And whoever said that it would be easy, the organizers of the terrorist acts know their business, all the more so those trained by the FBI and Tsereushniks themselves, this terrorist act is done by the nomad’s daughter or the son of a shepherd.
    8. Starover_Z
      Starover_Z 19 November 2015 10: 45
      +3
      Quote: Decathlon
      The methods of encryption used by the militants of the IG have put the FBI specialists at a dead end, RIA Novosti reports the statement by the director of the agency, James Komi.

      Terrorists are simply moving to Moscow, the Arab ligature, and it seems they don’t even know it at the FBI!
      This must be studied, but the budget does not allow you to see!
    9. Ermak
      Ermak 19 November 2015 10: 51
      +5
      “User privacy and security fundamental to Apple devices”

      yes, the article is just "light and unobtrusive advertising" by Apple. A PR example.
    10. cniza
      cniza 19 November 2015 11: 04
      +3
      Quote: Decathlon
      Come on! The maximum that may be incomprehensible is a light Arabic accent! In English speech ...



      They are true or pretend, who says two things about such things:
      - lull the vigilance of enemies;
      - according to Lavrov d - for b ....
    11. Lelek
      Lelek 19 November 2015 11: 17
      +1
      Quote: Decathlon
      The maximum that may be incomprehensible is a light Arabic accent!


      By the way about IG "slang" - I came across the posts:
      (cry.)
    12. Totalwar
      Totalwar 19 November 2015 11: 53
      +3
      Well, here’s another advertisement for Apple Inc. and google laughing
    13. Locksmith
      Locksmith 19 November 2015 11: 59
      0
      Quote: Decathlon
      Come on! The maximum that may be incomprehensible is a light Arabic accent! In English speech ...

      And it seemed to me in this article just a hidden advertisement. wink
    14. The comment was deleted.
  2. Vladimyrych
    Vladimyrych 19 November 2015 10: 38
    +4
    The FBI can not decipher the correspondence of terrorists IG

    But in general, how can this be? They themselves brought up, they taught encryption themselves, and now they can not decrypt the correspondence ... belay
    Maybe the shaitans have switched to their native language? In Farsi. So bring a translator laughing
  3. The comment was deleted.
  4. avvg
    avvg 19 November 2015 10: 41
    +6
    Here it is, the human arrogance, he says, is lying and does not blush.
    1. cniza
      cniza 19 November 2015 11: 06
      +3
      Quote: avvg
      Here it is, the human arrogance, he says, is lying and does not blush.



      No, it's already like with statistics - a blatant lie.
  5. Haettenschweiler
    Haettenschweiler 19 November 2015 10: 42
    +6
    - So, the FBI has seriously decided to tackle "apple" and "google". I think they are very annoyed by companies that refuse to actively cooperate and - oh, horror! - do not provide their encryption systems for analysis and study by special services at the first click of their fingers. That FBI specialists are not able to decipher the terrorists' negotiations is, of course, pure lies. A reason for aggression against the above companies. A reason for the formation of public opinion, they say, ay-ay-ay, what scum, help terrorists! Well, the highly qualified personnel of the terrorists is, the guys from the CIA, your handiwork. Your ears are sticking out. The Arabs had nothing but sand, camels and a turban until you decided to fight with someone else's hands. As a result the Bedouins suddenly learned to fly planes, shoot from MANPADS, build miniature, powerful explosive devices, hide their negotiations and other, other.
    1. EvgNik
      EvgNik 19 November 2015 10: 53
      +1
      Quote: Haettenschweiler
      This means that the FBI has seriously decided to deal with "apple" and "google"

      They are already seriously engaged in them, since the founding of their offspring.
  6. V.ic
    V.ic 19 November 2015 10: 44
    -2
    How is it with MN Zadornov: "Well, that's it !!
  7. Good me
    Good me 19 November 2015 10: 45
    +4
    Manhattan Prosecutor Cyrus Vance complained at the same conference that “even a court order did not help access mobile devices in more than a hundred cases — Apple's new operating systems. and Google didn’t allow investigators to enter phones without an owner’s password, and even manufacturing companies themselves were powerless to hack their products. ”

    In 2014, Apple CEO Tim Cook said that "the security and privacy of users is fundamental to Apple devices." According to him, Apple "never worked for the government and special services and did not give them access to the company's products or services."


    Oh shit ...


    Immediately, several "birds with one stone" were determined to kill ...

    And consumers of Apple products are "lulled" with fairy tales that spying on them cannot be, in principle, the same fairy tales lull the vigilance of terrorists, and at the same time Apple is "on horseback" as "THE MOST" company, taking care of the welfare of its customers ...
  8. A-Sim
    A-Sim 19 November 2015 10: 45
    +2
    Call Snowden! Suddenly help?
  9. HollyGremlin
    HollyGremlin 19 November 2015 10: 47
    +4
    Yes, this is an advertisement for Apple. Do not tell my heels, but with their full power, you can hack any phone.
  10. morpogr
    morpogr 19 November 2015 10: 47
    +2
    My yours do not understand, but what about the billions of dollars in budget of special services, total surveillance and wiretapping of everyone and everything?
  11. alex-cn
    alex-cn 19 November 2015 10: 47
    +1
    And what about our scientific companies? Gentlemen from the FBI - please contact. We are also interested in these codes.
  12. Wedmak
    Wedmak 19 November 2015 10: 48
    +1
    Come on, fill it in. Each OS has a back door. And God himself ordered to fill in the firmware backdoor under the guise of updating.
  13. roskot
    roskot 19 November 2015 10: 51
    +2
    Call the FSB. We will help, decipher. At worst there are Chinese. Guys are not a miss.
  14. Zingvar
    Zingvar 19 November 2015 10: 57
    +2
    Storyteller. Obviously not a hunt to do anything. You can see the usual koekaker.
  15. Dr. Barmaley
    Dr. Barmaley 19 November 2015 11: 00
    +5
    The FBI can not decipher the correspondence of terrorists IG


    Flip the text! You hold it upside down!
  16. Obstructia
    Obstructia 19 November 2015 11: 02
    +2
    Apparently, gentlemen, the terrorists have not yet set themselves Windows 10 laughing
  17. sailor roman
    sailor roman 19 November 2015 11: 04
    0
    I am sure that codes, ciphers, techniques, communication systems and the control system were not developed by the Igilovites, for this you need to have many years of training and hundreds of trainings. After all, everyone knows by whom and for what purposes terrorist organizations were created, starting with the "Taliban", who financed and armed them, who "assigned" advisers to them ... These are the state. systems and developed ciphers, codes, communication and control systems. And what will they now confess in their deeds.
    Until they destroy the leaders and traces of their activities, everything will be covered in darkness. What is now being done under the pretext of protecting the Turkish borders. I think so?
  18. Sergey-8848
    Sergey-8848 19 November 2015 11: 04
    0
    Excuse for those who do not know how or do not want to work. This director is not Hoover at all, and his president will not survive.
  19. aviator1913
    aviator1913 19 November 2015 11: 04
    0
    Well, here, too, not everything is smooth with us.

    There are many Igilovites, as well as their recruiters, those who sympathize with them even more, the amount of information has become simply enormous. Even using small encryption skills, if they are done in bulk, the complexity of processing all of them increases by an order of magnitude. Moreover, ordinary people also need to be weeded out, corny forces are not enough all over the world to listen to and decipher the broads.

    Even here they think that with Durov's "Telegram", etc. systems to do, since life has also made it not easy for FSB officers, to open one contact or user, now you need to apply much more effort than when using ordinary methods of communication and communication, or as it was before.
  20. Baloo
    Baloo 19 November 2015 11: 09
    0
    The FBI can not decipher the correspondence of terrorists IG

    Who would doubt that he could. Why not ask for help from Russia?
    Because for the Fashington macaques, terrorists are "ours."
  21. spech
    spech 19 November 2015 11: 17
    0
    and small print "as advertising"
    I won’t believe that they can’t hack their kids.
  22. Dimon19661
    Dimon19661 19 November 2015 11: 23
    0
    Yes, enigma must be activated)))
  23. SHURAVI
    SHURAVI 19 November 2015 11: 27
    0
    Quote: Baikonur
    That's it! His own correspondence!

    PS:
    Apple "never worked for the government and intelligence agencies and did not give them access to the company's products or services."
    Don't drive us out! (Makovetskii, film "Zhmurki")

    Can't or don't want to?
  24. raid14
    raid14 19 November 2015 11: 28
    +2
    If a person did not fall into the field of view of the special services and intends to become a terrorist, it is very difficult to identify without transforming the entire ORM complex. All manufacturers must provide keys and encryption codes to special services, otherwise they will not pass certification.
    There are a lot of ways to deceive "Prism" and "SORM" working on the Internet using key phrases and words, a lot and terrorists use them, these are various encryption and data transfer programs such as TOP, paid VPN with a high level of protection, steganography, etc.
  25. Altona
    Altona 19 November 2015 11: 39
    0
    Manhattan Prosecutor Cyrus Vance complained at the same conference that “even a court order did not help access mobile devices in more than a hundred cases — Apple's new operating systems. and Google didn’t allow investigators to enter phones without an owner’s password, and even manufacturing companies themselves were powerless to hack their products. ”
    -------------------
    Breshet on a blue eye and does not blush ... For some reason, a Russian tourist can be easily turned into an airport in a third country, and there are so many delicate legal and technical conventions with terrorists, and that the manufacturing companies themselves "cannot", this is a lie ... the phone glitched in the spring and was under warranty, I wrote a letter for a refund, so they quietly changed the back cover of the case to a new one and a new Android was installed and returned supposedly from an examination ...
  26. screw cutter
    screw cutter 19 November 2015 11: 59
    +1
    Or maybe just "google translate" is used to Arabic script from right to left, and cunning Arabs write from left to right. And they have no other translators.
    1. Altona
      Altona 19 November 2015 14: 34
      0
      Quote: screw cutter
      Or maybe just "google translate" is used to Arabic script from right to left, and cunning Arabs write from left to right. And they have no other translators.

      ----------------------
      Google translate translates from Arabic ... The West simply does not have their normal specialists in the Middle East, they gave all the details to the emirs and kings of the Middle Eastern states, as I understand it ... In a detailed decoding there is already a local specificity that the Americans simply do not understand ...
  27. Shuttle
    Shuttle 19 November 2015 12: 00
    +1
    Waze World!
    What a great product placement!

    And here is one more.
    http://www.computerra.ru/77086/zolotyie-klyuchiki-fbr-i-anb-nastoychivo-trebuyut
    -u-krupneyshih-provayderov-ssl-klyuchi /
  28. The comment was deleted.
  29. S. TALIN
    S. TALIN 19 November 2015 12: 07
    +1
    Come on! Subordinates do not report to superiors ?! I do not believe! (with)
    1. Altona
      Altona 19 November 2015 14: 37
      0
      Quote: S. TALIN
      Come on! Subordinates do not report to superiors ?! I do not believe! (with)

      -----------------
      Here the big question is, who are the bosses and who are the subordinates ... Megacorporations like Google and Microsoft have long wanted to not report to national intelligence and use their user archives for their own purposes, for this they brand Assange and Snowden ...
  30. gg.na
    gg.na 19 November 2015 12: 10
    +1
    Simply! Everything is very simple!! They don’t WANT the whole story! They don’t want to decipher and pretend that they are trying to decipher (although there is nothing to decipher in fact) negotiations of Ishilovites with people!
  31. Julian
    Julian 19 November 2015 12: 28
    0
    I am sure that this is a lie, absolute. Why?

    Apple CEO Tim Cook says “user privacy and privacy are fundamental to Apple devices”


    Too many lately exposures of this lousy office. Apparently, they decided to increase sales, and at the same time the cap that the special services are throwing on customers.
    Personally, I have not contacted this rubbish and will never contact. Convenience is convenience, but electronics is convenience not only for the buyer, but also for many others for whom the buyer is one of the goals of manipulation.
    And ISIS was dragged here for a greater advertising effect. ISIS, so to speak, is just an excuse for them.
  32. zerg
    zerg 19 November 2015 12: 29
    0
    Very funny: the budget of the FBI is $ 8,1 billion, the CIA $ 14,7 billion, the NSA $ 10,8 billion. It turns out that the FBI is trying to clear up for its budget what the CIA and the NSA put together for their budgets ....
  33. provincial
    provincial 19 November 2015 12: 36
    0
    "The FBI is unable to decrypt the correspondence of IS terrorists" - it's strange that they cannot decrypt their correspondence, this is a statement for idiots.
  34. Yun Klob
    Yun Klob 19 November 2015 13: 22
    0
    Use the Qur'an, that's just what edition? - thought the special services.
  35. inpu
    inpu 19 November 2015 13: 38
    0
    Most likely, when they break the code, they report, they hand over their own and the Ishilovites change to a new one. And so on the cycle.
  36. 1536
    1536 19 November 2015 19: 18
    0
    A good mine with a bad game. Why even report this. The British read German cipher telegrams throughout the Second World War, but did not tell anyone about it. Churchill, even learning from these telegrams about the Luftwaffe’s plans to bomb Coventry, did not allow the city residents to be informed of the German raid so that the Germans would not have guessed where the data leak was. The city was almost wiped off the face of the earth, but British intelligence continued to receive classified information. So there is no faith in the Americans and the British. And now is not the second world war. Truly Americans live in the past or even the year before last. And how to cooperate with such?
  37. Old26
    Old26 19 November 2015 20: 15
    0
    Quote: Tor5
    Or do not really want to decipher.

    Or they really can't. Sometimes it can take weeks to decipher a certain message, and the "event" has already happened. A short encrypted or coded message cannot be decrypted at all due to the fact that the message is too short
    And reading correspondence is generally quite difficult. For example, there are two people. A and B. A common mailbox is opened (both the login and password are known. Someone A writes a message and does not send it, but puts it in the draft section. And what, does someone track what he wrote?
    After a couple of days, someone B enters the same mailbox, opens a draft section and reads the message. And the corresponding services in w ... ne.
    And if you use your own, personally developed code or cipher, and at the same time the messages are short enough, it is also impossible to decipher, because not enough text for structural analysis. Well, if a cipher like "a dog on a leash" is used, then it may take months and years to decrypt using all the power of the country's machinery
  38. iAi
    iAi 25 November 2015 14: 59
    0
    And what, have ordinary banned ciphers not already been banned?
    (this is an absolutely strong encryption method)