0
How terrorists use encryption is going to become central to the Cryptowars 2.0 debate. Both sides are going to cite the case of Reda Hame described in
this NYTimes article. On one hand, it shows that terrorists do indeed use encryption. On the other hand, the terrorists used TrueCrypt, which can't be stopped, no matter how many "backdoor" laws the police-state tries to pass.
The problem with the NYTimes article is that the technical details are garbled. (
Update: at the bottom, I correct them). Normally, that's not a problem, because we experts can fill in the details using basic assumptions. But the technique ISIS used is bizarre, using TrueCrypt containers uploaded to a file-sharing site. This is a horrible way to pass messages -- assumptions we make trying to fill in the blanks are likely flawed.
Moreover, there is good reason to distrust the NYTimes article. Small details conflict with a
similar article in the French newspaper Le Monde from January 6. Both articles are based on the same confession by Reda Hame from last August.
For example, in discussing a training accident with a grenade, the NYTimes article says "Mr. Hame did not throw it far
Continue reading