0
So, challenge accepted:
tl;dr: The NSA should be able to go back through it's rolling 90 day backlog of Internet metadata and find all other terrorist cells using this method.
From what we can piece together from the NYTimes article, it appears that ISIS is passing around TrueCrypt container files as a way of messaging. This is really weird. It has the has the property of
security through obscurity, which is that it has the nice property of evading detection for a while because we'd never consider that ISIS would do such a strange thing. But it has the bad property that once discovered, it now becomes easier to track. With the keys found on the USB drive, we can now start decrypting things that were a mystery before.
We are going off of very little information at the moment, but let's imagine some fictional things.
First, we need to figure out what is meant by a file or hosting site in Turkey. Such hosting sites are all over the place, as
you can find with a
Continue reading