Dataconomy
  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
Subscribe
No Result
View All Result
Dataconomy
  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Big Data Firm Claims Link Between Snowden Leaks and Altered Terrorist Communications

by Eileen McNulty
August 1, 2014
in News
Home News
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Big data firm Recorded Future claims that its research proves Snowden’s revelations damaged national security, and allowed terrorists to develop countermeasures to US intelligence. Just months after Snowden leaked NSA documents, al-Qaida dramatically overhauled their online communications system.

Recorded Future’s CEO and co-founder, Christopher Ahlberg, told NPR: “We saw at least three major product releases coming out with different organizations with al-Qaida and associated organizations fairly quickly after the Snowden disclosures. But we wanted to go deeper and see how big those changes were.”

Recorded Future called in expert Mario Vuksan, the CEO of Reversing Labs to help them delve further into the system. Al-Qaida have been using a Windows-based system called Mujahideen Secrets to encrypt their communications since 2007. Between then and the Snowden leaks, only minor tweaks and updates had been implemented. Researchers found that in th wake of the Snowden revelations, the system not only became available on on cellphones, Android products and Macs, but that the core of the system itself has been overhauled. The encryption no longer relied on homemade software, but had implemented sophisticated open source code to help shroud their interactions.

“This is as close to proof that you can get that these have changed and improved their communications structure post the Snowden leaks,” Ahlberg said.

Some have pointed out that this circumstantial evidence can not inextricably link the leaked documents to al-Qaida’s decision to build a more robust encryption system. Bruce Schneier, a technologist and fellow at the Berkman Center at Harvard, stated: “Certainly they have made changes, but is that because of the normal costs of software development or because they thought rightly or wrongly that they were being targeted?”


Join the Partisia Blockchain Hackathon, design the future, gain new skills, and win!


“It is relatively easy to find vulnerabilities in software,” he continued. “This is why cyber criminals do so well stealing our credit cards. And it is also going to be why intelligence agencies are going to be able to break whatever software these al-Qaida operatives are using.”

Read more here.
(Image credit: Flickr)

Related Posts

How did ChatGPT passed an MBA exam

How did ChatGPT passed an MBA exam?

February 2, 2023
Google code red: ChatGPT and You.com like AI-powered tools threatening the search engine. Moreover, latest Apple Search rumors increased the danger.

Google code red: ChatGPT, You.com and rumors of Apple Search challenge the dominance of search giant

February 2, 2023
T-Mobile data breach 2023 explained: Learn how did the leak happen and explore T-Mobile data breach history. It is not the first time of the company

T-Mobile data breach 2023: The telecom giant got hacked eight times in the last six years

January 20, 2023
Microsoft layoffs 2023: Amazon job cuts that affect 11,000 employees explained. Big tech layoffs continue... Learn why and what will happen next.

Microsoft layoffs will affect more than 11,000 employees

January 18, 2023
Medibank Data Breach Class Action: Compensation can reach up to $20,000 per person

Medibank Data Breach Class Action: Compensation can reach up to $20,000 per person

January 16, 2023
What is DoNotPay AI Lawyer? The world's first robot lawyer ready to give $1 million to represent you. How does it work? Keep reading.

DoNotPay AI lawyer is ready to give $1 million for any case in US

January 12, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

LATEST ARTICLES

Cyberpsychology: The psychological underpinnings of cybersecurity risks

ChatGPT Plus: How does the paid version work?

AI Text Classifier: OpenAI’s ChatGPT detector indicates AI-generated text

A journey worth taking: Shifting from BPM to DPA

BuzzFeed ChatGPT integration: Buzzfeed stock surges after the OpenAI deal

Adversarial machine learning 101: A new cybersecurity frontier

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy
  • Partnership
  • Writers wanted

Follow Us

  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.