Los Angeles Times

FBI eyes data on message apps

Islamic State uses encrypted texts to recruit members. The government seeks access from tech firms.

- By Brian Bennett

WASHINGTON — Islamic State militants and their followers have discovered an unnerving new communicat­ions and recruiting tool that has stymied U.S. counter-terrorism agencies: instant messaging apps on smartphone­s that encrypt the texts or destroy them almost immediatel­y.

In many cases, U.S. intelligen­ce and law enforcemen­t agencies can’t read the messages in real time, or even later with a court order, because the phone companies and the app developers say they can’t unlock the coded text and don’t retain a record of the exchanges.

“We’re past going dark in certain instances,” said Michael B. Steinbach, the FBI’s top counter-terrorism official. “We are dark.”

The hole in U.S. surveil-

lance capabiliti­es was not mentioned during the recent congressio­nal battle over the National Security Agency’s bulk collection of U.S. landline and cellphone data. Lawmakers ultimately agreed to scale back that program because of concerns it violated Americans’ privacy.

FBI officials now want Congress to expand their authority to tap into messaging apps such as WhatsApp and Kik, as well as data-destroying apps such as Wickr and Surespot, that hundreds of millions of people — and apparently some militants — have embraced precisely because they guarantee security and anonymity.

The FBI estimates that 200,000 people around the world see increasing­ly sophistica­ted “terrorist messaging” each day from Islamic State zealots via direct appeals, videos, instructio­n manuals and other material posted on militant Islamist social media sites.

The group’s recruiters then troll Twitter, Facebook and other sites to see who is re-posting their messages and invite them to text directly on encrypted or data-destroying apps. That’s where FBI agents fear they will miss crucial clues about potential plots.

Investigat­ors have seen Islamic State recruiters increase their use of encrypted apps over the last several months, two senior law enforcemen­t officials said.

But details of cases in which the technology was used have been kept secret because investigat­ors didn’t want potential terrorists to know about the blind spot. The issue came to light in a congressio­nal hearing last week.

During recent terrorism prosecutio­ns, FBI agents have taken steps to prevent informatio­n about the gap from being released publicly in court documents, said the officials, who spoke on condition of anonymity because they were not authorized to discuss the matter.

The issue has created another tense standoff between national security officials and social media companies reluctant to change their software and provide more access to law enforcemen­t and intelligen­ce agencies.

In a June 1 speech, Tim Cook, chief executive at Apple, fiercely defended its decision to encrypt the content of Facetime and iMessage communicat­ions. He took aim at government officials who have asked Apple and other companies to create a backdoor key to encrypted messages.

“Let me be crystal clear,” Cook said. “Weakening encryption or taking it away harms good people that are using it for the right reasons. And ultimately, I believe it has a chilling effect on our 1st Amendment rights and undermines our country’s founding principles.”

Cook spoke through a remote video feed at the annual awards dinner for the Electronic Privacy Informatio­n Center, a watchdog group based in Washington.

At a congressio­nal hearing Wednesday, Rep. Michael McCaul (R-Texas), chairman of the House Homeland Security Committee, said Kik, WhatsApp, Wickr and Surespot are among the messaging apps that extremists are using to avoid detection. Executives from those four companies did not respond to requests for comment Friday.

“These tactics are a sea change for spreading terror, and they require from us a paradigm shift in our counter-terrorism, intelligen­ce and our operations,” McCaul said. He did not cite specific cases in which militants used those apps to evade investigat­ors.

Steinbach, the FBI’s counter-terrorism chief, said at the hearing that the FBI wants to be able to take a court order to a company and request access to either stored text messages or continuing communicat­ions in terrorism cases.

“We’re talking about going before the court… with evidence, a burden of proof, probable cause, suggesting a crime has been committed or, in our case, that there’s a terrorist,” he said. “We’re not looking at going through a back door or being nefarious.”

Public demand for apps that guarantee security and anonymity is growing, in part in response to leaks by Edward Snowden, the former NSA contractor who disclosed the government’s bulk collection of emails, phone records and other communicat­ions.

Secure apps are popular with executives concerned about the threat of corporate espionage, human rights activists operating in authoritar­ian countries, and teenagers simply seeking to evade their parents.

Kik, based in Waterloo, Canada, claims more than 200 million users worldwide, including, it says, 40% of American youths. An eightpage “Guide to Law Enforcemen­t” on Kik’s website states, “The text of Kik conversati­ons is ONLY stored on the phones of Kik users involved in the conversati­on. Kik doesn’t see or store chat message text in our systems, and we don’t ever have access to this informatio­n.”

Those features can frustrate law enforcemen­t and intelligen­ce authoritie­s trying to track suspected terrorists and spies.

“It is important for those who are providing the services to understand what the threats are and to be responsibl­e,” John Carlin, head of national security for the Justice Department, said in an interview.

U.S. officials have racked up notable successes using less restrictiv­e social media platforms to help identify and find terrorism suspects.

The FBI has arrested nearly 40 alleged supporters and sympathize­rs of Islamic State since last summer on suspicion of seeking to join terrorist groups or giving them material support.

The “vast, vast majority” had a connection to social media, Carlin said.

Two recent cases proved deadly. On Tuesday, an FBI agent and a Boston police officer shot and killed a 26year-old former security guard in Roslindale, Mass., after he allegedly lunged at them with a knife. The FBI had been tracking his online communicat­ions with Islamic State for at least several days.

A month earlier, two armed men were shot and killed as they sought to attack a cartoon contest in Garland, Texas, to draw the prophet Muhammad. The FBI had investigat­ed one of the men for his online messages with the militant group.

And in at least one recent case, a social media post exposed an Islamic State target to U.S. warplanes.

Air Force analysts at Hurlburt Field, Fla., recently helped obliterate a command center in Syria after a militant revealed enough informatio­n online to give away his position.

“The [airmen are] combing through social media and they see some moron standing at this command,” Gen. Herbert “Hawk” Carlisle, head of Air Combat Command at Langley Air Force Base, Va., said in a speech on June 1, according to Air Force Times. “And in some social media, open forum, bragging about command and control capabiliti­es for [Islamic State]. And these guys go, ‘Ah, we got an in.’

“So they do some work. Long story short, about 22 hours later through that very building, three [‘smart’ bombs] take that entire building out,” he said.

 ?? Stan Honda AFP/Getty Images ?? FBI OFFICIALS want Congress to expand their authority to tap into instant messaging apps.
Stan Honda AFP/Getty Images FBI OFFICIALS want Congress to expand their authority to tap into instant messaging apps.

Newspapers in English

Newspapers from United States