=============================
Going Dark from
whatis.techterm.com
Part of the Customer data management glossary:
Going dark is
slang for the sudden termination of communication. In the military, the term is
also used to describe a scenario in which communication appears to have ceased,
but in reality has just moved from a public communication channel, where it
could be monitored, to a private communication channel that prevents
eavesdropping.
According to
the United States Federal Bureau of Investigation (FBI), terrorists use mobile apps and encryption to go dark and make it difficult
for the Bureau to monitor conversations in legally-intercepted transmissions.
FBI Director James Comey described the going dark problem at the Aspen Security
Conference in July 2015: “ISIL's M.O. is to broadcast on Twitter, get people to
follow them, then move them to Twitter Direct Messaging" to evaluate them
as recruits. "Then they'll move them to an encrypted mobile-messaging app
so they go dark to us."
Mobile apps
that use end-to-end encryption (E2EE) are designed to protect data at rest
and in transit and keep the end user's text messages, emails and video chats
private and secure. However, the same technologies that protect user
communications from intruders make it impossible for government agencies to
make sense of the transmissions they legally gather, especially if the app uses
strong encryption.
The National
Security Agency (NSA) has proposed two potential encryption
methods to solve the going dark problem: split-key encryption and encryption
using "key escrow." In split key encryption, also known as secret
sharing, the technology vendor or service provider retains half of a master key
and law enforcement retains the other half so that decryption requires
participation of both parties. For key escrow, decryption requires multiple
keys, one of which is stored separately from the user, possibly in a government
agency location.
Opponents of
the proposed technologies maintain that both methods would be prohibitively
complex to implement and the complexity would provide points of entry that
would ultimately endanger user data security.
|
Good Netiquette And A Green Internet To All!
===============================================================
https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
==============================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
www.amazon.com/author/paulbabicki
If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I
am the founder and president of Tabula
Rosa Systems, a company that provides “best of breed” products for network,
security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT
product information for virtually anyone.
==============================================
No comments:
Post a Comment