Monday, December 14, 2015

Netiquette IQ Technical Term For 12/14/15 - Going Dark

Bravo For The Paris Climate Summit!

Going Dark from
Part of the Customer data management glossary:

Going dark is slang for the sudden termination of communication. In the military, the term is also used to describe a scenario in which communication appears to have ceased, but in reality has just moved from a public communication channel, where it could be monitored, to a private communication channel that prevents eavesdropping.
According to the United States Federal Bureau of Investigation (FBI), terrorists use mobile apps and encryption to go dark and make it difficult for the Bureau to monitor conversations in legally-intercepted transmissions. FBI Director James Comey described the going dark problem at the Aspen Security Conference in July 2015: “ISIL's M.O. is to broadcast on Twitter, get people to follow them, then move them to Twitter Direct Messaging" to evaluate them as recruits. "Then they'll move them to an encrypted mobile-messaging app so they go dark to us."
Mobile apps that use end-to-end encryption (E2EE) are designed to protect data at rest and in transit and keep the end user's text messages, emails and video chats private and secure. However, the same technologies that protect user communications from intruders make it impossible for government agencies to make sense of the transmissions they legally gather, especially if the app uses strong encryption.
The National Security Agency (NSA) has proposed two potential encryption methods to solve the going dark problem: split-key encryption and encryption using "key escrow." In split key encryption, also known as secret sharing, the technology vendor or service provider retains half of a master key and law enforcement retains the other half so that decryption requires participation of both parties. For key escrow, decryption requires multiple keys, one of which is stored separately from the user, possibly in a government agency location.
Opponents of the proposed technologies maintain that both methods would be prohibitively complex to implement and the complexity would provide points of entry that would ultimately endanger user data security.

 Good Netiquette And A Green Internet To All!

**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.