Homeless in Arizona

Articles on Legalizing Marijuana

This applies to freedom fighters in America too

How the U.S. is using terrorists' smartphones and laptops to defeat them

z_98939.php created February 01, 2018
  This not only applies to freedom fighters in Iraq and Afghanistan but to freedom fighters in America.

Remember if you are falsely arrested by the American police, they will try to steal all the data from your cell phone and use it against you and your friends.

You should always password protect your cell phone to make it a little bit harder for the police to steal your data.

And don't use an easy to guess password like 1234, your name or your birthdate. Use something that is difficult to guess.

And forget about using those worthless Apple passwords of your face. The piggies will simply snap of photo of your face, while you are handcuffed to break into your phone.

Technically the cops need a search warrant to steal the data from your cell phone, but have you ever seen the cops punished for breaking the law?


Source Also see: 1

How the U.S. is using terrorists' smartphones and laptops to defeat them

Jim Michaels, USA TODAY Published 3:23 p.m. ET Jan. 31, 2018 | Updated 4:08 p.m. ET Jan. 31, 2018

BETHESDA, Md. – Smartphones helped terror organizations grow and communicate. Now the devices are contributing to their downfall.

In a nondescript, highly secured building in this Washington suburb, a group of U.S. government technicians and linguists are downloading massive amounts of data from phones, hard drives, CDs and other devices, providing a huge boost to the U.S. intelligence community as it hunts terrorists.

Many of the devices have been captured from battlefields in Iraq and Syria, where the Islamic State has lost virtually all the territory it captured in 2014.

"This is the future," Kolleen Yacoub, director of the National Media Exploitation Center, told USA TODAY in a rare interview at the center’s headquarters.

It was the first time the center, which also supports law enforcement and other agencies, has allowed a journalist into the facility, providing insight into a critical but little known part of the intelligence community.

The center grew from a handful of employees when it was established in 2003 to about 700 today, including offices overseas. It has about 100 linguists.

“The ability to exploit captured electronic hardware is a great capability that we have adopted and expanded and improved tremendously over the past 15 years,” said Jim Howcroft, a retired Marine intelligence officer and director of the terrorism program at the George C. Marshall European Center for Security Studies.

The center in Maryland, managed by the Defense Intelligence Agency, reviews paper documents as well as electronic items.

But it is the proliferation of laptops and cellphones that has fueled the growth in this type of intelligence gathering.

Smartphones hold massive amounts of information critical to intelligence analysts, including photos, telephone numbers, GPS data and Internet searches.

Users generally assume the device won’t be compromised and don’t take precautions to protect the data, Yacoub said.

“What they’re saving on their devices is ground truth,” Yacoub said. “We tend to treat our digital devices, our mobile devices ... as personal items and we don’t lie to them.”

“The adversaries don’t lie to them either,” she said.

The data include videos and photos that help identify militants and their leaders.

Even when a device is damaged or information is deleted, the center's technicians recover 60% to 80% of the data. "Deleted does not mean lost" is one of the center's mottoes.

The amount of data coming into the center has skyrocketed in the past two years, Yacoub said, mainly because of the campaign against the Islamic State, or ISIS.

The data analysis has been particularly helpful in giving intelligence analysts an unprecedented look at how the radical group operated in Iraq and Syria because of the ubiquity of smartphones and the meticulous way ISIS kept records in areas it controlled.

The data include tens of thousands of personnel records on foreign fighters and their families with dates of birth, aliases, phone numbers, jobs and other valuable intelligence.

“They have their own central government in a sense,” Yacoub said.

ISIS had departments that developed drone technology, chemical weapons, finance and propaganda operations. It also kept detailed records on the bureaucracy it created to provide services in areas it controlled.

Some of the terror leaders have been captured fleeing the battlefield with reams of information in the hopes that they can use it to keep the group active or to regroup after the loss of territory.

“If you’re committed to sustaining this organization and you’re going to take your show on the road ... then you’re taking everything you can with you,” Marine Brig. Gen. James Glynn, deputy commanding general of the Special Operations Joint Task Force, said in an interview from Baghdad.

The intelligence is helping analysts map out how the Islamic State may try to evolve.

“If you don’t have a clear understanding of how ISIS is operating today, I don’t think you can really understand where they are going to next,” said Seth Jones, director of the Transnational Threat Project at the Center for Strategic and International Studies. “They are not going to disappear.”

 


Previous article on legalizing marijuana

Next article on legalizing marijuana

List of all articles on legalizing marijuana


Homeless in Arizona

Homeless In Arizona counter is screwed up