An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Facts: Mexico to U.S. Immigration

Unaccompanied Alien Children Charged in Execution-Style Murder, Media Calls Them “Baby-Faced Boys”

It appears that the recent execution-style murder of a Massachusetts man was committed by two Central American teens that came to the U.S. as Unaccompanied Alien Children (UAC) under President Obama’s open border free-for-all. Tens of thousands of illegal immigrant minors—mostly from El Salvador, Guatemala and Honduras—have entered the country through the Mexican border since the influx began in the summer of 2014 and the administration has relocated them nationwide.

News reports indicate that the 17-year-olds charged in the gruesome Massachusetts killing entered the U.S. recently as UAC’s and both have ties to MS-13, according to authorities cited by various outlets. They lived in Everett and one of the teens, Cristian Nunez-Flores, moved to Massachusetts from his native El Salvador a year and a half ago which is when the influx of Central American minors began. His parents remain in El Salvador, according to a local news article. The other gangbanger’s name is Jose Vasquez Ardon and he too is a recent arrival from Central America. Prosecutors say the teens, described in a local news article as “baby-faced boys,”shot a 19-year-old in the head. Both are being held without bail for obvious reasons. A must read summary here.

*** Meanwhile***

5 facts about Mexico and immigration to the U.S.

PewResearch: Pope Francis is expected to make immigration a major theme of his visit to Mexico. By traveling northward across Mexico, he intends to symbolically retrace the journey of Mexican and Central American migrants traveling to the United States. After the pope leaves Mexico City, his route will begin in the southern state of Chiapas, which shares a long border with Guatemala, and end in Ciudad Juárez, located across the U.S.-Mexico border from El Paso, Texas, a longtime entry point to the U.S.

U.S. immigration from Latin America has shifted over the past two decades. From 1965 to 2015, more than 16 million Mexicans migrated to the U.S. in one of the largest mass migrations in modern history. But over the past decade, Mexican migration to the U.S. has slowed dramatically. Today, Mexico increasingly serves as a land bridge for Central American immigrants traveling to the U.S.

Here are five facts about Mexico and trends in immigration to the U.S.

1Mexico increases deportations of Central AmericansMexico is stopping more unauthorized Central American immigrants at its southern border. The Mexican government said in 2014 that it would increase enforcement at its southern border in response to an increased flow of Central Americans traveling through Mexico to reach the U.S. In 2015, the government there carried out about 150,000 deportations of unauthorized immigrants from El Salvador, Guatemala and Honduras, a 44% jump over the previous year. These three Central American countries alone accounted for nearly all (97%) of Mexico’s deportations in 2015.

2Despite increased enforcement by Mexico, many unauthorized Central Americans are still reaching the U.S. via Mexico. At the U.S.-Mexico border, the number of families and unaccompanied children apprehended by U.S. Customs and Border Protection officials is again rising, though it’s too early to tell how 2016 will compare with prior years. From Oct. 1, 2015, to Jan. 31, 2016, 24,616 families and 20,455 unaccompanied children – the vast majority of them from Central America – were apprehended at the southwestern U.S. border, double the total from the same time period the year before. Apprehensions of unaccompanied children rose to record levels in fiscal 2014, then decreased by 42% in fiscal 2015.

3More Cubans are also traveling through Mexico to reach the U.S. The number of Cubans migrating through Mexico to reach the U.S. spiked dramatically last year after President Barack Obama said the U.S. would renew ties with the island nation. In fiscal 2015, 43,159 Cubans entered the U.S. via ports of entry, a 78% increase over the previous year. Two-thirds of these Cubans arrived through the U.S. Border Patrol’s Laredo Sector in Texas. (Cubans who pass an inspection can enter the U.S. legally under the Cuban Adjustment Act of 1966.)

4Fewer Mexicans are migrating to the U.S. today than in the past. In fact, more Mexicans left than came to the U.S since the end of the Great Recession. Between 2009 and 2014, 870,000 Mexican nationals left Mexico to come to the U.S., down from the 2.9 million who left Mexico for the U.S. between 1995 and 2000. Of those moving back to Mexico, many cite family as the reason for their return. About 1 million Mexican immigrants and their U.S.-born children moved from the U.S. to Mexico between 2009 and 2014, and 61% said they had done so to reunite with family or to start a family, according to the 2014 Mexican National Survey of Demographic Dynamics.

5More Mexicans now say life is about the same in the U.S. and Mexico. In 2015, 33% of Mexican adults said life in the U.S. is neither better nor worse than life in Mexico, up from 23% who said this in 2007. Still, about half of Mexican adults believe life is better in the U.S. and 35% of Mexicans said they would move to the U.S. if they had the opportunity and means to do so, similar shares as in 2009.

It was not a Hardware Issue, it was a Cyber Intrusion, IRS

IRS Confirms It Was a Victim of an Automated Attack

The attack, which occurred in January, targeted the electronic filing PIN application form on the IRS.gov Website. Experts said there are lessons to be learned.

eWeek: The U.S. Internal Revenue Service (IRS) is gearing up for another busy tax season, and it appears that hackers are getting ready, too. On Feb. 9, the IRS confirmed that it was the victim of an automated attack in January that targeted the electronic filing PIN application form on the IRS.gov Website.According to the IRS, attackers made use of personal information, including Social Security numbers, that was stolen from other non-IRS Websites. The attackers then used that information in an attempt to generate fraudulent E-File PIN numbers on IRS.gov. With a PIN number, an attacker could have potentially been able to file a tax return or gain access to other taxpayer information.The IRS investigation has found that 464,000 unique Social Security numbers (SSNs) were used in the attack, with 101,000 being successfully able to access the E-File PIN. The IRS is emphasizing that it has halted the attack and is contacting those who are affected.”No personal taxpayer data was compromised or disclosed by IRS systems,” the agency stated. “The IRS also is taking immediate steps to notify affected taxpayers by mail that their personal information was used in an attempt to access the IRS application.”

In May 2015, the IRS reported that its Get Transcript service was attacked. Get Transcript enables users to get information about their tax account transactions. As is the case with the new attack against the E-File PIN, the Get Transcript service attack involved user information that was stolen from third-party sites. The success rate for the Get Transcript attackers, however, was higher than it was for the E-File PIN attackers, where 100,000 out of 200,000 hack attempts were successful.

Security experts contacted by eWEEK are not surprised that the IRS is once again reporting an attack against its systems. The fact that the IRS.gov site was attacked with SSNs stolen from other third-party sites is, however, somewhat ironic.”One of the most successful ways hackers steal citizens’ Social Security numbers is through fraudulent phishing emails or phone calls that appear to be from the IRS,” Darren Guccione, CEO and co-founder of Keeper Security, told eWEEK.

Hackers know the public is terrified of being identity-theft victims and exploit this fear well, often by telling someone they’ve been a victim already and asking for their Social Security number, Guccione noted.Lance James, chief scientist at Flashpoint, commented that one of the big concerns he sees with the latest IRS attack is the continued reliance on Social Security numbers. “We need to rethink what a Social Security number means these days when it comes to accessing data,” James told eWEEK. “It should not be the administrator password for a person’s life.”Andy Hayter, security evangelist at G DATA Software, also commented on the risks associated with SSN disclosure. Every bit of an individual’s personally identifiable information that is collected via a breach is one more piece of information that can, and someday will, be used against a person, he said.
“As long as information such as Social Security numbers is used as identification, we will have bad actors trying to collect as much information about individuals to do harm, either through theft or worse,” Hayter told eWEEK.Inga Goddijn, executive vice president at Risk Based Security, noted that taxpayers should be concerned that questionable security practices at organizations completely unrelated to the IRS have the potential of affecting their tax returns.

Though the IRS has stated that no personal taxpayer data was compromised or disclosed in the new attack, JP Bourget, CEO of Syncurity, noted that there is still a real risk.”While maybe the IRS can in the end prevent any bad outcomes for taxpayers, I can imagine a few scenarios where a bad guy attempts to file a tax return for a refund that then holds up a valid refund to someone who is owed a refund, and even depending on that refund,” Bourget told eWEEK. “There’s also the angle of now your account is flagged and the uncertainty of how that affects a taxpayer over time and what hidden costs may arise from that.”One potentially positive outcome that could result from the IRS attack is that lessons learned could help prevent the next attack. Goddijn said that it would be helpful if the IRS can share more detail as to how the agency detected the attack and ideas for preventing these types of enumeration attacks in the future. She added that the U.S. government has been pushing for more threat intelligence sharing and improved security practices for all organizations.”Why not take this opportunity to lead the charge and share more about the attack with the security community,” Goddijn said. “That may help stop the next, similar assault on a high-value target.”

In 2015:

USAToday: Criminals hacked into an Internal Revenue Service website and gained access to approximately 100,000 tax accounts, the agency said Tuesday. Another 100,000 attempts were made but were not successful.

The attack appears to have first begun in February, the agency said.

The hackers got in by taking information about taxpayers they’d acquired from other sources and using it to correctly answer several personal identity verification questions in the IRS’ “Get Transcript” application, the IRS said in a statement.

This allowed them to get information about tax accounts through the application. The information stolen included Social Security information, date of birth and street address.

The Get Transcript application allows users to view their tax account transactions, line-by-line tax return information or wage and income reported to the IRS for a specific tax year. It was used to securely retrieve approximately 23 million taxpayer transcripts last year, the IRS said.

The information the hackers used to get in was probably previously stolen by other hackers who then sold it on the open market, said Rob Roy, chief technology officer of HP Enterprise Security Products.

The hackers who bought it “appear to have hired an army of people to submit over 200,000 queries into the IRS site over a period of four months. Not exactly a quick and easy operation,” he said.

“The matter is under review by the Treasury Inspector General for Tax Administration as well as the IRS’ Criminal Investigation unit, and the ‘Get Transcript’ application has been shut down temporarily,” the IRS said.

The agency will provide free credit monitoring services for the approximately 100,000 taxpayers whose accounts were accessed.

The theft was discovered late last week when IRS staff noticed unusual activity on the application. Further investigation showed that attempts were made beginning in February.

The breach does not involve the main IRS computer system that handles tax filing submissions. “That system remains secure,” the IRS said.

“The IRS historically has been very security, it has to be by virtue of the data it collects. But it just goes to show that even the most secure system can be attacked,” said Larry Ponemon of the Ponemon Institute, a data security research group.

China banks may lose 5 times US banks’ subprime losses

Yellin’s testimony includes China as the big worry.   

China is big concern

Yellen didn’t mince words about China: its economy is slowing down and uncertainty is rising about how much China will devalue its currency, the yuan.

A weak yuan has major implications for global trade. Yellen firmly blames the uncertainty of China’s currency for the rise in global growth fears.

“This uncertainty led to increased volatility in global financial markets and, against the background of persistent weakness abroad, exacerbated concerns about the outlook for global growth,” Yellen said.

Add in spooky dude, George Soros:

Bass: China banks may lose 5 times US banks’ subprime losses in credit crisis

CNBC: A Chinese credit crisis would see the country’s banks rack up losses 400 percent larger than the hit U.S. banks took during the subprime mortgage crisis, storied hedge fund manager Kyle Bass has warned in a letter to investors.

“Similar to the U.S. banking system in its approach to the Global Financial Crisis (GFC), China’s banking system has increasingly pursued excessive leverage, regulatory arbitrage, and irresponsible risk taking,” Bass, the founder of Dallas-based Hayman Capital, wrote in the letter dated Wednesday.

“Banking system losses – which could exceed 400 percent of the U.S. banking losses incurred during the subprime crisis – are starting to accelerate.”

China’s banking system has grown to $34.5 trillion in assets over the past 10 years, from a base of $3 trillion, wrote Bass, who is famed as one of the few major investors to correctly call the U.S. subprime housing collapse that kicked off the 2008 global financial crisis. That prescience earned him a mention in Michael Lewis’ book “Boomerang,” which was about the European credit crisis.

This expansion in the banking system’s asset base was fueled largely by rapid credit expansion, Bass wrote, that helped fund the huge, and often inefficient, infrastructure spending program that has propped up China’s growth.

“China’s [banking] system is even more precarious when we realize that, even at the biggest banks, loans are not made to borrowers based on their ability to repay,” he wrote. “Instead, load decisions are political decisions made by the state.”

Add to this the danger posed by China’s shadow banking system – made up of instruments Bass claimed the country’s banks used to subvert restrictions on lending – and the upshot was there were “ticking time bombs” in China’s banking system, the hedge fund manager explained.

“Chinese banks will lose approximately $3.5 trillion of equity if China’s banking system loses 10 percent of assets,” Bass wrote. “Historically, China has lost far in excess of 10 percent of assets during a non-performing loan cycle.”

He noted that U.S. banks lost about $650 billion of their equity throughout the global financial crisis.

The letter said that the Bank for International Settlements (BIS) estimated that Chinese banking system losses from the 1998-2001 non-performing loan cycle exceeded 30 percent of gross domestic product (GDP).

“We expect losses in this cycle to exceed prior cycles. Remember, 30 percent of Chinese GDP approaches $3.6 trillion today,” he warned.

Bass wrote that he expected the massive losses to force Beijing to recapitalize Chinese banks and sharply devalue the yuan.

“China will likely have to print in excess of $10 trillion worth of yuan to recapitalize its banking system,” he said. “By the time the loss cycle has peaked, we believe the renminbi will have depreciated in excess of 30 percent versus the U.S. dollar.”

The hedge fund manager didn’t return an email sent outside office hours requesting comment on the investor letter, which the Wall Street Journal reported was the first he had sent in two years.

Bass’ sentiments on the yuan aren’t new, with the Wall Street Journal reporting earlier this month that he was among the money managers making bearish bets on the currency.

The dollar has already fallen about 5.9 percent against the yuan since August, when a sharp devaluation by the People’s Bank of China (PBOC) roiled markets; the greenback was fetching around 6.5710 yuan on February 5, the last day of trade before China’s markets closed for a week-long Lunar New Year holiday.

The PBOC has introduced a slew of measures to arrest, or at least slow, declines in the currency in the hope of achieving an orderly depreciation.

The central bank has asked banks making yuan loans abroad to set aside more in reserves and has also hoovered up yuan in Hong Kong, a key market where the bearish bets have been made, effectively making it more expensive for traders to borrow the yuan to make these trades.

China’s state-owned publications have also chipped in with stinging editorials admonishing greedy speculators for betting against the currency. Prominent investor George Soros was recently likened to a “crocodile” that had declared “war” on China for suggesting while at the World Economic Forum in Davos, Switzerland, that China’s economy was headed for a hard landing.

In his letter, Bass casts the attacks on Soros as confirmation of his views.

“China’s public reaction in its state media to George Soros’ comments in Davos was in character for a country that is on the precipice of a large devaluation,” Bass said.

While many have pointed to China’s large – albeit shrinking – pile of $3.23 trillion in foreign-exchange reserves as a defensive wall against a crisis, Bass says that’s simply not enough.

He estimates China really only has around $2.1-2.2 trillion in reserves after adjusting for several factors including about $700 billion that could be tied up in China’s sovereign wealth fund CIC. That’s below his estimate of the $2.7 trillion minimum China would need to effect a banking sector bailout.

“China’s liquid reserve position is already below a critical level of minimum reserve adequacy,” he said.

Predictions of a Chinese economic disaster have been circulating for a long time; Gordon Chang’s book “The Coming Collapse of China” was published in 2001.

However, the mainland saw economic growth slow to a 25-year low of 6.9 percent in 2015 amid its transition toward a consumption-driven economy and away from its manufacturing roots.

When it comes to positioning for his expectations of a Chinese bank implosion, Bass wrote that he was thinking broad.

“What happens in China will not stay in China,” he said. “We decided to liquidate the majority of our risk assets.”

He did not appear likely to buy back in to the market any time soon.

“The next 18 months will be fraught with false-starts, risk rallies, and second-guessing,” he wrote.

To be sure, some of Bass’ other doomsday bets haven’t yet come to fruition.

For more than five years, he has called for a collapse in Japan government bonds (JGB) as part of a yet-to-materialize full-blown financial crisis there. That trade, dubbed a widow-maker, has so far backfired spectacularly.

Instead of a collapse in JGB prices, they’ve surged, with the benchmark 10-year seeing negative yields for the first time this week. Bond yields move inversely to prices.

Hayman Capital had returns of about 1.7 percent last year, according to a Bloomberg report.

***

TOKYO (AP) — Japan’s main stock index dived Friday, leading other Asian markets lower, after a sell-off in banking shares roiled investors in the U.S. and Europe.

Tokyo’s Nikkei 225 was down 4.8 percent to 14,952.61 after earlier sinking as much as 5.3 percent. Hong Kong’s Hang Seng fell 1.0 percent to 18,364.14. South Korea’s Kospi gave up 1.4 percent to 1,835.01 and Australia’s S&P/ASX 200 fell 1.2 percent to 4,765.30. Shares in New Zealand and Southeast Asia also fell. Markets in China and Taiwan are closed until Monday for Lunar New Year holidays.

Global stocks have been in a slump since the beginning of the year when China’s market, which had been propped up by government buying, plunged dramatically. Concerns about China, however, are now just one of several factors behind the bloodletting.

NYPD Covertly Tracked Cell Phones

New York police have covertly tracked cell phones, group says

Reuters: New York City’s police have made extensive use of covert devices to track cell phones without obtaining warrants since 2008, a civil liberties group said on Thursday, revealing how frequently law enforcement in the largest U.S. city has employed the technology.

The New York Civil Liberties Union released files that showed the New York Police Department used “cell site simulators” to track nearby cell phones more than a 1,000 times over the past eight years.

The American Civil Liberties Union has identified 60 local, state and federal agencies that have adopted the devices in recent years, but the group has said there are likely far more. The extent of the devices has largely been shrouded in secrecy, as departments and private manufacturers such as Harris Corp have refused to disclose information about their use.

U.S. Representative Jason Chaffetz of Utah, a Republican, has introduced a bill to require warrants for the use of cell site simulators.

The documents released on Thursday were obtained by the NYCLU through a Freedom of Information Law request.

The NYPD does not have a written policy on using the surveillance devices and does not obtain warrants when doing so, according to the NYCLU.

Instead, the department seeks “pen register” orders, which have been used for decades to gather information on specific phone numbers. The orders are issued by judges but require a lower standard than the probable cause needed for warrants.

The NYPD’s practice is less stringent than the one adopted last year by the U.S. Department of Justice, which calls for warrants except in emergency situations.

“We still have concerns that this military equipment is being used in a civilian context,” said Mariko Hirose, an NYCLU attorney. “At the very least, they should be using warrants and with a strict privacy policy that is written.”

The NYPD did not immediately respond to a request for comment.

The devices mimic cell towers and intercept signals from nearby phones to gather information. That data can include locations of calls, numbers that are called or texted and even the content of communications, the NYCLU said.

The simulators can also sweep up information from nearby “bystander” phones.

The documents do not indicate what data police collected. The simulators were used to investigate a wide range of crimes, including murder, rape and drug trafficking.

No New York court has yet tackled the question of whether the warrantless use of such devices is constitutional, Hirose said.

She said the NYCLU could have difficulty establishing the legal standing to bring such a challenge, which would probably have to come from a criminal defendant specifically targeted by a simulator.

Yikes, there is more:

Intercept: The NYPD has used cell-site simulators, commonly known as Stingrays, more than 1,000 times since 2008, according to documents turned over to the New York Civil Liberties Union. The documents represent the first time the department has acknowledged using the devices.

The NYPD also disclosed that it does not get a warrant before using a Stingray, which sweeps up massive amounts of data. Instead, the police obtain a “pen register order” from a court, more typically used to collect call data for a specific phone. Those orders do not require the police to establish probable cause. Additionally, the NYPD has no written policy guidelines on the use of Stingrays.

Stingrays work by imitating cellphone towers. They force all nearby phones to connect to them, revealing the owners’ locations. That means they collect data on potentially hundreds of people. They are small enough to fit in a suitcase, or be mounted on a plane.

When they were originally developed in 2003, Stingrays were designed for military use. But in the past decade, they have increasingly been purchased by law enforcement agencies. According to the ACLU, Stingrays are used by at least 59 police departments in 23 states, and at least 13 federal agencies, including the DEA, FBI, and the IRS. Because most departments withhold information about Stingrays, these numbers likely underrepresent the total.

In December, The Intercept published a secret U.S. government catalogue of cellphone surveillance technology, including Stingrays and “dirt-boxes.” The advertisements boast that many of the items can spy on “up to 10,000 targets.”

Stingrays have long been a topic of concern for privacy activists. “Cell-site simulators are powerful surveillance devices that can track people, including in their homes, and collect information on innocent bystanders,” said Mariko Hirose, a senior staff attorney at the NYCLU.  “If they are going to be used in communities the police should at minimum obtain a warrant and follow written policies.”

Instead, law enforcement agencies have fought to keep Stingrays secret, even dropping criminal cases to avoid disclosing anything about them. The FBI has forced local police agencies to sign Stingray-related non-disclosure agreements, claiming that criminals and terrorists who know about Stingrays could take countermeasures against them.

The increasing use of Stingrays, coupled with the lack of transparency, has alarmed civil liberties groups. “I think it’s critical to have transparency about the use of technology like Stingrays,” said Faiza Patel, an attorney with the Brennan Center for Justice. “That’s what allows courts, the public, and our elected officials to weigh in on the proper rules.”

In September, the Department of Justice issued guidelines requiring its officers to seek probable cause warrants before using a Stingray. But the guidelines only applied to federal law enforcement agencies, not to state and local police, who have fought such a change. In one ongoing court case, the state of Maryland has argued that anyone who turns on their phone consents to having his or her location tracked.

In November, Senator Ron Wyden, D-Ore., and Rep. Jason Chaffetz, R-Utah, introduced the GPS Act, a bill that would extend the Department of Justice’s guidelines to all law enforcement agencies. “Buying a smartphone shouldn’t be interpreted as giving the government a free pass to track your movements,” Wyden said.

See the government catalogue here:

Top photo: “nypd” by Nick Allen, used under CC BY 2.0/ cropped and color corrected from original.

Contact the author:

ISIS, Islamic State has a Help Desk

The Islamic State in Iraq and Syria (ISIS) uses a 34-page manual to instruct its followers on how to stay invisible on the Internet.

The Arabic document was translated and released this week by analysts at the Combating Terrorism Center, an independent research group at the U.S. Military Academy at West Point. It includes warnings to avoid Instagram because it is owned by Facebook, and Dropbox because former secretary of State Condoleezza Rice sits on its board of investors. Famous government leaker Edward Snowden has also criticized Dropbox over its privacy, the document notes.

Users are also directed to use Apple’s encrypted FaceTime and iMessage features over regular unencrypted text and chat features. More here.

New ISIS ‘help desk’ to aid hiding from authorities

TheHill: The Islamic State in Iraq and Syria (ISIS) has opened up a new technical “help desk” that instructs terrorists on how to hide from Western authorities, according to researchers.

The Electronic Horizon Foundation (EHF) was launched on Jan. 30 as a joint effort of several of the top ISIS cybersecurity experts, the Middle East Media Research Institute (MEMRI) said in a new report.

While researchers have previously uncovered an ISIS “help desk” and 34-page manual that help extremists encrypt their communications, MEMRI said the EHF takes these services to an “alarming” new level.

“Jihadis have long sought technical information, which has been confined in the past to various password-protected jihadi forums,” said the MEMRI report, shared exclusively with The Hill. “However, the freedom and ease by which they can now obtain that information is alarming, especially when such information is shared over private and secure channels.”

The EHF operates on the encrypted messaging platform Telegram but also maintains a Twitter account that disseminates information and directs followers to its secure Telegram channel.

The group’s self-stated goal is clear: “Spreading security and technical awareness among the monotheists.”

According to an announcement celebrating the EHF launch, ISIS has spent a year establishing the group with the goal of “unifying the technical and security efforts, and uniting the ranks of the mujahideen’s supporters.”

It brings together several technical support entities, such as the Information Security channel on Telegram and the “Islamic State Technician,” an ISIS security specialist thought to be behind a leading password-protected technical forum.

The announcement, which the MEMRI translated, was also direct that the EHF had been formed “due to the electronic war and tight surveillance imposed by the Western intelligence apparatuses over Internet users, and their tracking and following of the mujahideen and their supporters, and targeting them based on their data and information, which they share over the Internet.”

EHF pledged to provide resources to help combat this surveillance.

“It is time to face the electronic surveillance, educate the mujahideen about the dangers of the Internet, and support them with the tools, directives and security explanations to protect their electronic security, so that they don’t commit security mistakes that can lead to their bombardment and killing,” the announcement said.

As of early this week, the EHF Telegram account had over 2,200 members.

MEMRI said EHF has not posted much yet, “but it is expected to take the lead nonetheless in content posted as time goes by.”

If the group follows in the footsteps of its creators, its content will be “defensively-oriented,” such as tutorials on mobile phone security, instead of “offensively-oriented,” such as instructions on launching cyberattacks, MEMRI said.

In the wake of the terror attacks in Paris and San Bernardino, Calif., law enforcement officials have cautioned that potential terrorists are increasingly using encryption to hide from investigators, a phenomenon they call “going dark.”

The warnings have led to some calling for legislation that would guarantee government access to encrypted data, although momentum on Capitol Hill for such a bill has cooled in recent months.

“I don’t think we’re any closer to a consensus on that than we were, I think, six months ago,” Rep. Adam Schiff (D-Calif.), the House Intelligence Committee’s top Democrat, said last week. “Or if there is a consensus, it is that a legislative solution, I think, is very unlikely.”

 

IS Encryption Guide by AlyssaBereznak