Not 'Going Dark': 15 Out Of 15 Most Recent EU Terrorists Were Known To The Authorities In Multiple Ways

from the sure,-mass-surveillance-doesn't-work,-but-think-of-the-money-we-are-saving dept

Important information about recent terrorist attacks in Europe continues to emerge. Here's the latest news from Brussels, as reported by the Guardian: Plans and photographs of the home and office of Belgium's prime minister, Charles Michel, have been found on a computer abandoned near a terrorist hideout in Brussels, according to Belgian sources.



The laptop was found in a bin near a flat in the Schaerbeek district that had been a makeshift bomb factory for the terrorists who killed 32 people and injured at least 340 in last week's suicide bombings at Brussels airport and the city metro. Not unnaturally, perhaps, most commentary has been about the fact that Belgium's prime minister was apparently being considered as a target. But there's something else in this story that's interesting, not least because it's not explicit. The Belgian sources for this story have revealed that "plans and a photograph" were found on a computer. Assuming the laptop did indeed belong to the terrorists, that means one of two things: either the system did not use encryption at all, or that it was possible to bypass the protection. In either case, it looks like this is yet another demonstration that things are not "going dark" when it comes to terrorism, despite continued claims to the contrary.

Given how details about the attackers are coming through very sporadically, it can be hard to see the bigger picture. To address that issue, the German journalist Sascha Lobo has pulled together all the information he could find about lethal terrorist attacks carried out by Islamists over the last two years in Europe. Specifically, these were the attack on the Jewish Museum in Brussels in May 2014; the Paris attack on Charlie Hebdo and a Jewish supermarket in 2015; the attack on a cultural center and synagogue in Copenhagen in 2015; the second attack in Paris in November last year; and the recent attacks in Brussels.

The results of his research appear in the German news magazine Der Spiegel, but fortunately he has produced a tabulated form (with references) that doesn't require any knowledge of the German language to grasp. A glance is enough to see that every single one of the 15 attackers who have been identified was known to the authorities, often for multiple reasons. Indeed, as Lobo writes, it's even worse than it seems at first sight: All 15 identified attackers were on terror warning lists or "Islamist instigator" lists in at least one European country. In addition, most were on other lists, such as no-fly lists. All 15 had been classified as violence-prone. 14 had known contacts with other radical Islamists (one of them was apparently radicalized only via the Internet). Twelve had taken trips to the "Islamic State" in Syria, or to al-Qaida in Iraq or Yemen. Ten had criminal records, most of them for violent crimes. This is not a terrifying world where things are "going dark" for the authorities. This is not a situation where strong crypto made it impossible to know who was doing what. This is a world of persistent failure by the intelligence agencies and police to use the information they already had at their disposal. This is a world that wants to shift the blame to evil encryption, rather than admit that mass surveillance doesn't work, and is the wrong approach. Lobo offers a plausible explanation why this is still happening, despite the manifest inability of blanket snooping to spot obvious connections and use them to stop attacks: Comprehensive surveillance appears as seemingly inexpensive because it is a solution that scales thanks to technology: troubleshooting at the press of a button. Directly linked with the aim of saving more and more, just as with the State in general. But classic investigative work, which is proven to work, is expensive and labor intensive. This leads to a failure by the authorities because of a faith in technology that is driven by economics. In other words, it's much cheaper to call for even more automated mass spying than to address the problem properly by bringing in more trained personnel to carry out targeted surveillance of people who are known threats.

Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community. Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis. While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: belgium, brussels, encryption, going dark