Paris Attacks and "Going Dark": Intelligence-Related Issues to Consider

This report discusses intelligence efforts on tracking numerous individuals involved in the deadly assault in Paris on November 13, 2015.

CRS INSIGHT Paris Attacks and "Going Dark": Intelligence-Related Issues to Consider November 19, 2015 (IN10400) | Related Policy Issue Intelligence and National Security Related Author Anne Daugherty Miles | Anne Daugherty Miles, Analyst in Intelligence and National Security Policy (, 7-7739) Authorities are tracking numerous individuals involved in the deadly assault in Paris on November 13, 2015. According to one report, "a rogues' gallery of homegrown terrorists with links to Islamist groups has become large enough — and is acting stealthily enough — to make tracking them increasingly difficult for the region's intelligence agencies." (See CRS Insight IN10209, European Security, Islamist Terrorism, and Returning Fighters, by Kristin Archick and Paul Belkin.) While CRS has found no specific evidence of encrypted communications linked to the Paris attacks cited in news reports, some are using the Paris attacks to highlight the difficulties of collecting intelligence when communications data can be encrypted—an issue called "going dark." On November 16, 2015, Central Intelligence Agency (CIA) Director John Brennan stated: [O]peratives and terrorist networks ... have gone to school on what it is that they need to do in order to keep their activities concealed from the authorities.... [T]here are a lot of technological capabilities that are available right now that make it exceptionally difficult, both technically as well as legally, for intelligence and security services to have the insight they need to uncover it. "Going Dark" Technology changes have impacted law enforcement capabilities to access (1) communications in transit between devices and (2) stored data within devices. Companies such as Apple and Google have announced that they cannot unlock their devices for anyone under any circumstances, not even for law enforcement (because they do not maintain a key to decrypt messages sent between their devices.) Lawfare's Benjamin Wittes explains the encryption problem this way: It's about data at rest on devices, data that is now being encrypted in a fashion that can't easily be cracked when those devices are lawfully seized. And it's also about data in transit between devices, data encrypted such that when captured with a lawful court-ordered wiretap, the signal intercepted is undecipherable.... Initial recruitment may take place on Twitter, but the promising ISIS candidate quickly gets moved onto messaging platforms that are encrypted end to end. As a practical matter, that means there are people in the United States whom authorities reasonably believe to be in contact with ISIS for whom surveillance is lawful and appropriate but for whom useful signals interception is not technically feasible. Issues for Congress A number of hearings have focused on the subject of "going dark." On July 8, 2015, the Senate Judiciary Committee and Senate Select Committee on Intelligence held separate hearings with James Comey, Director of the Federal Bureau of Investigation (FBI). Comey framed the core question: "Once all of the requirements and safeguards of the laws and the Constitution have been met, are we comfortable with technical design decisions that result in barriers to obtaining evidence of a crime?" Organizations such as the American Civil Liberties Union (ACLU) are vocal in their opposition to any action that might weaken encryption technologies. According to the ACLU: "Such proposals threaten privacy and place an improper burden on private entities to build the government's surveillance infrastructure, decrease cyber and national security, and are unnecessary given current law enforcement access to electronic information." In commentary on the Paris attacks, Michael Morrell, former Deputy Director of the CIA and currently Senior Counselor for Beacon Global Strategies LLC, said, "We have ... had a public debate [about encryption].... defined by Edward Snowden ... and the concern about privacy. I think we're now going to have another debate ... defined by what happened in Paris." (In 2013, Edward Snowden's release of thousands of classified National Security Agency [NSA] documents prompted demands for greater privacy protections primarily within the context of intelligence counterterrorism and law enforcement activities.) The terrorist attacks in the United States on September 11, 2001 (9/11), prompted a new look at legislation related to surveillance and search provisions. Congress passed the Foreign Intelligence Surveillance Act (FISA) in 1978 to provide a statutory framework regulating when government agencies may gather foreign intelligence through electronic surveillance or physical searches. A number of laws passed after 9/11 amended FISA to enable the government to obtain information in a greater number of circumstances. (Major revisions are associated with P.L. 107-56, P.L. 108458, and P.L. 110-261.) Most recently, the USA FREEDOM Act (P.L. 114-23) was signed into law on June 2, 2015. The principal focus of the legislation was to address the bulk collection of telephone metadata by the NSA. (See CRS Legal Sidebar WSLG1278, USA FREEDOM Act Reinstates Expired USA PATRIOT Act Provisions but Limits Bulk Collection, by Edward C. Liu.) Some have dubbed the Paris attacks the "French 9/11." Intelligence and law enforcement communities across the globe have expressed concerns about the "going dark" problem. The attacks may create a difficult challenge for Congress: experts note that surveillance laws will have to balance current concerns about emerging technologies with the need to keep Americans safe and protect American privacy and civil liberties. Recent events may spark renewed debate concerning surveillance provisions in FISA (or other laws authorizing electronic surveillance, such as the Communications Access for Law Enforcement Act [CALEA, P.L. 103-414]). For more on "going dark" and CALEA, see CRS Report R44187, Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations, by Kristin Finklea. The Paris attacks illustrate that the United States is not alone in its efforts to balance privacy and security. FBI Director Comey's testimony points out the global nature of this challenge: It is clear that governments across the world, including those of our closest allies, recognize the serious public safety risks if criminals can plan and undertake illegal acts without fear of detection.... We should be clear that any steps that we take here in the United States may impact the decisions that other nations take.... In addition, any next steps we identify will be more effective if we are working together with our allies, and made more difficult if we are isolated.