Islamic State and other terrorist groups espouse a primitive ideology and rely on medieval tactics, but they use distinctly modern tools: social media and communications platforms designed to evade our most advanced efforts to fight terrorism.

By taking advantage of widely available encryption technologies, terrorists and common criminals alike can carry out their agendas in cyber safe havens beyond the reach of our intelligence agency tools and law enforcement capabilities. This is unacceptable. Americans of course need access to technology that keeps our personal and business communications private, but this must be balanced with concerns over national security.

Register or login for access to this item and much more

All Information Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access