Restricting Encryption Wouldn’t Stop Paris-Style Attacks

 

Despite what intelligence officials say, limiting information security would do little to thwart terrorism. Soon after gunshots rang out in Paris on, European officials began speculating about how such a well-planned attack went undetected until it was too late.
    
Spies from multiple allied countries shared intelligence about a threat to Paris in the week leading up to the attack. Why wasn’t it prevented? Several intelligence officials pointed to encrypted communications platforms.

FBI’s director James Comey calls this the “going dark” problem: With encrypted messaging increasingly available to the average consumer in services like iMessage and WhatsApp, law enforcement and intelligence officials can no longer easily eavesdrop on private communications between persons of interest.

Some government officials and lawmakers have suggested restricting strong software encryption, requiring tech companies to decrypt a secret message if presented with a warrant. The attack on Paris provided a perfect opportunity for these officials to push this argument.

“We don’t know for sure yet, but I think what we’re going to learn is that these guys were communicating via these encrypted apps,” the former CIA deputy director Mike Morell said on CBS Face the Nation.

The former CIA director John Brennan told a security conference he hopes the attacks will be a “wake-up call” that will highlight the technical obstacles to gathering intelligence from tech-savvy terrorists.

Security experts, digital-privacy advocates, and tech companies have pushed back against Comey and other encryption-phobic officials, warning that carving out access to encrypted communication for law enforcement would compromise the security that underpins much of what happens on the Internet every day.

And for now, it’s not yet clear that the Paris attackers used encrypted messaging. A US official told Reuters that the mode of communication the attackers used remains unknown.

More importantly, encryption is not just a tool for scheming and plotting. Strong encryption is essential to much of what the average Internet user does, whether it’s texting on iMessage or WhatsApp, banking online, or shopping for a new pair of shoes. Without it, a hacker could more easily snag sensitive information in transit, like personal correspondence or bank information.

“If you’re going to break the law, the last thing you’re worried about is getting a fine for encryption.”

If encryption were weakened, in the way that a proposed law in the UK requires, it would keep online security out of the hands of ordinary tech users, while barely posing an obstacle to those who use it to guard dangerous secrets. Indeed, it’s not clear that undermining strong encryption would do anything to prevent terrorism.

“Unfortunately, for an organization like ISIS that has pretty much gone to the extreme of everything that they’ve done, I don’t think that just loosening encryption standards is going to thwart and bring them down,” said Jasper Graham, a former technical director at the National Security Agency.

Graham, now the chief technology officer at Darktrace, a cybersecurity company, says enforcing a law like the UK encryption proposal would be very difficult. “If you’re going to break the law, the last thing you’re worried about is getting a fine for encryption,” he said.

Of course, Graham’s online-security business has different interests than the intelligence community, which may explain his support for encryption, even after spending years at the NSA.

But even without access to the contents of an electronic message, law enforcement is not without recourse. As targets exchange messages on a platform like WhatsApp, agents can still extract useful information about the people who are communicating.

This information about the communication, known as metadata, can paint a vivid picture of a social network, or tip agents off to a threat before it ripens. Metadata is the basic building block of one of the NSA’s most powerful spying programs, revealed by Edward Snowden in 2013.

“It’s up to our intelligence agencies to adapt, by focusing on what encryption can’t stop—like tracking who the bad guys are talking to, when, and where—and by focusing energy on breaking into their devices where the messages are decrypted, instead of breaking the security of everyone who uses the Internet,” says Ross Schulman, the senior policy counsel at New America’s Open Technology Institute.

But even powerful systems of tracking and collating metadata, like the one NSA employs domestically and abroad, don’t catch everything. A meticulous attacker can go out of his way to make connecting the dots very difficult for intelligence agencies.

As terrorists and criminals develop new tactics to avoid getting caught online, so must law enforcement adapt to the new, encrypted reality, said Michael McConnell, a former NSA Director and Director of National Intelligence, at a conference on encryption last month.

An attempt to hobble encryption would likely be very harmful to the US economy. Some of its most valuable sectors, like online banking, e-commerce, and R&D, would not be able to survive without strong cryptography, according to research from the Niskanen Center, a liber­tari­an think tank and ad­vocacy or­gan­iz­a­tion. And if US companies were barred from using strong encryption, it’s likely they would lose business to competitors abroad who would continue to offer security.

Without strong encryption, the trust every consumer relies on when sending a sensitive document, submitting credit-card information, or entering a social-security number online, will crumble. Sacrificing digital privacy would not make Americans more secure—it would leave both individuals and the economy more vulnerable.
DefenseOne: http://bit.ly/1NmRjeH

« Britain Building Cyber Forces to Attack ISIS
A Spy Firm’s Price List for Secret Hacker Techniques »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Micro Systemation AB (MSAB)

Micro Systemation AB (MSAB)

MSAB is a leader in the provision of forensically secure tools for the extraction and analysis of data from mobile devices.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

securitycurrent

securitycurrent

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Swascan

Swascan

Swascan is the first all-in-one, GDPR Compliant, Cloud Security Suite Platform. GDPR Assessment, Web Application Scan, Network Scan, Code Review.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

OurCrowd

OurCrowd

OurCrowd is a leading equity crowdfunding platform for investing in global startups.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

Credible Digital Security Pvt. Ltd. (CDSPL)

Credible Digital Security Pvt. Ltd. (CDSPL)

CDSPL is an innovative Cyber Security Services Company in India. We are committed to offering cyber security solutions for important sectors such as energy and utilities, healthcare, and more.

SecOps Group

SecOps Group

SecOps Group is a boutique cybersecurity consultancy helping enterprises identify & eliminate security risks on a continuous basis.

Anonos

Anonos

Anonos is a global software company that provides the only technology capable of protecting data in use with 100% accuracy, even in untrusted environments.

UberEther

UberEther

UberEther are a dedicated group of software developers and consultants developing and deploying the next generation of identity management and cloud solutions.