Restricting Encryption Wouldn’t Stop Paris-Style Attacks

 

Despite what intelligence officials say, limiting information security would do little to thwart terrorism. Soon after gunshots rang out in Paris on, European officials began speculating about how such a well-planned attack went undetected until it was too late.
    
Spies from multiple allied countries shared intelligence about a threat to Paris in the week leading up to the attack. Why wasn’t it prevented? Several intelligence officials pointed to encrypted communications platforms.

FBI’s director James Comey calls this the “going dark” problem: With encrypted messaging increasingly available to the average consumer in services like iMessage and WhatsApp, law enforcement and intelligence officials can no longer easily eavesdrop on private communications between persons of interest.

Some government officials and lawmakers have suggested restricting strong software encryption, requiring tech companies to decrypt a secret message if presented with a warrant. The attack on Paris provided a perfect opportunity for these officials to push this argument.

“We don’t know for sure yet, but I think what we’re going to learn is that these guys were communicating via these encrypted apps,” the former CIA deputy director Mike Morell said on CBS Face the Nation.

The former CIA director John Brennan told a security conference he hopes the attacks will be a “wake-up call” that will highlight the technical obstacles to gathering intelligence from tech-savvy terrorists.

Security experts, digital-privacy advocates, and tech companies have pushed back against Comey and other encryption-phobic officials, warning that carving out access to encrypted communication for law enforcement would compromise the security that underpins much of what happens on the Internet every day.

And for now, it’s not yet clear that the Paris attackers used encrypted messaging. A US official told Reuters that the mode of communication the attackers used remains unknown.

More importantly, encryption is not just a tool for scheming and plotting. Strong encryption is essential to much of what the average Internet user does, whether it’s texting on iMessage or WhatsApp, banking online, or shopping for a new pair of shoes. Without it, a hacker could more easily snag sensitive information in transit, like personal correspondence or bank information.

“If you’re going to break the law, the last thing you’re worried about is getting a fine for encryption.”

If encryption were weakened, in the way that a proposed law in the UK requires, it would keep online security out of the hands of ordinary tech users, while barely posing an obstacle to those who use it to guard dangerous secrets. Indeed, it’s not clear that undermining strong encryption would do anything to prevent terrorism.

“Unfortunately, for an organization like ISIS that has pretty much gone to the extreme of everything that they’ve done, I don’t think that just loosening encryption standards is going to thwart and bring them down,” said Jasper Graham, a former technical director at the National Security Agency.

Graham, now the chief technology officer at Darktrace, a cybersecurity company, says enforcing a law like the UK encryption proposal would be very difficult. “If you’re going to break the law, the last thing you’re worried about is getting a fine for encryption,” he said.

Of course, Graham’s online-security business has different interests than the intelligence community, which may explain his support for encryption, even after spending years at the NSA.

But even without access to the contents of an electronic message, law enforcement is not without recourse. As targets exchange messages on a platform like WhatsApp, agents can still extract useful information about the people who are communicating.

This information about the communication, known as metadata, can paint a vivid picture of a social network, or tip agents off to a threat before it ripens. Metadata is the basic building block of one of the NSA’s most powerful spying programs, revealed by Edward Snowden in 2013.

“It’s up to our intelligence agencies to adapt, by focusing on what encryption can’t stop—like tracking who the bad guys are talking to, when, and where—and by focusing energy on breaking into their devices where the messages are decrypted, instead of breaking the security of everyone who uses the Internet,” says Ross Schulman, the senior policy counsel at New America’s Open Technology Institute.

But even powerful systems of tracking and collating metadata, like the one NSA employs domestically and abroad, don’t catch everything. A meticulous attacker can go out of his way to make connecting the dots very difficult for intelligence agencies.

As terrorists and criminals develop new tactics to avoid getting caught online, so must law enforcement adapt to the new, encrypted reality, said Michael McConnell, a former NSA Director and Director of National Intelligence, at a conference on encryption last month.

An attempt to hobble encryption would likely be very harmful to the US economy. Some of its most valuable sectors, like online banking, e-commerce, and R&D, would not be able to survive without strong cryptography, according to research from the Niskanen Center, a liber­tari­an think tank and ad­vocacy or­gan­iz­a­tion. And if US companies were barred from using strong encryption, it’s likely they would lose business to competitors abroad who would continue to offer security.

Without strong encryption, the trust every consumer relies on when sending a sensitive document, submitting credit-card information, or entering a social-security number online, will crumble. Sacrificing digital privacy would not make Americans more secure—it would leave both individuals and the economy more vulnerable.
DefenseOne: http://bit.ly/1NmRjeH

« Britain Building Cyber Forces to Attack ISIS
A Spy Firm’s Price List for Secret Hacker Techniques »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

AV Test

AV Test

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

PartnerRe

PartnerRe

PartnerRe provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

Shift Technology

Shift Technology

Shift Technology provides insurance companies with an innovative SaaS solution to improve and scale fraud detection.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

Anthony Timbers LLC

Anthony Timbers LLC

Anthony Timbers is a cybersecurity consulting and penetration testing firm providing services to the Federal and Commercial sectors nationwide.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.

LetsData

LetsData

LetsData uses AI to provide governments, intergovernmental organizations, civil society, and businesses with data-empowered decisions on communication in the age of online disinformation.