Restricting Encryption Wouldn’t Stop Paris-Style Attacks

 

Despite what intelligence officials say, limiting information security would do little to thwart terrorism. Soon after gunshots rang out in Paris on, European officials began speculating about how such a well-planned attack went undetected until it was too late.
    
Spies from multiple allied countries shared intelligence about a threat to Paris in the week leading up to the attack. Why wasn’t it prevented? Several intelligence officials pointed to encrypted communications platforms.

FBI’s director James Comey calls this the “going dark” problem: With encrypted messaging increasingly available to the average consumer in services like iMessage and WhatsApp, law enforcement and intelligence officials can no longer easily eavesdrop on private communications between persons of interest.

Some government officials and lawmakers have suggested restricting strong software encryption, requiring tech companies to decrypt a secret message if presented with a warrant. The attack on Paris provided a perfect opportunity for these officials to push this argument.

“We don’t know for sure yet, but I think what we’re going to learn is that these guys were communicating via these encrypted apps,” the former CIA deputy director Mike Morell said on CBS Face the Nation.

The former CIA director John Brennan told a security conference he hopes the attacks will be a “wake-up call” that will highlight the technical obstacles to gathering intelligence from tech-savvy terrorists.

Security experts, digital-privacy advocates, and tech companies have pushed back against Comey and other encryption-phobic officials, warning that carving out access to encrypted communication for law enforcement would compromise the security that underpins much of what happens on the Internet every day.

And for now, it’s not yet clear that the Paris attackers used encrypted messaging. A US official told Reuters that the mode of communication the attackers used remains unknown.

More importantly, encryption is not just a tool for scheming and plotting. Strong encryption is essential to much of what the average Internet user does, whether it’s texting on iMessage or WhatsApp, banking online, or shopping for a new pair of shoes. Without it, a hacker could more easily snag sensitive information in transit, like personal correspondence or bank information.

“If you’re going to break the law, the last thing you’re worried about is getting a fine for encryption.”

If encryption were weakened, in the way that a proposed law in the UK requires, it would keep online security out of the hands of ordinary tech users, while barely posing an obstacle to those who use it to guard dangerous secrets. Indeed, it’s not clear that undermining strong encryption would do anything to prevent terrorism.

“Unfortunately, for an organization like ISIS that has pretty much gone to the extreme of everything that they’ve done, I don’t think that just loosening encryption standards is going to thwart and bring them down,” said Jasper Graham, a former technical director at the National Security Agency.

Graham, now the chief technology officer at Darktrace, a cybersecurity company, says enforcing a law like the UK encryption proposal would be very difficult. “If you’re going to break the law, the last thing you’re worried about is getting a fine for encryption,” he said.

Of course, Graham’s online-security business has different interests than the intelligence community, which may explain his support for encryption, even after spending years at the NSA.

But even without access to the contents of an electronic message, law enforcement is not without recourse. As targets exchange messages on a platform like WhatsApp, agents can still extract useful information about the people who are communicating.

This information about the communication, known as metadata, can paint a vivid picture of a social network, or tip agents off to a threat before it ripens. Metadata is the basic building block of one of the NSA’s most powerful spying programs, revealed by Edward Snowden in 2013.

“It’s up to our intelligence agencies to adapt, by focusing on what encryption can’t stop—like tracking who the bad guys are talking to, when, and where—and by focusing energy on breaking into their devices where the messages are decrypted, instead of breaking the security of everyone who uses the Internet,” says Ross Schulman, the senior policy counsel at New America’s Open Technology Institute.

But even powerful systems of tracking and collating metadata, like the one NSA employs domestically and abroad, don’t catch everything. A meticulous attacker can go out of his way to make connecting the dots very difficult for intelligence agencies.

As terrorists and criminals develop new tactics to avoid getting caught online, so must law enforcement adapt to the new, encrypted reality, said Michael McConnell, a former NSA Director and Director of National Intelligence, at a conference on encryption last month.

An attempt to hobble encryption would likely be very harmful to the US economy. Some of its most valuable sectors, like online banking, e-commerce, and R&D, would not be able to survive without strong cryptography, according to research from the Niskanen Center, a liber­tari­an think tank and ad­vocacy or­gan­iz­a­tion. And if US companies were barred from using strong encryption, it’s likely they would lose business to competitors abroad who would continue to offer security.

Without strong encryption, the trust every consumer relies on when sending a sensitive document, submitting credit-card information, or entering a social-security number online, will crumble. Sacrificing digital privacy would not make Americans more secure—it would leave both individuals and the economy more vulnerable.
DefenseOne: http://bit.ly/1NmRjeH

« Britain Building Cyber Forces to Attack ISIS
A Spy Firm’s Price List for Secret Hacker Techniques »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

KFSensor

KFSensor

KFSensor is an advanced 'honeypot' intrusion and insider threat detection system for Windows networks.

CyberOne

CyberOne

CyberOne (formerly Comtact) offer a full stack cybersecurity service to ensure our customers understand the cyber maturity of their organisation.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Omnipotech

Omnipotech

Omnipotech is a complete managed service provider. From desktop to datacenter, all the technology support you need, under one umbrella.

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

Somerville

Somerville

Somerville are a full service IT partner with over 40 years experience delivering exceptional service and value to our customers.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.

Metrodata Group

Metrodata Group

PT. Metrodata Electronics, known as Metrodata Group, is the leading information communication technology company in Indonesia.