Restricting Encryption Wouldn’t Stop Paris-Style Attacks

 

Despite what intelligence officials say, limiting information security would do little to thwart terrorism. Soon after gunshots rang out in Paris on, European officials began speculating about how such a well-planned attack went undetected until it was too late.
    
Spies from multiple allied countries shared intelligence about a threat to Paris in the week leading up to the attack. Why wasn’t it prevented? Several intelligence officials pointed to encrypted communications platforms.

FBI’s director James Comey calls this the “going dark” problem: With encrypted messaging increasingly available to the average consumer in services like iMessage and WhatsApp, law enforcement and intelligence officials can no longer easily eavesdrop on private communications between persons of interest.

Some government officials and lawmakers have suggested restricting strong software encryption, requiring tech companies to decrypt a secret message if presented with a warrant. The attack on Paris provided a perfect opportunity for these officials to push this argument.

“We don’t know for sure yet, but I think what we’re going to learn is that these guys were communicating via these encrypted apps,” the former CIA deputy director Mike Morell said on CBS Face the Nation.

The former CIA director John Brennan told a security conference he hopes the attacks will be a “wake-up call” that will highlight the technical obstacles to gathering intelligence from tech-savvy terrorists.

Security experts, digital-privacy advocates, and tech companies have pushed back against Comey and other encryption-phobic officials, warning that carving out access to encrypted communication for law enforcement would compromise the security that underpins much of what happens on the Internet every day.

And for now, it’s not yet clear that the Paris attackers used encrypted messaging. A US official told Reuters that the mode of communication the attackers used remains unknown.

More importantly, encryption is not just a tool for scheming and plotting. Strong encryption is essential to much of what the average Internet user does, whether it’s texting on iMessage or WhatsApp, banking online, or shopping for a new pair of shoes. Without it, a hacker could more easily snag sensitive information in transit, like personal correspondence or bank information.

“If you’re going to break the law, the last thing you’re worried about is getting a fine for encryption.”

If encryption were weakened, in the way that a proposed law in the UK requires, it would keep online security out of the hands of ordinary tech users, while barely posing an obstacle to those who use it to guard dangerous secrets. Indeed, it’s not clear that undermining strong encryption would do anything to prevent terrorism.

“Unfortunately, for an organization like ISIS that has pretty much gone to the extreme of everything that they’ve done, I don’t think that just loosening encryption standards is going to thwart and bring them down,” said Jasper Graham, a former technical director at the National Security Agency.

Graham, now the chief technology officer at Darktrace, a cybersecurity company, says enforcing a law like the UK encryption proposal would be very difficult. “If you’re going to break the law, the last thing you’re worried about is getting a fine for encryption,” he said.

Of course, Graham’s online-security business has different interests than the intelligence community, which may explain his support for encryption, even after spending years at the NSA.

But even without access to the contents of an electronic message, law enforcement is not without recourse. As targets exchange messages on a platform like WhatsApp, agents can still extract useful information about the people who are communicating.

This information about the communication, known as metadata, can paint a vivid picture of a social network, or tip agents off to a threat before it ripens. Metadata is the basic building block of one of the NSA’s most powerful spying programs, revealed by Edward Snowden in 2013.

“It’s up to our intelligence agencies to adapt, by focusing on what encryption can’t stop—like tracking who the bad guys are talking to, when, and where—and by focusing energy on breaking into their devices where the messages are decrypted, instead of breaking the security of everyone who uses the Internet,” says Ross Schulman, the senior policy counsel at New America’s Open Technology Institute.

But even powerful systems of tracking and collating metadata, like the one NSA employs domestically and abroad, don’t catch everything. A meticulous attacker can go out of his way to make connecting the dots very difficult for intelligence agencies.

As terrorists and criminals develop new tactics to avoid getting caught online, so must law enforcement adapt to the new, encrypted reality, said Michael McConnell, a former NSA Director and Director of National Intelligence, at a conference on encryption last month.

An attempt to hobble encryption would likely be very harmful to the US economy. Some of its most valuable sectors, like online banking, e-commerce, and R&D, would not be able to survive without strong cryptography, according to research from the Niskanen Center, a liber­tari­an think tank and ad­vocacy or­gan­iz­a­tion. And if US companies were barred from using strong encryption, it’s likely they would lose business to competitors abroad who would continue to offer security.

Without strong encryption, the trust every consumer relies on when sending a sensitive document, submitting credit-card information, or entering a social-security number online, will crumble. Sacrificing digital privacy would not make Americans more secure—it would leave both individuals and the economy more vulnerable.
DefenseOne: http://bit.ly/1NmRjeH

« Britain Building Cyber Forces to Attack ISIS
A Spy Firm’s Price List for Secret Hacker Techniques »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Irish Reporting & Information Security Service (IRISS)

Irish Reporting & Information Security Service (IRISS)

IRISS-CERT is Ireland's first CSIRT (Computer Security Incident Response Team) to provide services to all users within Ireland.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

International Federation of Robotics (IFR)

International Federation of Robotics (IFR)

The International Federation of Robotics connects the world of robotics around the globe. Our members come from the robotics industry, industry associations and research & development institutes.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

NST Cyber

NST Cyber

NST Cyber provides comprehensive Threat Exposure Management to Global banks and Forbes 2000 companies.