British PM Wants To Ban Encryption

UK-Ban.png

 

David Cameron has signalled that he intends to ban strong encryption, putting the British government on a collision course with some of the biggest tech companies in the world. The British Prime Minister re-affirmed his commitment to tackling strong encryption products in Parliament in response to a question.

Strong encryption refers to the act of scrambling information in such a way that it cannot be understood by anyone — even law enforcement with a valid warrant, or the software company itself — without the correct key or password.

It's currently used in some of the most popular tech products in the world, including the iPhone, WhatsApp, and Facebook.

But amid heightened terrorism fears, David Cameron is attempting to take action.

Over the last year, encryption has become a hot tech policy issue. Following exiled whistleblower Edward Snowden’s revelations about mass surveillance online by the NSA and other spy agencies, tech companies have increasingly moved to incorporate strong encryption into their products to protect consumers’ data. And simultaneously, governments and law enforcement officials have upped their rhetoric, warning that proliferation of the tech could help terrorists and criminals evade capture.

When Apple implemented strong encryption by default in late 2014, for example, a senior US police officer warned that the iPhone would become the “phone of choice for the pedophile” as a result. And European police chief Rob Wainwright said in March 2015 that encryption is now the “biggest problem” in tackling terrorism.

It’s a difficult situation. On the one hand, it’s easy to sympathise with law enforcement, who fear that large amounts of communications data they previously had access to are now “going dark.” 
But security experts warn that any attempt to weaken encryption or introduce “back doors” for the authorities can have unintended and dangerous consequences. There’s no back door that can only be used by the good guys, they argue, and weakening the tech will put consumers at risk from criminals and hackers.

Yahoo : http://bit.ly/1Lb41cV

« Use Threat Intelligence to Boost Mobile Security
FBI - Encryption is Great as Long as it Still Lets Us In »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

International Federation of Robotics (IFR)

International Federation of Robotics (IFR)

The International Federation of Robotics connects the world of robotics around the globe. Our members come from the robotics industry, industry associations and research & development institutes.

Atlantic Council Digital Forensic Research Lab (DFRLab)

Atlantic Council Digital Forensic Research Lab (DFRLab)

The Atlantic Council’s DFRLab has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Prodera Group

Prodera Group

Prodera Group is a specialist technology consulting partner trusted to help navigate the complex and dynamic lifecycle of change and transformation.

Acumera

Acumera

Acumera is a leader in managed network security, visibility and automation services.

Arctic Group

Arctic Group

Arctic Group is a Swedish service provider focusing on cybersecurity, integration services and deployment of software development tools.

Sekur Private Data

Sekur Private Data

Sekur Private Data Ltd. is a Cybersecurity and Internet privacy provider of Swiss hosted solutions for secure communications and secure data management.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

Dion Training Solutions

Dion Training Solutions

Dion Training Solutions offer comprehensive training in areas such as project management, cybersecurity, agile methodologies, and IT service management.