Russian Air Crash Investigation Changes The Encryption War

If intercepted communications prove an ISIS bomb caused crash in Egypt, it could be just the boost surveillance state advocates need. 

    
When US intelligence officials said “intercepted communications” are a basis for the early assessment that a bomb planted by the Islamic State may have doomed a Russian passenger jet over Egypt, they also may have given a huge boost to efforts to expand government-led surveillance in the name of counterterrorism.
“I think there is a possibility that there was a bomb on board,” President Barack Obama said, lending the commander in chief’s credibility to the theory. It’s the president’s first characterization of the disaster since British Prime Minister David Cameron said it was “more likely than not” that a bomb destroyed the airliner.
Egyptian officials continue to push back on the bomb theory, yet British Foreign Secretary Philip Hammond said, “Of course this will have a huge negative impact for Egypt. But with respect to [Egypt Foreign Ministry spokesman Ahmed Abouzeid,] he hasn’t seen all the information that we have.”

Consider that statement in the context of Cameron’s almost year-long crusade to strengthen the U.K. government’s surveillance capabilities and effectively shut down secure end-to-end user encryption both in the United Kingdom and beyond.

End-to-end user encryption refers to the ability of one person to share communications with another person over a digital interface, and only with that intended recipient. The message, whether an email, text or other communication, is “encrypted” by the sender and “decrypted” by the receiver using software. 

That means that the intermediary communications service provider, such as Apple, Google, Yahoo, or Facebook, can not decrypt the message, even under threat of incarceration or under pressure from a court. End-to-end user encryption, correctly implemented, is encryption without secret defects that allow someone to intercept those supposedly secure message. And it’s growing in popularity among users. In 2014, Apple and Google announced that iPhones and Android phones would begin to encrypt users’ data.

Just hours before the British government suspended flights over the Sinai, the UK government introduced a new law to weaken the type of end-to-end user encryption that would keep companies and law enforcement from being able to intercept messages. The so-called Investigatory Powers Bill also mandates that Internet companies retain detailed logs of their users’ Internet browsing activity for a year.

The bill claims to clarify a 2000 law and would require private companies to provide data and help authorities intercept communications, with a warrant, in addition to maintaining the ability to intercept and decrypt messages.
A UK government official explained it this way: “The Government is clear we need to find a way to work with industry as technology develops to ensure that, with clear oversight and a robust legal framework, the police and intelligence agencies can access the content of communications of terrorists and criminals in order to resolve police investigations and prevent criminal acts. That means ensuring that companies themselves can access the content of communications on their networks when presented with a warrant.’”

That matters in terms of the day’s headlines. The FBI and Cameron have accused the Islamic State of using popular encrypted-based apps to hide secret messages.

But human rights activists, journalists, and other security conscious individuals also use encryption to protect against data theft. Many computer science experts such as Bruce Schneier have argued for decades that wider access to encryption methods (without backdoors or built-in defects of the type the British government is seeking) would actually make the Internet far safer, including for people in countries like Iran and Syria who themselves are looking to reach out to US intelligence agencies. 

Wider use of encryption also likely would mean fewer instances of identify theft, missing data, and so-called phishing attacks that use personal information.
DefenseOne: http://bit.ly/1L1mzYI

 

 

« NATO’s role in the cyber domain is unclear.
New UK Surveillance Bill Appears In The Wake of Snowden »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Dell Technologies Capital

Dell Technologies Capital

At Dell Technologies Capital we lead investment in disruptive, early-stage startups in enterprise and cloud infrastructure.

Quantum Xchange

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe.

DataViper

DataViper

DataViper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

StateRAMP

StateRAMP

StateRAMP reduces risk from unsecure cloud solutions and protects data by providing State and local governments a standardized approach for verifying and monitoring security postures.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.