Category Archives: Encryption
Former UK security service head says weakening encryption would be too dangerous – 9to5Mac
While Apple may have given in to demands from the Chinese government to remove VPN apps from its app store there, it does generally take a strong stand on encryption. It uses end-to-end encryption for both iMessage and FaceTime, and resisted pressure from the FBI to create aweakened version of iOS, describing it as too dangerous.
Weve written a number of pieces explaining why we support Apples stance, both before and after the San Bernardino case.
The British government wants to ban end-to-end encryption altogether, arguing that it hampers the work of the security services. Support for Apples position and opposition to that of the British Home Secretary has now come from an unlikely source
In a BBC Radio 4 interview cited by Gizmodo,the former head of the Security Service (more commonly known as MI5)has said that while strong encryption does make their job harder, it is the lesser evil.Jonathan Evans said:
Im not personally one of those who believes we should weaken encryption, because I think there is a parallel issue which is cybersecurity more broadly. Whilst, understandably, there is a very acute concern about counter-terrorism, its not the only national security threat that we face. And I think the way cyberspace is being used by criminals, and by governments, is a potential threat to the UKs interests more widely and its very important that we should be seen and be a country where people can operate securely. And thats very important for our commercial interests, as well as our national security interests, so encryption is very positive.
MI5 is responsible fordomestic counter-intelligence and security. Evans wasDirector-General of MI5 until 2013.
Evans also spoke about the risk of unsecured Internet of Things devices.
As our vehicles, air transport, our critical infrastructure is resting critically on the internet, we need to be really confident that we have secured that because our economic and daily lives are going to be dependent on the security we can put in to protect us from cyber-attack.
Apple HomeKit certification requires extremely strong encryption for devices to be approved.
VPN apps encrypt traffic between a user and the server, ensuring that not even your ISP can see which sites you are visiting or what you are doing there. It is, however, important to choose one that doesnt keep logs to ensure that it is not doing its own snooping.
Check out 9to5Mac on YouTube for more Apple news:
Follow this link:
Former UK security service head says weakening encryption would be too dangerous - 9to5Mac
News in brief: facial recognition planned for Carnival; spy chief backs encryption; ginger emoji planned – Naked Security
Your daily round-up of some of the other stories in the news
Civil liberties groups have protested at plans by Londons Metropolitan Police to use facial recognition software to scan the faces of people partying at this years Notting Hill Carnival.
Tens of thousands of people party in the streets of west Londons Notting Hill Gate on the last weekend of August, and the civil rights group Liberty has challenged the decision to use the technology to spot troublemakers, saying its racist, as the carnival is rooted in the capitals African-Caribbean community.
The police force trialled facial recognition last year, saying at the time that the technology involves the use of overt cameras which scan the faces of those passing by and flag up potential matches against a database of custody images. The database has been populated with images of individuals who are forbidden from attending Carnival, as well as individuals wanted by police who it is believed may attend Carnival to commit offences.
Nobody was arrested as a result of the trial, said the Met after the event. Stafford Scott of The Monitoring Group, an anti-racism charity, echoed Libertys concerns, saying: It is racial profiling. They are coming and putting everyones face in the system. A technique they use for terrorists is going to be used against young black people enjoying themselves.
Jonathan Evans, a former British spy chief, has come out strongly in favour of encryption, despite the fact that widespread use of encryption has reduced the ability of the agencies to police, to access the content of materials shared by terrorists.
Evans, who led the UKs MI5 spy service between 2007 and 2013, told the BBCs Today programme on Radio 4 that Im not personally one of those who believes we should weaken encryption. He was referring to the calls from Amber Rudd, the home secretary to weaken encryption: just last week she said that real people didnt always want end-to-end encryption.
In his interview, Evans said that he was concerned about cybersecurity more broadly, and particularly mentioned the Internet of Things, the security of which we regularly despair about here at Naked Security. He said: As our vehicles, air transport, our critical infrastructure is resting critically on the internet, we need to be really confident we have that secured because our economic and daily lives are going to be dependent on the security we can put in to protect us from cyberattack.
At Naked Security were very encouraged by Evans words: we are opposed to backdoors and anything that would weaken encryption.
Emojis we love them. And were also keen on equality here at Naked Security, so we very pleased to see that a ginger-haired emoji was among the options in the latest recommendations from Unicodes emoji subcommittee.
As well as our titian-headed friends, silver foxes, the bald and those blessed with curls will also be represented in emojis from June next year if the draft candidates included in the recommendations from the subcommittee are adopted.
The emoji subcommittee meets weekly, by phone, and also holds a week-long meeting every quarter to discuss and advance or reject proposals.
The next stage for gingers, silver foxes, bald folk and curly-topped people is the final quarterly meeting of this year, when the list of final candidates for encoding in Unicode 11.0 will be decided, with the final code points and names for the new emojis being decided at the first quarterly meeting next year.
Catch up with all of todays stories on Naked Security
Follow @NakedSecurityFollow @katebevan
View original post here:
News in brief: facial recognition planned for Carnival; spy chief backs encryption; ginger emoji planned - Naked Security
Avoid getting lost in encryption with these easy steps – We Live Security (blog)
Encryption can be the answer to many data security issues faced by small and medium businesses.Not onlycan it protect sensitive information from unauthorized use and minimize the risks arising from data breaches, implementing this technology can also represent another step towards compliance with legislation, especially with respect to the General Data Protection Regulation (GDPR).
But in cybersecurity, there isno silver bullet meaning that no single product or service can handle all the potential threats out there. This applies to encryption also, as even this technology despite its many advantages still has limitations that you need to take into consideration. So before opting for a specific product, be sure you know the one that best fits your needs.
According to a recent study on data breaches carried out by the Ponemon Institute, human error is second only to malicious actors when it comes to the most commonly cited root cause of data leaks. However, these can be avoided by deploying a solution that is easy to use.
There will always be the need for some encryption to be carried out by the user, based on policy and training. If these actions require expert knowledge and the product is not user-friendly, employees might try to find the easy way out and companyrules could be broken. With a simple, user-friendly solution, this can be avoided.
A recent IDC survey on ESETs behalf has also shown that ease of management and ability to recover a lost access key are among the most important criteria when a business is in the process of choosing an encryption solution.
To avoid cases where employees are unable to decrypt their data because they have forgotten their keys, search for solutions that use a system of shared encryption keys, managed by on-site system administrators.
This is similar to the use of actual keys, something we all understand before starting elementary school. On top of that, it also makes sharing encrypted data within a predefined group quick, easy and in many cases, transparent for the user.
The solution you choose should be scalable and flexible, so that you can easily add advanced features if necessary, enabling you to vary enforced policies and keys remotely helping you to keep a strong default configuration.
Select a product that doesnt require reinstallation for upgrades or renewals. In addition, dont forget that if an encryption solution is available as a perpetual license, including annual maintenance and support, or as a subscription license, it can enable you to manage costsand improve your financial flexibility.
Select a solution that employs industry-standard encryption algorithms that you can trust, and a sophisticated key-sharing system for secure data exchange among all users.
Check if the encryption solution you are considering meets the rigorous FIPS-140-2 standard in the US and is validated by the National Institute of Standards and Technology (NIST). Also verify if it has been certified by key players on the market (i.e. OPSWAT) and has performed well in independent tests.
Set your data protection strategy carefully and choose the encryption solution that helps you fulfill it in a way that suits you best. To make the right decision, dont shy away from any questions you might have about usability and features of the product, even if they sound obvious to you. You might be surprised how many encryption solutions on the market dont cover the basics.
If you want to know which questions you should ask and what answers to seek, we will help you in our next blogpost, so stay tuned and read more on WeLiveSecurity.com.
Author Ondrej Kubovi, ESET
Read more from the original source:
Avoid getting lost in encryption with these easy steps - We Live Security (blog)
Here’s why IBM Z Mainframe Wants to Encrypt the World – Edgy Labs (blog)
IBMs new approach to fight cyber criminals is a mainframe that enables encryption of an entire dataset and renders it useless to hackers.
Hackers are everywhere and even ships in high seas can be compromised by their malicious deeds.
According to IBM X-Force Threat Intelligence Index, more than 4 billion records were leaked in 2016 alone, which is over a 500% increase from the previous year.
As cyber criminals keep on keeping up with security companies, theres urgent need to find novel approaches and countermeasures.
Think about it: if all sensitive data is efficiently encrypted and hackers cant decrypt it, they wouldnt be able to take advantage. Their attempts to breach security systems would be pointless.
A recent study by thePonemon Institute reveals that, after using effective incident response teams, the extensive use of encryption is the second factor in reducing the cost of data breach (by anaverage of $16 USD per record).
However some companies show passivity when it comes to data encryption; some just dont bother, while others cant afford to encrypt everything.
Current data encryption solutions (on-premises or cloud-based) can degrade systems performance, aside from being too complex and costly to deploy in the first place.
As a result, IBM estimates that, since 2013, of over 9 billion data records stolen, only 4% of the data was ever encrypted, and the company wants to remedy this.
IBMs security solutions span the whole spectrum, from hardware and software to web services, but the company has a universal encryption approach to the problem of data protection.
As a leading tech company, IBM wants to put an end to the global pandemic of security breaches and to do that it is betting on full encryption of sensitive data.
IBM has been making significant progress in cryptographic technology, mainly with its Z series mainframes. We just witnessed the introduction of the 14th generation of thesystem.
Called IBM Z, or z14, the mainframe is a system that enables the encryption of all data contained in databases, apps or the cloud, at any time, with just one-click.
Powered with a novel encryption engine, IBM Z is much faster and can run 12 billion encrypted transactions per day, without being a detriment to performance.
The IBM Z boasts many other features, including Blockchain technology, for businesses of any scale to make use of it.
Nevertheless, IBMs full encryption system might not keep hackers totally at bay. Cyber attacks can still target sensitive encrypted data and steal it.
It remains to be seen if hackers would ever be able to decrypt it.
Read this article:
Here's why IBM Z Mainframe Wants to Encrypt the World - Edgy Labs (blog)
Symantec Announces Plesk Will Integrate Symantec Encryption Everywhere Security Into Its Website Management … – Business Wire (press release)
MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--Symantec Corp. (NASDAQ:SYMC), one of the worlds leading cyber security companies, today announced that Plesk, a leading WebOps platform, will now incorporate Symantecs Encryption Everywhere security offerings into its website management platform and control panel, giving web professionals, small businesses, and cloud service providers one-click access to website encryption and customized security offerings. Symantec Encryption Everywhere is a website security solution that enables web hosting providers to seamlessly integrate security into every website. The newest version of Symantec Encryption Everywhere includes secure email and award-winning anti-virus and spyware removal from Norton.
Small businesses, web professionals and cloud service providers want better security for their websites, but are often intimidated by the complexities of online security and encryption, said Roxane Divol, executive vice president and general manager for Website Security at Symantec. Yet, browsers have begun flagging unencrypted websites as unsafe, causing businesses to lose brand trust, increase abandoned cart rates and find themselves open to hacking. Symantec and partners like Plesk are natively integrating basic encryption into websites and applications for easy compliance with browser security requirements, and options to expand beyond encryption as security needs grow.
Plesk will make it easy to manage and activate Symantec security packages within their website management platform and control panel. Plesk services over 11 million websites and 19 million mail boxes in 140 countries. Plesk enables all features deeply integrated and offering all available security offerings from Symantec at your fingertips. Hosting partners of Plesk will be able to resell these as well.
Encryption is no longer a nice-to-have for websites, but a must-have, said Nils Hueneke, CEO at Plesk. Our goal with all our WebOps solutions is to simplify the life of small businesses, web professionals and cloud service providers. By partnering with Symantec, we can offer the worlds most trusted security solutions to our customers seamlessly within our platform. In addition, the Symantec Encryption Everywhere program gives our partners a range of upsell opportunities that not only add value and brand differentiation, but also additional revenue streams.
For more information, visit https://www.symantec.com/theme/encryption-everywhere.
About Symantec Website Security
Symantec Website Security provides industry-leading security for websites, data, and applications with SSL/TLS, certificate management, vulnerability assessment, WAF/DDoS, malware scanning, etc. The Norton Secured Seal and Symantec Seal-in-Search assure customers they are safe to search, browse, interact, and buy. Symantec Website Securitys sophisticated solutions offer the promise of a safe and trusted internet experience across all websites and applications.
About Symantec
Symantec Corporation (NASDAQ: SYMC), a world leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global communityofmore than 50 million people and familiesrely on Symantecs NortonandLifeLockproduct suitesto protect their digital lives at home and acrosstheirdevices. Symantec operates one of the worlds largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visitwww.symantec.comor connect with us on Facebook, Twitter, and LinkedIn.
Symantec, the Symantec Logo and the Checkmark logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
IBM India Helps Create Breakthrough Encryption Technology That’s Completely Hacker Proof – Indiatimes.com
An increasing danger of our connected, digital world is the rise of hackers, and their potential to inflict serious damage with real-world consequences.
REUTERS
Nothing is precious for us than our data, and protecting that data at all costs is going to be paramount going forward. Good thing IBM has already perfected a full-proof system to foil the attempts of 21st century hackers!
IBM just released its latest Z series mainframe last month, the z14. What's a mainframe I hear you ask? Well, it's a very powerful computer which is used to handle huge volumes of data transactions -- for e.g. in a bank scenario, or for a flight booking website, or an ecommerce platform, among other things.
This is what the new IBM Z14 mainframe looks like
IBM's mainframes are widely used in the tech industry for delivery of critical services, but what the company has done for the first time ever with the newly released z14 mainframe is to allowdata encryption at every level of the system, and then storing everything inside encrypted containers. Multiple levels of encryption to hoodwink even the most diligent hackers out there.
And on top of that, if the system detects an attack like malware or other intrusion, the z14 mainframe has been designed to shut itself down automatically, as per an IBM statement on Techcrunch. Even if hackers could somehow get through all of these defenses, which is highly unlikely, the multiple levels of encryption would still render the data useless.
According to a report published in The Hindu, IBM's India engineering team had a crucial role in the successful development of the z14 mainframe's "pervasive encryption" technology.
The report quoted Gururaj S Rao, IBM Fellow & VP of System Integration, IBM zSystems as suggesting that a key z14 mainframe component designed by the India team was the encryption unit, which gives the z14 mainframe its unparalleled level of security. More than 100 engineers from IBM's India business unit contributed towards the development of the z14 mainframe.
Hopefully, the adoption and deployment of z14's pervasive encryption technology will cause a major dent in the exploits of hackers in the coming months and years. And we'll know that India had an important role in the scheme of things!
Follow this link:
IBM India Helps Create Breakthrough Encryption Technology That's Completely Hacker Proof - Indiatimes.com
Australia: Shelve Proposed Law to Weaken Encryption – Human Rights Watch (press release)
(Sydney, August 7, 2017) The Australian government should not force technology companies to weaken the security of their products or to subvert encryption, Human Rights Watch said last week in a letter to Prime Minister Malcolm Turnbull. That strategy would undermine cybersecurity for all users and would not stop determined criminals from using encryption.
On July 14, 2017, Turnbull announced new legislation to require device manufacturers and internet companies to provide appropriate assistance to intelligence and law enforcement agencies to access encrypted communications. Turnbull, along with Attorney General George Brandis and the acting commissioner of the Australian Federal Police, Michael Phelan, stated that encryption was thwarting the governments ability to monitor and investigate serious crime.
Governments are obliged to investigate and prosecute serious crimes, but any policy response should not do more harm than good, and needs to be effective, said Elaine Pearson, Australia director at Human Rights Watch. Unfortunately, Prime Minister Turnbulls proposal may fail on both counts and could undermine cybersecurity and human rights worldwide.
Governments have many ways to sharpen investigatory capability without undercutting the security of ordinary users, Human Rights Watch said. They could invest in modernizing investigation techniques and increasing resources and training in tools already at their disposal, consistent with human rights requirements. Any limitations encryption poses to police capabilities are greatly offset by the explosion of new kinds of investigatory material enabled by the digital world, including location information and vast stores of metadata that are not encrypted.
The Australian government previously proposed a coordinated approach to encryption at a June 26 meeting of the Five Eyes intelligence partnership, which also includes the United States, United Kingdom, Canada, and New Zealand, and the July 5 G20 summit. The prime minister provided few new details about the proposed legislation in the news conference to announce the legislation. When asked what kind of assistance companies would be required to provide, Turnbull said that he did not seek a back door into encrypted services, but nonetheless expected companies to ensure access to all data in unencrypted form.
However, for end-to-end encrypted applications like WhatsApp or iMessage or data stored on iPhones, companies cannot turn over unscrambled data nor the encryption keys, even with a court order, because they do not retain the keys. Only the sender and recipient can unscramble the information. The only way for companies to access unencrypted data is to introduce a deliberate vulnerability into their design that is, a back door or remove end-to-end encryption altogether.
The overwhelming consensus of information security experts and even some high-ranking former intelligence officials is that no technical solution would allow law enforcement agencies to decrypt communications without creating vulnerabilities that would expose all users to harm. Once back doors are introduced, malicious hackers and cybercriminals will seek them out, sell them on private grey markets, or exploit them for abuse or profit. Europol has also warned that solutions that intentionally weaken technical protection mechanisms to support law enforcement will intrinsically weaken the protection against criminals as well.
Companies are incorporating strong encryption into products in response to a range of threats from cybercriminals, data thieves, and malicious hackers. Encryption is a critical tool in their fight to secure users from these threats. Any requirement to weaken encryption flies in the face of global efforts to shore up cybersecurity, Human Rights Watch said.
Limiting strong encryption in Australia, or even across Australias closest allies like the Five Eyes alliance, is also unlikely to prevent bad actors from using it. A recent global survey of encryption confirms that determined criminals could easily shift to many available foreign alternatives that would not be subject to Australian law. Those most harmed by anti-encryption legislation are the millions of ordinary users with no connection to wrongdoing whose cybersecurity would be compromised. The harm may be even more serious for journalists and activists who regularly use encrypted applications to protect sources and victims from reprisals.
Turnbull stated that the bill would be modeled after the UKs 2016 Investigatory Powers Act (IP Act). The UK legislation allows authorities to serve technical capability notices on a broad range of internet companies. These notices will require firms to provide and maintain the capability to disclose, where reasonably practicable, the content of communications or secondary data in an intelligible form and to remove electronic protection applied by or on behalf of the operator. These notices can be used to facilitate not only targeted surveillance, but also mass surveillance, collection of metadata, and government hacking.
The precise scope of what these notices may require remains unclear, especially for operators who do not retain encryption keys. The draft implementing regulations do not clarify whether these companies will be required to alter the design of their products or build a back door into encryption. Contradictory statements from UK officials have not clarified the matter, nor shed light on how this approach would avoid undermining cybersecurity or prevent bad actors from using non-UK alternatives.
Just as troubling, the UK Investigatory Powers Act can also require some tech companies to notify authorities of new products or services before they are introduced so that authorities can assess whether new technical capabilities may be required. This potentially provides the government the ability to influence product design to facilitate surveillance, including whether and how encryption can be used.
The UK Investigatory Powers Act is no model for any government that cares about protecting the security of online communications, Pearson said. If other governments follow this example, no one could trust the security of the mobile phones and applications we use every day.
The UK parliament still needs to approve the implementing regulations before government officials can issue the new technical capability notices. However, once regulations are in place, the public may know very little about how they are used, since notices will be served and negotiated with companies secretly.
These overreaching provisions are among the reasons why whistleblower Edward Snowden described the IP Act as legalizing the most extreme surveillance in the history of Western democracy.
Australias approach to encryption will most likely be emulated by other countries in the region, Pearson said. If Turnbull wants to show true leadership, Australia should become a model for how countries can investigate effectively in a world with strong encryption, not endorse policies that would undermine cybersecurity and human rights.
Here is the original post:
Australia: Shelve Proposed Law to Weaken Encryption - Human Rights Watch (press release)
Letter to Prime Minister Turnbull re Encryption and Human Rights – Human Rights Watch (press release)
August 3, 2017Hon. Malcolm Turnbull MPPrime MinisterParliament HouseCANBERRA ACT 2600
Re: Encryption and Human Rights
Dear Prime Minister Turnbull,
We write to urge you to support the use of strong encryption as essential to security and human rights in the digital age. We call on you to refrain from forcing technology companies to weaken the security of their products or banning the use of end-to-end encryption.
In a July 14 press conference on national security and encryption, you discussed challenges that Australian law enforcement and intelligence agencies faced in accessing encrypted data or communications, even with a lawful court order. You announced your intention to introduce legislation that will in particular impose an obligation upon device manufacturers and upon service providers to provide appropriate assistance to intelligence and law enforcement on a warranted basis, to access data in unencrypted form. While the conference released few details, you stated that the legislation would be modelled on the United Kingdoms Investigatory Powers Act and that you will seek a coordinated approach with international partners, including the Five Eyes intelligence alliance.
Governments have a human rights obligation to investigate and prosecute crime and thwart terrorist attacks. However, any policy response should not do more harm than good, while also be effective at achieving its aim. Forcing companies to weaken encryption or effectively forbidding the use of end-to-end encryption fails on both counts, and would undermine human rights worldwide.
Strong encryption is the cornerstone of cybersecurity in the digital age. Todays cybercriminals are increasingly sophisticated, targeting Internet companies, credit card and identity data, critical infrastructure, and even nation-state intelligence agencies.[1] Strong encryption built into private sector technology protects the dataand the human rights and securityof billions of Internet users worldwide against these growing security threats. You yourself have acknowledged that you use encrypted applications like Wickr and WhatsApp because traditional communication methods are not secure.[2]
Weakening encryption for any purpose effectively weakens it for every purpose, including malicious hacking, financial fraud, and for other illicit purposes. And unfortunately, weak or partial encryption provides not just weak or partial protection, but no protection at all against sophisticated repressive regimes and capable criminals. Some companies that manufacture encrypted apps or devices do not have the ability to disclose conversations or data to law enforcement because that information is encrypted end-to-end and companies do not have the decryption keys. A requirement of assured decryptability for all data would force such companies to redesign their products without security features like end-to-end encryption or to introduce deliberate vulnerabilities, or back doors, into their software.
The overwhelming consensus of information security experts, along with some former Five Eyes intelligence officials, is that there is no technical solution that would allow specific law enforcement agencies to decrypt communications without creating vulnerabilities that would expose all users to harm.[3] Europol has also warned that solutions that intentionally weaken technical protection mechanisms to support law enforcement will intrinsically weaken the protection against criminals as well.[4] Determined cybercriminals and rival foreign intelligence agencies will find and exploit such back doors, for profit or abuse. This would undermine cybersecurity for all users, including billions that are under no suspicion of wrongdoing.
For human rights defenders and journalists, the harm can be even more serious. Activists and media organizations with whom we work in places like Hong Kong, Vietnam, Thailand, and across the Middle East rely on encryption built into phones and chat applications to protect sources and victims from reprisals. In 2015, the UN special rapporteur on freedom of expression, David Kaye, recognized that encryption enables the exercise of freedom of expression, privacy, and a range of other rights in the digital age.[5] Countries like Russia, China, and Turkey need no encouragement, they are already blurring the line between human rights activism and terrorism in order to justify surveillance and repression of human rights activists.
While strong encryption may limit some existing surveillance capabilities, weakening such security features will only increase the vulnerability of billions of ordinary people to cybercrime, identify theft, and malicious hacking. Such harm would be broadly disproportionate to any gains in law enforcement capabilities that undermining encryption would achieve.
It is also unlikely that limiting strong encryption in Australiaor even in all Five Eyes countries would prevent bad actors from using it. As a recent global survey of encryption products confirms, terrorists and criminals could easily shift to the many available foreign alternatives that would not be subject to Australian law.[6]
Technology companies face an escalating digital arms race to secure their software and devices against cybercriminals, and encryption is a key part of their arsenal. Instead of hindering efforts to protect ordinary users, we urge your government to invest in modernizing investigation techniques and increasing resources and training in tools already at their disposal, consistent with human rights requirements.[7] For example, any limitations encryption poses to police capabilities are greatly offset by the explosion of new kinds of investigatory material enabled by the digital world, including location information and vast stores of metadata that are not encrypted. And encrypted data can often be accessed in unencrypted form through cloud-based backups or by directly accessing it on devices with hacking or forensic tools. Of course, these alternative approaches should also be necessary and proportionate to legitimate security goals, regulated in public law, and subject to strict safeguards to ensure respect for privacy and other rights.
Australias approach to encryption will be emulated by other countries facing similar challenges. Your government can demonstrate true leadership by adapting to a world with strong encryption instead of fighting the gains the private sector has made in shoring up security and human rights in the digital age.
Sincerely,
Elaine PearsonAustralia Director
Cynthia WongSenior Internet Researcher
CC:
Senator the Hon. George Brandis QC, Attorney-General
Mr. Michael Phelan APM, Acting Commissioner of the Australian Federal Police
[1] See, for example, Sam Thielman, "Yahoo hack: 1bn accounts compromised by biggest data breach in history," The Guardian, December 15, 2016, https://www.theguardian.com/technology/2016/dec/14/yahoo-hack-security-o... (accessed August 2, 2017); Nicole Perlroth & David Sanger, "Hacks Raise Fear Over N.S.A.s Hold on Cyberweapons," New York Times, June 28, 2017, https://www.nytimes.com/2017/06/28/technology/ransomware-nsa-hacking-too... (accessed August 2, 2017).
[2] Eliza Borrello, "Malcolm Turnbull confirms he uses Wickr, WhatsApp instead of unsecure SMS technology," ABC News, March 2, 2015, http://www.abc.net.au/news/2015-03-03/malcolm-turnbull-uses-secret-messa... (accessed August 2, 2017).
[3] Nicole Perlroth, "Security Experts Oppose Government Access to Encrypted Communication," New York Times, July 7, 2015, https://www.nytimes.com/2015/07/08/technology/code-specialists-oppose-us... (accessed August 2, 2017); Mike McConnell, Michael Chertoff and William Lynn, Why the fear over ubiquitous data encryption is overblown, July 28, 2015, https://www.washingtonpost.com/opinions/the-need-for-ubiquitous-data-enc... (accessed August 2, 2017); John Leyden, "Former GCHQ boss backs end-to-end encryption," The Register, July 10, 2017, https://www.theregister.co.uk/2017/07/10/former_gchq_wades_into_encrypti... (accessed August 2, 2017).
[4] Europol and ENISA joint statement, "On lawful criminal investigation that respects 21st Century data protection," May 20, 2016, https://www.enisa.europa.eu/publications/enisa-position-papers-and-opini... (accessed August 2, 2017).
[5] UN Human Rights Council, Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, David Kaye, A/HRC/29/32, May 22, 2015, http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/29/32 (accessed August 2, 2017).
[6] B. Schneier, K. Seidel, and S. Vijayakumar, A Worldwide Survey of Encryption Products, February 11, 2016, https://www.schneier.com/academic/archives/2016/02/a_worldwide_survey_o.... (accessed August 2, 2017).
[7] Orin Kerr and Bruce Schneier, Encryption Workarounds, March 20, 2017, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2938033 (accessed August 2, 2017).
Zscaler Finds Hackers Using SSL Encryption in Malware to Hide … – eWeek
Malware authors and operators are increasingly using Secure Sockets Layer (SSL) encryption to hide their communications and escape detection, with the use of SSL for malware communications doubling in the first six months of 2017, security-in-the-cloud firm Zscaler said in its latest threat report.
On average, the company has seen 600,000 encrypted malicious activities every day, including calling back to command-and-control servers, phishing attempts and malware delivery. About 60 percent of the malicious activities were related to banking Trojans and a quarter related to ransomware, the Zscaler analysis stated.
I think we are heading in the direction where SSL will become [a de-facto measure taken by attackers], because it provides an additional layer of security for them to cover the C&C communications, Deepen Desai, senior director of research for Zscaler, told eWEEK.
Even today, they will not do command-and-control over plain text; they will use custom encryption. SSL just adds another layer on top it.
The company found that as many as a quarter of all new malware executables analyzed in its cloud sandbox communicated over SSL and transport layer security (TLS) in 2017.
Malware authors have always found different ways to hide their programs communications, such as using the TOR network or going through covert channels using DNS queries. Yet, SSL is a Web standard and so is very common on corporate networks. In 2016, security firm Blue Coat found that malicious SSL activity jumped by a factor of 58.
Exploit kits, malware, adware and C&C communications have all been observed using SSL encryption to hide the content of the communications. More than 300 Web exploits per day use SSL as part of their infection chain, the company said.
Zscaler and Blue Coat are not the only companies to see the increasing obfuscation of communications by attackers. On Aug. 3, security firm Kaspersky Lab published an analysis of current trends in steganography, a communications technique that embeds messages or data in other trafficmost often, images.
The company stated that steganography has become popular with the developers of malware and spyware, but that most anti-malware tools have trouble detecting the payloads.
So far, the security industry hasnt found a way to reliably detect the data exfiltration conducted in this way and the goal of our investigations is to draw industry attention to the problem and enforce the development of reliable yet affordable technologies, allowing the identification of steganography in malware attacks, Alexey Shulmin, security researcher at Kaspersky Lab, said in a statement.
Zscaler warned companies that the increase in SSL encryption should prompt firms to focus on inspecting SSL traffic.
The company also noted other trends in its threat report, including the increase in network-connected devices in the enterprise. Such devices connected to the so-called Internet of Things are often vulnerable to attack. The most common IoT devices are focused on entertainment, comprising 30 percent of all devices detected, security (27 percent) and health (13 percent).
Link:
Zscaler Finds Hackers Using SSL Encryption in Malware to Hide ... - eWeek
UK flip-flop on encryption doesn’t help anyone – CNET
In the debate over encrypting our private communications and giving the government backdoor access to better thwart terrorism, it's hard to tell where the British government stands.
"Encryption plays a fundamental role in protecting us all online."
"We need to make sure that our intelligence services have the ability to get into situations like encrypted WhatsApp."
"To be very clear Government supports strong encryption and has no intention of banning end-to-end encryption."
"There is a problem in terms of the growth of end-to-end encryption."
These statements might sound contradictory, but they have one thing in common: they can all be attributed to the UK's Home Secretary Amber Rudd.
Rudd has said all of these things and more about encryption in various speeches, interviewsover the past few months and aself-penned articlesearlier this week. It's not just you. From reading these statements, even in context, it's all pretty confusing.
The comments are just the latest turn in the debate over encryption, which has become a bugbear of the British government in the wake of multiple terror attacks in the UK during 2017. While he protections guard our privacy, they also prevent the authorities from being able to read messages between terrorists. Prime Minister Theresa May has called multiple times on tech companies to "do more" to tackle the terror threat. Rudd, ahead of attending theGlobal Internet Forum to Counter Terrorism on Tuesdaywrote an editorial in the Telegraph saying that the UK isn't looking to ban encryption, but does want some kind of change.
The back and forth from Rudd is counterproductive because she's seemingly seeking a middle ground that doesn't exist. By parsing her statements, Rudd appears to suggest a version of encryption that is almost, but not absolutely, unbreakable. But end-to-end encryption means that not even the companies that create and enforce security measures can decrypt your messages, so the idea of an emergency access point seems far-fetched.
"Amber Rudd must be absolutely clear on what co-operation she expects from Internet companies," said Jim Killock, executive director of UK digital rights campaign Open Rights Group. "She is causing immense confusion because at the moment she sounds like she is asking for the impossible."
It's not like tech companies aren't willing to help. Facebook, Twitter and Google have shown willingnesswork with governments on tackling terrorism.
Amber Rudd speaking at the Global Internet Forum to Counter Terrorism
But they aren't bending on the issue of putting in backdoors for government access. As tech companies and security experts have repeatedly pointed out, if the companies themselves have a way of accessing these communications, so potentially do more malicious people.
Breakable encryption could also, as numerous experts, including Facebook Chief Operating Officer Sheryl Sandberg, point out, chase terrorists onto other platforms that aren't as willing to cooperate with governments.
"If people move off those encrypted services to go to encrypted services in countries that won't share the metadata, the government actually has less information, not more," Sandberg said in an interview broadcast by the BBC last week.
In fact, it's already happening. On Wednesday, three men were found guilty in the UK of plotting a terrorist attack and had been using the encrypted app Telegram to communicate with one another. Telegram was called out by Europol chief Rob Wainwright earlier this year for "causing major problems," by not being cooperative with law enforcement.
Another allegation Rudd has leveled at end-to-end encryption is that "real people" don't care about it. People don't use WhatsApp because it is secure, she said in her Telegraph editorial, but because it is convenient, cheap and user-friendly. This is more than a huge generalization, it's an assertion for which she provides absolutely no supporting evidence.
Indeed, her comments have attracted criticism from privacy organization Big Brother Watch, which said they were "at best nave, at worst dangerous."
"Suggesting that people don't really want security from their online services is frankly insulting, what of those in society who are in dangerous or vulnerable situations, let alone those of us who simply want to protect our communications from breach, hack or cybercrime," said Renate Samson, the organization's chief executive in a statement.
"Once again the Government are attempting to undermine the security of all in response to the actions of a few," he said. "We are all digital citizens, we all deserve security in the digital space."
Rudd maintains "there are options" for using end-to-end encryption and also making sure terrorists "have no place to hide" online. But what these options are seem to be a mystery to everyone but her. For the sake of the British public, many of whom do care that their communications are kept private and secure, she needs to explain how this will work.
The Smartest Stuff: Innovators are thinking up new ways to make you, and the things around you, smarter. Here's what they're up to.
Intolerance on the Internet: Online abuse is as old as the internet and it's only getting worse. It exacts a very real toll.
Read the rest here:
UK flip-flop on encryption doesn't help anyone - CNET