Category Archives: Encryption

After Criticism, US Defense Department Will Implement New … – Gizmodo

One year from now, the US Department of Defense (DoD) expects to implement a new infrastructure to increase security around the way it communicates electronically, Gizmodo has learned.

The Defense Information Systems Agency (DISA), which manages the Pentagons email systems, says it intends to adopt, by default, STARTTLS, an encryption protocol designed to prevent the interception of email messages in transit. DISA is actively working an acquisition to upgrade the email gateways that will allow us to take advantage of evolving capabilities for email protection, wrote Maj. Gen. Sarah Zabel, vice director of DISA, in a letter this week addressed to Senator Ron Wyden, Democrat of Oregon.

In late March, Wyden sent a letter to DISA inquiring as to why the Pentagon had not already enabled STARTTLS, as it is widely used by default throughout the federal government and in the private sector to protect email communications. As you may know, the technology industry created STARTTLS fifteen years ago to allow email servers to communicate securely and protect email messages from surveillance as they are transmitted over the internet, Wyden wrote.

The senator added that while the Pentagon uses various other systems to protect classified and unclassified messagessuch as Public Key Infrastructure (PKI), which allows for the encrypted transfer of data at DoD, as well as to and from its defense industry partnersWyden was concerned that DISA is not taking advantage of a basic, widely used, easily-enabled cybersecurity technology. He continued: Indeed, until DISA enables STARTTLS, unclassified email messages sent between the military and other organizations will be needlessly exposed to surveillance and potentially compromised by third parties.

It appears, however, that surveillance was at least one reason why DISA had not enabled STARTTLS already. In a letter acquired by Gizmodo dated April 27, Zabel states that DISA made a deliberate decision not to use STARTTLS because it feared doing so would interfere with its ability to inspect each email it was sent for malicious software, phishing attempts, and other exploits. DISA currently rejects over 85% of all DoD email traffic coming from the Internet on a daily basis due to malicious behavior, Zabel wrote. The remaining 15% of email traffic is also inspected for Zero Day threats that exploit an undisclosed cybersecurity vulnerability.

Added Zabel: We also inspect for advanced, persistent threats using detection methods developed using national level intelligence. Many of these detection methods would be rendered ineffective if STARTTLS were enabled.

However, in a follow-up letter to Wyden this week, the major general clarified that DoD was largely hindered in adopting STARTTLS by its own antiquated technology.

Email remains one of our largest threat vectors, Zabel wrote, continuing: DISA is currently implementing architectural changes, which will allow the use of STARTTLS on a default basis, while still enabling us to apply appropriate safeguards; however, the capacity and throughput of the aging equipment creates limitations in supporting STARTTLS as the default for all mail sessions.

A new email gateway infrastructure will allow the use of STARTTLS by default, the letter said, estimating that DoD would be able to acquire and transition to this new system by July 2018.

The Presidential Advisory Commission on Election Integrity, which is charged with investigating President Trumps unsubstantiated claims of widespread voter fraud during the 2016 election, recently asked state officials to send their voter rolls to the commission using an email address that does not use STARTTLS.

For far too long, many of the unclassified email messages sent and received by members of the military have been left vulnerable to surveillance by foreign governments and hackers, Senator Wyden told Gizmodo. The Pentagon is doing the right thing by encrypting emails as they are sent to and from the militarys servers.

Wyden called DISAs decision a good step, but said there was no reason it should take an entire year to adopt industry-standard cybersecurity technology. Protecting the communications of American servicemen and women should be a priority, so I hope the agency accelerates its timeline, he said.

Kate Conger contributed to this report.

Read the original here:
After Criticism, US Defense Department Will Implement New ... - Gizmodo

Encryption thwarting investigators as federal government taps increase – Naked Security

The annual US Wiretap Reportout, covering 2016, and as usual, its packed with intriguing tidbits.

A few key takeaways: the federal government is wiretapping more, states are wiretapping less, drug crimes remain the #1 target, encryption is becoming a somewhat bigger obstacle to investigators, and courts almost always give law enforcement what it wants.

When Congress set detailed rules for wiretapping in 1968, it also instructed the US court system to tell Congress the number and nature of federal and state applications for orders authorizing or approving the interception of wire, oral, or electronic communications. This report excludes intercepts governed by the Foreign Intelligence Surveillance Act of 1978: you wont find data here about espionage or terrorism warrants. These are federal and state warrants related to violent, white-collar and organized crime and above all, drug crime.

According to The Register:

Investigations into just drug dealing made up 61% of all wiretap requests, and that rose to 82% when multiple charges, including drugs, were counted. By comparison, the next most popular cause for wiretaps was conspiracy, which accounted for just 8%, followed by homicide at 5%.

Even so, drug-related wiretaps actually plummeted last year from 3,367 to 1,949. That correlated with an overall 41% drop in warrants requested by state law enforcement, from 2,745 to 1,617, suggesting that state authorities may be de-emphasizing the use of wiretaps in the drug war.

As the San Bernardino Sun reports, more than a third of this national shift can be traced to one county in California: Riverside, where wiretaps dropped from 640 to 106. This followed an expose by USA TODAY and The Desert Sun which raised

questions about the vast wiretapping coming out of Riverside County, which, in 2014, entailed the interception of 2m calls, texts and other forms of communication among 44,000 people [most] approved by a single judge Judge Helios Hernandez.

Since then, a new local district attorney has taken greater responsibility for personally reviewing wiretap requests, demanding that they have a clearer connection to the county. Meanwhile, the US Drug Enforcement Agency ordered its agents to check in with federal prosecutors before pursuing wiretaps.

Riversides case points to vast disparities in the numbers of wiretaps authorized in different US jurisdictions. According to an official report summary:

Six states (California, New York, Nevada, New Jersey, Colorado, and Florida) accounted for 82% of all state wiretap applications. California alone accounted for 35%.

A more detailed analysis by the Electronic Frontier Federation found that California investigators captured 7.8m communications from 181,000 people at a cost of nearly $30m. Of those, 19% were considered incriminating.

Only two of 3,170 federal and state wiretap requests were turned down by courts last year but thats up from a whopping zero in 2015. (In the past 11 years, only nine warrant requests have been turned down.)

Of course, a courts rejection isnt the only way to thwart law enforcement. For years, authorities have loudly complained that encryption would prevent access to crucial information for prosecuting dangerous offenders. But the actual data seemed to raise serious questions about this argument.In 2015, for example, the number of wiretaps in which encryption was encountered actually dropped from 22 to just seven.

This year, however, that number spiked to 57, and investigators couldnt overcome encryption in 48 of these cases. While, even in 2016, encryption interfered with fewer than 2% of wiretaps its wider availability and awareness might finally be having an impact.

With or without encryption, wiretapping got a lot more expensive in 2016, averaging $74,949 per tap, up 78% from 2015. In the past, wiretappings high cost has been viewed as a key reason for its disproportionate use in drug cases. As ACLU lead technologist Christopher Soghoian told Wired:

When agencies bust a drug dealer and get $5m and a kilo of coke, they keep the money. In many ways, the drug cases subsidize the surveillance technology.

When you combine those incentives with the Trump-era Justice Department re-emphasis on fierce enforcement of even lower-level drug offenses, next years numbers could prove even more interesting than usual.

Read the original:
Encryption thwarting investigators as federal government taps increase - Naked Security

On Encryption, Archiving, and Accountability – Freedom to Tinker

As Elites Switch to Texting, Watchdogs Fear Loss of Accountability, says a headline in todays New York Times. The story describes a rising concern among rule enforcers and compliance officers:

Secure messaging apps like WhatsApp, Signal and Confide are making inroads among lawmakers, corporate executives and other prominent communicators. Spooked by surveillance and wary of being exposed by hackers, they are switching from phone calls and emails to apps that allow them to send encrypted and self-destructing texts. These apps have obvious benefits, but their use is causing problems in heavily regulated industries, where careful record-keeping is standard procedure.

Among those industries is the government, where laws often require that officials work-related communications be retained, archived, and available to the public under the Freedom of Information Act. The move to secure messaging apps frustrates these goals.

The switch to more secure messaging is happening, and for good reason, because old-school messages are increasingly vulnerable to compromisethe DNC and the Clinton campaign are among the many organizations that have paid a price for underestimating these risks.

The tradeoffs here are real. But this is not just a case of choosing between insecure-and-compliant or secure-and-noncompliant. The new secure apps have three properties that differ from old-school email: they encrypt messages end-to-end from the sender to the receiver; they sometimes delete messages quickly after they are transmitted and read; and they are set up and controlled by the end user rather than the employer.

If the concern is lack of archiving, then the last propertyuser control of the account, rather than employer controlis the main problem. And of course that has been a persistent problem even with email. Public officials using their personal email accounts for public business is typically not allowed (and when it happens by accident, messages are supposed to be forwarded to official accounts so they will be archived), but unreported use of personal accounts has been all too common.

Much of the reporting on this issue (but not the Times article) makes the mistake of conflating the personal-account problem with the fact that these apps use encryption. There is nothing about end-to-end encryption of data in transit that is inconsistent with archiving. The app could record messages and then upload them to an archivewith this upload also protected by end-to-end encryption as a best practice.

The second property of these appsdeleting messages shortly after usehas more complicated security implications. Again, the message becoming unavailable to the user shortly after use need not conflict with archiving. The message could be uploaded securely to an archive before deleting it from the endpoint device.

You might ask why the user should lose access to a message when that message is still stored in an archive. But this makes some sense as a security precaution. Most compromises of communications happen through the users access, for example because an attacker can get the users login credentials by phishing. Taking away the users access, while retaining access in a more carefully guarded archive, is a reasonable security precaution for sensitive messages.

But of course the archive still poses a security risk. Although an archive ought to be more carefully protected than a user account would be, the archive is also a big, high-value target for attackers. The decision to create an archive should not be taken lightly, but it may be justified if the need for accountability is strong enough and the communications are not overly sensitive.

The upshot of all of this is that the most modern, secure approaches to secure communication are not entirely incompatible with the kind of accountability needed for government and some other users. Accountable versions of these types of services could be created. These would be less secure than the current versions, but more secure than old-school communications. The barriers to creating these are institutional, not technical.

View original post here:
On Encryption, Archiving, and Accountability - Freedom to Tinker

Ground-Based Signals Measured From Space Could Enable Quantum Encryption Network – Photonics.com

Photonics.com Jul 2017 ERLANGEN, Germany, July 5, 2017 Quantum-limited coherent measurements of optical signals were sent from a satellite in Earths orbit to an optical ground station over a distance of 38,600 kilometers (almost 24,000 miles). Excess noise was bound. The precise Earth-based measurement of optical signals from a satellite demonstrates the potential for a satellite-based quantum encryption network using equipment that is already in space.

Although methods for quantum encryption have been in development for more than a decade, the technology has been unable to work over long distances because residual light losses in the optical fibers used for telecommunications networks on the ground degrade the quantum signals. According to researchers, encryption techniques such as quantum key distribution will be of increasing importance as current encryption codes based on mathematical algorithms become easier to crack.

A team from the Max Planck Institute for the Science of Light worked with satellite telecommunications company Tesat-Spacecom GmbH and the German Space Administration to conduct the experiments.

From our measurements, we could deduce that the light traveling down to Earth is very well suited to be operated as a quantum key distribution network, Max Planck researcher Christoph Marquardt said. We were surprised because the system was not built for this.

A satellite-based quantum encryption network would provide an extremely secure way to encrypt data sent over long distances.

We were quite surprised by how well the quantum states survived traveling through the atmospheric turbulence to a ground station, said Marquardt. The paper demonstrates that technology on satellites, already space-proof against severe environmental tests, can be used to achieve quantum-limited measurements, thus making a satellite quantum communication network possible. This greatly cuts down on development time, meaning it could be possible to have such a system as soon as five years from now.

Developing such a system in just five years is an extremely fast timeline since most satellites require around ten years of development.

The researchers are now working with Tesat-Spacecom and others in the space industry to design an upgraded system based on the hardware already used in space. This will require upgrading the laser communication design, incorporating a quantum-based random number generator to create the random keys, and integrating post processing of the keys.

The results of initial experiments indicate that quantum communication using satellites in space is feasible and could open the possibility of a global quantum key distribution network for secure communication.

There is serious interest from the space industry and other organizations to implement our scientific findings, said Marquardt. We, as fundamental scientists, are now working with engineers to create the best system and ensure no detail is overlooked.

The research was published in Optica, a publication of OSA, The Optical Society of America (doi:10.1364/OPTICA.4.000611).

See the original post:
Ground-Based Signals Measured From Space Could Enable Quantum Encryption Network - Photonics.com

Virtru Brings End-To-End Encryption To G Suite – Android Headlines

Google has partnered up with Virtru Corporation to bring customizable end-to-end email and messaging encryption, on both server side and client side, to all G Suite users. End users and administrators can choose to encrypt any incoming or outgoing message in order to help protect sensitive data. Administrators can set rules to encrypt any message that meets certain criteria, and can take advantage of advanced access controls that can grant or revoke access to a given message at any time, even after its been delivered. The goal of Virtru is not just to add an extra level of security, but to help especially sensitive data circulated in regulated industries like the medical and law fields to stay as secure as possible, making it easier than ever to keep communications compliant with applicable law.

Administrators on Virtru-enabled servers can not only encrypt or decrypt things that come and go at will, but can control the entire process from origination to endpoint, and even after. Starting at the source, administrators can set custom rules to encrypt messages based on a wide variety of criteria, such as sender and recipient, keywords in the contents, and presence or type of attachments, among other things. Virtru allows total end-to-end encryption of all messages across platforms, and for any messages that dont fall under administrator-set rules, users can encrypt them with nothing more than the push of a button in their mobile email client or browser. Decryption keys can be stored onsite, or in Virtrus cloud, or even both, ensuring maximum security for the keys and making recovery a breeze. As icing on the cake, admins will have a personal dashboard, where they can keep track of all communications within their organization, including those with participants on the outside, and can get customizable notifications of anything happening on the network.

Virtru will integrate tightly with G Suite when it rolls out. For now, only communications such as emails will be encrypted, but support for other file and transmission types could come later. Google has not revealed how much Virtru will cost when it hits G Suite, or how users can go about getting it. Instead, Virtru will be hosting a webinar on July 11, at 10 AM Pacific time. The webinar will go over the basics of getting, implementing, and maintaining a Virtru installation over a given instance of G Suite.

Continue reading here:
Virtru Brings End-To-End Encryption To G Suite - Android Headlines

Weakening encryption is an attack on our freedom – Red Flag

In the wake of the recent terrorist attacks in London, there is a renewed attempt by global governments to increase surveillance of the internet.

Taking aim at encryption, Malcolm Turnbull stated that, despite it being a vital piece of security for every user of the Internet encrypted messaging applications are also used by criminals and terrorists at the moment much of this traffic is difficult for our security agencies to decrypt, and indeed for our Five Eyes partners as well.

In June, attorney-general George Darth Brandis, along with his Five Eyes counterparts from the UK, US, Canada and NZ, met in Ottawa to discuss ways to weaken encryption and pressure the tech industry to build back doors through which they can spy on global communications.

In response, a joint statement by 83 organisations and individuals from these five countries opposed these plans. The executive officer of Electronic Frontiers Australia, Jon Lawrence, said, Calls to undermine encryption in the name of national security are fundamentally misguided and dangerous. Jim Killock, executive director at the UKs Open Rights Group, said, Security experts and cryptographers are as united in their views on encryption as scientists are on climate change.

At the time of writing, we dont know what decisions were made at the Five Eyes ministerial meeting, but new attempts to circumvent encryption reflect the ways that state surveillance has changed since revelations from US whistleblower Edward Snowden.

In 2013, Snowden shocked the world when he revealed that the US and its allies had created the largest and most complex system of state surveillance that has ever existed. One of the US National Security Agencys most invasive programs was XKeyscore, a searchable database with millions of peoples emails, web browsing histories and more. This also allowed for real-time monitoring of almost any individual around the world while they used the internet.

Just four years later, the state of computer security has changed immensely, making this surveillance more difficult. According to a report published in February by the Electronic Frontiers Federation, more than half of all internet traffic is now encrypted. The expansion of Virtual Private Network services and use of the Onion Router (TOR) has made it easier for everyone to remain anonymous online. However, the development that is of most concern to the likes of the NSA is the widespread use of encrypted mobile devices and messaging applications such as Signal and WhatsApp.

These applications use a method called end-to-end encryption in which messages are encrypted, and the tools to decrypt those messages exist only on the device of the sender and receiver. Therefore, a company like WhatsApp cannot read the messages sent through its servers. As a WhatsApp spokesperson said in 2016 as part of an ongoing court case brought by the Brazilian government, We cannot share information we dont have access to.

Years before James Comey began presenting himself as the supposed good guy of the US establishment, the then FBI director railed against the use of domestic encryption tools. In 2015 he stated, If the challenges of real-time interception threaten to leave us in the dark, encryption threatens to lead all of us to a very dark place.

He pressured companies such as Apple to build back doors to bypass encryption. While the intelligence agencies recognise that they cannot currently break modern encryption algorithms, they have focused their resources on trying to get around them by hacking directly into mobile devices.

This strategy was demonstrated in March when whistleblower website WikiLeaks released Vault 7, the largest ever publication of confidential documents leaked from the CIA. Additional leaks this year by hacking group Shadow Brokers have further revealed the extent of the intelligence agencies hacking capabilities. These documents show that the US has been developing, purchasing and stockpiling security vulnerabilities in Apple and Android mobile devices. Exploiting these vulnerabilities has allowed them to read WhatsApp or Signal messages as they are being typed or read.

One of the most damning leaks in Vault 7 revealed that the CIA had discovered how to turn Samsung Smart TVs into covert listening devices, even when they are turned off.

The recent WannaCry and Petya ransomware attacks, which caused immense damage across the world, both used security holes codenamed EternalBlue that had been stockpiled by the CIA and deliberately left open. While the CIA did not intend these vulnerabilities to be used in this way, it is the inevitable result of keeping software insecure and creating back doors.

With leaks from the CIA and the NSA exposed, these security flaws are now being fixed, making it more difficult for the agencies to continue their spying activities. This explains the increased push from Five Eyes countries to force tech companies to install back doors so they can bypass encryption.

However, the argument that states should have the right to bypass encryption to stop terrorism simply doesnt hold up. It would be ludicrous to suggest that turning Smart TVs into listening devices is about stopping ISIS. It has always been about developing tools for mass surveillance, and now increasingly for espionage and cyberwar. This has been seen before. For example, the worm Stuxnet was written by the US and Israel and used to target Iranian nuclear facilities.

It is not a question of whether governments will one day use these hacking techniques for domestic surveillance they already do. On 30 June, it was revealed that Centrelink has been paying Israeli hacking company Cellebrite to break into mobile phones. The methods used are the same ones Cellebrite developed in 2015, when it helped the FBI break into an iPhone as part of the San Bernardino terrorism case.

It is now known that government departments such as the Australian Tax Office and the Department of Employment have paid around $500,000 to Cellebrite for equipment and training to hack into phones.

In the debate about metadata storage, George Brandis was adamant that the government wasnt after the content of Australians communications, just who we are talking to. These new revelations and the entire debate about encryption show that the content is exactly what they are after. No matter the justification, we should resist any attempt to weaken encryption and our right to privacy.

See the article here:
Weakening encryption is an attack on our freedom - Red Flag

Why breaking WhatsApp encryption is such a bad idea – Mashable


Mashable
Why breaking WhatsApp encryption is such a bad idea
Mashable
However, in this video British YouTuber Tom Scott passionately explains why forcing services like WhatsApp to break their end-to-end encryption is actually a very dangerous idea. "The devil is in the detail," Scott says. "If we could replicate the way ...
How WhatsApp encryption works and why we need ithtxt.africa

all 3 news articles »

See the article here:
Why breaking WhatsApp encryption is such a bad idea - Mashable

Encryption: Turnbull continues his Man of La Mancha ways – iTWire

An exclusive report this morning says that Australian Prime Minister Malcolm Turnbull plans to ask US President Donald Trump to demand that US technology companies break into encrypted messages sent by suspected terrorists.

It is an indication that the publishing company, Fairfax Media, and the writer, Peter Hartcher, are prepared to print any kind of bunkum as long as it comes from a sufficiently "official" source.

Whether the statement makes sense or not is never the issue, it would appear. The reader is also given no indication that Turnbull is speaking nonsense.

Without any proof, Turnbull also told Hartcher: "The point is, what are the responsibilities that a WhatsApp or a Telegram or a Signal, what are the responsibilities they owe to public safety You have got a very real global threat where terrorist organisations, Islamist terrorist organisations, are using these digital platforms to do us harm."

To put it rather bluntly, short of rolling back encryption altogether, there is no way of ensuring that all people who are not behind bars do not have access to encryption.

Tom Sulston (right), a software delivery consultant who works for ThoughtWorks, agrees. "Given that the best encryption libraries are open source, that genie is out of the bottle," he said during an informal exchange with iTWire.

"While governments might choose to compel companies to put backdoors in their individual implementations, the library code remains secure," said Sulston, who recently addressed the Canberra press gallery on the tools journalists could use to help protect their sources from unwanted intrusion.

"So attempts to roll back encryption not only wouldnt work, theyd punish ordinary citizens while criminals used other, un-backdoored tools, or simply move their communications to other jurisdictions."

Somehow, the Australian government, which can afford to pay any number of consultants steep fees, cannot find a man with the simple common sense that someone like Sulston has. Or is that because the kind of logic that Sulston dishes out would mean that Turnbull would be unable to bloviate as he has in the exclusive interview mentioned at the start of this piece?

Sulston was asked what was the best option for governments in the existing scenario. Pat came the answer: "Governments need to realise the limitations of technology encryption tools are either broken or not. They cant be compromised just for intelligence agencies and no-one else. There is a huge gap where our society has gone digital and our government has failed to understand what this means."

Unlike our good Prime Minister, Sulston also knows his limitations as a technologist. "Im not a legal or security expert, so I dont have strong (or relevant!) opinions on how governments should tackle terrorism," he confessed.

"But I do believe that their efforts to do so need to remain within the boundaries set by existing laws, including the Universal Declaration of Human Rights."

Turnbull would do well to contemplate the fact that the whole debate about encryption was brought to the fore by the US National Security Agency. Its blanket surveillance of Americans was exposed in 2013 by one Edward Snowden and this led US companies to do everything possible to convince their customers that their data was safe.

Microsoft went so far as to set up a data centre in Germany where it would not be subject to the remit of US laws.

Encryption is built into products like WhatsApp for a reason the owners, in this case Facebook, want to attract more and more people with the selling point being that whatever they say is secure.

Try asking companies which are making billions hand over fist by offering such apps free, to cut back on encryption.

Empty promises can be made some of the time, but even Turnbull, who probably holds the record for the use of the words "innovative" and "agile" in recent times, should realise that you cannot blow hot air on encryption all the time and expect people not to become cynical as to the motives behind such talk.

Visit link:
Encryption: Turnbull continues his Man of La Mancha ways - iTWire

Encrypting police transmissions is a blow to transparency and openness in government – LancasterOnline

By Thanksgiving, the public will no longer be able to listen in on police dispatches in Lancaster County, as LNP reported last week. The Lancaster County commissioners on Tuesday directed Lancaster County-Wide Communications to encrypt police transmissions, blocking the public and media from hearing whats going on in the county. West Hempfield Township police Chief Mark Pugliese, who heads the county police chiefs association, says the change will protect police from ambushes and secure personal information about crime victims and witnesses.

Police officers have a dangerous, difficult job more difficult and dangerous than most of us can probably imagine.

And we wouldnt support any measure that would make life more perilous for a police officer.

But some sort of balance between protecting officers and ensuring the publics right to information must be struck.

We understand the other side of the argument.

We live in a changed and changing world, Commissioner Dennis Stuckey told LNP. Gone are the days when you can talk to a 15- or 20-year veteran who says hes only had to pull his gun out twice.

Pugliese also said there have been several incidents in the county where the public or the media interfered with investigations, in some cases by getting to crime scenes more quickly than police.

As Commissioner Josh Parsons, who supports encryption, said, The fake 911 ambush scenario could happen no matter what we do today. However, he said, encryption does provide some percentage of safety.

Pugliese was off-base when he scolded the media for being in such a rush to get the news out. Thats the medias job, especially when it comes to a public safety issue.

The fact of the matter is and this is not a criticism law enforcement relies on the media when its convenient.

When police are hunting a fugitive, they ask the media to post a photo of the suspect. When prosecutors announce a major conviction, they call a news conference.

When a house exploded outside Millersville on Sunday, people who heard and felt the blast were desperate for information about what had happened. Emergency responders were busy doing what they do best, and supervisors at Lancaster County-Wide Communications had no information. The only way LNP could inform the public about the situation in the moments after the explosion was by monitoring the police scanner.

Come November, when the media wants to hear what police are doing in the community silence.

So, the message seems to be that the media and public are to be kept out of the loop until further notice. We will be informed strictly on a need-to-know basis.

Theres no evidence that radio transmissions have made policing more dangerous or more difficult.

Melissa Melewsky, media law counsel for the Pennsylvania NewsMedia Association, told LNP that media organizations have used emergency radio transmissions for decades without incident to keep the public informed about emergency situations in the community.

As Knapp reported, Commissioner Craig Lehman said hes also concerned about police safety but said officers may become further isolated from their communities if they decrease transparency.

Lehman is correct. Encryption will limit transparency and serve as an obstacle to the media. And, as he pointed out, less transparency breeds mistrust and suspicion. Thats the last thing anyone including police needs.

Lehman suggested a compromise: Encrypt public transmissions, but give news outlets access.

The commissioners and the county police chiefs should give this serious consideration, though we dont believe the public should be shut out either.

From the medias standpoint, radio silence will only make a reporters job more difficult and very well could, in turn, limit the publics access to information.

In an emergency situation, and you can imagine any number of them natural disaster, active shooter, fire the media needs to work with law enforcement to keep the public informed. In such situations, media outlets monitor radio transmissions for information and logistics. Encrypting such transmissions would not be in the best interest of the public.

And Lehman said blocking transmissions might actually make police less safe if public trust is lost.

The decision to encrypt was administrative and did not require a vote.

We urge the commissioners to reconsider this order and, at the very least, seek a compromise.

This is not about getting to the crime scene first.

Were big fans of transparency here because when it begins to erode, were all in trouble.

View post:
Encrypting police transmissions is a blow to transparency and openness in government - LancasterOnline

Shielding data from the "five eyes": we need to stand up for … – Open Democracy

Street art by Banksy near Hyde Park, London. Credit: David Maddison/Flickr. Some rights reserved.The Five Eyes is a surveillance partnership of intelligence agencies consisting of Australia, Canada, New Zealand, the United Kingdom, and the United States. According to a joint communique issued after the meeting, officials discussed encryption and access to data. The communique states that encryption can severely undermine public safety efforts by impeding lawful access to the content of communications during investigations into serious crimes, including terrorism.

In the letter organized by Access Now, CIPPIC, and researchers from Citizen Lab, 83 groups and security experts wrote, we call on you to respect the right to use and develop strong encryption. Signatories also urged the members of the ministerial meeting to commit to allowing public participation in any future discussions.

Read the full letter here.

Security experts and cryptographers are as united in their views on encryption as scientists are on climate change.

Massive surveillance operations conducted by the Five Eyes partnership inherently put the human rights of people around the world at risk. The joint communique commits to human rights and the rule of law, but provides no detail as to how these powerful, secretive spy agencies plan to live up to those commitments. We call for public participation and meaningful accountability now; otherwise, those commitments are empty. Amie Stepanovich, U.S. Policy Manager at Access Now

Our political leaders are putting people around the world at greater risk of crime when they call for greater powers to weaken our digital security. Security experts and cryptographers are as united in their views on encryption as scientists are on climate change. Politicians need to listen to them before they make decisions that could put us all at risk. Jim Killock, ORG

Attempting to undermine the free use and development of strong encryption technology is not only technologically misguided, it is politically irresponsible. Both law enforcement and intelligence agencies have access to more dataand more powerful analytical toolsthan ever before in human history. Measures that undermine the efficacy or public availability of encryption will never be proportionate when weighed against their profound threat to global human rights: encryption is essential to the preservation of freedom of opinion, expression, dissent, and democratic engagement. Without it, meaningful privacy, trust, and safety in the digital sphere would not be possible. Lex Gill, Research Fellow, Citizen Lab, Munk School of Global Affairs

Encryption protects billions of ordinary people worldwide from criminals and authoritarian regimes. Agencies charged with protecting national security shouldnt be trying to undermine a cornerstone of security in the digital age. Cynthia Wong, Senior Internet Researcher, Human Rights Watch

Encryption is used by governments, businesses, and citizens alike to secure communications, safeguard personal information, and conduct business online. Deliberately weakening encryption threatens the integrity of governance, the safety of online commerce, and the interpersonal relationships that compose our daily lives. We must not sacrifice our core values to the threat of terrorism: the solution to such threats must entail better protecting our basic rights and the technologies that advance them. Christopher Parsons, Research Associate and Managing Director of the Telecom Transparency Project at the Citizen Lab, Munk School of Global Affairs

Encryption is a necessary and critical tool enabling individual privacy, a free media, online commerce and the operations of organisations of all types.

Calls to undermine encryption in the name of national security are fundamentally misguided and dangerous. Encryption is a necessary and critical tool enabling individual privacy, a free media, online commerce and the operations of organisations of all types, including of course government agencies. Undermining encryption therefore represents a serious threat to national security in its own right, as well as threatening basic human rights and the enormous economic and social benefits that the digital revolution has brought for people across the globe. Jon Lawrence, EFA

Assurances of strong encryption not only benefit civil liberties and privacy, but the economy as well. A vibrant and dynamic internet economy is only possible if consumers and users trust the environment in which theyre conducting business. While law enforcement and intelligence services have legitimate concerns over their ability to access data, those concerns need to be balanced with the benefits encryption provides to average users transacting in cyberspace. A strong Internet economy, buttressed by the trust that encryption produces, is vital to national interests around the globe. National policies should support and defend, not weaken and abridge, access to encryption. Ryan Hagemann, Niskanen Center

The strength of the tools and techniques that our government and members of the public have and use to secure our nation and protect our privacy is of significant public interest. Transparency and accountability around a nations policy regarding the use of encryption is a bedrock importance in a democracy, particularly given the potential of backdoors to put billions of online users at greater risk for intrusion, compromise of personal data, and breaches of massive consumer or electoral databases. The democracies in the Five Eyes should be open and accountable to their publics about not only the existence of these discussions but their content, removing any gap between what is being proposed and the consent of those governed by those policies. Alex Howard, Sunlight Foundation

Encryption is a vital tool for journalists, activists, and everyone whose lives and work depend on using the internet securely. It allows reporters to protect their confidential sources from reprisal, and to fearlessly pursue stories that powerful actors dont want told. It offers protection from mortal danger for dissidents trying the communicate under repressive regimes. Undermining the integrity of encryption puts lives at risk, and runs directly counter to the mandate of the Five Eyes Signals Intelligence agencies to keep their citizens safe. Tom Henheffer, Executive Director, Canadian Journalists for Free Expression

The answer to concerns on going dark is to help bring our law enforcement and counterterrorism officials into the future, not send encryption to the past. We hope to hear back from the Five Eyes that they were looking for how to adapt to digital security measures, not break them to the detriment of everyday Americans and our national security. As Five Eyes leaders work on a strategy to protect against cyberattacks, it is important to have a transparent process and cooperation between governments and civil society without stifling innovation or weakening other parts of security. Austin Carson, Executive Director, TechFreedom

Strong encryption is essential for modern society. Broken technologies undermine commerce, security, and human rights. Jeramie Scott, EPIC

Any attempt by the U.K. government to attack encrypted messengers would be nothing less than an attack on the right to a private conversation.

Any attempt by the U.K. government to attack encrypted messengers would be nothing less than an attack on the right to a private conversation. Far from making the internet safer, by undermining the technology that protects everything from our bank accounts to our private conversations, governments around the world are putting us all at risk. Transparency is vital around any coordinated plans that could jeopardize both our security and our rights. Silkie Carlo, Policy Officer, Liberty

We increasingly rely on a secure internet for work, personal relationships, commerce, and politics. While we support justifiable lawful intercept with appropriate oversight, we dont think we should be seriously weakening the security of the internet to achieve it. Attempts to weaken encryption will do more damage to our society and our freedom than the possible threats its meant to be protecting us from. Thomas Beagle, Chairperson, NZ Council for Civil Liberties

All sensitive personal data must be encrypted as a matter of human rights to privacy, especially health data, i.e., all information about our minds and bodies, wherever it exists. Today health data is the most valuable personal data of all, the most attractive to hackers, and the most sold and traded by the massive, hidden global health data broker industry. Dr. Deborah Peel, Patient Privacy Rights

We lock our devices for good reason. Introducing backdoors weakens security and violates our right to privacy. The very existence of backdoors means unwelcome guests will come knocking. Linda Sherry, Director of National Priorities, Consumer Action

Originally posted here:
Shielding data from the "five eyes": we need to stand up for ... - Open Democracy