Connect with us

Hi, what are you looking for?



Data Encryption in Sharp Focus After Deadly Attacks

Data encryption in sharp focus after deadly attacks in Paris

With renewed focus on how encrypted messages can be used to plot terrorist attacks, President Barack Obama’s administration is stepping up pressure on the tech sector to help in the battle.

Data encryption in sharp focus after deadly attacks in Paris

With renewed focus on how encrypted messages can be used to plot terrorist attacks, President Barack Obama’s administration is stepping up pressure on the tech sector to help in the battle.

Although issues around encryption have been ongoing for decades, the prickly topic has sprung to the fore in recent weeks following killing sprees in Paris and California.

Over the past two years, more sophisticated encryption — notably for smartphones — has become widely available following revelations by former intelligence contractor Edward Snowden about vast US surveillance programs.

But US administration officials as well as local law enforcement are making the case for better access to encrypted data, saying new smartphone and encryption technologies have made it more difficult to thwart “malicious actors.”

“We want to strike the right balanceWe want to make sure encryption is not used in a way that does allow for dark space for terrorist groups,” a White House statement said.

Privacy remains a major counter-argument.

Underlining those concerns, an online petition calling on the administration to avoid weakening encryption got more than 100,000 signatures, requiring a White House reply.

Advertisement. Scroll to continue reading.

White House chief technology officer Ed Felton and cybersecurity chief Michael Daniel said in response that “American technologists have a unique perspective… and we need them to bring their expertise, innovation and creativity to bear against the threat of terrorism.”

Some analysts say the public is though ready to accept improved access for legitimate investigative purposes.

‘Back doors’

“This is part of a larger debate since the dawn of the Internet about how much anonymity people should have,” said James Lewis, a senior fellow at the Center for Strategic and International Studies, who as a former administration official worked on encryption issues.

Lewis said the debate has been skewed by the use of the term “back door” for law enforcement or intelligence when in fact most tech firms have the ability to decrypt data under certain circumstances.

“Companies like Google mine this data for advertising purposes,” Lewis said.

Darren Hayes, a professor of computer science forensics at Pace University in New York, said one helpful move would be for Apple and Google to roll back their encryption to the level of a year ago to enable access to smartphones with a warrant or court order.

“It worked very well, but Apple somewhere along the line decided it didn’t make business sense,” he said, adding that tech firms are conscious of their public image and don’t want to be seen as tools of law enforcement or the National Security Agency.

At the same time, he said, in New York “there are more than 100 investigations stopped in their tracks because there are phones that can’t be analyzed. These are murderers, rapists, pedophiles who are not being prosecuted.”

Hayes said that in the current environment, tech firms are not likely to voluntarily make changes to help law enforcement.

“The only way they would be persuaded is through legislation,” he said.

FBI Director James Comey told lawmakers the administration “has decided not to seek a legislative remedy at this time,” but repeated his warning about “going dark” — losing the ability to track communications over new encrypted messaging systems.

“We believe it must be addressed since the resulting risks are grave in both traditional criminal matters as well as in national security matters,” he said.

He added that the government “is actively engaged with private companies to ensure they understand the public safety and national security risks that result from malicious actors’ use of their encrypted products and services.”

Right to privacy

But privacy activists and encryption specialists in the private sector remain firm in resisting efforts to provide special access to investigators.

“Weakening encryption makes us all less secure,” says Rainey Reitman of the Electronic Frontier Foundation in a blog post.

“We cannot create a back door, a front door, or any other kind of door for the United States government that cannot be exploited by malicious hackers and other foreign governments.”

Activists say encryption offers numerous benefits, such as securing personal or business data and financial transactions, and can help deter smartphone thefts.

Robyn Greene, policy counsel for the Open Technology Institute at New America Foundation, said that “prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption.”

Green added that smartphones should have the same privacy protection as other means of communication.

“Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation,” she said on the Just Security blog.

“The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.”

RelatedAttacks Revive Debate on Encryption, Surveillance

RelatedTech Firms ‘Will Win’ Encryption Battle: Google Chief

RelatedIS Jihadists Out of Reach in Online ‘Dark Space’: FBI

Related: In Fight on Terror, Encryption is Double-Edged Sword

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...


Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.


Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.


Meta was fined an additional $5.9 million for violating EU data protection regulations with WhatsApp messaging app.