Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

NSA Chief Seeks Compromise on Encrypted Phone Snooping

Washington – The National Security Agency chief said Monday intelligence services need access to encrypted devices to thwart terrorism, and hopes to find common ground with the tech sector on the issue.

Washington – The National Security Agency chief said Monday intelligence services need access to encrypted devices to thwart terrorism, and hopes to find common ground with the tech sector on the issue.

Admiral Michael Rogers told a Washington cybersecurity forum that he does not believe Americans should be divided on the issue of encryption — which makes it nearly impossible for outside parties to gain access, even in some cases with a warrant.

Rogers said that in the fight against terrorism, the concerns are the same as in law enforcement, and endorsed the view expressed by FBI director James Comey on gaining access to encrypted mobile devices.

Comey last year warned that law enforcement could be hampered in critical investigations after Apple and Google said they would encrypt their smartphones and give users the keys, making it impossible to hand over data even with a court order.

“Broadly, I share director Comey’s concern,” Rogers said.

“Most of the debate I’ve seen is that it’s either all or nothing, that it’s either total encryption or no encryption at all.”

Rogers said it should be feasible to “come up with a legal framework that enables us within some quasi-process to address… valid concerns if I have indications to believe that this phone, that this path is being used for criminal, or in my case, foreign intelligence or national security issues.”

The NSA chief called for the same kind of cooperation used to fight child pornography and exploitation, where tech firms report potential criminals to authorities.

Advertisement. Scroll to continue reading.

“We have shown in other areas that through both technology and a legal framework and a social compact that we can take on tough issues, and I hope we can do the same thing here,” he said.

The NSA has come under intense scrutiny both at home and abroad after former contractor Edward Snowden leaked documents about government surveillance programs that sweep up vast amounts of data from Internet and phone communications.

Rogers declined to comment on the latest reports from last week that the NSA implanted spyware on commercially made hard drives, and that it worked with British intelligence to hack into the world’s biggest maker of SIM cards to be able to access mobile communications.

“We fully comply with the law,” Rogers said. “We do that foreign intelligence mission operating within (a legal) framework.”

RelatedReport Connects Elite Hacking Group to NSA-Linked Cyberweapons

Related: Stolen SIM Card Keys Could be Powerful Spy Tool

RelatedGoogle to Boost Android Encryption, Joining Apple

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.