How to protect privacy and security in the Crypto Wars

Size: px
Start display at page:

Download "How to protect privacy and security in the Crypto Wars"

Transcription

1 As part of the Global Conference on Cyberspace, the Netherlands will facilitate an expert panel on the right to privacy, one of the central themes of the conference. During this panel, high esteemed privacy and security experts such as Bruce Schneier and Sir David Omand will discuss two questions: What will privacy look like in five years? and How to balance privacy and security?. To inspire this debate, the Ministry of Foreign Affairs of the Netherlands commissioned two thought provoking pieces, one on each of these questions, to the award winning Dutch data journalists Maurits Martijn and Dimitri Tokmetzis. As such, these pieces do not reflect the position of the Dutch government. The second of these papers, How to protect privacy and security in the Crypto Wars by Dimitri Tokmetzi, can be found below. For further discussion on this topic, follow the debate on Friday 17 April 2015 at 11:15 CET (livestream available). * * * How to protect privacy and security in the Crypto Wars We thought that the Crypto Wars of the nineties were over, but renewed fighting has erupted since the Snowden revelations. On one side, law enforcement and intelligence agencies are afraid that broader use of encryption on the Internet will make their work harder or even impossible. On the other, security experts and activists argue that installing backdoors will make everyone unsafe. Is it possible to find some middle ground between these two positions? This is the story of how a handful of cryptographers hacked the NSA. It s also a story of encryption backdoors, and why they never quite work out the way you want them to. So began the blog post on the FREAK attack, one of the most ironic hacks of recent years. Matthew Green, assistant professor at John Hopkins university, and a couple of international colleagues exploited a nasty bug on the servers that host the NSA website. By forcing the servers to use an old, almost forgotten and weak type of encryption which they were able to crack within a few hours, they managed to gain access to the backend of the NSA website, making it possible for them to alter its content. Worse still, the cryptographers found that the same weak encryption was used on a third of the 14 million other websites they scanned. For instance, if they had wanted to, they could have gained access to whitehouse.gov or tips.fbi.gov. Many smartphone apps turned out to be vulnerable as well. The irony is this: this weak encryption was deliberately designed for software products exported from the US in the nineties. The NSA wanted to snoop on foreign governments and companies if necessary and pushed for a weakening of encryption. This weakened encryption somehow found its way back onto the servers of US companies and government agencies. Since the NSA was the organization that demanded export-grade crypto, it s only fitting that they should be the first site affected by this vulnerability, Green gleefully wrote. The FREAK attack wasn t only a show of technological prowess, but also a political statement. Ever since Edward Snowden released the NSA files in June 2013, a new battle has been raging between computer security experts and civil liberties activists on one side and law enforcement and intelligence agencies on the other. 1

2 There was one set of revelations that particularly enraged the security community. In September 2013 the New York Times, ProPublica and the Guardian published a story on the thorough and persistent efforts of the NSA and its British counterpart GCHQ to decrypt Internet traffic and databases. In a prolonged, multi-billion operation dubbed BULLRUN, the intelligence agencies used supercomputers to crack encryption, asked, persuaded or cajoled telecom and web companies to build backdoors into their equipment and software, used their influence to plant weaknesses in cryptographic standards and simply stole encryption keys from individuals and companies. A war is looming But security specialists argue that by attacking the encryption infrastructure of the Internet, the intelligence agencies have made us all less safe. Terrorists and paedophiles may use encryption to protect themselves when planning and committing terrible crimes, but the Internet as a whole cannot function without proper encryption. Governments cannot provide digital services to their citizens if they cannot use safe networks. Banks and financial institutions must be able to communicate data over secure channels. Online shops need to be able to process payments safely. And all companies and institutions have to keep criminals and hackers out of their systems. Without strong encryption, trust cannot exist online. Cryptographers have vowed to fight back. Major web companies like Google and Yahoo! promised their clients strong end-to-end encryption for and vowed to improve the security of their networks and databases. Apple developed a new operating system that encrypted all content on the new iphone by default. And hackers started developing web applications and hardware with strong, more user-friendly encryption. In the past few years we have seen the launch of encrypted social media (Twister), smartphones (Blackphone), chat software (Cryptocat), cloud storage (Boxcryptor), file sharing tools (Peerio) and secure phone and SMS apps (TextSecure and Signal). This worries governments. In the wake of the attack on Charlie Hebdo in Paris, UK Prime Minister David Cameron implied that encryption on certain types of communication services should be banned. In the US, FBI director James Comey recently warned that the intelligence agencies are going dark because of the emergence of default encryption settings on devices and in web applications. In Europe, the US and elsewhere politicians are proposing that mandatory backdoors be incorporated in hardware and software. Some even want governments to hold golden keys that can decrypt all Internet traffic. The obvious question is how we can meet the needs of all concerned? One the one hand, how can we ensure that intelligence and law enforcement agencies have access to communications and data when they have a legal mandate to do so? Their needs are often legitimate. One the other, how can we ensure strong data protection for all, not only a techsavvy few? As we shall see, this crypto conflict isn t new, nor is the obvious question the right question to ask at this moment. Crypto to the people Up until the seventies, the use of cryptography was limited to governments, big corporations and some math enthusiasts. With the rise of electronic networks like the Internet, the demand for encryption grew. Academics started to develop new cryptography methods, but were warned by intelligence agencies to refrain from publishing about them, according to Bart Preneel, a long-time professor of cryptography at the Belgian University of Leuven. The 2

3 first encryption products were built into hardware and exporting them was prohibited by most countries. These export controls were outdated the moment encryption became available in software products in the late eighties, Preneel says. Phil Zimmermann developed his encryption product Pretty Good Privacy (PGP) that made it fairly simple to encrypt traffic. Once uploaded onto the Internet, there was no stopping it, according to Preneel. The US authorities tried to stop Zimmermann from exporting his code, but PGP had already found its way onto the nascent network. Zimmermann also published the raw code in a book, making the export of his work a free speech issue. The Clinton administration still tried to force a backdoor to be incorporated in USmanufactured hardware, but this Clipper Chip proved to be unsafe and too contentious. Export controls were subsequently relaxed. The same happened on the other side of the Atlantic. In 1995 the Wassenaar Arrangement was signed, restricting the export of cryptography and many other products. In 2000 these restrictions were lifted. Strong democratised encryption was unstoppable. Preneel said: We thought we had won the war. We turned out to be wrong. The Crypto War was lost If anything, the proponents of strong encryption had probably lost the war. However, the war is certainly not over as far as FBI director James Comey is concerned. In a speech at the Brooking Institution in October 2014 he told the audience that perhaps it s time to suggest that the post-snowden pendulum has swung too far in one direction in a direction of fear and mistrust. Comey thinks that tech companies overreacted to the Snowden revelations. Encryption isn t just a technical feature; it s a marketing pitch. He objected to the term backdoor. We want to use the front door, with clarity and transparency, and with clear guidance provided by law. We are completely comfortable with court orders and legal process front doors that provide the evidence and information we need to investigate crimes and prevent terrorists attacks. These comments by the FBI Director sound legitimate and certainly seem reasonable. But there are at least three objections to installing decryption technology in infrastructure and software. Making everyone less secure The first objection is: who gets to decide who uses a backdoor? The famous cryptographer Bruce Schneier has often warned that modern computer technology is fundamentally democratising. Today's NSA secret techniques are tomorrow's PhD theses and the following day's cybercrime attack tools. In other words, if you install a backdoor, you can never be sure whether or not someone else will find it and use it for nefarious purposes. A strong case in point is the so-called Vodafone hack that was discovered in Athens, Greece in late A lawful wiretapping device, used by the country s law enforcement agencies, was compromised and more than a hundred people were spied on, possibly for two years prior to the discovery. The culprits remain unknown until this day. The targets were journalists, Arab individuals, senior government and secret service officials and an American embassy worker. Similar major security breaches were discovered in other countries too. Theoretically it might be feasible, as current NSA director Michael Rogers argues, to build a backdoor that only his agency can use. The NSA actually came close to building a very secure backdoor with DUAL_EC_DRBG, the Dual Elliptic Curve Deterministic Random Bit Generator. This piece of software is one of the few international standards used to generate 3

4 encryption keys. The Snowden files showed that in the early 2000s the NSA exploited a weakness in the code, through which only they could guess the outcome of the generator, and with that knowledge were able to break the widely-used encryption keys. The only problem is that even years before Snowden blew the whistle, cryptographers knew that there was something wrong with the code, but couldn t find definite proof. And the leak shows that even the single most advanced intelligence agency cannot keep its secrets. The real world keeps disproving the theory. Unsound economics The second argument is one of economics. Backdoors can stifle innovation. Even until very recently, communications were a matter for a few big companies, often state-owned. The architecture of their systems changed slowly, so it was relatively cheap and easy to build a wiretapping facility into them. Today thousands of start-ups handle communications in one form or another. And with each new feature these companies provide, the architecture of the systems changes. It would be a big burden for these companies if they had to ensure that governments can always intercept and decrypt their traffic. Backdoors require centralised information flows, but the most exciting innovations are moving in the opposite direction, i.e. towards decentralised services. More and more web services are using peer-to-peer technology through which computers talk directly to one another, without a central point of control. File storage services as well as payment processing and communications services are now being built in this decentralised fashion. It s extremely difficult to wiretap these services. And if you were to force companies to make such wiretapping possible, it would become impossible for these services to continue to exist. A government that imposes backdoors on its tech companies also risks harming their export opportunities. For instance, Huawei the Chinese manufacturer of phones, routers and other network equipment is unable to gain market access in the US because of fears of Chinese backdoors built into its hardware. US companies, especially cloud storage providers, have lost overseas customers due to fears that the NSA or other agencies could access client data. Unilateral demands for backdoors could put companies in a tight spot. Or, as researcher Julian Sanchez of the libertarian Cato Institute says: An iphone that Apple can t unlock when American cops come knocking for good reasons is also an iphone they can t unlock when the Chinese government comes knocking for bad ones. There is no going dark Third and finally, there is no going dark. Law enforcement and intelligence agencies can still intercept and read a lot of data. In fact we are living in what many security commentators call the golden age of surveillance. As more and more of our activities are mediated by technology, we leave a growing digital trail that reveals a great deal about ourselves. Encryption lets you hide the content of messages, but not their context so-called metadata which reveal for instance what you read, who you talk to and where you are. In fact, this kind of data reveals so much that the former NSA director Michael Hayden once boasted: we kill people based on metadata. Furthermore, many governments and private businesses have developed formidable offensive capabilities. Many intelligence and law enforcement agencies are able to hack the end points in systems, i.e. the devices we use. There is a small but growing industry in finding and selling details of software vulnerabilities, so that they can be exploited. Many 4

5 governments use the services of companies like Gamma International (which offers the FinFisher hacking suite), Hacking Team (Remote Control System) and VUPEN (which sells so called zero days, software vulnerabilities that haven t yet been found by others). With the rise of ubiquitous computing and the Internet of Things, the volume of revealing data streams will only increase, leaving no shortage of data to intercept or devices to hack. The real trade-off? When the balance between security and privacy is viewed from an economic perspective, there seems to be a trade-off. Yes, backdoors are possible, but the price could be higher than we bargained for. Technically it might be feasible to install backdoors that only law enforcement and intelligence agencies can exploit, but the real world of organisations and software implementation might mess up this carefully scripted scenario. Such a scenario would also only play out if governments were to force all communications providers to give them centralised access, something that could severely stifle innovation. And it may transpire that building backdoors requires a crackdown on academic research: you don t want your backdoor to be exposed by nosy professors. But, more importantly, the choice between privacy and security is a false one. The real choice is between mass surveillance and targeted surveillance. It is true that encrypting a great deal of data by default would make legitimate efforts to intercept and decrypt communications a lot harder. But this would mostly be the case for surveillance on a large scale. Targeted surveillance would remain possible. And when it comes to targeted surveillance, there are a number of viable policy options. The first is the decryption order. With a court order, suspects could be forced to decrypt their information. If they refused to comply, they could be sent to jail. Several countries, like France, the UK and the US are already using this mechanism. Others, like the Netherlands, are considering it. Another option is remotely hacking devices. The end points of the Internet, for instance our devices, are the weakest. Recently The Intercept revealed that the NSA stole the encryption keys of Gemalto, a multinational company that produces SIM cards for many phone operators. Law enforcement agencies could use malware to gain access to devices and intercept data before they are encrypted. With robust legal safeguards in place, government hacking could be a viable option. At this stage no one knows how to prevent abuse of malware: once an agency has malware, it is very easy to produce different versions of it and very difficult to control its spread. The final option is increased data retention for all companies and institutions, so that agencies can access historical metadata. But as last year s annulment of the data retention directive by the European Court of Justice showed, mandated storage of data has to be enshrined within a very robust data protection framework. Whatever the outcome of this new Crypto War may be, it s clear that a ceasefire needs to involve all parties and address all legitimate interests. In the end the overriding interest is the same for everybody: a secure and robust Internet. And we need secure and robust cryptography to get there. 5

Revealed: how US and UK spy agencies defeat internet privacy and security

Revealed: how US and UK spy agencies defeat internet privacy and security http://www.theguardian.com/world /2013/sep/05/nsa gchq encryption codes security Revealed: how US and UK spy agencies defeat internet privacy and security NSA and GCHQ unlock encryption used to protect

More information

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:

More information

Politics and Cryptography in the United States. Outline. What are Your Rights? Syvale Lee April 11, 2006

Politics and Cryptography in the United States. Outline. What are Your Rights? Syvale Lee April 11, 2006 Politics and Cryptography in the United States Syvale Lee April 11, 2006 Outline Bill of Rights Security versus Freedom Current Trends in Computer Security Export Control on Cryptography Pretty Good Privacy

More information

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Steven M. Bellovin https://www.cs.columbia.edu/ smb Join work with Matt Blaze, Sandy Clark, Susan Landau Steven M. Bellovin

More information

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy Privacy and data protection in a post-snowden world Carly Nyst Head of International Advocacy The great irony is that we re the only ones not spying on the American people. - Keith Alexander, head of the

More information

Securing our information we have the technology; we just have to have the will to do it

Securing our information we have the technology; we just have to have the will to do it Interview with Arjen Kamphuis, information technology specialist Securing our information we have the technology; we just have to have the will to do it Author: Valentina Novak "The hackers need you as

More information

Good morning. It s an honor to be here.

Good morning. It s an honor to be here. Remarks Prepared for Delivery by James B. Comey Director, Federal Bureau of Investigation Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course? Brookings Institution, Washington,

More information

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy

More information

Microsoft Cloud Computing Research Centre

Microsoft Cloud Computing Research Centre Microsoft Cloud Computing Research Centre 1 st Annual Symposium, Cambridge 2014 : Legal frameworks Ian Walden i.n.walden@qmul.ac.uk 1 Introductory remarks From organised crime to law enforcement The Snowden

More information

10 Hidden IT Risks That Threaten Your Financial Services Firm

10 Hidden IT Risks That Threaten Your Financial Services Firm Your firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your business without IT. Today,

More information

10 Hidden IT Risks That Threaten Your Practice

10 Hidden IT Risks That Threaten Your Practice (Plus 1 Fast Way to Find Them) Your practice depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

A Guide to Mobile Security For Citizen Journalists

A Guide to Mobile Security For Citizen Journalists A Guide to Mobile Security For Citizen Journalists Your Citizen journalism, and with it the rise of alternative media voices, is one of the most exciting possibilities for mobile phones in activism. Mobile

More information

Neoscope www.neoscopeit.com 888.810.9077

Neoscope www.neoscopeit.com 888.810.9077 Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your practice without IT. Today,

More information

Introduction to Encryption

Introduction to Encryption Computers and Society Introduction to Encryption Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/35 3-0: Terminology

More information

Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven

Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven 2 3 NSA calls the iphone users public 'zombies' who pay for their own surveillance 4 Snowden revelations NSA: Collect it

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

How Covert Agents Infiltrate the Internet to Manipulate, Deceive,...

How Covert Agents Infiltrate the Internet to Manipulate, Deceive,... DISPATCHES How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations By Glenn Greenwald 24 Feb 2014, 6:25 PM EST 1 of 17 02/25/2014 10:22 AM A page from a GCHQ top secret

More information

The Year 2013 Has Become 1984

The Year 2013 Has Become 1984 The Year 2013 Has Become 1984 Saturday, September 21, 2013 23:33 idiscovery Solutions Tom Matzen The Editor interviews Tom Matzen, Director at idiscovery Solutions, in charge of the firm s International

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

Can we maintain Human Rights in Our Cyber Empire?

Can we maintain Human Rights in Our Cyber Empire? Can we maintain Human Rights in Our Cyber Empire? Yvo Desmedt Univ. of Texas at Dallas USA and University College London UK December 11, 2014 c Yvo Desmedt 1. THE INDUSTRIAL EMPIRES The industrial empires

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

Patriot Act Impact on Canadian Organizations Using Cloud Services

Patriot Act Impact on Canadian Organizations Using Cloud Services Patriot Act Impact on Canadian Organizations Using Cloud Services November 8, 2013 By Scott Wright The Streetwise Security Coach http://www.securityperspectives.com 1 PRESENTATION TITLE Why do nation-states

More information

ITAR Compliance Best Practices Guide

ITAR Compliance Best Practices Guide ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations

More information

Apple ios 8 Security

Apple ios 8 Security Apple ios 8 Security Apple ios 8 Security Apple ios 8 Security What s this all about? For all devices running ios 8.0 and later versions, Apple will no longer be performing ios data extractions as the

More information

AB 1149 Compliance: Data Security Best Practices

AB 1149 Compliance: Data Security Best Practices AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and

More information

The Security-Privacy tension: recent developments in the U.K. and elsewhere

The Security-Privacy tension: recent developments in the U.K. and elsewhere The Security-Privacy tension: recent developments in the U.K. and elsewhere James Davenport Hebron & Medlock Professor of Information Technology University of Bath (U.K.) 16 January 2014 Overall Thesis

More information

A6- Sensitive Data Exposure

A6- Sensitive Data Exposure OWASP Vulnerabilities and Attacks Simplifie d: Business Manager Series Part 2 Have you heard of the times when Fantastic Frank from Randomland was furious? Money and critical data was being stolen from

More information

details, and numerous other data points. Enough information is often collected that even 2

details, and numerous other data points. Enough information is often collected that even 2 Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 650 Pennsylvania Avenue, NW Washington, D.C. 050 VIA E MAIL bigdata@ostp.gov March, 04 Re: Big Data Study, Document

More information

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!

More information

Just Net Coalition statement on Internet governance

Just Net Coalition statement on Internet governance Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a

More information

Encryption and Digital Signatures

Encryption and Digital Signatures GreenNet CSIR Toolkit Briefing no.3 How to protect privacy, and your identity, online Written by Paul Mobbs for the GreenNet Civil Society Internet Rights Project, 2002. http://www.internetrights.org.uk/

More information

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems

More information

CYBER STREETWISE. Open for Business

CYBER STREETWISE. Open for Business CYBER STREETWISE Open for Business As digital technologies transform the way we live and work, they also change the way that business is being done. There are massive opportunities for businesses that

More information

Presented by Evan Sylvester, CISSP

Presented by Evan Sylvester, CISSP Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information

More information

1 Data Protection Principles

1 Data Protection Principles Today, our personal information is being collected, shared, stored and analysed everywhere. Whether you are browsing the internet, talking to a friend or making an online purchase, personal data collection

More information

ENCRYPTION A MATTER OF HUMAN RIGHTS

ENCRYPTION A MATTER OF HUMAN RIGHTS ENCRYPTION A MATTER OF HUMAN RIGHTS 2 Encryption: A Matter of Human Rights CONTENTS Executive summary... 3 1. What is encryption?... 6 Other relevant definitions... 8 2. Encryption and human rights...

More information

What Makes a Good Security Architecture?

What Makes a Good Security Architecture? What Makes a Good Security Architecture? What makes a good security architecture? How many times have you heard some organisations state, our policy is that anti-virus software is installed on all servers.

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is

More information

Brief on Did GCHQ Spy on You Illegally?

Brief on Did GCHQ Spy on You Illegally? Brief on Did GCHQ Spy on You Illegally? Privacy International on Monday launched a campaign and platform allowing people to ask the UK s surveillance court, the Investigatory Powers Tribunal, if GCHQ spied

More information

10 Hidden IT Risks That Might Threaten Your Law Firm

10 Hidden IT Risks That Might Threaten Your Law Firm (Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

WHITE PAPER WHAT HAPPENED?

WHITE PAPER WHAT HAPPENED? WHITE PAPER WHAT HAPPENED? ENSURING YOU HAVE THE DATA YOU NEED FOR EFFECTIVE FORENSICS AFTER A DATA BREACH Over the past ten years there have been more than 75 data breaches in which a million or more

More information

The Cancer Running Through IT Cybercrime and Information Security

The Cancer Running Through IT Cybercrime and Information Security WHITE PAPER The Cancer Running Through IT Prepared by: Richard Brown, Senior Service Management Consultant Steve Ingall, Head of Consultancy 60 Lombard Street London EC3V 9EA T: +44 (0)207 464 8883 E:

More information

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was

More information

DSL and Cable Modems: The Dangers of Having a Static IP Address

DSL and Cable Modems: The Dangers of Having a Static IP Address DSL and Cable Modems: The Dangers of Having a Static IP Address By Joe Edwards ECE 478 Spring 2000 1.0 Introduction As computer technology continues to rapidly progress, more and more people are abandoning

More information

18. Encryption and Wiretapping

18. Encryption and Wiretapping 18. Encryption and Wiretapping Congress should lift all technical review requirements for encryption software and hardware; reject attempts to foist key escrow, or key recovery, on the market; reject a

More information

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference

More information

Thank you for the opportunity to join you here today.

Thank you for the opportunity to join you here today. Ambassador Daniel A. Sepulveda Remarks on the U.S. Privacy Framework and Signals Intelligence Reforms November 3, 2015 Digital Europe Brussels, Belgium Thank you for the opportunity to join you here today.

More information

Best Practices Top 10: Keep your e-marketing safe from threats

Best Practices Top 10: Keep your e-marketing safe from threats Best Practices Top 10: Keep your e-marketing safe from threats Months of work on a marketing campaign can go down the drain in a matter of minutes thanks to an unforeseen vulnerability on your campaign

More information

Who Controls Your Information in the Cloud?

Who Controls Your Information in the Cloud? Who Controls Your Information in the Cloud? threat protection compliance archiving & governance secure communication Contents Who Controls Your Information in the Cloud?...3 How Common Are Information

More information

Marble & MobileIron Mobile App Risk Mitigation

Marble & MobileIron Mobile App Risk Mitigation Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their

More information

EECS 588: Computer and Network Security. Introduction January 14, 2014

EECS 588: Computer and Network Security. Introduction January 14, 2014 EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade

More information

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen

More information

Open an attachment and bring down your network?

Open an attachment and bring down your network? Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak

More information

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 On March 10, 2015 the Center for Strategic and International Studies, in conjunction with the Cybersecurity Unit of the U.S. Department of

More information

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,

More information

CYBER SECURITY THREAT REPORT Q1

CYBER SECURITY THREAT REPORT Q1 CYBER SECURITY THREAT REPORT Q1 Moving Forward Published by UMC IT Security April 2015 0 U.S. computer networks and databases are under daily cyber-attack by nation states, international crime organizations,

More information

Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act

Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act On 1 January 2016, the Dutch Data Breach Notification Act will enter into force. The Dutch DPA issued Guidelines

More information

Cybersecurity & Privacy Innovation Forum 28. April 29. April 2015

Cybersecurity & Privacy Innovation Forum 28. April 29. April 2015 Cybersecurity & Privacy Innovation Forum 28. April 29. April 2015 Cyber-Security and Privacy in Vertical Supply Chains Dr. Nicola Jentzsch DIW Berlin Table of Contents I. Rationale of Industrial Policy

More information

Cloud storage buyer s guide

Cloud storage buyer s guide Cloud storage buyer s guide for small business sponsored by 1 Table of contents Why should you read this guide? 3 Step 1: Decide how much security you need 4 Step 2: Consider what you need cloud storage

More information

Bush Lets U.S. Spy on Callers Without Courts

Bush Lets U.S. Spy on Callers Without Courts Page 1 of 5 Article 1 NYTimes.com Go to a Section Welcome, 75200 - Membe NYT Since 1981 Bush Lets U.S. Spy on Callers Without Courts Advertisement By JAMES RISEN and ERIC LICHTBLAU Published: December

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

NSA Surveillance, National Security and Privacy

NSA Surveillance, National Security and Privacy NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM

More information

CERT's role in national Cyber Security: policy suggestions

CERT's role in national Cyber Security: policy suggestions CERT's role in national Cyber Security: policy suggestions Subject: Legal Aspect of Cyber Security. Author: Vladimir Chitashvili Lecture: Anna-Maria Osula What is national Cyber Security is? In another

More information

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise White Paper Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical

More information

More effective protection for your access control system with end-to-end security

More effective protection for your access control system with end-to-end security More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT

More information

Internet Governance Forum Baku 2012

Internet Governance Forum Baku 2012 Internet Governance Forum Baku 2012 Workshop Cloudy Jurisdiction: Addressing the Thirst for Cloud Data in Domestic Legal Processes Workshop organized by Tamir Israel, Staff Lawyer, Samuelson- Glushko Canadian

More information

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

POLICY BRIEF Why Trade Agreements are not Setting Information Free

POLICY BRIEF Why Trade Agreements are not Setting Information Free POLICY BRIEF Why Trade Agreements are not Setting Information Free Susan Ariel Aaronson, Ph.D. In December 2012, IIEP published a policy brief, Can Trade Policy Set Information Free? which compared US,

More information

Security and Fraud Exceptions Under Do Not Track. Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University

Security and Fraud Exceptions Under Do Not Track. Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University Security and Fraud Exceptions Under Do Not Track Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University Position Paper for W3C Workshop on Web Tracking and User Privacy 28/29

More information

Mark Corcoran interviews Timothy Pilgrim Australian Privacy Commissioner.

Mark Corcoran interviews Timothy Pilgrim Australian Privacy Commissioner. 1 Foreign Correspondent. Mark Corcoran interviews Timothy Pilgrim Australian Privacy Commissioner. Q What s your perspective on the significance of this emerging technology, UAV or drone technology, as

More information

CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL

CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL Paper By: Chow, R; Golle, P; Jakobsson, M; Shai, E; Staddon, J From PARC & Masuoka, R And Mollina From Fujitsu Laboratories

More information

Electronic voting in the Netherlands

Electronic voting in the Netherlands Electronic voting in the Netherlands The return of the paper ballot sheet Eddy Habben Jansen, deputy director ProDemos House for Democracy and the Rule of Law In January 2012 the Second Chamber of the

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

Email Data Security. The dominant business communication tool

Email Data Security. The dominant business communication tool Email Data Security Jim Brashear General Counsel Zix Corporation Dallas Business Uses Email The dominant business communication tool Time spent on email exceeds time spent on all other communication tools

More information

Round Table Report. 1 April 2015, Brussels

Round Table Report. 1 April 2015, Brussels 1 April 2015, Brussels Speakers Jon Crowcroft - Professor of Communications Systems (University of Cambridge), jointly leading the Microsoft Cloud Computing Research Centre Danny DeCock - PhD researcher

More information

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic

More information

THREATS. Your Business Can t Afford to Ignore. Your business depends on intelligence, but can you count on your technology?

THREATS. Your Business Can t Afford to Ignore. Your business depends on intelligence, but can you count on your technology? 10 DATA SECURITY THREATS Your Business Can t Afford to Ignore Your business depends on intelligence, but can you count on your technology? Today, technology plays a vital role in the way you service and

More information

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit

More information

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

Cryptography for Software and Web Developers

Cryptography for Software and Web Developers Cryptography for Software and Web Developers Part 5: Don t believe the crypto hype Hanno Böck 2014-05-28 1 / 10 The NSA scandal was the biggest boost for snake oil crypto of all time Threema, Telegram,

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

Potential Cyber Warfare Capabilities of Major Technology Vendors *

Potential Cyber Warfare Capabilities of Major Technology Vendors * Potential Cyber Warfare Capabilities of Major Technology Vendors * Audun Jøsang University of Oslo, Norway josang@ifi.uio.no Abstract: The Snowden revelations of 2013 gave the public an insight into the

More information

Keynote Presentation to. Simon Fraser University Vancouver, BC November 8, 2013. Elizabeth Denham Information and Privacy Commissioner for B.C.

Keynote Presentation to. Simon Fraser University Vancouver, BC November 8, 2013. Elizabeth Denham Information and Privacy Commissioner for B.C. CHECK AGAINST DELIVERY Keynote Presentation to MEDIA DEMOCRACY DAYS Simon Fraser University Vancouver, BC November 8, 2013 Elizabeth Denham Information and Privacy Commissioner for B.C. Thank you so much.

More information

SecureAge SecureDs Data Breach Prevention Solution

SecureAge SecureDs Data Breach Prevention Solution SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal

More information

of firms with remote users say Web-borne attacks impacted company financials.

of firms with remote users say Web-borne attacks impacted company financials. Introduction As the number of users working from outside of the enterprise perimeter increases, the need for more efficient methods of securing the corporate network grows exponentially. In Part 1 of this

More information

Take Back Control. Executive Summary

Take Back Control. Executive Summary Take Back Control There's no such thing as secure anymore. Debora Plunkett, NSA Executive Summary Businesses violate your privacy every day because collecting, using, sharing, and even losing your personal

More information

Inspection of Encrypted HTTPS Traffic

Inspection of Encrypted HTTPS Traffic Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents

More information

Network Security Landscape

Network Security Landscape Cole p01.tex V3-07/28/2009 3:46pm Page 1 Network Security Landscape COPYRIGHTED MATERIAL IN THIS PART Chapter 1 State of Network Security Chapter 2 New Approaches to Cyber Security Chapter 3 Interfacing

More information

EECS 588: Computer and Network Security. Introduction

EECS 588: Computer and Network Security. Introduction EECS 588: Computer and Network Security Introduction January 13, 2014 Today s Cass Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade

More information

What the Life Insurance Industry Does Not Want You to Have.

What the Life Insurance Industry Does Not Want You to Have. What the Life Insurance Industry Does Not Want You to Have. 1. Who am I and why should you listen to me? 2. What can go wrong and how can you be affected by this? 3. After the government noticed there

More information

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information