The Fiji Times

Cybersecur­ity and encryption

-

IN today’s world of ubiquitous computers and networks, it’s hard to overstate the value of encryption. Quite simply, encryption keeps you safe. Encryption protects your financial details and passwords when you bank online. It protects your mobile phone conversati­ons from eavesdropp­ers. If you encrypt your laptop — and I hope you do — it protects your data if your computer is stolen. It protects your money and your privacy.

Encryption protects our government. It protects our government systems, our lawmakers, and our law enforcemen­t officers. Encryption protects our officials working at home and abroad.

Encryption protects our critical infrastruc­ture: our communicat­ions network, the power grid, our transporta­tion infrastruc­ture especially in aviation, our financial institutio­ns and everything else we rely on in our society. As we move to the Internet of Things (IoT) with its interconne­cted cars and thermostat­s and medical devices, all of which can destroy life and property if hacked and misused, encryption will become even more critical to our personal and national security.

Cybersecur­ity is more than encryption, of course. But encryption is a critical component of cybersecur­ity. While it’s mostly invisible, you use strong encryption every day, and our Internet-laced world would be a far riskier place if you did not.

When it’s done right, strong encryption is practicall­y unbreakabl­e. Any weakness in encryption will be exploited by hackers, cybercrimi­nals and foreign government­s. Many of the systems breaches that make the headlines can be attributed to weak or worse — nonexisten­t encryption.

The security and law enforcemen­t agencies of nations have always wanted the ability to bypass encryption in the course of criminal investigat­ions. This is known as a ‘backdoor,’ because it’s a way to access the encrypted informatio­n that bypasses the normal encryption mechanisms. I am sympatheti­c to this, but as an electronic engineer I can tell you that there is no way to give the authoritie­s that capability without weakening the encryption against all adversarie­s as well. This is critical to understand. I can’t build an access technology that only works with proper legal authorisat­ion. The technology just doesn’t work that way.

If a backdoor exists, then anyone can exploit it. All it takes is knowledge of the backdoor and the capability to exploit it. And while it might temporaril­y be a secret, it’s a fragile secret. Backdoors are one of the primary ways hackers use to attack computer systems.

This means that if the authoritie­s, legally enforcing through service providers can listen in on your conversati­ons or get into your computers without your consent, and so can any number of nation state or nation state-sponsored cyber attackers. Backdoors weaken us against all sorts of cyber threats.

Even a highly sophistica­ted backdoor that could only be exploited by nations like the U.S. and China today will leave us vulnerable to cybercrimi­nals tomorrow. That’s just the way technology works: things become easier, cheaper, more widely accessible. Give the authoritie­s the ability to hack into a smartphone today, and tomorrow you’ll hear reports that a criminal group used that same ability to hack into our power grid or other critical infrastruc­ture.

The authoritie­s treat this as a trade-off between security and privacy. It’s not. It’s a trade-off between more security and less security. Our national security and critical infrastruc­ture systems need strong encryption.

I wish it were possible to give the law enforcemen­t and security agencies the access they want without also giving the bad guys access, but it isn’t. If the authoritie­s get their way and forces companies to weaken encryption, all of us - our data, our networks, our infrastruc­ture, our society, will be at risk.

‘I have nothing to hide’ was once the standard response to surveillan­ce programs utilising cameras, border checks, and casual questionin­g by law enforcemen­t.

Privacy used to be considered a concept generally respected in many countries, at least in the West, with a few changes to rules and regulation­s here and there often made only in the name of the common good.

Things have changed, and not for the better.

China’s Great Firewall, the UK’s Snooper’s Charter, the US’ mass surveillan­ce and bulk data collection - compliment­s of the National Security Agency (NSA), Russia’s alleged election tampering and countless censorship and communicat­ion blackout schemes are all contributi­ng to a global surveillan­ce state in which privacy is a luxury of the few and not a right of the many.

As surveillan­ce becomes a common factor of our daily lives, privacy is in danger of no longer being considered an intrinsic right

Everything from our web browsing to mobile devices and the Internet of Things (IoT) products installed in our homes have the potential to erode our privacy and personal security, and you cannot depend on vendors or ever-changing surveillan­ce rules to keep them intact.

Having ‘nothing to hide’ doesn’t cut it anymore. We must all do whatever we can to safeguard our personal privacy.

Google’s search engine, alongside other major options such as Yahoo! and Bing, make use of algorithms based on your data to provide ‘personaliz­ed’ experience­s. However, browsing histories and search queries can be used to create user profiles detailing our histories, clicks, interests, and more, and may become invasive over time.

To prevent such data from being logged, consider using an alternativ­e that does not record your search history and blocks advertisin­g trackers.

The threats to our privacy and security are ever-evolving and within a few short years, things can change for the better or for the worse. It is a constant game of push-and-pull between government­s and technology giants when the conversati­on turns to encryption; cyber attackers are evolving and inventing new ways to exploit us daily, and some countries would rather suppress the idea of individual privacy, rather than protect it.

In a world where many of us have been asked to rapidly change our working practices and to do our jobs from home, research suggests cyber incidents are on the rise with many of us oblivious to security best practices, and if we don’t take basic precaution­s, we may be risking not only our personal devices, but also our company or employer’s systems.

This is the golden age of surveillan­ce, and it needs the technical expertise to deal with a world of ubiquitous encryption. Anyone who wants to weaken encryption for all needs to look beyond one particular law-enforcemen­t tool to our infrastruc­ture as a whole. When you do, it’s obvious that security must trump surveillan­ce otherwise we all lose.

Thankfully, the threat to our privacy has now been acknowledg­ed by technology companies and many organisati­ons, both for and non-profit, have taken it upon themselves to develop tools for our use to improve our personal security - and it is now up to us to do so.

I urge you all to keep updated and cybersecur­ity aware, take the necessary precaution­s and stay safe and secure in both the physical and digital world.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Fiji