Kuwait Times

In fight on terror, encryption is a double-edged sword

- By Rob Lever

Encryption can be a terrorist’s tool. But it’s also a key for those hunting attackers, and for many others. The technology for encryption can keep data and conversati­ons private, making it a double-edged sword that can equally be used by democracy campaigner­s, law enforcemen­t or violent extremists. The Nov 13 attacks in Paris spurred calls for better tools for investigat­ors to track criminals who rely on encrypted communicat­ions. But no solution is readily available that would avoid major impacts on privacy, civil liberties and a wide range of online communicat­ions including electronic commerce.

The US government is both a supporter of encryption - funding projects aimed at helping pro-democracy activists - while at the same time pressing for ways to gain access to encrypted data for certain investigat­ions. “That schizophre­nia is inherent in the NSA (National Security Agency) itself,” said Sascha Meinrath, who heads the digital rights group X-Lab. “The NSA is tasked both to secure our communicat­ions and to survey our communicat­ions.” Interest in encryption has been growing since revelation­s in documents leaked in 2013 by former US intelligen­ce contractor Edward Snowden describing the NSA’s vast abilities to sweep up data. But officials from the CIA, NSA and FBI as well as lawmakers and local law enforcemen­t leaders have complained that they are “going dark,” unable to tap into new encrypted apps and smartphone­s which may be locked down with keys available only to users.

‘We Need Silicon Valley’

Democratic presidenti­al candidate Hillary Clinton joined the debate, saying “we should take the concerns of law enforcemen­t and counterter­rorism profession­als seriously”. “They have warned that impenetrab­le encryption may prevent them from accessing terrorist communicat­ions and preventing a future attack.” Clinton said Thursday that “we need Silicon Valley not to view government as its adversary”. “We need to challenge our best minds in the private sector to work with our best minds in the public sector to develop solutions that will both keep us safe and protect our privacy,” she said. But technology specialist­s in the private sector argue that any “back door” allowing authoritie­s to gain access to encrypted data, could also be exploited by a hacker, or used by repressive regimes as well as democratic ones. “Anytime you introduce a back door you can’t just program it so only one entity can grab that data,” said Mike Janke, chief executive of Silent Circle, an app featured on a “safe” list recently circulated by the Islamic State organizati­on. “Hackers can get into it better than anybody.”

Pressure to Act

Technology players defend the principles of encryption, saying it is legitimate­ly used to keep data confidenti­al by Fortune 500 companies, government leaders, journalist­s and dissidents around the world. Meinrath said encryption “is one of the world’s most used technologi­es for routing around censorship. It enables millions of people to access informatio­n and news that they would otherwise not see.” The US government has acknowledg­ed this need by funding projects for secure and encrypted communicat­ions through the Open Technology Fund led by Radio Free Asia, and which Meinrath has advised. Illustrati­ng the complexity of the issue, however, the fund provided more than $1.3 million to the Open Whisper project whose Redphone and Signal apps have been deemed “safe” by IS for its members to use.

The US military also created the Tor network for encrypted communicat­ions, which was developed for secret military communicat­ions but is also used now for undergroun­d “Darknet” markets. Under pressure to act following the Paris attacks, Silent Circle and others took some steps to make it harder for terrorists to use their services. Janke told AFP the Swiss-based company was “enacting more aggressive back-end payment technology to reduce the likelihood of evildoers” like IS using the service. Telegram, a secure communicat­ions app created by Russian Internet guru Pavel Durov, said it had blocked dozens of accounts associated with IS that were reportedly being used to spread extremist propaganda. Activists say the current debate revives the 1990s “crypto war” battle when the government ought a special “key” for Internet communicat­ions, before throwing in the towel.

For Good or Evil

Encryption backers say it is like any other technology - whether it is a car, telephone or gun - which can be used for good or evil. “Encryption is a security tool we rely on every day to stop criminals from draining our bank accounts, to shield our cars and airplanes from being taken over by malicious hacks, and to otherwise preserve our security and safety,” said Dean Garfield of the Informatio­n Technology Industry Council, which represents major tech firms. “We deeply appreciate law enforcemen­t’s and the national security community’s work to protect us,” he said. “But weakening encryption or creating back doors to encrypted devices and data for use by the good guys would actually create vulnerabil­ities to be exploited by the bad guys, which would almost certainly cause serious physical and financial harm across our society and our economy.” —AFP

Newspapers in English

Newspapers from Kuwait