Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Better locks to secure our data are the inevitable result of too many prying eyes
Buchanan, William J
Authors
Abstract
Robert Hannigan, the new head of British signals intelligence agency GCHQ, has accused technology companies of aiding terrorists and criminals by providing them secure communications through their products and networks. Far from adopting a conciliatory tone following last year’s revelations from documents leaked by Edward Snowden about government spying on citizens, the intelligence chief has doubled down, railing against companies like Microsoft, Google, Facebook, Yahoo and Apple for what some will see as trying to balance user privacy against the rapacious demands of the surveillance services. Hannigan’s statement is bound to rile some. Privacy, he says, has never been “an absolute right”. Extremist groups are using the liberties granted them by the web: while some have been harboured by dark areas of the net in the past, ISIS instead uses the internet to openly “promote itself, intimidate people, and radicalise new recruits.” Last month Apple released iOS 8, the latest version of its mobile phone and tablet operating system, with encryption for the phones contents enabled by default. This led to outcries from the FBI that it would make their work harder, while a Chicago police chief claimed the iPhone would become to “choice of phone for paedophiles”. The fifth version of Google’s Android operating system, codenamed Lollipop, is released next week with similar security upgrades. Besieged by thefts and leaks of anything from intimate photos to financial data, users might legitimately ask why it has taken so long. The protection for digital files on computers or phones provided by file attributes and content types has barely changed in decades, and is based on concepts of stand-alone computer systems, and with little thought on keeping things truly private. This works well from a corporate point of view, where we can keep backwards compatability and allow IT department administrators to keep full control. The firms creating mobile devices, however, have different issues, as their devices are on the move, and often stolen or mislaid. The internet itself is built from the protocols used in the days of mainframe computers and teletype terminals, with little thought given to protecting data as it is stored and transmitted. Now more connected, more mobile than ever, we carry our most sensitive data with us all the time: what was once protected by firewalls and physical security is now in our pocket. With mobile phones increasingly integrated into our lives, the devices need to be more protected that our traditional desktop computers. So Apple and Google now find themselves with consumers who will switch mobile devices to keep up to date, without many decades of previous operating systems and application software to maintain compatibility with – the ball and chain around Microsoft’s neck, particularly. With the power and speed of even mobile phone hardware now considerable and growing all the time, the days when a special maths chip was needed to perform complex cryptography are gone. This tension between law enforcement and the right to privacy remains unresolved. The FBI currently see the status quo, where major tech companies are persuaded or brow-beaten into cooperating with police and security agencies under the PATRIOT Act, as necessary to pursue criminals and terrorists. In the UK the Regulation of Investigatory Powers Act 2000 (RIPA) defines what information of citizens that law enforcement can access, with the support of a warrant. In both cases this will undoubtedly become harder with encryption-by-default, and the same tension exists with encrypted and anonymised “dark net” service Tor, where law enforcement are scared that crime can go un-noticed, whereas privacy advocates promote the privacy capabilities it offers. But the introduction of improved security is a predictable response to a situation in which the agencies headed by Hannigan’s predecessors and fellow spooks have been seen to ease themselves past those safeguards to citizens' information that remain. .
Citation
Buchanan, W. J. (2014). Better locks to secure our data are the inevitable result of too many prying eyes
Publication Date | Nov 5, 2014 |
---|---|
Deposit Date | Aug 7, 2015 |
Publicly Available Date | May 15, 2017 |
Keywords | Cybersecurity; privacy; surveillance services |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/8772 |
Files
Better Locks To Secure Our Data Are The Inevitable Result Of Too Many Prying Eyes
(553 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nd/4.0/
Better locks to secure our data are the inevitable result of too many prying eyes
(340 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nd/4.0/
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology
(2024)
Journal Article
Detection of Ransomware
(2024)
Patent
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search