How to keep your data out of WikiLeaks – Computer Business Review

Add to favorites

Want to avoid seeing your corporate data appear in WikiLeaks?

However much you thrive on the roller coaster of business, one adrenaline rush you want to avoid is finding out that your corporate data is on WikiLeaks.

CIOs face the dichotomy of running an agile, flexible, data-sharing organisation while ensuring they are keeping corporate data safe. Much of the data being shared is sensitive in nature and if it gets into the wrong hands the results would be disastrous.

The good news is that it is possible to strike a delicate balance between an agile data model and strong data security.

When it comes to safeguarding data, establishing role-based, data-level security settings and encryption at rest are key to ensuring that data is only shared with appropriate individuals or organisations.

Take, for instance, the activities involved in supporting NHS patients or insurance customers. A doctor or financial analyst should have access to a great deal of patient or customer personal information. On the other hand, a call centre handler booking appointments or renewing policies only needs a restricted view of the same data.

Based on our work with security-conscious organisations, including global banks, here are the key factors that need addressing:

Redaction: Using redaction makes it easy to mask sensitivedata for certain audiences. By removing, replacing or blocking out details such as personallyidentifiable information (PII), it is easy to share custom views of your dataand prevent leakage.This feature has the added bonus of helping with compliance as it provides support for regulations including EU GDPR.

Advanced encryption: To protect data from cyber criminals and insider threats, organisations need to implement encryption in a more systematic way. Advanced encryption involves the selective and transparent encryption of data, configuration and logs. With its automatic and fast granular key rotation, standards-based cryptography and advanced key management, advanced encryption provides separation of duties between the security administrator and any system, network or database administrator to decrease the risk of potential exposure.

Standards Focus: Ensure you use data management products that support standards such as Common Criteria Certification, a stringent standard for computer security. Additionally, look for compartment security, data auditing, strict access controls as well as authentication tools that work with your organisations existing IT infrastructure.

Principle of least privilege: This is the process of deciding which users, programs and processes require access to the information in any particular layer of a computing environment. This includes application security controls around the databases APIs and security capabilities.

RBAC at scale: Role-Based Access Controls that manage individual users access to data dependent on their role have to be deployed at scale or designed with very granular roles and access controls to ensure performance isnt impacted at times when there are high volumes of data being added or queried.

Element level security: While older databases offered security at the document level, the latest technology has made it possible to increase granularity and hide specific elements within a document from users. Security at the element or property level based on an employees role enables companies to protect sensitive information throughout the life cycle of a document.

Certificate-Based Strong Authentication (CBA): CBA ensures the use of an encryption key that is unique to the authentication device and the user. CBA can also be used to digitally sign transactions and provide proof of the integrity and origin of data, also known as non-repudiation.

Effective data governance policies: Its important to implement and follow effective data governance policies and best practices such as maintenance of access controls, metadata, data quality and security features. If your database platform allows attributes to travel with the data, then the policy enforcement can be more granular and effective.

Separation of duties: This security method is used to manage conflicts of interest, the appearance of conflict of interest and fraud. By carefully restricting the types or amount of data any one individual employee can access, it creates a naturalbarrier to fraudulent activity.

Use the strongest available authentication: Using the highest level of authentication ensures the security and quality of the data.Examples include, LDAP, Kerberos and an external Key Management System.

Use SSL/TLS: Last but not least, Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL) is essential to encrypt all communications between all the different nodes and hosts.

We believe enterprises dont need to make a trade-off between data sharing and security. When your most sensitive and valuable data is being integrated across multiple silos of data, it takes a combination of products and processes to ensure that data is secure. But these capabilities can protect against some of the most sophisticated security threats companies are facing todayand in doing so, provide a competitive advantage.

Read more here:
How to keep your data out of WikiLeaks - Computer Business Review

Chelsea Manning’s DNA, Candy-Colored Churches, and More Art … – Bedford + Bowery

(image via Fridman Gallery / Facebook)

A Becoming ResemblanceOpening Wednesday, August 2 at Fridman Gallery, 6 pm to 8 pm. On view through September 5.

Its hard to ignore Chelsea Manning lately. And rightfully so: Against all odds, her newly liberatedpresence, both on Twitter and IRL, remains one of the most fiercely optimistic in a pool of (justifiably) jaded folk. Ironic memes have no match for colorful emojis, it seems. But this Wednesday, Manning can be found in an art gallery, and her presence manifests in more ways than just the literal.

A Becoming Resemblance is a collaborative venture between Manning and interdisciplinary artist Heather Dewey-Hagborg, using and exploring the technology of genomic identity construction. The show consists of 3D-printed portraits constructed in 2015 from pieces of DNA (hair, nail clippings) Chelsea sent her collaborator from prison. This gave the world a chance to once again put a human face to her identity, which had been shrouded by incarceration for years. The show will also include a graphic novel the duo made last year in collaboration with illustrator Shoili Kanungo depicting Chelseas sentence getting commuted by Obama and her being able to see her 3D portraits in person. What was initially drawn as hopeful fiction can now become reality.

(flyer via Erin Davis and Max C Lee)

Ride Collision: Voice-Haptic On-Road Patio For Liaison SessioningOpening Friday, August 4 at Invisible Exports, 6 pm to 10 pm. On view through August 26.

Though theyve been hard at work curating the Re: Art Show, which manifests in a different part of the vast and strange Pfizer Building in Bed-Stuy every month, Erin Davis and Max C Lee are still finding time to make work of their own. Aside from being quite a mouthful of a title, Ride Collision: Voice-Haptic On-Road Patio For Liaison Sessioning is the duos first solo show in New York.

The show is part of a larger series entitled Ride Collision, exploring the ways one can construct environments using discarded or repurposed found materials. These sculptural creations relate to cars and transportation and the culture and norms surrounding them. The show is also described as delving into how car crashes and other hazards can throw into turmoil the very rules and norms put in place to prevent them. Rocks made from painted styrofoam resemble asphalt, pieces of drywall are modified to resemble road barriers that brace for impact, and caution tape abounds.

Karin Ferrari, still from DECODING The Intros of ZiB (THE WHOLE TRUTH), 2016, digital video, 28:58 (via Tiger Strikes Asteroid)

Revealing Reflected RefractionsOpening Friday, August 4 at Tiger Strikes Asteroid New York, 6 pm to 9 pm. On view through September 10.

This week appears to be a week of long and/or sort of convoluted exhibition titles. For example, try saying this one five times fast. If youre in need of a nice vocal warm-up, it could be a useful one to tuck in your back pocket. If youre not interested in such folly, know that Revealing Reflected Refractions is also a group art exhibition.

The exhibition showcases four artists of differing backgrounds and practices. Video by Karin Ferrari combines the Austrian national news and the Illuminati, drawings from Hai-Hsin Huang depict a multicultural humanity, light sculptures by Alison Kudlow are both tangible and intangible, and site-specific by Nooshin Rostami makes the formality of a gallery space a little more uncertain. At Fridays opening reception, Rostami will also be performing.

(image via Knockdown Center)

The Clock Is Taking A NapOpening Sunday, August 6 at Knockdown Center, 5 pm to 7 pm. On view through November 5.

Using a color palette reminiscent of scoops of sherbet and making shapes that recall fruit, body parts, rainbows, and more, Amie Cunats mural for Knockdown Center breathes new life into New York City architecture. The mural takes inspiration from drawings of notable buildings like churches, layering each structure on so it recalls the squished reality of real estate in the city, but with an added dose of sugary surrealism. Every day the cityscape changes a little more, for better or for worse, and here you can see it from yet another perspective.

More here:
Chelsea Manning's DNA, Candy-Colored Churches, and More Art ... - Bedford + Bowery

Amnesty, Snowden Decry New Russian Internet Restrictions – RadioFreeEurope/RadioLiberty

Amnesty International has denounced a new Russian law banning the use of Internet proxy services -- including virtual private networks, or VPNs -- as a "major blow to Internet freedom" in the country.

The criticism from the global rights watchdog on July 31 came a day after the Russian government formally published the new law, which President Vladimir Putin signed on July 29.

The law was also criticized by Russia's most famous asylum recipient, former U.S. security consultant Edward Snowden, who leaked a trove of classified U.S. documents on government surveillance before fleeing to Russia.

The main provisions in the new law are set to take effect on November 1, just months before a March 2018 presidential election in which Putin is widely expected to seek and win a new six-year term.

The law will require Internet providers to block websites that offer VPNs and other proxy services. Russians frequently use such websites to access blocked content by routing connections through servers abroad.

Lawmakers who promoted the law said it is needed to prevent the spread of extremist materials and ideas.

Critics say Putin's government often uses that justification to suppress political dissent. Russian authorities in recent years have carried out a broad crackdown on web content deemed extremist.

"This is the latest blow in an assault on online freedom which has seen critical sites blocked and social-media users prosecuted solely for what they post online, under vaguely written antiextremism legislation," Denis Krivosheev, deputy director for Europe and Central Asia at Amnesty International, said in a July 31 statement.

"The ban on VPNs takes this shameful campaign a whole step further," he added.

Putin signed another law on July 29 that will require operators of instant messaging services, such as messenger apps, to establish the identity of those using the services by their phone numbers.

Snowden, meanwhile, called the new restrictions a "violation of human rights" https://twitter.com/Snowden/status/891822030810697728 and a "tragedy of policy."

"Banning the 'unauthorized' use of basic Internet security tools makes Russia both less safe and less free," Snowden, who continues to reside in Russia, wrote on his Twitter feed.

Visit link:
Amnesty, Snowden Decry New Russian Internet Restrictions - RadioFreeEurope/RadioLiberty

Icarus: See the Chilling Moment Russia’s Doping Doctor Realizes His Life Is in Danger – Vanity Fair

Filmmaker Bryan Fogel set out to make a gonzo documentary about dopingand ended up unearthing the largest, most unbelievable sports scandal in recent memory. The entire saga is captured in Icarus, a Sundance darling that made waves this January when Netflix acquired it for $5 millionone of the highest sums a doc has ever fetched at the festival.

The story begins with Fogel, a cyclist as well as a documentarian, investigating the effects of performance-enhancing drugs by injecting himself with those very substances. His goal is to prove how simple it is for even an amateur like him to evade anti-doping tests. For assistance, he reaches out to Dr. Grigory Rodchenkov, the Russian doctor in charge of drug testing at Moscows Olympics lab . . . and, as Fogel soon finds out, the mastermind behind the state-approved doping program that boosted his nations performance at the 2014 Sochi Olympics and beyond; as the film reveals, up to 99 percent of Russian athletes are guilty of doping.

As Fogel and Rodchenkov become more closely entwined, more and more details about the Russian doping program emerge, even as Russia denies that its Sochi medals were ill-gottenand the doctor gradually begins to realize that his insider knowledge has put a target on his back. Things come to a head in the pivotal scene youll find above, exclusively on Vanity Fair, in which Rodchenkov compares himself to Edward Snowden.

Icarus premieres on Netflix August 4.

PreviousNext

From Getty Images.

From Getty Images.

2016 Getty Images

2016 Getty Images

From Getty Images.

From Getty Images.

From Getty Images.

From Getty Images.

From Getty Images.

From Getty Images.

2016 Getty Images

2016 Getty Images

Read the original here:
Icarus: See the Chilling Moment Russia's Doping Doctor Realizes His Life Is in Danger - Vanity Fair

Newly declassified memos detail extent of improper Obama-era NSA spying – MTNV

The National Security Agency and FBI violated specific civil liberty protections during the Obama administrationby improperly searching and disseminating raw intelligence on Americans or failing to promptly delete unauthorized intercepts, according to newly declassified memos that provide some of the richest detail to date on the spy agencies ability to obey their own rules.

The memos reviewed by The Hill were publicly released on July 11 through Freedom of Information Act litigation by the American Civil Liberties Union.

They detail specific violations that the NSA or FBI disclosed to the Foreign Intelligence Surveillance Court or the Justice Departments national security division during President Obamas tenure between 2009 and 2016. The intelligence community isnt due to report on compliance issues for 2017, the first year under the Trump administration, until next spring.

ADVERTISEMENTThe NSA says that the missteps amount to a small number less than 1 percent when compared to the hundreds of thousands of specific phone numbers and email addresses the agencies intercepted through theso-called Section 702 warrantless spying program created by Congress in late 2008.

Quite simply, a compliance program that never finds an incident is not a robust compliance program, said Michael Halbig, theNSAs chief spokesman. The National Security Agency has in place a strong compliance program that identifies incidents, reports them to external overseers, and then develops appropriate solutions to remedy any incidents.

But critics say the memos undercut the intelligence communitys claim that it has robust protections for Americans incidentally intercepted under the program.

Americans should be alarmed that theNSAisvacuuming up their emails and phone calls without a warrant, said , an ACLU staff attorney in New York who helped pursue the FOIA litigation.TheNSAclaims it has rules to protectour privacy, but it turns out those rules are weak, full of loopholes, andviolated again and again.

Section 702 empowers the NSA to spy on foreign powers and to retain and use certain intercepted data that was incidentally collected on Americans under strict privacy protections. Wrongly collected information is supposed to be immediately destroyed.

The Hill reviewed the new ACLU documents as well as compliance memos released by the NSA inspector general and identified more than 90 incidents where violations specifically cited an impact on Americans. Many incidents involved multiple persons, multiple violations or extended periods of time.

For instance, thegovernment admitted improperly searching the NSAs foreign intercept data on multiple occasions, including one instance in which ananalyst ran the same search query about an American every work day for a period between 2013 and 2014.

There also were several instances in which Americans unmasked names were improperly shared inside the intelligence community without being redacted, a violation of the so-called minimization procedures that Obama loosened in 2011that are supposed to protect Americans identity from disclosure when they are intercepted without a warrant.Numerous times improperly unmasked information about Americans had to be recalled and purged after the fact, the memos stated.

CIA and FBI received unminimized data from many Section 702-tasked facilities and at times are thus required to conduct similar purges, one report noted.

NSAissued a report which included the name of a United States person whose identity was not foreign intelligence, said one typical incident report from 2015, which said theNSAeventually discovered the error and recalled the information.

Likewise, the FBI disclosed three instances between December 2013 and February 2014 of improper disseminations of U.S. persons identities.

TheNSAalso admitted it was slow in some cases to notify fellow intelligence agencies when it wrongly disseminated information about Americans. The law requires a notificationwithin five days, but some took as long as 131 business days and the average was 19 days, the memos show.

U.S. intelligence officials directly familiar with the violations told The Hill that the memos confirm that the intelligence agencies have routinely policed, fixed and self-disclosed to the nations intelligence court thousands of minor procedural and more serious privacy infractions that have impacted both Americans and foreigners alike since the warrantless spying program was created by Congress in late 2008.

Alexander Joel, who leads the Office of Civil Liberties, Privacy and Transparency under the director of national intelligence, said the documents chronicle episodes that have been reported to Congress and the Foreign Intelligence Surveillance Court for years in real time and are a tribute to the multiple layers of oversight inside the intelligence community.

We take every compliance incident very seriously and continually strive to improve compliance through our oversight regime and as evidence by our reporting requirements to the FISC and Congress, he told The Hill. That said, we believe that, particularly when compared with the overall level of activity, the compliance incident rate is very low.

The FBI said it believes it has adequate oversight to protect Americans privacy, while signaling it will be pushing Congress hard this fall to renew the Section 702 law before it expires.

The FBIs mission is to protect the American people and uphold the Constitution of the United States, the bureau said in a statement to The Hill. When Congress enacted Section 702, it built in comprehensive oversight and compliance procedures that involve all three branches of government. These procedures are robust and effective in identifying compliance incidents. The documents released on July 11, 2017 clearly show the FBIs extensive efforts to follow the law, and to identify, report, and remedy compliance matters.

Section 702 is vital to the safety and security of the American people. It is one of the most valuable tools the Intelligence Community has, and therefore, is used with the utmost care by the men and women of the FBI so as to not jeopardize future utility. As such, we continually evaluate our internal policies and procedures to further reduce the number of these compliance matters.

The new documents show that theNSAhas, on occasion, exempted itself from its legal obligation to destroy all domestic communications that were improperly intercepted.

Under the law, theNSAis supposed to destroy any intercept if it determines the data was domestically gathered, meaning someone was intercepted on U.S. soil without a warrant when the agency thought they were still overseas. The NSA, however, has said previously it created destruction waivers to keep such intercepts in certain cases.

The new documents confirm theNSAhas in fact issued such waivers and that it uncovered in 2012 a significant violation in which the waivers were improperly used and the infraction was slow to be reported to the court.

In light of related filings being presented to the Court at the same time this incident was discovered and the significance of the incident, DOJ should have reported this incident under the our immediate notification process, then-Assistant Attorney General Lisa Monaco wrote the FISA court in Aug. 28, 2012, about the episode, according to one memo released through FOIA.

TheNSAdeclined to say how often destruction waivers are given. But Joel, of the Office of the Director of National Intelligence, said the Foreign Intelligence Surveillance Court has supervised such waivers and affirmed they are consistent with the Fourth Amendment of the Constitution and the statutory requirements of Section 702.

Other violations cited in the memos:

In annual and quarterly compliance reports that have been released in recent years, U.S. intelligence agencies have estimated the number of Section 702 violations has averaged between 0.3 percent and 0.6 percent of the total number of taskings. A tasking is an intelligence term that reflects a request to intercept a specific phone number or email address.

The NSA now targets more than 100,000 individuals a year under Section 702 for foreign spying, and some individual targets get multiple taskings, officials said.

The actual number of compliance incidents remains classified but from the publicly available data it is irrefutable that the number is in the thousands since Section 702 was fully implemented by 2009, said a senior U.S. official with direct knowledge, who spoke only on condition of anonymity.

The increasing transparency on Section 702 violations is having an impact on both critics and supporters of a law that is up for renewal in Congress at the end of this year. Of concern are the instances in which Americans data is incidentally collected and then misused.

Retired House Intelligence Committee Chairman Pete Hoekstra, a Republican who strongly supported the NSA warrantless spying program when it started under President George W. Bush, said he now fears it has now become too big and intrusive.

If I were still in Congress today, I might vote with the people today to shut the program down or curtail it, Hoekstra, who has been tapped by Trump to be ambassador to the Netherlands, said in an interview.

One percent or less sounds great, but the truth is 1percent of my credit card charges dont come back wrong every month. And in my mind one percent is pretty sloppy when it can impact Americans privacy.

This story was updated at 10:38 a.m.

See the rest here:
Newly declassified memos detail extent of improper Obama-era NSA spying - MTNV

Message encryption a problem – Rudd – BBC News


BBC News
Message encryption a problem - Rudd
BBC News
The major technology companies must step up their fight against extremism or face new laws, the home secretary has told the BBC. Amber Rudd said technology companies were not doing enough to beat the enemy on the internet. Encryption tools used by ...
'Real People' Don't Need Encrypted Messaging Services, Claims UK Home SecretaryMac Rumors
You're wrong, Amber Rudd encryption is for 'real people'New Scientist
UK home secretary Amber Rudd says 'real people' don't need end-to-end encryptionBusiness Insider
Telegraph.co.uk -Wired.co.uk -BBC -Telegraph.co.uk
all 74 news articles »

Read the rest here:
Message encryption a problem - Rudd - BBC News

We don’t want to ban encryption, but our inability to see what terrorists are plotting undermines our security – Telegraph.co.uk

Awful terror attacks this year have confirmed again how terrorists use internet platforms to spread their vile ideology, and to inspire and to plan their acts of violence.

Nearly every plot we uncover has a digital element to it. Go online and you will find your own do-it-yourself jihad at the click of a mouse. The tentacles of Daesh (Isil) recruiters in Syria reach back to the laptops in the bedrooms of boys and increasingly girls in our towns and cities up and down the country. The purveyors of far-Right extremism pump out their brand of hate across the globe, without ever leaving home.

The scale of what is happening cannot be downplayed. Before he mowed down the innocents on Westminster Bridge and stabbed Pc Keith Palmer, Khalid Masood is thought to have watched extremist videos. Daesh claim to have created 11,000 new social media accounts in May alone. Our analysis shows that three-quarters...

Originally posted here:
We don't want to ban encryption, but our inability to see what terrorists are plotting undermines our security - Telegraph.co.uk

Ex-NSA boss questions encrypted message access laws proposed by Malcolm Turnbull – ABC Online

Updated August 01, 2017 07:34:44

The Federal Government's bid to force tech companies to reveal terrorists' secret conversations could be unachievable, according to the former deputy director of the US National Security Agency (NSA).

Chris Inglis had a 28-year career with the NSA and now advises private companies on how to detect Edward Snowden-style leakers within their ranks.

He told the ABC the Turnbull Government's bid to access encrypted messages sent by terrorists and other criminals is to be admired, but the technology may prove problematic.

"I don't know how feasible it is to achieve the kind of access the Government might want to have under the rule of law, the technology is tough to get exactly right," Mr Inglis told the ABC.

"But the Government is honour-bound to try to pursue both the defence of individual rights and collective security."

Encrypted messages affect close to 90 per cent of ASIO's priority cases and the laws would be modelled on Britain's Investigative Powers Act, which obliges companies to cooperate.

Technology experts, like adjust professor at the Centre for Internet Safety Professor Nigel Phair, have questioned how these laws would really work.

"From a technical perspective we are looking at very high-end computing power that makes it really, really difficult to decrypt a message on the fly, it's just not a simple process," he said.

Facebook has already indicated it will resist the Government's laws, saying weakening encryption for intelligence agencies would mean weakening it for everyone.

"Because of the way end-to-end encryption works, we can't read the contents of individual encrypted messages," a spokesman said.

But Mr Inglis said technology companies would not need to create a so-called backdoor to messages, but rather allow intelligence agencies to exploit vulnerabilities.

The NSA was criticised in May after it was revealed it knew about a vulnerability in Microsoft's system, but exploited it rather than reporting it to the company.

"Here's the dirty little secret: most of these devices already have what might be technically described as a backdoor their update mechanisms, their patch mechanisms," he said.

"My read on what you are trying to do is to put that issue on the table and say, 'we are not going to create backdoors, but we are going to try and use the capabilities that already exist'."

Mr Inglis said the Australian Government was pushing for legal powers the US Government had not called for.

"We have not had as rich a debate as what I sense is going on in Australia," he said.

"The Government by and large has not stepped in and directed that we are either going to seek a solution, we are still trying to find a voluntary way forward."

When Prime Minister Malcolm Turnbull announced the legislation, he noted strong libertarian tendencies of US-based technology companies.

Mr Inglis said Australia was "in the middle of the pack" when it came to cyber security planning.

"You are currently working through how to balance individual privacy the defence of liberty as well as we would say in the states and the pursuit of collective security," he said.

"No-one is exempt from the threats that are traversing across the cyber space at this moment in time."

Topics: science-and-technology, defence-and-national-security, security-intelligence, information-and-communication, turnbull-malcolm, government-and-politics, australia, united-states

First posted August 01, 2017 04:44:23

Read more:
Ex-NSA boss questions encrypted message access laws proposed by Malcolm Turnbull - ABC Online

Encryption and terror: how can government get the balance right? – ITProPortal

The emergence of multinational, mass-scale, internet-based social networks at the start of the 21st Century has changed the rules of communication like no other invention since the birth of broadcast radio 100 years previously.

Never before has it been possible for anyone to disseminate information, talk and share on such a mass scale, across the barriers of language and political borders. It's marvellous on so many levels.

But there's a dark side. Add easy-to-use, easy-to-access, high-strength encryption into the equation, as has indeed happened over the last few years, and we have a recipe for disaster. Terrorists and law-breakers are empowered like no previous era - and it may feel like there's no means to stop them without major incursions to civil liberties.

It's very clear that terrorist groups and other criminals are using encryption to organise their activities without fear of being detected, because strong encryption has become so easy.

Encryption proliferation, through popular messaging services - available for free, to anyone - makes it impossible for our security services to exercise their investigatory powers in the digital world in the same way they can in the physical domain.

In the physical domain, we expect privacy, of course. We expect to be able to come into our houses and close the door behind us, and no-one is allowed to come in and bother us. Quite right, too.

Unless we've broken the law and it demands we either be arrested or our property investigated.

Then, those privacy rights are clearly less important than the rule of law.

At that point, as members of a democratic society, we're bound to agree that - having obtained a judicial warrant through the laws we consent to as members of this society - security and law enforcement services ought to be able to bash through people's doors and conduct a thorough search.

But those actions are no longer available to our peacekeepers in the digital realm. The doors they have a legal warrant to breach won't break down. The wire-tap that was obtained through the courts yields only gibberish.

This cannot stand. We can't live safely in a society in which our security forces work blind and deaf.

This weakness for security and privacy are born out of design. The outer layers of the Internet, where social networks and messaging apps exist, have moved faster than its lowest levels.

The technological foundations of the Internet, invented in 1969 to enhance communications between a limited number of academic, corporate and defence systems, as DARPANET have barely moved on.

There was no thought around maintaining personal privacy on these systems back then, nor was there any thought given to the widespread use of sophisticated encryption systems.

Much the same thing is true of our legislature which, in the UK, relies on a complex system of precedents and legal acts, dating back centuries. Many current lawmakers continue to have a weak grasp of technology, and are prone to making over-generalisations that are neither practical, nor ultimately in their nation's best interest.

In short, we need to change the Internet, and our social networks.

We need to retrofit our wonderful, but dated, 1969 communications network with the powers it needs to continue to provide the amazing benefits it has done to date, but with safety and privacy embedded.

We need a blanket policy that will treat everyone the same, and give everyone their rightly deserved privacy.

A mechanism for privacy should be provided at the application layer of the Internet and this involves several steps, and some caveats.

To join future networks, identities ought to be verified. This is a complex area, and the verification credentials required of a 10-year-old girl might not be the same ones required of a 30-year-old man. But the broad proposition is that everyone should have a verifiable identity on the Internet that remains the same throughout one's life, much like your passport.

That, in itself, poses questions about privacy. If I were a young, closeted gay man, for example, then I may be looking for information and connections on the Internet that means a verified identity could threaten my privacy, and have further ramifications for my private life. That needs to be protected against.

Or what if I am now a 40-year-old businesswoman, who perhaps made some regrettable choices in my youth that are shown online? Again, people deserve that degree of privacy, just as they would normally find it in the physical world.

So, everything to be encrypted by law. Everything. Nobody, and no commercial organisation, will be allowed to read or identify your messages, browsing history or any other content you have produced on the Internet through any kind of scanning without your explicit consent.

The proviso is that when your actions and your content are encrypted, very securely, then the keys to that encryption action are retained by the service provider.

If the law enforcement or national security authorities require access to those keys, then the regulated service provider will yield them, for the specific actions for which they have a warrant. Only people with something to hide should have anything to fear - again, only warranted authorities would be allowed access.

This, I believe, is the only solution. We need privacy. We need security. We cannot continue as a free, democratic society without a balance between those two things. At Scentrics, we've put years of research into the problem, and we believe that legitimised key escrow, through agencies regulated by government, as telcos and ISPs already are, is the only solution.

There's no doubt that a transition to such a state will be resisted by some, and from well-meaning intentions. People, by-and-large, don't want to change. There's a knee-jerk lobby ready to resist any change to the status quo perceived as any infringement to existing rights. And not least, be sure that such a change would require a considerable body of legislation, communication and reassurance. It will be a long, hard road.

But consider the alternative. Across most of the Internet, private networks are harvesting everything you do, say and post. And make no mistake that state authorities are not equally interested in probing your digital persona on a mass scale. You have no privacy whatsoever in the current environment. Encryption will change the rules for that engagement - in the favour of private citizens.

The encryption tools we have now are empowering terrorists, who currently face no checks to their organisation, recruitment, and operational efforts. That cannot be allowed. Whereas server-centric encryption against verified identities will make it very hard for them to continue.

What's it to be? The status quo we have at present is entirely untenable. And the terrorists will win if we drag our feet. As for the future we are proposing? It requires compromises, but making rational compromises which balance safety and civil liberties is the very foundation of rational society.

Paran Chandrasekaran, CEO, Scentrics Image Credit: Sergey Nivens / Shutterstock

Continued here:
Encryption and terror: how can government get the balance right? - ITProPortal

Ixia’s Active SSL Sheds Light On Encrypted Traffic – No Jitter

Ixia's Active SSL Sheds Light On Encrypted Traffic By employing a network packet broker, tool can handle decryption/encryption without negatively impacting performance.

By employing a network packet broker, tool can handle decryption/encryption without negatively impacting performance.

Instead of turning a blind eye (literally) to the traffic or overburdening critical tools, Ixia's Active SSL feature lets a network packet broker handle the decrypt/encrypt process without negatively impacting performance.

The job of a network manager is really hard and continues to get harder. Complexity has increased, new devices are connected at an alarming rate, and shadow IT has run amok in most companies. However, no trend has made the network manager's life more challenging than the rise of encrypted traffic.

Encryption is the ultimate Catch-22. At first it seems like a great idea in that SSL hides traffic from the bad guys. But then you quickly realize it enables those same hackers to hide threats from the monitoring and security tools that network managers rely on to manage and protect the network.

One solution is to have the tools decrypt, do whatever they're supposed to do, and then re-encrypt the traffic. But the SSL decryption/encryption process is processor-intensive and can bring the tools to their knees, so many network and security professionals let the encrypted traffic go by and hope and pray it isn't malicious. Last year, a ZK Research study found that almost 50% of organizations admit to turning security features off in favor of performance -- and encrypted traffic is a big contributor to that percentage.

Ixia offers up a better alternative to the encrypted traffic conundrum. Instead of turning a blind eye (literally) to the traffic or overburdening critical tools, Ixia's Active SSL feature lets a network packet broker handle the decrypt/encrypt process without negatively impacting performance.

The past several years has seen an explosion in the number of purpose-built network tools aimed at helping network managers understand what's happening on the network and how to secure it. The resulting tool sprawl has created a surge of interest in network packet brokers, which Ixia describes as a middleman for network monitoring traffic. These devices make adding new tools plug and play, performing the majority of the heavy lifting of traffic so the tools can do what they were meant to do and no more.

Ixia has added the Active SSL feature to its SecureStack software set that runs on its Vision One network packet brokers. Ixia's customers can use the platform to identify performance problems across physical and virtual networks as well as better secure the environment. Active SSL highlights include:

Active SSL also uses something called "ephemeral keys" to provide forward secrecy and protect past and future data exchanges. Ephemeral keys are cryptographic keys generated for each execution of the key establishment process. The use of the ephemeral keys means traffic is un-encrypted, inspected, and re-encrypted before being sent back to the network.

Some organizations have shied away from encrypting traffic because of the overhead involved in doing so, but the IETF's Transport Layer Security (TLS) 1.0 standard, which uses ephemeral keys, improves both security and performance. With TLS, the use of encrypted traffic will likely accelerate, making Active SSL and other solutions that can help bring light to a growing blind spot.

Follow Zeus Kerravala on Twitter and Google+! @zkerravala Zeus Kerravala on Google+

Read the rest here:
Ixia's Active SSL Sheds Light On Encrypted Traffic - No Jitter