{"id":32088,"date":"2017-06-09T19:41:52","date_gmt":"2017-06-09T23:41:52","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/infosec17-society-needs-to-address-encryption-dilemma-computerweekly-com.php"},"modified":"2017-06-09T19:41:52","modified_gmt":"2017-06-09T23:41:52","slug":"infosec17-society-needs-to-address-encryption-dilemma-computerweekly-com","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/infosec17-society-needs-to-address-encryption-dilemma-computerweekly-com.php","title":{"rendered":"Infosec17: Society needs to address encryption dilemma &#8211; ComputerWeekly.com"},"content":{"rendered":"<p><p>    According to one of the directors at Interpol we are facing a    tsunami of criminality online, says Mary Aiken, forensic    cyber psychologist and advisor to the European    Cyber Crime Centre (EC3) at Europol.  <\/p>\n<p>        Find out what are the most appropriate threat intelligence        systems and services for your organisation      <\/p>\n<p>            By submitting your personal information, you agree that            TechTarget and its partners may contact you regarding            relevant content, products and special offers.          <\/p>\n<p>              You also agree that your personal information may be              transferred and processed in the United States, and              that you have read and agree to the Terms of Use and the Privacy Policy.            <\/p>\n<p>    We are going to have to think about governance in this space    even though this makes some people uncomfortable, she told    Infosecurity    Europe 2017 in London.  <\/p>\n<p>    But if we do not have some form of governance in the cyber    context, that will negatively affect real-world social order,    she said.  <\/p>\n<p>    Aikens comments coincide with fresh calls by the European    Commission (EC) to give law enforcement new powers to obtain    information from online service providers such as Facebook and    Google as part of new measures to fight terrorism.  <\/p>\n<p>    The EC has proposed multiple ways to     make it easier for police to retrieve data stored in the cloud    directly from technology companies in response to    complaints about delays in investigations, reports the    Telegraph.  <\/p>\n<p>    The proposals include allowing security forces in one member    state to ask a tech firm directly for data without consulting    the authorities in that state, introducing an obligation on    tech firms to hand over data to any force from a member state    when a legal request is made, and giving police forces direct    access to servers so they can copy the data they need.  <\/p>\n<p>    This third option is kind of an     emergency possibility which will require some additional    safeguards protecting the privacy of people, Vera Jourova,    European Union (EU) justice commissioner, told Reuters. These    safeguards would include requiring that law enforcement    requests are necessary and proportionate, she added.  <\/p>\n<p>    EU justice ministers are aiming to put forward a proposal for    future legislation in this regard by the end of the year or    early 2018.  <\/p>\n<p>    According to Aiken, there are three aims in apparent conflict,    which are privacy, collective security and the aim of the    vitality of the tech industry.  <\/p>\n<p>    To achieve a balance in cyber space, none of those aims can    have primacy over the other, she said, adding that she is    very concerned from a policing and governance point of view    that there are encrypted domains that are effectively beyond    the law or cannot be accessed easily when necessary.  <\/p>\n<p>    It will be almost impossible real-time to deliver on    collective security when this information in obfuscated, she    said, suggesting there needs to be a conversation about how    best to resolve these tensions.  <\/p>\n<p>    We need to stop thinking about things like cyber security and    child development in silos and start joining the dots, said    Aiken.  <\/p>\n<p>    It is all connected. We cant look at any one problem in    isolation. Hackers dont wake up at 15 and decide to become a    hacker. Theres a developmental pathway to hacking, and if we    can understand that and address that early on, then we can    start tackling that problem over time.  <\/p>\n<p>    The UK has shown incredible leadership in this regard, said    Aiken, in terms of access to online pornography, which is very    damaging for young people and looking at online age    verification, which is critical in terms of child protection.  <\/p>\n<p>    This is an issue that everyone in society should be concerned    about, she said, because in time these children will begin to    shape society. When we are all sitting in a nursing home, they    are the ones who are going to be running the country, and they    may not have the level of empathy that is conducive to looking    after everybody else.  <\/p>\n<p>    Asked about concerns from the information security community    about giving advantages to criminals by making data more    accessible to law enforcement, Aiken said this is the crux of    the debate, but without being prescriptive about what should be    done, there have to be checks and balances in place.  <\/p>\n<p>    Effectively, if we see increasing amounts of negative    behaviour associated with wide use of encryption across social    media platforms, for example, and that has a negative impact,    then we are going to have to think about it again and have a    conversation about where robust encryption is appropriate and    where it is not, she said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.computerweekly.com\/news\/450420453\/Infosec17-Society-needs-to-address-encryption-dilemma\" title=\"Infosec17: Society needs to address encryption dilemma - ComputerWeekly.com\">Infosec17: Society needs to address encryption dilemma - ComputerWeekly.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> According to one of the directors at Interpol we are facing a tsunami of criminality online, says Mary Aiken, forensic cyber psychologist and advisor to the European Cyber Crime Centre (EC3) at Europol. Find out what are the most appropriate threat intelligence systems and services for your organisation By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32088","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32088"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32088"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32088\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}