{"id":32945,"date":"2017-08-11T07:41:14","date_gmt":"2017-08-11T11:41:14","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/ex-mi5-chief-warns-against-crackdown-on-encrypted-messaging-apps-the-guardian.php"},"modified":"2017-08-11T07:41:14","modified_gmt":"2017-08-11T11:41:14","slug":"ex-mi5-chief-warns-against-crackdown-on-encrypted-messaging-apps-the-guardian","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/ex-mi5-chief-warns-against-crackdown-on-encrypted-messaging-apps-the-guardian.php","title":{"rendered":"Ex-MI5 chief warns against crackdown on encrypted messaging apps &#8211; The Guardian"},"content":{"rendered":"<p><p>  Jonathan Evans, former director general of the British security  service, says Islamist terrorism will remain a threat for another  20-30 years. Photograph: PA<\/p>\n<p>    A former head of MI5 has spoken out    against curtailing use of encryption in messaging apps despite    warning that Islamist terrorism will remain a threat for up to    another 30 years.  <\/p>\n<p>    Jonathan Evans said the terrorist threat to Britain was a    generational problem, and suggested the Westminster Bridge    attack in March may have had an energising effect on    extremists.<\/p>\n<p>      Without encryption, everything sent over the internet  from      credit card details to raunchy sexts  is readable by anyone      who sits between you and the information's recipient. That      includes your internet service provider, and all the other      technical organisations between the two devices, but it also      includes anyone else who has managed to insert themselves      into the chain, from another person on the same insecure      wireless network to a state surveillance agency in any      country the data flows through.    <\/p>\n<p>      With encryption, that data is scrambled in such a way that it      can only be read by someone with the right key. While some      older and clumsier methods of encryption have been broken,      modern standards are generally considered unbreakable even by      an attacker possessing a vast amount of computer power.    <\/p>\n<p>      But while encryption can protect data that it is vital to      keep secret (which is why the same technology that keeps the      internet encrypted is used by militaries worldwide), it also      frustrates efforts by law enforcement to eavesdrop on      terrorists, criminals and spies.    <\/p>\n<p>      That's particularly true for end-to-end encryption, where      the two devices communicating are not a user and a company      (who may be compelled to turn over the information once it      has been decrypted), but two individual users.    <\/p>\n<p>    Thank you for your feedback.  <\/p>\n<p>    But Lord Evans, who retired from the security service in 2013,    told BBC Radio 4s Today programme that he would not support a    clampdown on use of encryption.<\/p>\n<p>    His comments came after Amber Rudd, the home secretary,    argued that    internet companies were not doing enough to tackle    extremism online. She has previously singled out the use of    encryption as a problem.  <\/p>\n<p>    Acknowledging that use of encryption had hampered security    agencies efforts to access the content of communications    between extremists, Evans added: Im not personally one of    those who thinks we should weaken encryption because I think    there is a parallel issue, which is cybersecurity more broadly.  <\/p>\n<p>    While understandably there is a very acute concern about    counter-terrorism, it is not the only threat that we face. The    way in which cyberspace is being used by criminals and by    governments is a potential threat to the UKs interests more    widely.  <\/p>\n<p>    Its very important that we should be seen and be a country in    which people can operate securely  thats important for our    commercial interests as well as our security interests, so    encryption in that context is very positive.  <\/p>\n<p>    After the home secretarys intervention at the Global    Internet Forum to Counter Terrorism in California this    month, the companies taking part said they were cooperating to    substantially disrupt terrorists ability to use the internet    in furthering their causes, while also respecting human    rights.  <\/p>\n<p>    Looking ahead, Evans warned of the threat of a cyber-attack    against the internet of    things  the networking of physical devices, ranging from    cars to lightbulbs to TVs  as a major issue.<\/p>\n<p>    As our vehicles, air transport, our critical infrastructure is    resting critically on the internet, we need to be really    confident that we have secured that because our economic and    daily lives are going to be dependent on the security we can    put in to protect us from cyber-attack, he said.  <\/p>\n<p>    But the threat of Islamist terrorism was likely to remain at    the fore for 20-30 years, he warned.  <\/p>\n<p>    Were at least 20 years into this. My guess is that we will    still be dealing with the long tail in another 20 years time     I think this is genuinely a generational problem, Evans said.  <\/p>\n<p>    I think that we are going to be facing 20 or 30 years of    terrorist threats and therefore we need absolutely critically    to persevere.  <\/p>\n<p>    He said the London    bombings in July 2005 triggered an energising effect on    the extremist networks in the UK, and thought there would be a    similar feeling after the Westminster Bridge attack.<\/p>\n<p>    We did see a huge upsurge in threat intelligence after 7 July    and I suspect that theres the same sort of feeling in the    period after the Westminster Bridge attack  that a lot of    people who thought Id like to do this suddenly decided Yep,    if they can do it, then I can do it.  <\/p>\n<p>    Since the atrocity in March, there have been attacks in    Manchester, London Bridge and Finsbury Park.  <\/p>\n<p>    Evans, now an independent crossbencher in the House of Lords,    also told the programme he would be surprised if Russia had not    attempted to interfere with British democracy, after repeated    allegations of Kremlin interference in foreign elections.<\/p>\n<p>    He said: It would be extremely surprising if the Russians were    interested in interfering in America and in France and in    various other European countries but were not interested in    interfering with the UK, because traditionally I think we have    been seen as quite hawkish and therefore I would be surprised    if there had not been attempts to interfere with the election.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.theguardian.com\/technology\/2017\/aug\/11\/ex-mi5-chief-warns-against-crackdown-encrypted-messaging-apps\" title=\"Ex-MI5 chief warns against crackdown on encrypted messaging apps - The Guardian\">Ex-MI5 chief warns against crackdown on encrypted messaging apps - The Guardian<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Jonathan Evans, former director general of the British security service, says Islamist terrorism will remain a threat for another 20-30 years. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32945","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32945"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32945"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32945\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}