Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
New privacy battle looms after moves by Apple, Google
by Staff Writers
Washington (AFP) Oct 01, 2014


Cyber-security highlighted by public-private alliance
Nashville (UPI) Oct 1, 2014 - Public and private-sector leaders on Wednesday kicked off a month of nationwide activities and events to promote cyber-security.

National Cyber Security Awareness Month 2014 is a project of the National Cyber Security Alliance, a public-private partnership, and started this year with an event at the National Association of State Chief Information Officers conference in Nashville, Tenn.

"We're thrilled to kick-off NCSAM 2014 in Nashville this year and are looking forward to an engaging dialogue with some of the nation's top cyber-security experts," said Michael Kaiser, executive director, NCSA.

"We want to thank Facebook for providing a live stream of the event for the fourth year in row. Streaming the NCSAM launch on Facebook Live will allow us to reach a broader audience than ever before with a clear message to join forces this October and beyond to build a safer, more secure Internet."

Added Joe Sullivan, Facebook's chief security officer: "Security awareness is one of the most powerful tools available for protecting people's information in today's online environment. Connecting people securely is core to what we do at Facebook, and we look forward to seeing what we can achieve this month as a community."

The meeting in Nashville Wednesday featured panel discussions and speakers, including Tennessee State Chief Information Officer Mark Bengel, Tennessee Gov. Bill Haslam and security experts from a number of companies and government agencies.

National Cyber Security Awareness Month is co-sponsored by the U.S. Department of Homeland Security in cooperation with the NCSA and the Multi-State Information Sharing and Analysis Center.

A new battle is brewing over privacy for mobile devices, after moves by Google and Apple to toughen the encryption of their mobile devices sparked complaints from law enforcement.

The issue is part of a long-running debate over whether tech gadgets should have privacy-protecting encryption which makes it difficult for law enforcement to access in time-sensitive investigations.

FBI director James Comey reignited the issue last week, criticizing Apple and Google for new measures that keep smartphones locked down -- without even the company holding the keys to unlock the data.

"What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law," the FBI chief said, warning that law enforcement may be denied timely access, even with a warrant, in cases ranging from child kidnapping to terrorism.

Former FBI criminal division chief Ronald Hosko made a similar point in an opinion piece in the Washington Post, citing a case in which the agency used smartphone data to solve a brutal kidnapping just in time to save the life of the victim.

"Most investigations don't rely solely on information from one source, even a smartphone," he said. "But without each and every important piece of the investigative puzzle, criminals and those who plan acts destructive to our national security may walk free."

- Crypto Wars 2.0 -

Observers who follow privacy and encryption say they have seen this debate before.

In the mid-1990s, as the Internet was gaining traction, the government pressed for access to digital "keys" to any encryption software or hardware, before abandoning what ended up being a futile effort.

"This is Crypto Wars 2.0," says Joseph Hall of the Center for Democracy and Technology, a digital rights group active in both campaigns.

Today, "the main difference is that phones are increasingly deeply personal, containing much more daily life and interaction than a desktop from the 1990s" Hall said.

Hall argued that giving law enforcement access requires companies to "engineer vulnerabilities" which could be exploited by hackers or others.

"There's no way to tell the difference between a good guy and bad guy when they walk through the back door," he said.

Cindy Cohn of the Electronic Frontier Foundation says the FBI has been making these arguments since 1995, with the same flawed logic.

"We've seen this movie before," Cohn said.

"Regulating and controlling consumer use of encryption was a monstrous proposal officially declared in 2001," she said in a blog post. "But like a zombie, it's now rising from the grave, bringing the same disastrous flaws with it."

In 2013, before the revelations of massive surveillance from leaked National Security Agency documents, the FBI called for broader authority to capture mobile communications which fall outside traditional surveillance, such as Skype and Google Hangouts.

But civil liberties activities say leaked NSA documents suggest that contrary to FBI claims made last year, the government has many tools at its disposal.

"There are an increasing number of places where we leave our digital trails," Hall said, including in the Internet cloud, where it can be accessed with a court order.

- No back doors -

Jennifer Granick, director of civil liberties at the Stanford University Center for Internet and Society, said the FBI argument overlooks the fact US tech firms must compete in the global marketplace.

"Global customers do not want backdoored products any more than Americans do, and with very good reason," Granick writes on the "Just Security" blog.

"Authoritarian countries like Russia, China, the United Arab Emirates, Sudan, and Saudi Arabia want to censor, spy on, and control their citizens' communications. These nations are just as able to make demands that Apple and Google decrypt devices as the FBI is, and to back up those demands with effective threats."

On balance, she said, "the public is more secure, not less secure, with the wide use of strong cryptography -- including cryptography without back doors."

Mike Janke, chief executive of the firm Silent Circle which makes the fully encrypted Blackphone, said the FBI is making a "false cry" against Google and Apple because the law enforcement agency can easily gain access to a phone -- through a carrier tap, or location tracking, for example.

Greater privacy, Janke said, comes from the harder encryption on Blackphone, but law enforcement can still track a user's location as long as the battery is inside.

While a small number of people may use encryption for nefarious purposes, Janke said, "do you sacrifice the privacy and trade secrets of everyone else because of that?"

rl/mdl

GOOGLE

APPLE INC.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Body cameras join cops on the beat in US
Laurel, United States (AFP) Sept 30, 2014
For a growing number of police officers in the United States, miniature video cameras are becoming as much a part of the uniform as a pistol, handcuffs and badge. "I've been doing this for so long, I'm just used to it," said officer Aaron Waddell of the local police force in Laurel, a Washington suburb of 25,000 that introduced body cameras nearly two years ago. The rules are simple: whe ... read more


CYBER WARS
Turning the Moon into a cosmic ray detector

Russia to Launch Full-Scale Moon Exploration Next Decade

Lunar explorers will walk at higher speeds than thought

Year's final supermoon is a Harvest Moon

CYBER WARS
India's Mars Orbiter Cost Only 11 Percent of NASA's Maven Probe: Reports

India's spacecraft beams back first Mars photos

NASA Rover Drill Pulls First Taste From Mars Mountain

Back to Driving

CYBER WARS
Crew selected for eight-month Mars simulation

Orion Recovery Tests Help Teams Prepare for December Flight

NASA technologies to be studied for commercialization

NASA Seeks Best and Brightest for Space Technology Fellowships

CYBER WARS
China's first space lab in operation for over 1000 days

China Exclusive: Mars: China's next goal?

Astronauts eye China's future space station

China eyes working with other nations as station plans develop

CYBER WARS
NASA Expands Commercial Space Program

Yelena Serova becomes first Russian woman aboard space station

Crew including first woman cosmonaut in 17 years blasts off for ISS

A Giant Among Earth Satellites

CYBER WARS
Arianespace's lightweight Vega launcher is readied for its mission with the European IXV spaceplane

Soyuz Rocket Awaiting Launch at Baikonur Cosmodrome

Elon Musk, Rick Perry attend groundbreaking for Texas spaceport

France raises heat on decision for next Ariane rocket

CYBER WARS
New milestone in the search for water on distant planets

Clear skies on exo-Neptune

Distant planet's atmosphere shows evidence of water vapor

Chandra Finds Planet That Makes Star Act Deceptively Old

CYBER WARS
France taps Thales for radar antenna research project

Fed Up With Federal Inaction, States Act Alone on Cap-and-Trade

Microsoft to tap $2-trillion Indian cloud market

How to make stronger, 'greener' cement




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.