How much cyber security is too much cyber security?

How much cyber security is too much cyber security?

This post is also available in: heעברית (Hebrew)

35907681_mLarge terror organizations, being an important target of world’s intelligence agencies, are well aware of their inferior situation in comparison to the national organizations, and so they’ve made a conceptual change in the way they operate. In order to magnify their reputation and to publish it in as many places around the world, these organizations are make obvious use in popular media and the internet both to spread propoganda and to communicate with their members. ISIS is a major example for using popular media and communications networks to its use, and with understanding they have no chance in the technological battlefield against the CIA, the use of encrypting technologies is becoming more apparent in their patterns of communications with their members all over the world to plan attacks without being exposed.

ISIS has instructed its members to manage communications through different encrypted routes, from regular smartphone apps such as Telegram or Kick, to encoding computer IP adresses. In order to deal with this, american authorities are trying as of late to pass laws to force the major communication companies, whose products are being used by terrorists, to install a back-way breach to allow the decoding to be cracked in case the need arises. As a result, 15 experts from all areas of cyber security, technology and law have prepared a report that objects to the american government officials’ requests. First and foremost, the objection is over the claim that citizens would resis purchasing technological means while knowing that they contain an inherent breach of security through which anyone can violate their privacy.

Subscribe to our newsletter.

On top of this, the authors claim that the request conatin many technological issues that should be given more thought. Since all communications companies will be demanded to construct inherent breaches in their products, it means that there will be a single unified encoding system for them all, which begs for the question – who will have access to bypass the encoding system which is so widespread? After all, a small number of people will have the ability to access into any account of any citizen if they wish it. Furthermore, the people holding the key to decoding this general encryption, citizens of government officials, will be a main target for cyber attacks by every hostile person of body and as latest events have proven, even the United States’ government and army aren’t immune to hackers’ attacks. The writers of the report claim that even if the idea, led by U.S. law enforcement agencies, will be successful and there will be no possible breaches to serve as weakpoints, all a person would have to do to bypass the restriction is simply to purchase a device from a company that isn’t commited to these regulations.

Another important matter which the writers of the report criticize is that laws such as this one will cause a great deal of damage of the United States’ reputation around the world as a beacon and symbol of personal freedom for citizens. It’s hardly worth mentioning how much this reputation was already severely damaged from the exposures by Edward Snowden. Installing inherent breaches in technological devices will also expose the people using them to cyber attacks, so that in fact the law will actually turn the citizens, those it is supposed to protect, much more vulnerable.