. Military Space News .
CYBER WARS
In fight on terror, encryption is double-edged sword
By Rob Lever
Washington (AFP) Nov 21, 2015


Starwood Hotels reveals North America cyber intrusion
New York (AFP) Nov 20, 2015 - Starwood Hotels, which operates the Sheraton and Westin chains, said Friday that hackers had infected payment systems in some of its establishments, potentially leaking customer credit card data.

The hack occurred at "a limited number" of its hotels in North America, according to Starwood, whose other well-known chains include St Regis and W Hotels.

Starwood said that an investigation by forensic experts concluded that malware was detected in some restaurants, gift shops and other points of sale systems at hotels.

"The malware was designed to collect certain payment card information, including cardholder name, payment card number, security code and expiration date," the group said in a statement.

"The affected hotels have taken steps to secure customer payment card information and the malware no longer presents a threat to customers using payment cards at Starwood Hotels."

Sergio Rivera, Starwood's president for the Americas, said the company has been working with law enforcement and payment card organizations.

"We want to assure our customers that we have implemented additional security measures to help prevent this type of crime from reoccurring," he said.

Encryption can be a terrorist's tool. But it's also a key for those hunting attackers, and for many others.

The technology for encryption can keep data and conversations private, making it a double-edged sword that can equally be used by democracy campaigners, law enforcement or violent extremists.

The November 13 attacks in Paris spurred calls for better tools for investigators to track criminals who rely on encrypted communications.

But no solution is readily available that would avoid major impacts on privacy, civil liberties and a wide range of online communications including electronic commerce.

The US government is both a supporter of encryption -- funding projects aimed at helping pro-democracy activists -- while at the same time pressing for ways to gain access to encrypted data for certain investigations.

"That schizophrenia is inherent in the NSA (National Security Agency) itself," said Sascha Meinrath, who heads the digital rights group X-Lab.

"The NSA is tasked both to secure our communications and to survey our communications."

Interest in encryption has been growing since revelations in documents leaked in 2013 by former US intelligence contractor Edward Snowden describing the NSA's vast abilities to sweep up data.

But officials from the CIA, NSA and FBI as well as lawmakers and local law enforcement leaders have complained that they are "going dark," unable to tap into new encrypted apps and smartphones which may be locked down with keys available only to users.

- 'We need Silicon Valley' -

Democratic presidential candidate Hillary Clinton joined the debate, saying "we should take the concerns of law enforcement and counterterrorism professionals seriously."

"They have warned that impenetrable encryption may prevent them from accessing terrorist communications and preventing a future attack."

Clinton said Thursday that "we need Silicon Valley not to view government as its adversary."

"We need to challenge our best minds in the private sector to work with our best minds in the public sector to develop solutions that will both keep us safe and protect our privacy," she said.

But technology specialists in the private sector argue that any "back door" allowing authorities to gain access to encrypted data, could also be exploited by a hacker, or used by repressive regimes as well as democratic ones.

"Anytime you introduce a back door you can't just program it so only one entity can grab that data," said Mike Janke, chief executive of Silent Circle, an app featured on a "safe" list recently circulated by the Islamic State organization.

"Hackers can get into it better than anybody."

- Pressure to act -

Technology players defend the principles of encryption, saying it is legitimately used to keep data confidential by Fortune 500 companies, government leaders, journalists and dissidents around the world.

Meinrath said encryption "is one of the world's most used technologies for routing around censorship. It enables millions of people to access information and news that they would otherwise not see."

The US government has acknowledged this need by funding projects for secure and encrypted communications through the Open Technology Fund led by Radio Free Asia, and which Meinrath has advised.

Illustrating the complexity of the issue, however, the fund provided more than $1.3 million to the Open Whisper project -- whose Redphone and Signal apps have been deemed "safe" by IS for its members to use.

The US military also created the Tor network for encrypted communications, which was developed for secret military communications but is also used now for underground "Darknet" markets.

Under pressure to act following the Paris attacks, Silent Circle and others took some steps to make it harder for terrorists to use their services.

Janke told AFP the Swiss-based company was "enacting more aggressive back-end payment technology to reduce the likelihood of evildoers" like IS using the service.

Telegram, a secure communications app created by Russian Internet guru Pavel Durov, said it had blocked dozens of accounts associated with IS that were reportedly being used to spread extremist propaganda.

Activists say the current debate revives the 1990s "crypto war" battle when the government sought a special "key" for Internet communications, before throwing in the towel.

- For good or evil -

Encryption backers say it is like any other technology -- whether it is a car, telephone or gun -- which can be used for good or evil.

"Encryption is a security tool we rely on everyday to stop criminals from draining our bank accounts, to shield our cars and airplanes from being taken over by malicious hacks, and to otherwise preserve our security and safety," said Dean Garfield of the Information Technology Industry Council, which represents major tech firms.

"We deeply appreciate law enforcement's and the national security community's work to protect us," he said.

"But weakening encryption or creating back doors to encrypted devices and data for use by the good guys would actually create vulnerabilities to be exploited by the bad guys, which would almost certainly cause serious physical and financial harm across our society and our economy."

Jason Healey, a former White House advisor who is now a Columbia University researcher and Atlantic Council fellow, said any new laws on encryption are unlikely to be effective.

"If the terrorists are clever enough to avoid NSA-monitored technology, won't they be smart enough to avoid future NSA-backdoored cryptography and devices?" he wrote in The Christian Science Monitor.

"They will simply switch to non-US software that has more privacy safeguards or is difficult to monitor."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Northrop Grumman receives contract for encryption devices
Washington (UPI) Nov 17, 2015
Northrop Grumman has been awarded a maximum $99.9 million indefinite-delivery/indefinite-quantity, firm-fixed-price contract to deliver KGV-72 Type-1 Programmable Inline Encryption Devices. The systems will be used to process classified messaging traffic encryption through the Joint Battle Command-Platform, which provides platform interoperability to the U.S. Army and U.S. Marine Corps ... read more


CYBER WARS
Patriot takes out two ballistic missiles in latest test

Army system integrates different radars for Patriot-3 interceptor

Putin: Russia Has Weapons Capable of Penetrating Any Missile Defenses

Lockheed Martin to build Ballistic Missile Defense radar

CYBER WARS
Navy, Boeing test new Harpoon missile variant

Hundreds of TOW missiles tipped for sale to Morocco

Sale of Harpoon missiles to South Korea in the works

Northrop Grumman tests Battle Command System against cruise missiles

CYBER WARS
Japan to acquire Global Hawk drones

Former operators speak out about US drone killings

Navy starts pre-Milestone C tests on MQ-4C Triton UAS

Thales Group unveils Spy'Ranger mini-drone

CYBER WARS
Australia contracts for defense computer network upgrades

Harris Corporation Wins $40 Million Air Force Satellite Control Network Contract Extension

Commercialization is coming to WGS

DARPA's RadioMap Program Enters Third Phase

CYBER WARS
Rockwell Collins opens new facility in India

Tank Killer: New Armata gets really big gun

Raytheon's Next Generation Jammer completes preliminary design review

Australia seeks costing info for new armored vehicles

CYBER WARS
US approves $1.29 bn sale of bombs to Saudi Arabia

New York City turns tide on homeless vets

Orbital ATK and Boeing open offices in UAE

Bullets, cluster bombs at Thai arms fair despite censure over junta rule

CYBER WARS
Protests, South China Sea tensions at Asia-Pacific summit

Obama ups pressure on China at Asia-Pacific summit

Finland to consider lifting ban on military operations abroad

China tells Obama to keep out of South China Sea disputes

CYBER WARS
Light wave technique an advance for optical research

Nanostructuring technology can simultaneously control heat and electricity

Rice makes light-driven nanosubmarine

Novel 'crumpling' of hybrid nanostructures increases SERS sensitivity









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.