2017 Encryption Landscape

2017 Encryption Landscape

There is a growing belief that 2017 will be a decisive year in the battle over encryption that has been quietly raging for over 25 years.  This ongoing battle has pitted the federal government, who argues that some form of encryption backdoors are needed for national security purposes, against security professionals and privacy advocates, who argue that these types of backdoors are foolhardy at best and dangerous at worst.  The recent election of Donald Trump, the self-described “law-and-order” president, threatens to upend the shaky détente that currently exists between these two competing camps.  If early indications are true and Trump does in fact take a more strident approach towards issues of security and privacy, organizations and vendors alike will be facing a radically altered landscape in 2017.

For a preview of the type of changes that may be in store, one needs to look no further than to the UK, where a recently-passed bill, named the British Investigatory Powers Bill (aka “Snooper’s Charter”), is already causing widespread changes.  This new law allows the UK government to engage in online surveillance, to perform wholesale bulk collection of every citizen’s metadata, and to have the legal authority to hack into devices remotely.  Furthermore, the law enables the government to impose what is called a “technical capability notice” on a commercial entity, which would oblige them to change or modify their product to remove any form of electronic protection applied by the company to any communications or data.  In other words, the government is demanding that companies have the backdoor capability of removing the encryption that is being used to protect data.

The impact on commercial entities that deal with any sort of consumer or citizen data is becoming clear: they will be required to collect, store, maintain, and disclose this information when presented with a warrant.  While this will present data storage challenges to an organization, the greater fear is the worry about hacking.  For all the talk about safeguarding data, it’s now clear that it is virtually impossible to stop a determined hacker from compromising data.  In the last year alone, major commercial entities, such as Yahoo, Verizon and LinkedIn, have all been hacked.  In other words, it’s not a question of if a company will be hacked; it’s simply a question of when.  While companies will continue to try to find ways to prevent these hacks, 2017 will be the year of an increased focus on mitigating the impact of inevitable breaches.

On the flip side, security vendors, especially those that deal with encryption technology, will be faced with a dilemma.  Encryption is built on a foundation of math. If a backdoor weakness were purposely built in due to some type of mandate, then the mathematical underpinning of encryption will have an inherent vulnerability that will be identified and exploited by sophisticated hackers.  Furthermore, even if vendors were to put in a backdoor, it would have no real effect at stopping criminals due to the widespread availability of other tools and encryption services that go beyond the reach of federal authorities.  Thus, compliance with any sort of federal mandate will likely result in a significant commercial impact to the vendor’s business as clients migrate to other solutions or services.

To avoid the economic impact caused by the insertion of a backdoor, vendors will likely migrate toward an alternate deployment model that relies on “safe harbor” provisions.  Like the safe harbor provisions used within the Digital Millennium Copyright Act (DMCA), vendors will claim protection from monetary or legal liability based on the allegedly infringing activities of third parties.  For data being sent across the Internet, this can be achieved by implementing a more advanced encryption model that takes advantage of one-time use keys to protect the data being sent to and from different parties.  For statically stored data, this can be done by moving to a model where the keys used to unlock this stored data are uniquely tied to an individual using biometrics or other similar techniques.  In both models, because the keys are self-deleting and/or uniquely linked to the user, neither the vendor nor the organization can unlock this data themselves and thus cannot be subject to a court order.  Importantly, these approaches also provide an immediate security benefit by providing another protective layer against hackers who attempt to steal data.

The debate that started 25 years ago when the U.S. government attempted to regulate encryption in the early days of the Internet seems destined to explode into the limelight in 2017.  The national conversation that results will dramatically shape the encryption landscape for years to come.   

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.