Thursday, July 10, 2014

The Rise of Encryption

Disclosures from Edward Snowden about NSA surveillance has had an interesting yet perhaps unsurprising consequence on the world of technology.  As the general public learns increasingly more about the capabilities of the US intelligence community, individuals from all walks of life have begun seeking methods to safeguard their online privacy.  And while the government would argue that only those with something to hide should be concerned, this has not stemmed the tide of encryption for everyone. 

When Edward Snowden attempted to set up an encrypted communication channel with journalist Glenn Greenwald, not even a 12-minute tutorial video that Snowden made helped Greenwald understand how to use PGP.   To help overcome the steep learning curve associated with cryptogrpahy,  Nadim Kobeissi  has developed an encryption program called miniLock which will be released later this year in beta version at the HOPE hacker conference in New York.  The program has been designed as “a free and open-source browser plugin designed to let even Luddites encrypt and decrypt files with practically uncrackable cryptographic protection in seconds” (Greenberg, 2014).  Utilizing public-key encryption, miniLock can be used to encrypt a variety of files from pictures on a thumb drive to documents uploaded to Dropbox or Google Drive.  According to Kobeissi, the usual complexity of employing public and private encryption keys has been simplified to provide a user-friendly privacy solution.  A more technical explanation of the cryptography behind this software is being saved for the beta release at the HOPE conference later this month. 

In addition to providing law-abiding citizens with a privacy tool, the development of miniLock and programs like it has also lead to an increase in the number of nefarious uses.  According to an annual report released by the US court system this year, the number of criminals employing encryption has steadily increased throughout the last ten years (Greenberg, 2014).


Even though the use of encryption by criminals represents a very small number (0.25%), the more interesting statistic is that law enforcement was defeated by strong encryption 9 times in 2013.  This represents over a 100% increase since 2012 (4 times) and before 2012, the number was 0 (Greenberg, 2014). 

So what’s a law enforcement or intelligence agency supposed to do?  In a recent UK case, a computer science student named Christopher Wilson was jailed for six months for failing to disclose his encryption passwords to authorities (Leyden, 2014).  As a security professional, I can see both sides of the argument.  If no other evidence exists implicating an individual in a crime should they be compelled to give up their digital privacy?  And on the flipside of that coin, just how many more criminal cases will be stymied in 2014 by increasingly easy to use yet secure encryption solutions? 


References
Greenberg, A. (2014). Rising use of encryption foiled the cops a record 9 times in 2013. Wired. Retrieved from http://www.wired.com/2014/07/rising-use-of-encryption-foiled-the-cops-a-record-9-times-in-2013/

Greenberg, A. (2014). The ultra-simple app that lets anyone encrypt anything. Wired. Retrieved from http://www.wired.com/2014/07/minilock-simple-encryption/

Leyden, J. (2014). Computing student jailed after failing to land over crypto keys. The Register. Retrieved from http://www.theregister.co.uk/2014/07/08/christopher_wilson_students_refusal
_to_give_up_crypto_keys_jail_sentence_ripa/