{"id":74723,"date":"2015-02-05T19:03:00","date_gmt":"2015-02-06T00:03:00","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-08-09T12:16:09","modified_gmt":"2022-08-09T16:16:09","slug":"spies-say-encryption-best-to-protect-data","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/spies-say-encryption-best-to-protect-data\/","title":{"rendered":"Spies Say Encryption Best to Protect Data"},"content":{"rendered":"<p><strong>Updated August 01, 2019 &#8211;<\/strong> Trump&#8217;s top cop U.S. <b><\/b>Attorney General William Barr rehashed the <a href=\"https:\/\/cdt.org\/press\/ag-barr-repackages-time-worn-encryption-arguments\/\" target=\"_blank\" rel=\"noopener noreferrer\">time-worn government demands<\/a> for private firms to <strong>break encryption<\/strong>. AG Barr closed his July 23, 2019 speech at the <a href=\"https:\/\/www.justice.gov\/opa\/speech\/attorney-general-william-p-barr-delivers-keynote-address-international-conference-cyber\" target=\"_blank\" rel=\"noopener noreferrer\">International Conference on Cyber Security<\/a>, by <a href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/08\/post-snowden-tech-became-more-secure-but-is-govt-really-at-risk-of-going-dark\/\" target=\"_blank\" rel=\"noopener noreferrer\">saying<\/a> that U.S. citizens should <strong>accept encryption backdoors<\/strong> because backdoors are essential to our security.<\/p>\n<p style=\"text-align: center;\">&#8212;<\/p>\n<p><a href=\"http:\/\/www.diskinternals.com\/bitlocker\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-101882\" title=\"Spies Say Encryption Best to Protect Data\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitlockericon250.png?resize=103%2C100&#038;ssl=1\" alt=\"Spies Say Encryption Best to Protect Data\" width=\"103\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitlockericon250.png?resize=150%2C145&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitlockericon250.png?resize=75%2C73&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitlockericon250.png?w=250&amp;ssl=1 250w\" sizes=\"auto, (max-width: 103px) 100vw, 103px\" \/><\/a>Despite what current US policy appears to be, a newly leaked document courtesy of <a title=\"Edward Snowden\" href=\"http:\/\/www.theguardian.com\/us-news\/edward-snowden\" target=\"_blank\" rel=\"noopener noreferrer\">Edward Snowden<\/a> revealed that some U.S. officials are encouraging the use of encryption to protect data.\u00a0<em><a title=\"GigaOm\" href=\"https:\/\/gigaom.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">GigaOm<\/a><\/em>\u00a0<a title=\"Leaked US report says encryption \u201cbest defense\u201d to protect data \" href=\"https:\/\/web.archive.org\/web\/20210423134457\/https:\/\/gigaom.com\/2015\/01\/16\/leaked-us-report-says-encryption-best-defense-to-protect-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">points<\/a> out a 2009 document penned by the <strong><a title=\"U.S. National Intelligence Council\" href=\"https:\/\/web.archive.org\/web\/20170413202427\/https:\/\/www.dni.gov\/index.php\/about\/organization\/national-intelligence-council-who-we-are\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. National Intelligence Council<\/a>,<\/strong> which explained that companies and the government are prone to attacks by nation-states and criminal syndicates \u201cdue to the slower than expected adoption\u2026of encryption and other technologies.\u201d The report detailed a five-year prognosis on the \u201cglobal cyber threat to the US information infrastructure\u201d and stated that <strong>encryption<\/strong> technology is the \u201c<strong>[b]est defense to protect data<\/strong>.\u201d<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20160428210542\/http:\/\/www.mmins.com\/data-breaches-are-you-protected\/data-breach-2\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101889\" title=\"750 major data breaches exposing more than 81 million private records.\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach1.jpg?resize=114%2C95&#038;ssl=1\" alt=\"750 major data breaches exposing more than 81 million private records.\" width=\"114\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach1.jpg?resize=150%2C125&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach1.jpg?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach1.jpg?w=240&amp;ssl=1 240w\" sizes=\"auto, (max-width: 114px) 100vw, 114px\" \/><\/a>Seems that these spooks were right. <a href=\"https:\/\/web.archive.org\/web\/20160729153456\/http:\/\/www.fierceitsecurity.com:80\/?\" target=\"_blank\" rel=\"noopener noreferrer\"><em>FierceITSecurity<\/em><\/a>\u00a0<a href=\"https:\/\/web.archive.org\/web\/20160602164521\/http:\/\/www.fierceitsecurity.com\/story\/infographic-750-major-data-breaches-us-last-year\/2015-01-29\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> there were <strong>750 major data breaches<\/strong> in the U.S.\u00a0last year, exposing more than <strong>81 million private records<\/strong>. <em>FierceITSecurity<\/em>\u00a0cites data from <a title=\"Syscloud\" href=\"https:\/\/www.syscloud.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SysCloud<\/a>, a provider of security and data backup for enterprises which provided the following infographic about data breaches.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20170627151252\/http:\/\/www.appstechnews.com\/news\/2015\/jan\/28\/business-data-breaches-get-more-expensive-each-year-state-enterprise-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-101892 size-large\" title=\"SysCloud infographic\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/state-enterprise-security.jpg?resize=251%2C1024&#038;ssl=1\" alt=\"SysCloud infographic\" width=\"251\" height=\"1024\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/state-enterprise-security.jpg?resize=251%2C1024&amp;ssl=1 251w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/state-enterprise-security.jpg?resize=37%2C150&amp;ssl=1 37w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/state-enterprise-security.jpg?zoom=2&amp;resize=251%2C1024&amp;ssl=1 502w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/state-enterprise-security.jpg?zoom=3&amp;resize=251%2C1024&amp;ssl=1 753w\" sizes=\"auto, (max-width: 251px) 100vw, 251px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2015\/02\/data-breach-at-health-insurer-anthem-could-impact-millions\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101894 size-medium\" title=\"U.S.\u2019s second-biggest health insurer\u00a0Anthem Inc., lost personal information for about 80 million of its customers\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/anthem_logo-1.jpg?resize=150%2C44&#038;ssl=1\" alt=\"U.S.\u2019s second-biggest health insurer\u00a0Anthem Inc., lost personal information for about 80 million of its customers\" width=\"150\" height=\"44\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/anthem_logo-1.jpg?resize=150%2C44&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/anthem_logo-1.jpg?resize=75%2C22&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/anthem_logo-1.jpg?w=444&amp;ssl=1 444w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>2015 will be worse. The <em><a title=\"Wall Street Journal\" href=\"https:\/\/www.wsj.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">WSJ<\/a><\/em> <a title=\"Health Insurer Anthem Hit by Hackers\" href=\"https:\/\/web.archive.org\/web\/20220918110358\/https:\/\/www.wsj.com\/articles\/health-insurer-anthem-hit-by-hackers-1423103720\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a>\u00a0a\u00a0single <strong>data breach<\/strong> at the U.S.\u2019s second-biggest <strong>health insurer<\/strong>\u00a0<a class=\"t-company\" title=\"NASDAQ : ANTM\" href=\"https:\/\/www.fiercehealthcare.com\/payers\/anthem-shareholders-ok-rebrand-elevance-health\" target=\"_blank\" rel=\"noopener noreferrer\">Anthem <\/a>Inc., lost personal information for about <strong>80 million<\/strong> of its customers when\u00a0attackers broke into a database. According to the <em>WSJ<\/em>, the breach exposed names, birthdays, addresses, and Social Security numbers. <a title=\"Anthem\" href=\"https:\/\/web.archive.org\/web\/20160930172023\/https:\/\/www.anthem.com\/health-insurance\/home\/overview\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Anthem<\/strong><\/a> said in <a title=\"http:\/\/www.anthemfacts.com\/\" href=\"https:\/\/web.archive.org\/web\/20201220154205\/https:\/\/www.anthemfacts.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">a statement<\/a> that the affected (plan\/brands) include Anthem Blue Cross, Anthem <strong>Blue Cross and Blue Shield<\/strong>, Blue Cross and Blue Shield of Georgia, Empire Blue Cross and Blue Shield, Amerigroup, Caremore, Unicare, Healthlink, and DeCare. Anthem did not encrypt the stolen PII according to <a title=\"Health Insurer Anthem Didn't Encrypt Data Stolen--Update\" href=\"https:\/\/web.archive.org\/web\/20150421044111\/http:\/\/www.nasdaq.com:80\/article\/health-insurer-anthem-didnt-encrypt-data-stolenupdate-20150205-01484\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a>.<\/p>\n<p><em>GigaOm<\/em> explains that <strong>encryption<\/strong> makes it possible for documents and messages to be unreadable to people who don\u2019t have the proper <a title=\"cryptographic key\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/key\" target=\"_blank\" rel=\"noopener noreferrer\">cryptographic key<\/a>.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-101904\" title=\"encryption\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt2.png?resize=329%2C92&#038;ssl=1\" alt=\"encryption\" width=\"329\" height=\"92\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt2.png?resize=150%2C42&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt2.png?resize=75%2C21&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt2.png?resize=768%2C215&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt2.png?w=915&amp;ssl=1 915w\" sizes=\"auto, (max-width: 329px) 100vw, 329px\" \/><\/p>\n<p>A cryptographic key is the core part of cryptographic operations which scramble information. Cryptographic systems include pairs of operations, such as encryption and decryption. A key is a part of the variable data that is provided as input to a cryptographic algorithm to execute this sort of operation. The security of the scheme is dependent on the security of the keys used.<\/p>\n<p>The spooks\u00a0also encouraged <strong>multi-factor authentication<\/strong>, which adds another step to the security process beyond simply entering a password.<\/p>\n<p><a href=\"http:\/\/imgkid.com\/obama-angry-face.shtml\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101896\" title=\"vocal opponent of encryption technology\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/barack-obama-angry-2.jpg?resize=133%2C100&#038;ssl=1\" alt=\"vocal opponent of encryption technology\" width=\"133\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/barack-obama-angry-2.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/barack-obama-angry-2.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/barack-obama-angry-2.jpg?resize=768%2C576&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/barack-obama-angry-2.jpg?resize=1024%2C768&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/barack-obama-angry-2.jpg?w=1500&amp;ssl=1 1500w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/barack-obama-angry-2.jpg?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/barack-obama-angry-2.jpg?w=1440&amp;ssl=1 1440w\" sizes=\"auto, (max-width: 133px) 100vw, 133px\" \/><\/a>Despite the totally porous nature of online security,\u00a0<em>GigaOm<\/em>\u00a0points out that the <strong>Obama administration is a vocal opponent of encryption technology<\/strong>. <a title=\"iPhone Encryption and the Return of the Crypto Wars\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2014\/10\/iphone_encrypti_1.html\" target=\"_blank\" rel=\"noopener noreferrer\">According<\/a> to <a title=\"Schneier on Security\" href=\"https:\/\/www.schneier.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bruce Schneier<\/a>\u00a0the gooberments opposition to encryption on phones is all bluster and sound bites.<\/p>\n<p>Encryption is no doubt a hot topic in the security space. <em>GigaOm<\/em> says there\u2019s been a wave of security start-ups focusing on encryption scoring millions of dollars in investment in recent months. Security start-ups <a title=\"http:\/\/veradocs.com\/eradocs\" href=\"http:\/\/veradocs.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Veradocs<\/a>,\u00a0<a title=\"Ciphercloud\" href=\"http:\/\/www.ciphercloud.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CipherCloud<\/a>,\u00a0and <a title=\"Ionic Security\" href=\"https:\/\/www.twilio.com\/blog\/twilio-acquires-ionic-security\" target=\"_blank\" rel=\"noopener noreferrer\">Ionic Security<\/a> have recently landed over $100 million in investments.<\/p>\n<p>Despite political pushback, it\u2019s clear that companies won\u2019t slow down on <strong>implementing encryption<\/strong>\u00a0any time soon, so long as <strong>large-scale data breaches<\/strong>\u00a0continue to occur on a seemingly weekly basis.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Is it time to go back to a cash economy?<\/em><\/p>\n<p>&nbsp;<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li>Crypto-Wars Escalate: Congress Plans Bill To Force Companies To Comply With Decryption Orders (thenewsdoctors.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Obama administration opposes encryption while spies say encryption best defense to protect data<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,2363,461,2362,125,2364,824,1282,2213,4],"class_list":["post-74723","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-anthem","tag-barack-obama","tag-blue-cross-and-blue-shield","tag-data-breach","tag-edward-snowden","tag-encryption","tag-hipaa","tag-multi-factor-authentication","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/74723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=74723"}],"version-history":[{"count":20,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/74723\/revisions"}],"predecessor-version":[{"id":127719,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/74723\/revisions\/127719"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=74723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=74723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=74723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}